Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2005-2009  (450)
  • 1995-1999
  • 1990-1994
  • 2005  (450)
  • Safari Tech Books Online  (381)
  • NetLibrary, Inc  (69)
Datasource
Material
Language
Years
  • 2005-2009  (450)
  • 1995-1999
  • 1990-1994
Year
  • 1
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A comprehensive guide to analyzing the business rationale for WLANs Evaluate the business rationale behind the deployment of WLANs, including return on investment (ROI), net present value, payback period, and total cost of ownership Develop a robust execution plan to deploy and operate the WLAN Understand the high-level technical issues of deploying and managing your WLAN from a business decision-maker's perspective Maximize the positive impact of supplementary and complementary services such as voice, video, and guest WLAN access Identify potential security threats and develop strategies to mitigate attacks Learn methodological and technical best practices from WLAN deployment case studies featuring real-world, enterprise-class businesses and institutions Gather information easily by referring to quick reference sheets and appendixes covering an antenna overview, a high-level sample project plan, checklists, and flowcharts Businesses today are increasingly adopting wireless LANs (WLANs) as a primary data transport mechanism. To determine when and how to effectively deploy WLANs, business managers, project managers, and IT executives need a clear, holistic evaluation of the business benefits and risks behind this complex technology solution. The Business Case for Enterprise-Class Wireless LANs helps you make the right decisions by explaining the business value and cost of investing in a WLAN-from security and architecture to deployment and application. Using a lifecycle perspective, this guide covers the value proposition, cost justification, and alignment of security, design, and operational components within the business. Written in an approachable style, The Business Case for Enterprise-Class Wireless LANs provides a baseline analysis of WLAN technologies for a large-scale deployment and includes concise real-world case studies with checklists and flowcharts that you can adapt for your needs. By recognizing the obstacles and advantages of implementing a WLAN from a strategic and justified business perspective, you can apply the economic benefits to your organization and ensure a timely and efficient deployment of your organization's WLAN. This volume is in the Network Business Series offered by Cisco Press®. Books in this series provide IT executives, decision makers, and networking professionals with pertinent information about today's most important technologies and business strategies.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: Exposes the inner workings of Cisco CallManager to help you maximize your Cisco IP Communications solution Read new content on QSIG, SIP trunks, video support, hunt lists and line groups, time-of-day routing, and new features added in CallManager releases 3.2, 3.3, 3.4, 4.0, and 4.1 Review content from the first edition that has been fully revised and updated to CallManager release 4.1 Learn how to deploy and manage a CallManager solution Understand the components that make up CallManager call routing through the use of basic to advanced examples that solve enterprise call routing problems Gain a full understanding of how CallManager manages media resources and processes information for conferencing, transcoding, annunciation, and more Learn detailed information about North American and international dial plans, trunk and station devices, media resources, and much more Cisco CallManager Fundamentals , Second Edition, provides examples and reference information about Cisco® CallManager, the call-processing component of the Cisco IP Communications solution. Cisco CallManager Fundamentals uses examples and architectural descriptions to explain how CallManager processes calls. This book details the inner workings of CallManager so that those responsible for designing and maintaining a Voice over IP (VoIP) solution from Cisco Systems® can understand the role each component plays and how they interrelate. This book is the perfect resource to supplement your understanding of CallManager. You'll learn detailed information about dial plan management and call routing, hardware and software components, media processing, call detail records, system management and monitoring, and the history of CallManager. The authors, all members of the original team that developed and implemented the CallManager software and documentation from its early stages, also provide a list of features and Cisco solutions that integrate with CallManager. This second edition of Cisco CallManager Fundamentals covers software releases through release 4.1. With this book, you will gain a deeper understanding of the system and find answers to questions not available in any other source. This book is part of the Cisco Press® Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 419 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Wireless LANs ; Security measures ; Electronic books ; local
    Abstract: Expert guidance for securing your 802.11 networks Learn best practices for securely managing, operating, and scaling WLANs Comprehend the security-related technological underpinnings of WLANs Explore new security protocols in 802.11i and WPA and learn how they prevent attacks Review centralized deployment models for wired/wireless integration Deepen your knowledge of defense by understanding the tools that attackers use to perform reconnaissance and to attack authentication and encryption mechanisms Understand how to design secure WLANs to support enterprise applications with the new standards and practices detailed in this book Reference the next generation authentication standards and protocols Find out about mobility, hotspots, and campus wireless networks Grasp Open Authentication, MAC-based authentication, shared key authentication, EAP authentication protocols, WEP, WPA, and 802.11i Cisco Wireless LAN Security is an in-depth guide to wireless LAN technology and security, introducing the key aspects of 802.11 security by illustrating major wireless LAN (WLAN) standards that can protect the entire network. Because a WLAN is less effective as an isolated piece of the network, this book emphasizes how to effectively integrate WLAN devices into the wired network while maintaining maximum security. Cisco Wireless LAN Security covers the spectrum of WLAN security, including protocols and specifications, vulnerabilities and threats, and, especially, deployment patterns and design guidelines. With a unique combination of theory and practice, this book addresses fundamental wireless concepts, such as WEP, and innovations, such as EAP, switching, and management. Each chapter includes detailed illustrations, checklists, design templates, and other resources. You will also find generic wireless deployment patterns based on real-world customer installations and functional examples of architecture, design, and best practices. Whether you currently design, configure, implement, and maintain WLANs or simply want to explore wireless security issues, Cisco Wireless LAN Security has everything you need to understand how to create a seamlessly secure, impenetrable 802.11 network. This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references (p. [399]-402) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xiv, 282 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: "Every programming language has its quirks. This lively book reveals oddities of the Java programming language through entertaining and thought-provoking programming puzzles." --Guy Steele, Sun Fellow and coauthor of The Java™ Language Specification "I laughed, I cried, I threw up (my hands in admiration)." --Tim Peierls, president, Prior Artisans LLC, and member of the JSR 166 Expert Group How well do you really know Java? Are you a code sleuth? Have you ever spent days chasing a bug caused by a trap or pitfall in Java or its libraries? Do you like brainteasers? Then this is the book for you! In the tradition of Effective Java™ , Bloch and Gafter dive deep into the subtleties of the Java programming language and its core libraries. Illustrated with visually stunning optical illusions, Java™ Puzzlers features 95 diabolical puzzles that educate and entertain. Anyone with a working knowledge of Java will understand the puzzles, but even the most seasoned veteran will find them challenging. Most of the puzzles take the form of a short program whose behavior isn't what it seems. Can you figure out what it does? Puzzles are grouped loosely according to the features they use, and detailed solutions follow each puzzle. The solutions go well beyond a simple explanation of the program's behavior--they show you how to avoid the underlying traps and pitfalls for good. A handy catalog of traps and pitfalls at the back of the book provides a concise taxonomy for future reference. Solve these puzzles and you'll never again fall prey to the counterintuitive or obscure behaviors that can fool even the most experienced programmers.
    Note: Includes bibliographical references (p. 265-269) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 306 p. ; , 24 cm
    DDC: 005.1/4
    Keywords: Debugging in computer science ; Electronic books ; local
    Abstract: 50 exercises to help you find bugs faster -- with less aggravation! Bug hunting is an art, and you need to be a master . Get Find the Bug , and you'll become one. Long-time Microsoft programmer Adam Barr presents 50 programs, each with exactly one bug. Your assignment: find it. As you do, Barr will teach you how to "think like your processor"... anticipating exactly how code will behave, even without running it. You'll learn better ways to read code, understand it -- and above all, improve it. Whether you're building new systems or maintaining someone else's, you'll find bugs earlier, faster, with less frustration... and write cleaner code to begin with. Presents "bugged" programs in C, Java, Python, Perl, and x86 assembly language, with carefully explained solutions Includes language overviews to help you debug all 50 examples, even if you don't know the language Shows how to look past the "surface" of code to uncover its hidden internal logic Offers practical guidance on analyzing programs, including specific inputs to test Presents a wide range of realistic bugs, with no phony "gotchas" Draws on the types of coding and debugging challenges Microsoft uses to interview new programmers An indispensable resource for working programmers, maintainers, testers, quality specialists, and everyone involved in code reviews © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 295-298) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 397 p. , ill. ; , 25 cm
    DDC: 005.1/068/5
    Keywords: Capability maturity model (Computer software) ; Electronic books ; local
    Abstract: Use Assessments to Drive Process Improvements in Software, Systems, Human Resources, and Beyond Pioneered by the world's leading innovators in software engineering, assessments have evolved into a remarkably powerful tool for process improvement in areas ranging from systems to services, hardware to human resources. Unlike audits, assessments are conducted from the inside. When handled correctly, assessments can help transform technical and managerial culture, dramatically improving both quality and profitability. In CMMI Assessments: Motivating Positive Change , two of the field's most respected leaders show exactly how to use them for maximum business advantage. Writing for executives, managers, technical professionals, and assessors themselves, Marilyn Bush and Donna Dunaway illuminate every phase of the assessment process-from planning through post-assessment follow-up. The authors begin with an expert overview of what assessments entail, when they make sense, how to set achievable goals for them, and how to lead them to success. Next, they "drill down" into each stage of the process, presenting step-by-step instructions and defining the roles and responsibilities of every participant. Coverage includes creating and training assessment teams; identifying assessment products; consolidating interview data and other onsite activities; presenting results; and using those results productively. Drawing on their unsurpassed experience leading assessments and mentoring assessors, they offer deep insights into the real-world challenges and obstacles you'll face-and proven solutions. They also present an extended case study showing how a real software development organization drove continuous improvement through four years of iterative assessments-moving from CMM Level 2 to elite Level 5 status, and driving dramatic business benefits along the way. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 375-380) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 643 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: HP-UX ; Operating systems (Computers) ; Electronic books ; local
    Abstract: This is the definitive guide to installing and administering HP-UX 11i Version 2 in any environment, on both HP 9000 and HP Integrity server families. Drawing on 18 years of on-site HP-UX consulting experience, Marty Poniatowski offers unparalleled practical insight into running HP-UX 11i efficiently and reliably, illuminating features even experienced HP-UX sysadmins find confusing. Poniatowski organizes this book around your day-to-day needs and your system's lifecycle. He begins with in-depth coverage of installation and bootup, then walks through everything from LVM and kernel configuration through networking. He especially focuses on the capabilities and tools that make HP-UX unique-and how you can use them to save time and money. Coverage includes Partitioning from start to finish-including vPars and nPartitions installation, creation, and modification Booting HP Integrity systems with EFI, and HP 9000 systems with PDC, ISL, or hpux Mastering the Management Processor (MP): console, virtual front panel, and command menu Using HP-UX's new kernel-building commands: kcconfig, kcusage, kctune, kcmodule, and more Working with HP-UX's new web-based tools: pd (devices), parmgr (partitions), and kcweb (kernel) Mapping LBA to slot numbers: clear explanations of a non-intuitive technique Using Ignite-UX to boot and recover systems across the network Managing disks, devices, backup, users/groups, and much more © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 695 p. , ill. ; , 24 cm
    Series Statement: IBM Press series--information management
    Keywords: WebSphere ; Application software ; Development ; Java (Computer program language) ; Web servers ; Computer programs ; Web site development ; Electronic books ; local
    Abstract: The expert guide to deploying and managing any WebSphere Application Server V5.x application and environment If you're a WebSphere Application Server administrator or developer, this is your advanced guide for delivering applications rapidly, running them smoothly, and administering them efficiently. Four leading IBM consultants draw on their years of experience to illuminate the key steps involved in taking WebSphere Application Server applications from development to production. They focus on the areas most crucial to success, including application assembly and build, application and infrastructure configuration and administration, and application testing and verification. Along the way, they show how to implement automated deployment processes that can be executed frequently, reliably, and quickly-so you can get your applications to market fast. The focus is on WebSphere Application Server Version 5.1, but much of the information applies to other versions. Coverage includes Installing, testing, and managing WebSphere Application Server environments: clustering, security, messaging, integration, and more Deploying and managing key J2EE technologies: JDBC, Connectors, EJB, container managed and message driven beans, transactions, JMS, JavaMail, and more Deploying highly available, scalable multi-node WebSphere Application Server environments: clustering, distributed session management, and edge components Advanced considerations: working with Java Management Extensions, caching, and much more Performance-tuning tools Troubleshooting Leveraging key WebSphere deployment and administration tools: ANT, wsadmin, Admin Console, and the Application Server Toolkit Advanced discussions of J2EE and architectural concepts you need to deploy successfully-with practical examples © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 1664 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: HP-UX ; Hewlett-Packard computers ; Programming ; Examinations ; Study guides ; Operating systems (Computers) ; Electronic books ; local
    Abstract: HP-UX CSE: Official Study Guide and Desk Reference The definitive HP-UX CSE exam preparation guide and reference HP-approved coverage of all three CSE exams: CSE HP-UX Advanced System Administration, CSE High Availability Using HP-UX Serviceguard, and CSE HP-UX Networking and Security Comprehensive study resources: exam objectives, sample questions, and summaries for last-minute review More than a great study guide: an outstanding reference for working system engineers This book delivers comprehensive preparation for all three HP-UX CSE exams, the core exam: CSE HP-UX Advanced System Administration, and specialty exams, CSE High Availability Using HP-UX Serviceguard and CSE HP-UX Networking and Security . Coverage includes: Implementing HP-UX in technology-rich enterprise environments Maximizing the performance and availability of HP-UX systems and applications Partitioning: node and virtual partitions Disks, volumes, file systems: RAID, LVM, VxVM, HFS, VxFS, VFS layer, swap/dump space, and more Monitoring system resources, activities, events, and kernels Processes, threads, and bottlenecks: priorities, run queues, multi-processor environments, memory requirements, bottlenecks, and more Installation, patching, and recovery, including Software Distributor and Ignite-UX Emergency recovery with HP-UX installation media Broad networking coverage: IPv6, ndd, DHCP, DNS, NTP, CIFS/9000, LDAP, sendmail, Automatic Port Aggregation, VPNs, VLANs, and more Planning, implementing, and managing high availability clustering with Serviceguard Other HP-UX cluster solutions: Extended Serviceguard Cluster, Metrocluster, Continentalclusters, and more Infrastructure for remote access to HA clusters: SANs, DWDM, dark fiber HP-UX security administration: Trusted systems, SSH, HIDS, IPSec, IPFilter, and Bastille Operating Systems/HP-UX Sample questions, last-minute review tips, and other study resources This isn't just an outstanding prep guide, it's the definitive day-to-day reference for working professionals in high availability environments. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 525 p. , ill. ; , 24 cm
    DDC: 005.2'765
    Keywords: Lotus Notes ; WebSphere ; Software configuration management ; Web servers ; Computer programs ; Electronic books ; local
    Abstract: Straight from IBM, this is the first comprehensive guide to building collaborative solutions that integrate WebSphere and Lotus to drive maximum business value. Writing for experienced Web developers, three leading IBM consultants show how to design and deploy WebSphere and Domino together in any environment, no matter how large or complex. The authors address architecture, security, performance, availability, development, and much more. Using their techniques, you can implement cutting-edge collaboration, drive productivity improvements, streamline business processes, accelerate response times-and build your On Demand enterprise. Coverage includes Architecting WebSphere and Lotus collaboration for maximum effectiveness Establishing a common platform that reduces administrative costs and increases ROI Choosing what to deploy on WebSphere and what to deploy on Domino Optimizing new Lotus collaborative applications for existing WebSphere environments Managing integrated WebSphere and Domino systems Using WebSphere and Domino development tools to extend and customize your system Accessing J2EE from Domino-and vice versa Detailed appendices on WebSphere Application Server, Domino, WebSphere Portal, Lotus Workplace, and much more... © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 501-504) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Pearson Education/PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 337 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: BEA WebLogic server ; BEA WebLogic workshop ; Client/server computing ; Java (Computer program language) ; Web services ; Electronic books ; local
    Abstract: "Very impressive work. This book is valuable for beginning and intermediate technologists." Dwight Mamanteo, Technical Manager, BEA Systems "Provides explanations of Web services, tuning tips, and discussions on security that will likely be of benefit to developers as they create their Web services." Robert W. Husted, Member, Technical Staff, Requisite Software Build Web services infrastructure based on service-oriented architecture (SOA) Implement enterprise-class Web services using WebLogic and J2EE Complete lifecycle coverage with best practices: design, prototyping, development, testing, deployment, and management Real-world enterprise Web services implementation with J2EE and WebLogic You've seen plenty of theory about Web services. This book is about the reality: what it takes to successfully implement J2EE Web services with BEA WebLogic in complex enterprise environments. Anjali Anagol-Subbarao, one of the world's leading Web services experts, offers powerful insights for every stage of the Web services lifecycle: design, prototyping, development, testing, deployment, and management. Anagol-Subbarao draws on her experience architecting and building Web services infrastructure for HP's worldwide operations and takes on the challenges that face every enterprise implementer. She demonstrates how to design robust Web services that align with business processes, smoothly integrate with existing infrastructure, deliver superior performance and security, and can be managed effectively. Coverage includes Primers on WebLogic Workshop, WebLogic Server, WLI, and J2EE Web services technology Building effective service-oriented architectural (SOA) frameworks Translating designs into working code Designing for end-to-end security and tuning for high performance Testing Web services and deploying them to production environments Addressing the unique challenges associated with managing distributed Web services © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxi, 434 p. , ill. ; , 24 cm
    Series Statement: Robert C. Martin series
    DDC: 005.1
    Keywords: Application software ; Development ; Electronic books ; local
    Abstract: Get more out of your legacy systems: more performance, functionality, reliability, and manageability Is your code easy to change? Can you get nearly instantaneous feedback when you do change it? Do you understand it? If the answer to any of these questions is no, you have legacy code, and it is draining time and money away from your development efforts. In this book, Michael Feathers offers start-to-finish strategies for working more effectively with large, untested legacy code bases. This book draws on material Michael created for his renowned Object Mentor seminars: techniques Michael has used in mentoring to help hundreds of developers, technical managers, and testers bring their legacy systems under control. The topics covered include Understanding the mechanics of software change: adding features, fixing bugs, improving design, optimizing performance Getting legacy code into a test harness Writing tests that protect you against introducing new problems Techniques that can be used with any language or platformwith examples in Java, C++, C, and C# Accurately identifying where code changes need to be made Coping with legacy systems that aren't object-oriented Handling applications that don't seem to have any structure This book also includes a catalog of twenty-four dependency-breaking techniques that help you work with program elements in isolation and make safer changes. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit | Boston, MA :Safari,
    Language: English
    Pages: 290 p. ; , 23 cm
    Keywords: Flash (Computer file) ; Computer animation ; Electronic books ; local
    Abstract: This guide allows you to learn specific Flash skills step-by-step at your own pace. Choose from among several tutorials to develop the skills that are most appropriate to the Flash projects you are working on at any given time. Each lesson leads you through the workflow for implementing a specific real-world feature or effect in your Flash applications. In Macromedia Flash 8: A Tutorial Guide, learn how to: • Navigate the Flash workspace and use common document types • Use the Flash drawing tools and create engaging graphic effects • Use ActionScript to add interactivity and custom functionality to your documents • Connect your Flash projects to external data sources to create data-driven applications Powerful development and design tools require thorough and authoritative technical advice and documentation. When it comes to Macromedia Flash, no one is more authoritative than Macromedia's own development and writing teams. Now their official documentation is available to you in printed book form. As you work, keep this guide by your side for ready access to valuable information on using Flash. We've designed it so that it's easy to annotate as you progress.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 369 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Linux ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: Covers Red Hat and SUSE When something goes wrong with your Linux firewall, you need to fix it-right now. You don't have time for endless newsgroup searches, confusing man pages, emails to the developers... it's an emergency! One book brings together all the step-by-step solutions and proven problem-solving techniques you'll need when the time comes: Troubleshooting Linux® Firewalls . Authors Michael Shinn and Scott Shinn are among the world's leading firewall experts; they've even been hired to protect computer security at the White House. In this book, they cover every area where Linux firewalls can go wrong: rules and filtering problems, Layer 2/3/4 issues, trouble with individual services, DNS/DHCP failures, even misconfigured VPNs. They also present an easy, start-to-finish troubleshooting methodology that'll help you identify even the newest or most obscure firewall problem fast-and solve it! Inside, you will find in-depth information on the following areas: What you must know about iptables and netfilter to troubleshoot and avoid problems Using loggers, sniffers, and other tools to diagnose even the most obscure firewall problems Making sure your firewall rules work the way they're supposed to Resolving problems with Network Address Translation and IP Forwarding Troubleshooting SMTP, Apache, Squid, NFS, FTP, instant messaging, and other Web-based services Finding and fixing common problems with IPsec VPN configuration Making your firewalls more failure-resistant: recommendations from the experts If you depend on a Linux firewall, what will you do if it goes down? With Troubleshooting Linux® Firewalls , you can be confident that the solutions are right at hand-so you can sleep at night! © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxviii, 651 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Where has this book been all my professional life? It is about time someone wrote this book. The author covers many basic, practical issues that other authors omit in a format that makes for a great troubleshooting reference and for casual perusing. There are a lot of books available that give a broad overview of system and network administration, and there are a lot of detailed books on each specific topic covered in this book, but I don't know of any other place where I can get so much useful, practical information on such a wide range of topics in such a concise and readable form. I will highly recommend it to my friends and colleagues who are trying to manage their own systems. I am anxious to show it to our instructors who teach data communications and networks as a possible text or lab manual." -Ron McCarty, instructor and program chair, Computer Science, Penn State Erie "This book takes a very unique approach and is very flexible. It offers a great deal to the home user, students, small businesses-all the way to any Linux sys admin that needs a handy reference. I found it very refreshing in terms of style, stated goals, presentation, ease of use, direction, and the "present and future" value of the content. In other words the author is very current and knowledgeable. I would recommend this book to every level from programmer to manager." -Joe Brazeal, Information Technician III, Southwest Power Pool "This book is an excellent resource for new Linux administrators. I was impressed with the comprehensive set of 35 topic chapters, making this book a very useful reference. I know of no other work like this." -George Vish II, Linux curriculum program manager and senior education consultant, Hewlett-Packard Education "I would recommend this book to novice Linux users and administrators. It covers a lot of topics, and makes it easy for readers to follow along." -Bret Strong, education consultant, Hewlett-Packard Company "Linux Quick Fix Notebook is a well-written guide to designing, installing, and maintaining Linux servers. Many Linux reference texts are just simple rewrites of Linux ¨man¨ and ¨info¨ pages, but this book addresses the real issues that systems administrators encounter when working with Linux. The author provides a pedagogical guide to learning Linux server administration. In addition, the book includes step-by-step information so that users can quickly take advantage of the best that open source software has to offer today. I...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: The all-in-one guide to modern routed and switched campus network design Understand the network design process and network design models Learn how switches are used in network design Design an IP addressing plan and select appropriate IP routing protocols Apply network security design principles to boost network security Enable WLANs to improve workforce mobility Examine QoS design requirements and tools Unleash the power of voice transport over data networks, including VoIP and IP telephony Use content networking to provide content to users quickly and efficiently Learn how to integrate network management protocols and tools into network designs Understand how to effectively integrate IP multicast, high availability, storage networking, and IPv6 into your network designs Over the past decade, campus network design has evolved many times as new technologies have emerged and business needs have changed. For enterprises to take advantage of cost-saving, productivity-enhancing solutions, such as IP telephony and content networking, their core infrastructures must include the key enabling technologies required by these solutions and provide a resilient, secure foundation that can scale to business needs. As with any architecture, designing a solid foundation is the first step. Campus Network Design Fundamentals is an all-in-one guide to key technologies that can be integrated into network design. The book provides insight into why each technology is important and how to apply this knowledge to create a campus network that includes as many or as few of today's productivity-enhancing applications as are needed in your environment. Topics covered throughout the book include network design process and models, switching, IP routing, quality of service (QoS), security, wireless LANs (WLANs), voice transport, content networking, network management, IPv6, IP multicast, increasing network availability, and storage networking. Sample network designs are included through-out, and the book concludes with a comprehensive case study that illustrates the design process and solutions for headquarters, branch offices, and home office/remote users. Whether you need an overview of modern campus technologies or seek advice on how to design switched and routed networks that securely support these technologies, this book is your comprehensive resource to the foundations upon which all modern-day campus networks are based. This book is part of the Cisco Press® Fundament...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Identify, mitigate, and respond to network attacks Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS Evaluate Intrusion Prevention System (IPS) solutions including IPS integration and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) configuration Deploy VPN solutions including site-to-site IPsec VPNs, remote- access VPNs, and Public Key Infrastructure (PKI) Learn to manage firewall, IPS, and VPN solutions with Adaptive Security Device Manager (ASDM) Achieving maximum network security is a challenge for most organizations. Cisco® ASA, a new unified security device that combines firewall, network antivirus, intrusion prevention, and virtual private network (VPN) capabilities, provides proactive threat defense that stops attacks before they spread through the network. This new family of adaptive security appliances also controls network activity and application traffic and delivers flexible VPN connectivity. The result is a powerful multifunction network security device that provides the security breadth and depth for protecting your entire network, while reducing the high deployment and operations costs and complexities associated with managing multiple point products. Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance is a practitioner's guide to planning, deploying, and troubleshooting a comprehensive security plan with Cisco ASA. The book provides valuable insight and deployment examples and demonstrates how adaptive identification and mitigation services on Cisco ASA provide a sophisticated security solution for both large and small network environments. The book contains many useful sample configurations, proven design scenarios, and discussions of debugs that help you understand how to get the most out of Cisco ASA in your own network. "I have found this book really highlights the practical aspects needed for building real-world security. It offers the insider's guidance needed to plan, implement, configure, and troubleshoot the Cisco ASA in customer environments and demonstrates the potential and power of Self-Defending Networks." -Jayshree Ullal, Sr. Vice President, Security Technologies Group, Cisco Systems® This security book is part of th...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Direct from the creators of the Java™ programming language, the completely revised fourth edition of The Java™ Programming Language is an indispensable resource for novice and advanced programmers alike. Developers around the world have used previous editions to quickly gain a deep understanding of the Java programming language, its design goals, and how to use it most effectively in real-world development. Now, Ken Arnold, James Gosling, and David Holmes have updated this classic to reflect the major enhancements in Java™ 2 Standard Edition 5.0 (J2SE™ 5.0). The authors systematically cover most classes in Java's main packages, java.lang.* , java.util, and java.io, presenting in-depth explanations of why these classes work as they do, with informative examples. Several new chapters and major sections have been added, and every chapter has been updated to reflect today's best practices for building robust, efficient, and maintainable Java software. Key changes in this edition include New chapters on generics, enums, and annotations, the most powerful new language features introduced in J2SE 5.0 Changes to classes and methods throughout to reflect the addition of generics Major new sections on assertions and regular expressions Coverage of all the new language features, from autoboxing and variable argument methods to the enhanced for-loop and covariant return types Coverage of key new classes, such as Formatter and Scanner The Java™ Programming Language, Fourth Edition, is the definitive tutorial introduction to the Java language and essential libraries and an indispensable reference for all programmers, including those with extensive experience. It brings together insights you can only get from the creators of Java: insights that will help you write software of exceptional quality.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    San Jose, Calif. : Adobe ; | Boston, MA :Safari,
    Language: English
    Pages: 600 p. ; , 24 cm
    DDC: 005.72
    Keywords: Adobe Acrobat (Computer file) ; Electronic books ; local
    Abstract: Ready to learn the visual effects secrets used at such leading-edge studios as Industrial Light + Magic and The Orphanage? Adobe After Effects 6.5 Studio Techniques inspires you to take your work to the next level with realworld examples and insider techniques. Get blockbuster results without the big budget as you delve deep into the essence of visual effects. This book goes beyond conventional step-by-step instruction, teaching you bread-and-butter effects that you can adapt and combine for countless projects. • Real solutions from real professionals: Nobody does it better, and now they'll show you how. Discover the keys to analyzing your shots from Stu Maschwitz, Visual Effects Supervisor for Star Wars, Episode One and Sin City . Unlock the mysteries of linear color space with Brendan Bolles, co-creator of the eLin plug-ins. Master fundamental effects techniques with Mark Christiansen, After Effects specialist for The Orphanage on The Day After Tomorrow . • Compositing essentials: No matter how sophisticated the effect, they all start from the same building blocks. Find out what you've been missing about color and light matching, keying, motion tracking, rotoscoping, working with film, and more. • Advanced techniques: Your goal should be effects so good that no one notices them. From sky replacement to explosions, from smoke to fire, learn to bring your shots to life and enhance scenes without anyone ever knowing what they're seeing isn't 100% real. • Companion CD-ROM: Professional tools produce professional results. Demo versions of plug-ins from Andersson Technologies, Red Giant Software, Frischluft, and Trapcode will enhance your work. Stop relying on ready-made solutions and pre-built effects. Learn how to build up and customize your own effects with the tools at hand-you'll be amazed at how much better the results look!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley Professional | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Eclipse Distilled David Carlson Foreword by Grady Booch Series Editors Erich Gamma Lee Nackman John Wiegand A Concise Introduction to Eclipse for the Productive Programmer Organized for rapid access, focused on productivity, Eclipse Distilled brings together all the answers you need to make the most of today's most powerful Java development environment. David Carlson introduces proven best practices for working with Eclipse, and shows exactly how to integrate Eclipse into any Agile development process. Part I shows how to customize workspaces, projects, perspectives, and views for optimal efficiency-and how to leverage Eclipse's rapid development, navigation, and debugging features to maximize both productivity and code quality. Part II focuses entirely on Agile development, demonstrating how Eclipse can simplify team ownership, refactoring, continuous testing, continuousintegration, and other Agile practices. Coverage includes Managing Eclipse projects from start to finish: handling both content and complexity Using perspectives, views, and editors to work more efficiently Setting preferences to fit your own unique needs-or your team's Leveraging Eclipse's powerful local and remote debugging tools Understanding how Eclipse fits into contemporary iterative development processes Performing continuous testing with JUnit in the Eclipse environment Using Eclipse's wizard-assisted refactoring tools Implementing continuous integration with Ant-based automated project builders Employing best practices for code sharing with CVS and other repositories By focusing on need-to-know information and providing best practices and methodologies, this book is designed to get you working with Eclipse quickly. Whether you're building enterprise systems, Eclipse plug-ins, or anything else, this concise book will help you write better code-and do it faster. About the Author David Carlson is a developer, researcher, author, instructor, and consultant who thrives on innovative technology. He started using Java in 1995 and Eclipse in 2001. David has a Ph.D. in Information Systems from the University of Arizona and is a frequent speaker at conferences and a contributor to technical journals. He is creator of the hyperModel plug-in for Eclipse, and author of Modeling XML Applications with UML (Addison-Wesley, 2001). Cover photo: © archivberlin Fotoagentur GmbH / Alamy Addison-Wesley www.awprofessional.com/series/eclipse ISBN 0-321-28815-7 $34.99 US $48.99 CANADA © Copyr...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley Professional | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Finally, there's a book that treats Excel as the powerful development platform it really is, and covers every facet of developing commercial-quality Excel applications. This is not a book for beginners. Writing for professional developers and true Excel experts, the authors share insider's knowledge they've acquired building Excel applications for many of the world's largest companies-including Microsoft. Professional Excel Development demonstrates how to get the utmost from Excel, addressing everything from application architectures through worksheet and userform design, charting, debugging, error handling and optimizing performance. Along the way, the authors offer best practices for every type of Excel development, from building add-ins through interacting with XML Web services. Coverage includes Building add-ins to provide new Excel functions Designing effective worksheets, userforms and other user interface elements Leveraging Excel's powerful data analysis features Creating sophisticated custom charts Handling errors, debugging applications and optimizing performance Using class modules and interfaces to create custom objects Understanding Windows API calls: when to use them, and how to modify them Adding worksheet functions with C-based XLLs Programming with databases Controlling external applications from Excel Integrating with Visual Basic 6, VB.NET and Visual Studio Tools for Office Using XML to import and export data and communicate with Web services Providing help, securing, packaging and distributing The accompanying CD-ROM contains the book's sample timesheet application at every stage of construction, with detailed code comments. It also includes many examples of the concepts introduced in each chapter and a collection of the authors' Excel development utilities. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvi, 316 p. , ill. ; , 24 cm
    DDC: 006.74
    Keywords: HTML (Document markup language) ; Electronic books ; local
    Abstract: The fastest route to true HTML/CSS mastery! Need to build a web site? Or update one? Or just create some effective new web content? Maybe you just need to update your skills, do the job better. Welcome. This book's for you. We'll leverage what you already know about the web, so you'll go further, faster than you ever expected. You'll master today's best practices: the real nuts and bolts, not theory or hooey. You'll learn through dozens of focused HTML, XHTML, and CSS examples: crafted for simplicity and easy to adapt for your own projects. Need specific solutions? This book's modular, visual, high-efficiency format delivers them instantly . Molly E. Holzschlag draws on her unparalleled experience teaching Web design and development. No other HTML/CSS guide covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with HTML, XHTML, and CSS in real-world projects Learn how to build web pages that'll work in any environment, on virtually any contemporary browser Construct templates that simplify every page you develop Structure and tag text so it's easy to work with and manage Add images, media, and scripts-quickly and reliably Discover the right ways to use HTML tables Build easy-to-use forms and validate your users' input Use CSS to take total control over your site's look and feel Master core CSS techniques: color, images, text styles, link effects, lists, navigation, and more Control margins, borders, padding, positioning, floats, even Z-index Design efficient, compatible, easy-to-manage CSS layouts Includes concise XHTML and CSS annotated references: quick help for every language element Spring Into... is a new series of fast-paced tutorials from Addison-Wesley. Each book in the series is designed to bring you up to speed quickly. Complex topics and technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working...now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 352 p. , ill. ; , 23 cm. +
    DDC: 005.446
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Enter your Linux Desktop Garage Don't just survive with Linux: thrive Find tools & info to do practically everything , such as: Ripping your CDs (&DVDs) De-Spam-ifying your email Capturing, editing, organizing your digital photos Chatting with your Linux-deficient IM pals Tracking your contacts, appointments, life Transforming Firefox into easy blogware Finding great substitutes for your Windows apps Diving into a veritable plethora of games Where you get the truth (unvarnished) Where you get productive (quick) Where Linux is fun (honest) Your guide: Susan Matteson , real user, real expert She reveals the fun stuff (from MP3s to desktop wallpaper) Demystifies the essentials (from file management to passwords) Simplifies the tasks they said were easy, but weren't (until now) Where there's even more (plenty) Step-by-step instructions for both Mandrake & Fedora Linux Zero-hassle tips for managing & personalizing your PC Gnoppix Linux on CD-ROM (run Linux without touching Windows) © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR ; | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 353 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The first comprehensive, expert guide for end-to-end Linux application optimization Learn to choose the right tools-and use them together to solve real problems in real production environments Superior application performance is more crucial than ever-and in today's complex production environments, it's tougher to ensure, too. If you use Linux, you have extraordinary advantages: complete source code access, plus an exceptional array of optimization tools. But the tools are scattered across the Internet. Many are poorly documented. And few experts know how to use them together to solve real problems. Now, one of those experts has written the definitive Linux tuning primer for every professional: Optimizing Linux® Performance. Renowned Linux benchmarking specialist Phillip Ezolt introduces each of today's most important Linux optimization tools, showing how they fit into a proven methodology for perfecting overall application performance. Using realistic examples, Ezolt shows developers how to pinpoint exact lines of source code that are impacting performance. He teaches sysadmins and application developers how to rapidly drill down to specific bottlenecks, so they can implement solutions more quickly. You'll discover how to: Identify bottlenecks even if you're not familiar with the underlying system Find and choose the right performance tools for any problem Recognize the meaning of the events you're measuring Optimize system CPU, user CPU, memory, network I/O, and disk I/O-and understand their interrelationships Fix CPU-bound, latency-sensitive, and I/O-bound applications, through case studies you can easily adapt to your own environment Install and use oprofile, the advanced systemwide profiler for Linux systems If you're new to tuning, Ezolt gives you a clear and practical introduction to all the principles and strategies you'll need. If you're migrating to Linux, you'll quickly master Linux equivalents to the tools and techniques you already know. Whatever your background or environment, this book can help you improve the performance of all your Linux applications-increasingbusiness value and user satisfaction at the same time. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 338 p. , ill. ; , 24 cm
    DDC: 005.2762
    Keywords: Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: Easy-to-follow coverage of twelve indispensable Jakarta Commons packages Code examples that show innovative uses of Commons components, including using HttpClient to access Web resources, FileUpload for handling HTTP file uploads, and BeanUtils for easy form generation Detailed instructions for combining the Commons project libraries with the popular Eclipse IDE Save time and money with reusable open source Java™ components Master the Jakarta Commons Library of Open Source JavaTM Components Using the Apache Jakarta Commons reusable Java™ components, you can leverage the work of the global open-source community to solve common programming problems reliably, quickly, and inexpensively. But, to use the Commons libraries effectively, you need far more guidance than the official documentation offers. In Apache Jakarta Commons: Reusable Java™ Components, Will Iverson covers what Java developers need to know to take full advantage of Jakarta Commons-starting right now. Iverson begins with a definitive overview of the Commons project: goals, installation, and getting started with Commons components. Next, he presents example-rich chapters on the twelve most useful Commons packages, covering topics ranging from HTTP FileUpload to database connectivity. Iverson provides detailed code samples for every component he describes. After you've mastered the core Jakarta Commons packages, you'll constantly rely on this book's handy seventy-five page quick-reference. Iverson's coverage includes Downloading Commons project libraries and installing them into Eclipse Programmatically accessing resources via HTTP, FTP, NNTP, and other Internet protocols Using the Jakarta Commons suite of configurable object pools Managing database connectivity in Swing applications-and anywhere containers aren't doing it for you Using BeanUtils to generate forms and gain runtime access to information provided by JavaBeans-style objects Traversing complex object graphs with JXPath Using Jakarta Commons' advanced collections tools to establish richer object relationships Extending java.lang with better methods for manipulating core classes Implementing conversion routines, configurable logging, command-line help, and more Exploring the newest packages, including emerging "sandbox" packages Whether you're building code for front-end Web applications, client-side software, or back-end servers, learning Jakarta Commons will make you far more efficient. Apache Jakarta Commons is the faste...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: "This book is the best way for beginning developers to learn wxWidgets programming in C++. It is a must-have for programmers thinking of using wxWidgets and those already using it." -Mitch Kapor, founder of Lotus Software and the Open Source Applications Foundation Build advanced cross-platform applications that support native look-and-feel on Windows, Linux, Unix, Mac OS X, and even Pocket PC Master wxWidgets from start to finish-even if you've never built GUI applications before Leverage advanced wxWidgets capabilities: networking, multithreading, streaming, and more CD-ROM: library of development tools, source code, and sample applications Foreword by Mitch Kapor, founder, Lotus Development and Open Source Application Foundation wxWidgets is an easy-to-use, open source C++ API for writing GUI applications that run on Windows, Linux, Unix, Mac OS X, and even Pocket PC-supporting each platform's native look and feel with virtually no additional coding. Now, its creator and two leading developers teach you all you need to know to write robust cross-platform software with wxWidgets. This book covers everything from dialog boxes to drag-and-drop, from networking to multithreading. It includes all the tools and code you need to get great results, fast. From AMD to AOL, Lockheed Martin to Xerox, world-class developers are using wxWidgets to save money, increase efficiency, and reach new markets. With this book, you can, too. wxWidgets quickstart: event/input handling, window layouts, drawing, printing, dialogs, and more Working with window classes, from simple to advanced Memory management, debugging, error checking, internationalization, and other advanced topics Includes extensive code samples for Windows, Linux (GTK+), and Mac OS X About the CD-ROM The CD-ROM contains all of the source code from the book; wxWidgets distributions for Windows, Linux, Unix, Mac OS X, and other platforms; the wxWidgets reference guide; and development tools including the OpenWatcom C++ compiler, the poEdit translation helper, and the DialogBlocks user interface builder. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Indianapolis, Ind. : Pearson Education, Inc. | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 575 p. , ill. ; , 23 cm
    Edition: NetWare ed.
    DDC: 005.4/3
    Keywords: NetWare ; Handbooks, manuals, etc ; Operating systems (Computers) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Novell® Open Enterprise Server Administrator's Handbook, NetWare® Edition covers the major components and features of Open Enterprise Server (OES) on the NetWare platform. This book helps you understand how to integrate the benefits of OES in an existing environment. After a brief introduction to the concepts necessary to introduce features, the book focuses on the implementation of OES on the NetWare platform. While this book is not a reference for network theory, protocols or architectures, the administrator will learn about adding open source options, features and technologies that extend the applicability and value of NetWare and how to use the major components and features of OES on NetWare.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams ; | Boston, MA :Safari,
    Language: English
    Pages: 948 p. ; , 24 cm
    DDC: 005.2762
    Keywords: JBoss (Computer file) ; Web sites ; Authoring programs ; Electronic books ; local
    Abstract: If you need to understand how JBoss works, why not learn it from the people who created it? JBoss 4.0 - The Official Guide is the authoritative resource recognized as the official print documentation for JBoss 4.0. The only book for advanced JBoss users, this guide presents a complete understanding to configuring and using JBoss 4.0. It is fully up-to-date with the new features and changes in JBoss 4.0, including those used to integrate development with Eclipse, incorporate Aspect-Oriented Programming and implement J2EE 1.4 functionality months ahead of the commercial competition. Get under the hood and explore everything that JBoss 4.0 can offer you with JBoss 4.0 - The Official Guide .
    Note: Includes CD-ROM
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Indianapolis : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 338.4/762138
    Keywords: Electronic industries ; Technological innovations ; Electronic industries ; Household electronics ; Electronic books ; local
    Abstract: "The consumer electronics world sets a blistering pace for innovation, and anyone hoping to keep up-or take the lead-should read this book. Insightful and comprehensive, it maps out the industry terrain, and then points the way toward opportunities that lie ahead. Bailey and Wenzek have put together a compelling read on this fas­cinating global industry." -Tom Kelley, General Manager IDEO author, The Ten Faces of Innovation "Consumer electronics is one of the largest, fastest growing, most exciting, and most ruthless markets in the global economy. And technology and innovation are pouring into the space at an accelerating pace. Unfortunately, many vendors are not making money. Maniacal focus on return on investment is the key to success, and this book provides thought-provoking ideas on how to drive it." -Mike Bingle, Managing Director Silver Lake Partners "An industry built on the foundation of market dominance is being shaken up. In consumer electronics, those keystone companies that appraise the innovative value of niche players regain profitable growth. This book outlines what it takes to win in a turbulent ecosystem." -Marco Iansiti, Professor of Business Administration Harvard Business School The consumer electronics industry is entering an era of extraordinary growth. The industry's best companies will ride that wave to unprecedented success. But, today, many CE companies are struggling with business models that are simply untenable. They must change to survive: they must change even more dramatically to win. In this book, two world-renowned consultants preview the industry's future-from online gaming to telehealthcare, and beyond. Next, they present a powerful new blueprint, offering indispensable guidance on everything from technology platforms to user interface design, branding to channel strategies. You'll discover how to uncover new sources of value, design better models for doing business, and fuel growth by reaching new geographical markets. Whatever your role in the industry, this book will help you: · Make better decisions, find your differentiators, and focus on your key success drivers · Tap into the emergent "meta-value" that arises when technologies, devices, services, and content come together · Reach tomorrow's smart, service-sensitive shopper: not just the "technology-hungry" customers · Widen margins by adding value consumers will pay for · Transform cost structures to support rapid growth and nonstop change ·...
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Pearson Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxii, 185 p. , ill. ; , 24 cm
    Keywords: Business presentations ; Debates and debating ; Public speaking ; Questioning ; Self presentation ; Verbal self-defense ; Electronic books ; local
    Abstract: Jerry Weissman has made a career of coaching nearly 500 execs on their IPO roadshows, the most critical presentations of their lives. Now, he's written an indispensable guide to answering the toughest questions you'll ever face. Using compelling examples from Presidential debates to stock analyst meetings, Weissman teaches how to respond with perfect assurance. Discover how to avoid the defensive, evasive, or contentious answers that have destroyed political careers and ruin credibility. Learn to control your entire exchange with a hostile questioner: the question, answer, interactions with questioner and audience, timing, and above all, yourself. Whether an executive, politician, fundraiser, interviewee, teacher, student -- or even a family member at Thanksgiving dinner -- you're judged on how you handle these moments. Get this book: handle them brilliantly.
    Note: Includes bibliographical references (p. 169-173) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Wharton School Pub. | Boston, MA :Safari,
    Language: English
    Pages: xliv, 256 p. , ill. ; , 24 cm
    Keywords: Business ethics ; Leadership ; Moral and ethical aspects ; Moral development ; Success in business ; Moral and ethical aspects ; Electronic books ; local
    Abstract: Through a combination of research, and original thought leadership, the authors demonstrate how the best performing companies have leaders who actively apply moral values to achieve enduring personal and organizational success. These individuals exhibit moral intelligence: a strong moral compass and the ability to follow it. Lennick and Kiel reveal how dozens of companies benefit from the moral intelligence of their leaders, help build specific moral competencies leaders need: integrity, responsibility, compassion, forgiveness, and more. This book also includes the new Moral and Emotional Competency Inventory (MECI): an indispensable metric to assess moral intelligence. Leaders with strong moral intelligence can build the trust and commitment that are the foundation of truly great businesses. Be one of those leaders, lead one of those companies, with Moral Intelligence.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Wharton School | Boston, MA :Safari,
    Language: English
    Pages: xliii, 241 p. , ill. ; , 24 cm
    DDC: 658.408
    Keywords: Capitalism ; Social responsibility of business ; Electronic books ; local
    Abstract: Capitalism is indeed at a crossroads, facing international terrorism, worldwide environmental change, and an accelerating backlash against globalization. Companies are at crossroads, too: finding new strategies for profitable growth is now more challenging. Both sets of problems are intimately linked. Learn how to identify sustainable products and technologies that can drive new growth while also helping to solve today's most crucial social and environmental problems. Hart shows how to become truly indigenous to all markets -- and avoid the pitfalls of traditional 'greening' and 'sustainability' strategies. This book doesn't just point the way to a capitalism that is more inclusive and more welcome: it offers specific techniques to recharge innovation, growth, and profitability.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Boston : Nicholas Brealey Pub
    ISBN: 1857884264 , 9781857884265
    Language: English
    Pages: 1 v
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Does your marketing sell?
    DDC: 658.8/02
    Keywords: Communication in marketing. ; Communication in marketing ; Communication in marketing ; Communication in marketing. ; Kommunikation ; Marketing ; Electronic books. ; Electronic books. ; Electronic books Electronic books ; Marketing ; Kommunikation ; Marketing ; Kommunikation
    Note: Includes bibliographical references and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Burlington, Mass : Elsevier Butterworth-Heinemann
    ISBN: 1417544449
    Language: English
    Pages: xiv, 402 p , ill , 24 cm
    Edition: Boulder, Colo NetLibrary 2004 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    DDC: 620.1/126
    RVK:
    RVK:
    Keywords: Materials Fatigue ; Testing. ; Strains and stresses Testing. ; Materials Fatigue ; Testing. ; Strains and stresses Testing. ; Materialermüdung ; Werkstoffprüfung ; Electronic books. ; Electronic books. ; Materialermüdung ; Werkstoffprüfung ; Fahrzeug ; Materialermüdung ; Werkstoffprüfung
    Note: Includes bibliographical references and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2004
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Washington, D.C : National Academies Press
    ISBN: 0309547121 , 9780309547123
    Language: English
    Pages: viii, 45 pages , 24 cm
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Experimental poverty measures
    Keywords: Poverty Statistical methods. ; Poor Congresses. ; Income distribution Congresses. ; Households Congresses. ; Wealth Congresses. ; Poverty Statistical methods ; United States ; Poor Congresses ; United States ; Income distribution Congresses ; United States ; Households Congresses ; United States ; Wealth Congresses ; United States ; United States ; Wealth Congresses ; Poor Congresses ; Poverty Statistical methods ; Income distribution Congresses ; Households Congresses ; Poor Congresses ; Poverty Statistical methods ; Households Congresses ; Wealth Congresses ; Income distribution Congresses ; Poverty Statistical methods. ; Poor Congresses. ; Income distribution Congresses. ; Households Congresses. ; Wealth Congresses. ; Poverty ; Statistical methods ; Wealth ; Poor ; Conference papers and proceedings ; SOCIAL SCIENCE ; Poverty & Homelessness ; Households ; Income distribution ; Armut ; Einkommensstatistik ; Einkommensverteilung ; Reichtum ; Statistisches Modell ; United States ; USA ; Electronic books. ; Electronic books. ; Electronic books Conference proceedings ; Konferenzschrift ; USA ; Armut ; Reichtum ; Einkommensstatistik ; Einkommensverteilung ; Statistisches Modell ; USA ; Armut ; Reichtum ; Einkommensstatistik ; Einkommensverteilung ; Statistisches Modell
    Abstract: FrontMatter -- Acknowledgments -- Contents -- 1 Introduction and Background -- 2 Setting and Updating Thresholds -- 3 Equivalence Scales -- 4 Geographic Adjustments to Thresholds -- 5 Medical Expenses -- 6 Work-Related and Child Care Expenses -- 7 Housing -- 8 Data Issues, Other Topics, and Future Research -- References -- APPENDIXES -- A Workshop Agenda -- B Workshop Participants
    Note: Includes bibliographical references , Also available via the World Wide Web , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    ISBN: 1423716086 , 9780749443825 , 0749443820 , 9781423716082
    Language: English
    Pages: xvii, 236 pages , Illustrationen , 24 cm
    Edition: 3rd ed
    Edition: Online-Ausg. Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: PR in practice series
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Risk issues and crisis management
    RVK:
    Keywords: Issues management. ; Social responsibility of business. ; Crisis management. ; Issues management ; Social responsibility of business ; Crisis management ; Gestion par problèmes ; Entreprises Responsabilité sociale ; Gestion de crise ; Crisis management ; Issues management ; Social responsibility of business ; Issues management. ; Social responsibility of business. ; Crisis management. ; Krisenmanagement ; Öffentlichkeitsarbeit ; Electronic books. ; Electronic books. ; Electronic books ; Öffentlichkeitsarbeit ; Krisenmanagement ; Öffentlichkeitsarbeit ; Krisenmanagement
    Abstract: 1: Risk issues management -- Outside-in thinking -- Issues management defined -- Planning an issues management programme -- an issues management model -- CSR: the new moral code for doing business -- An issue ignored is a crisis ensured -- Implementing an issues management programme -- 2: Crisis management -- So it hits the fan -- now what? -- Perception is the reality -- The media in crisis situations -- The legal perspective -- Planning for the unexpected -- Crisis communications management
    Description / Table of Contents: 1: Risk issues managementOutside-in thinking -- Issues management defined -- Planning an issues management programme -- an issues management model -- CSR: the new moral code for doing business -- An issue ignored is a crisis ensured -- Implementing an issues management programme -- 2: Crisis management -- So it hits the fan -- now what? -- Perception is the reality -- The media in crisis situations -- The legal perspective -- Planning for the unexpected -- Crisis communications management.
    Note: Includes bibliographical references (p. 223-225) and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    New York : AMACOM
    ISBN: 0814428932 , 9780814428931
    Language: English
    Pages: Online-Ressource
    Series Statement: EBSCOhost eBook Collection
    Keywords: Business enterprises Computer networks ; Business enterprises Computer networks ; Electronic books ; Business enterprises Computer networks ; BUSINESS & ECONOMICS ; Motivational ; BUSINESS & ECONOMICS ; Mentoring & Coaching ; Business enterprises ; Computer networks ; Management Theory ; Management ; Business & Economics ; Arbeitsplatz ; Computerunterstützte Kommunikation ; Soziale Software ; Soziales Netzwerk ; Unternehmen ; Electronic books ; Electronic books ; Arbeitsplatz ; Soziale Software ; Computerunterstützte Kommunikation ; Soziales Netzwerk ; Unternehmen ; Soziale Software ; Computerunterstützte Kommunikation ; Soziales Netzwerk ; Arbeitsplatz ; Soziale Software ; Computerunterstützte Kommunikation ; Soziales Netzwerk ; Unternehmen ; Soziale Software ; Computerunterstützte Kommunikation ; Soziales Netzwerk
    Abstract: Powerful networking tools that drive rapid, sustainable growth
    Description / Table of Contents: Who do you know? -- The seven keys to a powerful network -- Face-to-face vs. virtual communications -- Introduction to social software -- Email lists -- Relating in real-time -- Virtual communities -- Web logs (blogs) -- Social visibility software -- Virtual becoming reality -- The future of social software -- Netiquette -- Manage the email deluge -- The virtual you -- Privacy, safety, and other concerns -- Increase your character -- Increase your competence -- Build the relevance level of your network -- Build strong ties -- Increase the level and quality of information -- Grow the number of people in your network -- Increase the diversity of your network -- Ten simple steps to radically improve your network online -- Finding a job -- Marketing -- Sales -- Business development -- Volunteering
    Description / Table of Contents: Preliminaries; Contents; Preface; 1 Who Do You Know?; 2 The Seven Keys to a Powerful Network; 3 Face to Face Versus Virtual Communications; 4 Introduction to Social Software; 5 Building Your Virtual Presence; 6 E mail Lists; 7 Relating in Real Time; 8 Social Network Sites and Virtual Communities; 9 Blogs Web Logs; 10 Relationship Capital Management Software; 11 Software to Help You Meet Face to Face; 12 The Future of Social Software; 13 Netiquette; 14 Manage the E Mail Deluge; 15 The Virtual You; 16 Privacy Safety and Other Concerns; 17 Improve Your Character; 18 Increase Your Competence
    Description / Table of Contents: 19 Raise the Relevance of Your Network20 Build Strong Ties; 21 Increase the Quality and Quantity of Information; 22 Multiply the Number of People in Your Network; 23 Double Your Diversity; 24 Ten Simple Steps to Radically Improve Your Network Online; 25 Finding a Job; 26 Marketing; 27 Sales; 28 Business Development; 29 Volunteering; 30 Afterword How This Book Was Born; Appendix A The Network Valuation FormulaSM; Appendix B How to Use This Book to Grow Your Network; Glossary; Endnotes; Index; Acknowledgments; About the Authors;
    Description / Table of Contents: Who do you know? -- The seven keys to a powerful network -- Face-to-face vs. virtual communications -- Introduction to social software -- Email lists -- Relating in real-time -- Virtual communities -- Web logs (blogs) -- Social visibility software -- Virtual becoming reality -- The future of social software -- Netiquette -- Manage the email deluge -- The virtual you -- Privacy, safety, and other concerns -- Increase your character -- Increase your competence -- Build the relevance level of your network -- Build strong ties -- Increase the level and quality of information -- Grow the number of people in your network -- Increase the diversity of your network -- Ten simple steps to radically improve your network online -- Finding a job -- Marketing -- Sales -- Business development -- Volunteering
    Description / Table of Contents: Who do you know?The seven keys to a powerful network -- Face-to-face vs. virtual communications -- Introduction to social software -- Email lists -- Relating in real-time -- Virtual communities -- Web logs (blogs) -- Social visibility software -- Virtual becoming reality -- The future of social software -- Netiquette -- Manage the email deluge -- The virtual you -- Privacy, safety, and other concerns -- Increase your character -- Increase your competence -- Build the relevance level of your network -- Build strong ties -- Increase the level and quality of information -- Grow the number of people in your network -- Increase the diversity of your network -- Ten simple steps to radically improve your network online -- Finding a job -- Marketing -- Sales -- Business development -- Volunteering.
    Note: Includes bibliographical references and index
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    New York : Cambridge University Press
    ISBN: 0511115806 , 0521612802 , 9780521612807 , 052184827X , 9780521848275 , 1280153083 , 9781280153082 , 9780511115806 , 0511122209 , 9780511122200
    Language: English
    Pages: 1 volume
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Economics of financial markets
    Parallel Title: Druckausg. Bailey, Roy E. The economics of financial markets
    RVK:
    Keywords: Electronic books ; Capital market ; Stock exchanges ; Futures market ; Futures market ; Capital market ; Stock exchanges ; Electronic books ; Capital market ; Stock exchanges ; Futures market ; Arbitrage ; Arbitrage-Pricing-Theorie ; Capital-Asset-Pricing-Modell ; Financial Futures ; Kapitalmarkttheorie ; Optionsmarkt ; Portfolio Selection ; Electronic books ; Kapitalmarkttheorie ; Portfolio Selection ; Capital-Asset-Pricing-Modell ; Arbitrage-Pricing-Theorie ; Arbitrage ; Financial Futures ; Optionsmarkt ; Kapitalmarkttheorie ; Portfolio Selection ; Capital-Asset-Pricing-Modell ; Arbitrage-Pricing-Theorie ; Arbitrage ; Financial Futures ; Optionsmarkt
    Abstract: The Economics of Financial Markets presents a concise overview of capital markets, suitable for advanced undergraduates and for beginning graduate students in financial economics. Following a brief overview of financial markets - their microstructure and the randomness of stock market prices - this textbook explores how the economics of uncertainty can be applied to financial decision-making. The mean-variance model of portfolio selection is discussed, with analysis extended to the capital asset pricing model (CAPM). Arbitrage plays a pivotal role in finance and is studied in a variety of contexts, including the APT model of asset prices. Methods for the empirical evaluation of CAPM and APT are also discussed, together with the volatility of asset prices, the intertemporal CAPM and the equity premium puzzle. An analysis of bond contracts leads into an assessment of theories of the term structure of interest rates. Finally, financial derivatives are explored, focusing on futures and options contracts
    Note: Includes bibliographical references and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    ISBN: 1423708830 , 9780749442200 , 0749442204 , 9781423708834 , 9780749445997 , 0749445998 , 1280222581 , 9781280222580
    Language: English
    Pages: xv, 485 pages , Illustrationen , 25 cm
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Keywords: Electronic books ; Social responsibility of business ; Business enterprises Environmental aspects ; Small business Environmental aspects ; Industrial management ; Factory and trade waste Environmental aspects ; Pollution prevention ; Business ethics ; Electronic books ; Social responsibility of business ; Business enterprises Environmental aspects ; Small business Environmental aspects ; Industrial management ; Factory and trade waste Environmental aspects ; Pollution prevention ; Business ethics ; Globalisierung ; Nachhaltige Entwicklung ; Electronic books ; Globalisierung ; Nachhaltigkeit ; Globalisierung ; Nachhaltigkeit
    Abstract: Forewords -- Part 1: Sustainable value -- Part 2: A new framework for business -- Part 3: Business standards -- Part 4: Marketing and consumption -- Part 5: Waste and recycling -- Part 6: Emissions and contaminants -- Part 7: Land use -- Part 8: Energy use -- Part 9: Transport -- Part 10: Health and safety -- Part 11: Employment -- Part 12: External relationships -- Part 13: Process efficiency -- Part 14: Funding and investment -- Part 15: Making it happen -- Index -- Index of advertisers
    Abstract: Aims to assist those running or advising organizations of all types and sizes in understanding the business case for sustainable development and corporate social responsibility. Tackles the subject from many different perspectives; offering advice and guidance in preparing and implementing programs and policies appropriate for the different contexts in which businesses operate
    Note: Includes bibliographical references and indexes , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    ISBN: 0511115660 , 9780511115660
    Language: English
    Pages: xi, 276 pages , Illustrationen , 24 cm
    Edition: Online-Ausg. Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Federalism and the market
    RVK:
    Keywords: Federal government ; Federal government Developing countries ; Federal government ; Federal government ; Federal government ; POLITICAL SCIENCE ; Public Policy ; Economic Policy ; BUSINESS & ECONOMICS ; Government & Business ; BUSINESS & ECONOMICS ; Development ; Economic Development ; BUSINESS & ECONOMICS ; Development ; Business Development ; BUSINESS & ECONOMICS ; Structural Adjustment ; BUSINESS & ECONOMICS ; Development ; General ; Economic policy ; Federal government ; Föderalismus ; Wirtschaftspolitik ; Developing countries Economic policy. ; Developing countries Economic policy ; Developing countries ; Developing countries Economic policy ; Developing countries Economic policy ; Developing countries Economic policy. ; Developing countries ; Entwicklungsländer ; Electronic books. ; Electronic books ; Electronic books. ; Electronic books ; Entwicklungsländer ; Föderalismus ; Wirtschaftspolitik ; Entwicklungsländer ; Föderalismus ; Wirtschaftspolitik
    Abstract: Intergovernmental Bargaining and Economic Policy in Federations --From Market-Preserving to Market-Distorting Federalism: Divergent Incentives and Economic Reform in Developing Nations --Federalism and the Decentralized Politics of Macroeconomic Policy and Performance --Testing the Model: Macroeconomic Reform Beyond the Federal-Unitary Distinction --Partisan Harmony, Intergovernmental Coordination, and Market Transitions: The Case of Argentina --Regional Competition, Fiscal Dependence, and Incentives in the Argentine Provinces --The View from Below: The Politics of Public Sector Reform in Three Argentine Provinces --Conclusion: Federalism, Reform, and Enduring Puzzles.
    Abstract: This book, first published in 2005, develops a comparative model of intergovernmental bargaining to account for variation in the capacity of federations in the developing world to undertake economic policy reform, suggesting that many market reform policies are a function of a constant process of bargaining between national and regional leaders struggling for political survival. As the degree of national-regional disagreement mounts, collective action on reforms that require implementation at multiple levels of government becomes more difficult. The degree to which the two factors conflict depends on four factors: the individual electoral interests, a shared intergovernmental fiscal system, the manner in which regional interests are represented in national policy making and the levers of partisan influence national leaders have over subnational politicians. In testing the argument with a combination of cross-sectional time-series and case study analysis, this book contributes to the broad literatures on development and the comparative political economy of federalism and decentralization
    Note: Includes bibliographical references (p. 249-272) and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Hershey PA : Idea Group Pub
    ISBN: 1591403839 , 9781591403838
    Language: English
    Edition: Boulder, Colo NetLibrary Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Keywords: Electronic commerce. ; Electronic data interchange. ; Electronic commerce ; Electronic data interchange ; Electronic data interchange ; Electronic commerce ; Electronic commerce. ; Electronic data interchange. ; Electronic Commerce ; Electronic books. ; Electronic books. ; Electronic books ; Electronic Commerce ; Electronic Commerce
    Abstract: Collaborative Commerce Eldon Y. Li, Timon C. Du -- Electronic Collaboration, Communication and Cooperation: A Taxonomy and a Prototype Gregoris Mentzas, Georgia Bafoutsou -- Collaborative Product Development George Q. Huang -- Collaborative Engineering Manuel Contero, Carlos Vila -- Collaborative Decision Making Beomjin Choi, T.S. Raghu, R. Ramesh, Andrew B. Whinston -- Workflow Collaboration Benjamin Yen, Guohua Wan -- Knowledge Networking for Collaborative Commerce Dimitris Apostolou, Gregoris Mentzas, Wolfgang Maass -- Networked Collaborative E-Learning David McConnell -- Costs and Benefits in Supply Chain Collaboration Tim S. McLaren, Milena M. Head, Yufei Yuan -- Applications: Collaborative Transportation and Consolidation in Global Third Party Logistics Jonah C. Tyan -- Ethical Dimensions in Collaborative Commerce Samuel H.S. Wang, Jyh-tong Teng, Hsin Rau, Michael H. Hu
    Note: Includes bibliographical references and index , Made available through NetLibrary; access may be limited to NetLibrary affiliated libraries , Collaborative Commerce , Electronic Collaboration, Communication and Cooperation: A Taxonomy and a Prototype , Collaborative Product Development , Collaborative Engineering , Collaborative Decision Making , Workflow Collaboration , Knowledge Networking for Collaborative Commerce , Networked Collaborative E-Learning , Costs and Benefits in Supply Chain Collaboration , Applications: Collaborative Transportation and Consolidation in Global Third Party Logistics , Ethical Dimensions in Collaborative Commerce , Mode of access: World Wide Web.
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Berkeley : University of California Press
    ISBN: 1417585005 , 9781417585007 , 9780520929111 , 052092911X
    Language: English
    Pages: xvi, 480 p , ill , 24 cm
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Last titan
    RVK:
    Keywords: Dreiser, Theodore, ; Dreiser, Theodore 1871-1945 ; Dreiser, Theodore ; Dreiser, Theodore ; Dreiser, Theodore, ; Dreiser, Theodore ; Novelists, American Biography. 20th century ; Journalists Biography. ; Novelists, American Biography ; 20th century ; Journalists Biography ; United States ; Journalists Biography ; Novelists, American Biography 20th century ; Journalists Biography ; Novelists, American Biography 20th century ; Novelists, American Biography. 20th century ; Journalists Biography. ; Novelists, American 20th century ; Journalists United States ; Electronic books ; BIOGRAPHY & AUTOBIOGRAPHY ; Literary ; LITERARY CRITICISM ; American ; General ; Journalists ; Novelists, American ; Biographies ; Biographie ; United States ; Electronic books. ; Electronic book ; Electronic books. ; Electronic books ; Biografie ; Dreiser, Theodore 1871-1945 ; Biografie ; Dreiser, Theodore 1871-1945 ; Dreiser, Theodore 1871-1945
    Abstract: Hoosier hard times -- A very bard of a city -- This matter of reporting -- Survival of the fittest -- Editorial days -- The writer -- Sister Carrie -- Down hill and up -- Return of the novelist -- Life after the Titanic -- The genius himself -- Back to the future -- An American tragedy -- Celebrity -- Tragic America -- Facing West -- Selected works of Theodore Dreiser
    Description / Table of Contents: Hoosier hard times --A very bard of a city --This matter of reporting --Survival of the fittest --Editorial days --The writer --Sister Carrie --Down hill and up --Return of the novelist --Life after the Titanic --The genius himself --Back to the future --An American tragedy --Celebrity --Tragic America --Facing West --Selected works of Theodore Dreiser.
    Description / Table of Contents: Hoosier hard timesA very bard of a cityThis matter of reportingSurvival of the fittestEditorial daysThe writerSister CarrieDown hill and upReturn of the novelistLife after the TitanicThe genius himselfBack to the futureAn American tragedyCelebrityTragic AmericaFacing WestSelected works of Theodore Dreiser.
    Note: Includes bibliographical references and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    ISBN: 1423710584 , 1843102692 , 9781843102694 , 9781423710585
    Language: English
    Pages: 255 p , 24 cm
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Child welfare services for minority ethnic families
    Keywords: Electronic books ; Child welfare Research ; Great Britain ; Children of minorities Services for ; Great Britain ; Social work with minorities Great Britain ; Family social work Great Britain ; Child welfare Research ; Children of minorities Services for ; Social work with minorities ; Family social work ; Children of minorities Services for ; Family social work ; Social work with minorities ; Child welfare Research ; Electronic books ; Child welfare Research ; Great Britain ; Children of minorities Services for ; Great Britain ; Social work with minorities Great Britain ; Family social work Great Britain ; Electronic books Great Britain ; Child welfare ; Research ; Children of minorities ; Services for ; Family social work ; Social work with minorities ; POLITICAL SCIENCE ; Public Policy ; Social Security ; POLITICAL SCIENCE ; Public Policy ; Social Services & Welfare ; Kind ; Nationale Minderheit ; Wohlfahrt ; Great Britain ; Großbritannien ; Electronic books ; Electronic books ; Großbritannien ; Nationale Minderheit ; Kind ; Wohlfahrt ; Großbritannien ; Nationale Minderheit ; Kind ; Wohlfahrt
    Abstract: Cover -- Contents -- Preface -- Acknowledgements -- 1 Introduction: A Context to the Review -- Part I The Research and the Messages -- 2 Introduction to the Research Literature -- The background to the research review -- The approach to the task of review and synthesis -- Mapping the territory -- 3 Family Support Services -- Who needs and who uses community-based family support services? -- Services targeted at vulnerable families and communities -- Services targeted at vulnerable populations that also provide services to referred families -- Children in need' assessed for and/or provided with a service under the provisions of section 17 of the Children Act 1989 -- Research on family support for ethnic minority children and families in particular circumstances -- Overview of research on family support services and barriers to their use -- 4 Child Protection Services and the Family Courts -- Child maltreatment and child protection ... an overview -- Which minority ethnic children and families are referred for a child protection service? -- Why are children and families referred to the formal child protection systems? -- Stress factors amongst families referred to the formal child protection systems -- The child protection and family support services received -- Outcomes for minority ethnic parents and children referred to the formal child protection systems -- Conclusions on child protection -- 5 Children Looked After Away from Home or Placed for Adoption -- An overview of the research -- Are the different groups of children of minority ethnic origin over- or under-represented amongst children looked after? -- The characteristics of ethnic minority children who are looked after -- Child placement as family support or short-term intervention -- Placement patterns of children looked after -- What do we know about interim and long-term outcomes for children and families? -- What do we know about what makes a difference? -- 6 Messages from Research on the Social Care Services to Parents and Children of Minority Ethnic Origin -- The nature and quality of the social work and other services provided -- Family members and their satisfaction with services -- Cultural issues and matching the social worker to the family -- Research on the use of interpreters -- 7 Next Steps in Researching Child Welfare Services for Minority Ethnic Children, Parents and Carers -- Family support -- The child protection services -- Children looked after or placed for adoption -- A holistic approach to researching child welfare services for minority ethnic children and families -- Part II Summaries of the Main Research Studies -- Summaries of the Main Research Studies -- Appendix 1: Ethnicity and faith group membership as reported to the Census 2001 -- Appendix 2: Template for research summaries -- Appendix 3: The approach to the research review -- References -- Subject Index
    Description / Table of Contents: CoverContents -- Preface -- Acknowledgements -- 1 Introduction: A Context to the Review -- Part I The Research and the Messages -- 2 Introduction to the Research Literature -- The background to the research review -- The approach to the task of review and synthesis -- Mapping the territory -- 3 Family Support Services -- Who needs and who uses community-based family support services? -- Services targeted at vulnerable families and communities -- Services targeted at vulnerable populations that also provide services to referred families -- Children in need' assessed for and/or provided with a service under the provisions of section 17 of the Children Act 1989 -- Research on family support for ethnic minority children and families in particular circumstances -- Overview of research on family support services and barriers to their use -- 4 Child Protection Services and the Family Courts -- Child maltreatment and child protection ... an overview -- Which minority ethnic children and families are referred for a child protection service? -- Why are children and families referred to the formal child protection systems? -- Stress factors amongst families referred to the formal child protection systems -- The child protection and family support services received -- Outcomes for minority ethnic parents and children referred to the formal child protection systems -- Conclusions on child protection -- 5 Children Looked After Away from Home or Placed for Adoption -- An overview of the research -- Are the different groups of children of minority ethnic origin over- or under-represented amongst children looked after? -- The characteristics of ethnic minority children who are looked after -- Child placement as family support or short-term intervention -- Placement patterns of children looked after -- What do we know about interim and long-term outcomes for children and families? -- What do we know about what makes a difference? -- 6 Messages from Research on the Social Care Services to Parents and Children of Minority Ethnic Origin -- The nature and quality of the social work and other services provided -- Family members and their satisfaction with services -- Cultural issues and matching the social worker to the family -- Research on the use of interpreters -- 7 Next Steps in Researching Child Welfare Services for Minority Ethnic Children, Parents and Carers -- Family support -- The child protection services -- Children looked after or placed for adoption -- A holistic approach to researching child welfare services for minority ethnic children and families -- Part II Summaries of the Main Research Studies -- Summaries of the Main Research Studies -- Appendix 1: Ethnicity and faith group membership as reported to the Census 2001 -- Appendix 2: Template for research summaries -- Appendix 3: The approach to the research review -- References -- Subject Index.
    Note: Includes bibliographical references (p. 232-246) and indexes , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Cambridge : Cambridge University Press
    ISBN: 0511115628 , 0511115075 , 9780511115073 , 128043483X , 9781280434839 , 9780511115622 , 0511113978 , 9780511113970 , 9780511536779 , 0511536771
    Language: English
    Pages: 1 v , ill
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Space-time coding
    RVK:
    Keywords: Space time codes. ; Space time codes ; Codage spatio-temporel ; Space time codes ; Space time codes. ; Leitungscodierung ; Raum-Zeit-Signalverarbeitung ; Electronic books. ; Electronic books ; Electronic books ; Electronic books. ; Electronic books Electronic books ; Raum-Zeit-Signalverarbeitung ; Leitungscodierung ; Raum-Zeit-Signalverarbeitung ; Leitungscodierung
    Abstract: This book covers the fundamental principles of space-time coding for wireless communications over multiple-input multiple-output (MIMO) channels, and the practical coding methods for achieving the performance improvements predicted by the theory. Ideal for graduate students familiar with the basics of digital communications, and engineers implementing the theory in real systems
    Abstract: Cover; Half-title; Title; Copyright; Contents; Preface; Standard notation; Space-time coding notation; Abbreviations; 1 Introduction; 2 Capacity of multiple-input multiple-output channels; 3 Space-time code design criteria; 4 Orthogonal space-time block codes; 5 Quasi-orthogonal space-time block codes; 6 Space-time trellis codes; 7 Super-orthogonal space-time trellis codes; 8 Differential space-time modulation; 9 Spatial multiplexing and receiver design; 10 Non-orthogonal space-time block codes; 11 Additional topics in space-time coding; References; Index
    Description / Table of Contents: Cover; Half-title; Title; Copyright; Contents; Preface; Standard notation; Space-time coding notation; Abbreviations; 1 Introduction; 2 Capacity of multiple-input multiple-output channels; 3 Space-time code design criteria; 4 Orthogonal space-time block codes; 5 Quasi-orthogonal space-time block codes; 6 Space-time trellis codes; 7 Super-orthogonal space-time trellis codes; 8 Differential space-time modulation; 9 Spatial multiplexing and receiver design; 10 Non-orthogonal space-time block codes; 11 Additional topics in space-time coding; References; Index.
    Note: Includes bibliographical references , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Cambridge [England] : Cambridge University Press
    ISBN: 0511128118 , 0521852889 , 9780521852883 , 9780511128110 , 9780511127588 , 0511127588
    Language: English
    Pages: viii, 426 p , ill , 25 cm
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    RVK:
    Keywords: MATLAB. ; MATLAB MATLAB ; MATLAB. ; Engineering mathematics Data processing. ; Numerical analysis Data processing. ; Engineering mathematics Data processing ; Numerical analysis Data processing ; Engineering mathematics Data processing. ; Numerical analysis Data processing. ; Algorithmus ; MATLAB ; Numerisches Verfahren ; Electronic books. ; Electronic books. ; Electronic books ; Lehrbuch ; Numerisches Verfahren ; MATLAB ; Algorithmus
    Abstract: Cover; Half-title; Title; Copyright; Contents; Preface; 1 Introduction to MATLAB; 2 Systems of Linear Algebraic Equations; 3 Interpolation and Curve Fitting; 5 Numerical Differentiation; 6 Numerical Integration; 7 Initial Value Problems; 8 Two-Point Boundary Value Problems; 9 Symmetric Matrix Eigenvalue Problems; 10 Introduction to Optimization; Appendices; Index
    Abstract: Numerical Methods in Engineering with MATLAB® is a text for engineering students and a reference for practicing engineers. The numerous examples and applications were chosen for their relevance to real world problems, and where numerical solutions are most efficient. MATLAB® mfiles are available on the book web site
    Note: Includes index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Washington, DC : National Academy of Sciences
    ISBN: 0309576296 , 9780309576291
    Language: English
    Edition: Electronic ed. Online-Ressource (Text + Images)
    Series Statement: EBSCOhost eBook Collection
    Keywords: Electronic books ; Chemical industry ; Catalysis ; Catalysis ; Chemical industry ; Electronic books ; TECHNOLOGY & ENGINEERING ; Chemical & Biochemical ; SCIENCE ; Chemistry ; Industrial & Technical ; Catalysis ; Chemical industry ; Electronic books ; Electronic books
    Abstract: ""Substrate Specificity and Stereoselectivity""""Enzyme Stability""; ""Enzyme Activity""; ""Cofactor Regeneration""; ""ALTERNATIVE AND RENEWABLE RESOURCES""; ""Alternative Resources""; ""Low-Cost Production of Synthesis Gas""; ""Available Chemicals""; ""Renewable Resources""; ""Converting Biomass to Feedstocks and Polymers""; ""Efficient Use of Carbon""; ""OLEFIN POLYMERIZATION""; ""Copolymerized Olefins with a Diverse Class of Polar Unsaturated Monomers""; ""Tolerant Catalysts""; ""Macromolecular Architectures and Thermoplastic Elastomers""; ""Polymer Recycling""; ""ALKYLATION TECHNOLOGY""
    Abstract: ""INNOVATION""""COMPUTATIONAL TECHNOLOGY, COMBINATORIAL CHEMISTRY, AND DATA MANAGEMENT""; ""FUNDING FOR CATALYSIS RESEARCH""; ""PROPOSAL REVIEW PROCESS""; ""PROGRAM METRICS""; ""RESEARCH CENTERS""; ""References""; ""Appendix A Invited Speakers ""; ""Appendix B Biographical Sketches of Committee Members ""; ""Glossary""; ""Acronyms""
    Abstract: ""CATALYTIC PROCESS TECHNOLOGY""; ""Copyright""; ""Preface""; ""Acknowledgments""; ""Contents""; ""Executive Summary""; ""RECOMMENDATIONS""; ""Recommendations for Applied Research""; ""Alkane Activation and Selective Oxidation""; ""Synthesis of Fine Chemicals""; ""Alternative and Renewable Resources""; ""Olefin Polymerization""; ""Alkylation Technology""; ""Environmental Applications""; ""Policy-Related Recommendations""; ""Innovation""; ""Computational Technology""; ""Funding for Catalyst Research""; ""Proposal Review Process""; ""Program Metrics""; ""Research Centers""; ""1 Introduction ""
    Abstract: ""U.S. CHEMICAL INDUSTRY""""INDUSTRIAL CATALYSIS""; ""POLICY BACKGROUND""; ""OFFICE OF INDUSTRIAL TECHNOLOGIES""; ""CURRENT STUDY""; ""2 Areas for Applied Research ""; ""ALKANE ACTIVATION AND SELECTIVE OXIDATION""; ""Low-Temperature, Oxidative Dehydrogenation of Alkanes to Alkenes""; ""Molecularly Designed Metal Oxides""; ""Direct Epoxidation of Higher Alkenes with Molecular Oxygen""; ""Primary Oxidation of Alkanes to Alcohols and Diols""; ""SYNTHESIS OF FINE CHEMICALS""; ""Catalysis""; ""Synthetic Versatility and Atom Economy""; ""Selectivity""; ""Reaction Conditions""; ""Biocatalysis""
    Abstract: ""Ultrahigh Selectivity""""Tolerance to Functional Groups""; ""Reactivity""; ""ENVIRONMENTAL APPLICATIONS""; ""Pollution Control for Mobile Applications""; ""Control of Nitrogen Oxides in Lean-Exhaust Environments""; ""Control of Particulate Emissions""; ""Catalytic Sensors""; ""Measuring Combustion Exhaust Streams""; ""Monitoring Fuel Quality""; ""Fuel Cell Systems""; ""Converting Hydrocarbon Fuels to Hydrogen""; ""Metal-Sintering Processes of Supported Metal Catalysts""; ""Mechanistic Understanding of the Sintering of Metals on a Support""; ""Model System""; ""3 Policy-Related Issues ""
    Note: Description based on online resource; title from HTML t.p. (National Academies Press, viewed Aug. 11, 2011)
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    S.l. : Orchard Publications
    ISBN: 0974423947 , 9780974423944 , 0974423947
    Language: English
    Edition: E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Keywords: Amplifiers (Electronics) ; Electronic circuits Data processing ; Amplifiers (Electronics) ; Electronic circuits Data processing. ; Amplifiers (Electronics) ; Electronic circuits Data processing. ; Electronic books. ; Electronic books
    Note: Title from ebook title screen (viewed on Aug. 9, 2006) , Includes bibliographical references and index , Made available through NetLibrary; access may be limited to NetLibrary affiliated libraries
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    New York : American Management Association
    ISBN: 0814428649 , 9780814428641
    Language: English
    Pages: xxv, 358 p , ill , 26 cm.
    Edition: 2nd ed
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Erscheint auch als Rothwell, William J., 1951- Beyond training and development
    Keywords: Performance technology. ; Performance standards. ; Performance technology ; Performance standards ; Performance technology. ; Performance standards. ; Electronic books ; BUSINESS & ECONOMICS ; Human Resources & Personnel Management ; Performance standards ; Performance technology ; BUSINESS & ECONOMICS ; Workplace Culture ; Leistungssteigerung ; Mitarbeiter ; Unternehmen ; Electronic books. ; Electronic books ; Electronic books. ; Electronic books ; Mitarbeiter ; Unternehmen ; Leistungssteigerung ; Mitarbeiter ; Unternehmen ; Leistungssteigerung
    Abstract: Why training is not enough -- What is human performance enhancement (HPE)? -- Transforming a training department into a human performance enhancement (HPE) department -- Analyzing what is happening -- Envisioning what should be happening -- Clarifying present and future performance gaps -- Determining the importance of performance gaps -- Identifying the underlying causes of performance gaps -- Selecting human performance enhancement (HPE) strategies -- Implementing human performance enhancement (HPE) strategies to address organizational environment problems or opportunities -- Implementing human performance enhancement (HPE) strategies to address work environment problems or opportunities -- Implementing human performance enhancement (HPE) strategies to address work problems or opportunities -- Implementing human performance enhancement (HPE) strategies to address worker problems or opportunities -- Evaluating human performance enhancement (HPE) strategies -- What Is the Future of HPE?
    Description / Table of Contents: Why training is not enough -- What is human performance enhancement (HPE)? -- Transforming a training department into a human performance enhancement (HPE) department -- Analyzing what is happening -- Envisioning what should be happening -- Clarifying present and future performance gaps -- Determining the importance of performance gaps -- Identifying the underlying causes of performance gaps -- Selecting human performance enhancement (HPE) strategies -- Implementing human performance enhancement (HPE) strategies to address organizational environment problems or opportunities -- Implementing human performance enhancement (HPE) strategies to address work environment problems or opportunities -- Implementing human performance enhancement (HPE) strategies to address work problems or opportunities -- Implementing human performance enhancement (HPE) strategies to address worker problems or opportunities -- Evaluating human performance enhancement (HPE) strategies -- What Is the Future of HPE?
    Note: Includes bibliographical references and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005 , System requirements: Microsoft Word 97 or higher and Microsoft PowerPoint 97 or higher.
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    ISBN: 1417591064 , 9781417591060
    Language: English
    Pages: 383 p , 22 cm
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: Costerus new ser. 155
    Series Statement: EBSCOhost eBook Collection
    Series Statement: Costerus
    Parallel Title: Erscheint auch als Hegerfeldt, Anne C Lies that tell the truth
    RVK:
    Keywords: Magic realism (Literature) ; English fiction History and criticism. 20th century ; English fiction History and criticism ; 20th century ; Magic realism (Literature) ; English fiction History and criticism 20th century ; Magic realism (Literature) ; English fiction History and criticism. 20th century ; LITERARY CRITICISM ; European ; English, Irish, Scottish, Welsh ; English fiction ; Magic realism (Literature) ; Criticism, interpretation, etc ; Englisch ; Magischer Realismus ; Rezeption ; Roman ; Electronic books. ; Electronic books. ; Electronic books Criticism, interpretation, etc ; Magischer Realismus ; Rezeption ; Englisch ; Roman ; Geschichte 1969-2000 ; Magischer Realismus ; Rezeption ; Englisch ; Roman ; Geschichte 1969-2000
    Abstract: The critical debate : an overview -- A working definition -- Magic "mongrel" realism : the adaptation of other genres and modes -- Through anOther's eyes : magic realist focalizers -- Mythos meets logos : paradigms of knowledge in magic realist fiction -- Making the real fantastic and the fantastic real : strategies of destabilization -- Making the immaterial matter : techniques of literalization -- Mimicking the mind : magic realism as an inquiry into human thought -- "The only real ism of these back-to-front and jabberwocky days" : mimicking a fantastic reality
    Abstract: Magic realism has long been treated as a phenomenon restricted to postcolonial literature. Drawing on works from Britain, Lies that Tell the Truth compellingly shows how magic realist fiction can be produced also at what is usually considered to be the cultural centre without forfeiting the mode's postcolonial attitude and aims. A close analysis of works by Angela Carter, Salman Rushdie, Jeanette Winterson, Robert Nye and others reveals how the techniques of magic realism generate a complex critique of the West's rational-empirical worldview from within a Western context itself. Understanding magic realism as a fictional analogue of anthropology and sociology, Lies that Tell the Truth reads the mode as a frequently humorous but at the same time critical investigation into people's attempts to make sense of their world. By laying bare the manifold strategies employed to make meaning, magic realist fiction indicates that knowledge and reality cannot be reduced to hard facts, but that people's dreams and fears, ideas, stories and beliefs must equally be taken into account; 1900 - 1999
    Note: Title from ebook title screen (viewed on May 2, 2005) , Includes bibliographical references and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Cambridge, U.K : Cambridge University Press
    ISBN: 0511113552 , 9780511113048 , 0511113048 , 9780511113550
    Language: English
    Pages: xvii, 230 p , 24 cm
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Additional Information: Rezensiert in Marsh, Clive Fields of Faith: Theology and Religious Studies for the Twenty-First Century. Edited by David F. Ford, Ben Quash, and Janet Martin Soskice 2007
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Fields of faith
    Keywords: Electronic books ; Religion Study and teaching (Higher) ; Theology Study and teaching (Higher) ; Religion Study and teaching (Higher) ; Theology Study and teaching (Higher) ; Religion Study and teaching (Higher) ; Theology Study and teaching (Higher) ; Electronic books ; Religion Study and teaching (Higher) ; Theology Study and teaching (Higher) ; Theology ; Study and teaching (Higher) ; RELIGION ; Education ; Religion ; Study and teaching (Higher) ; Religionswissenschaftliches Studium ; Theologiestudium ; Electronic books ; Aufsatzsammlung ; Religionswissenschaftliches Studium ; Theologiestudium ; Religionswissenschaftliches Studium ; Theologiestudium
    Abstract: How will study of theology and the religions in higher education be shaped in the coming century? This book offers different perspectives on the field from practitioners in a broad range of disciplines and from a variety of faiths, offering a vision of the field and best practice within it
    Abstract: Cover; Half-title; Title; Copyright; Dedication; Contents; Notes on contributors; Introduction; CHAPTER 1 The study of religion and the rise of atheism: conflict or confirmation?; CHAPTER 2 Doing Theology in the university; CHAPTER 3 Shaping the field: a transatlantic perspective; CHAPTER 4 The study of religion as corrective reading; Section 1: Understanding Faith; Section 2: The Practice of Justice and Love; Response; CHAPTER 13 Fields of faith: an experiment in the study of theology and the religions; Index of names; Subject index
    Description / Table of Contents: Cover; Half-title; Title; Copyright; Dedication; Contents; Notes on contributors; Introduction; CHAPTER 1 The study of religion and the rise of atheism: conflict or confirmation?; CHAPTER 2 Doing Theology in the university; CHAPTER 3 Shaping the field: a transatlantic perspective; CHAPTER 4 The study of religion as corrective reading; Section 1: Understanding Faith; Section 2: The Practice of Justice and Love; Response; CHAPTER 13 Fields of faith: an experiment in the study of theology and the religions; Index of names; Subject index;
    Note: Includes bibliographical references and indexes , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Hershey PA : IRM Press
    ISBN: 1591402360 , 9781591402367
    Language: English
    Pages: 1 v
    Edition: Boulder, Colo NetLibrary 2004 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Keywords: Human-computer interaction. ; Human-computer interaction ; Human-computer interaction. ; Mensch-Maschine-Kommunikation ; Electronic books. ; Electronic books. ; Electronic books ; Mensch-Maschine-Kommunikation
    Abstract: Preface / Anabela Sarmento -- Sect. I. Tools to improve usability and Web design -- Ch. I. Service-oriented human computer interaction and scripting / Neil McBride and Ibrahim Elbeltagi -- Ch. II. User acceptance of online computer games : comparing two models in a field study / Yuan Gao -- Ch. III. Web-STAR : development of survey tools for use with requirements gathering in Web site development / Jonathan Lazar, Adam Jones and Kisha-Dawn Greenidge -- Sect. II. Internet and end users' concerns -- Ch. IV. The use of query operators and their effect on the results from Web search engines / Bernard J. Jansen -- Ch. V. Interactive proxy for URL correction / Kai-Hsiang Yang -- Ch. VI. Emerging practices and standards for designing business Web sites : recommendations for developers / Carmine Sellitto and Andrew Wenn -- Sect. III. IT and issues regarding human resources management -- Ch. VII. A framework for defining e-business IT skills portfolio / Susy Chan and Abdulrahman A. Mirza -- Ch. VIII. Issues in end-user behavior / Murray E. Jennex -- Ch. IX. Employee perceptions of outsourcing of information technology operations : an empirical investigation / Lynda Roberson Louis -- Sect. IV. Human and organizational issues regarding IT adoption and use -- Ch. X. Surfacing occupational threats to IT-enabled change : a neglected role for organization development? / Joe McDonagh -- Ch. XI. Human factors in the "system selection" stage of library automation / Nasrine Olson -- Ch. XII. Stressing office technology's non-technical side : applying concepts from adaptive structuration theory / Huub J. M. Ruel -- Ch. XIII. Expanding the information carrying capacity of the new media in the context of virtual teams / John D'Ambra and Zixiu Guo -- Ch. XIV. Change and challenge : managing the e-business organization / John Mendonca -- Sect. V. Case studies of human and organizational issues regarding IT adoption and use -- Ch. XV. Data quality and work alignment : do IT professionals think differently? / Latif Al-Hakim and Hongjiang Xu -- Ch. XVI. Human issues and computer interaction : a study of a U.K. police call centre / Steve Clarke, Brian Lehaney and Huw Evans -- Ch. XVII. The role of group learning in implementation of a personnel management system in a hospital / Tatyana Bondarouk and Klass Sikkel
    Note: Electronic reproduction, Boulder, Colo : NetLibrary, 2004 , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Cambridge, UK : Cambridge University Press
    ISBN: 0511082177 , 9780511082177
    Language: English
    Pages: xi, 451 p , 24 cm
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Kant and the metaphysics of causality
    RVK:
    Keywords: Kant, Immanuel, ; Kant, Immanuel 1724-1804 ; Kant, Immanuel ; Kant, Immanuel ; Kant, Immanuel, ; Kant, Immanuel ; Causation. ; Causation ; Causation ; Causation. ; PHILOSOPHY ; Epistemology ; Causation ; Kausalität ; Electronic books. ; Electronic books. ; Electronic books ; Kant, Immanuel 1724-1804 ; Kausalität ; Kant, Immanuel 1724-1804 ; Kausalität
    Abstract: Cover; Half-title; Dedication; Title; Copyright; Contents; Acknowledgments; A Note on Citations and Translations; Introduction; 1 Pre-established Harmony versus Physical Influx; 2 Kant's Pre-Critical Theory of Causality; 3 Kant's Second and Third Analogies of Experience; 4 Kant's Model of Causality; 5 The Metaphysics of Freedom; 6 Kant's Reply to Hume; Conclusion; Bibliography; PRIMARY LITERATURE; SECONDARY LITERATURE; Index.
    Abstract: This is a book about Kant's views on causality as understood in their proper historical context. Eric Watkins argues that a grasp of Leibnizian and anti-Leibnizian thought in eighteenth-century Germany helps one to see how the Critical Kant argued for causal principles that have both metaphysical and epistemological elements
    Note: Includes bibliographical references (p. 431-440) and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Cambridge, UK : Cambridge University Press
    ISBN: 0511109776 , 9780511109775
    Language: English
    Pages: xix, 226 p , 24 cm
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Philosophy of Gottlob Frege
    RVK:
    Keywords: Frege, Gottlob, ; Frege, Gottlob 1848-1925 ; Frege, Gottlob ; Frege, Gottlob ; Frege, Gottlob, ; Frege, Gottlob ; PHILOSOPHY ; History & Surveys ; Modern ; Philosophie ; Electronic books. ; Electronic books. ; Electronic books ; Frege, Gottlob 1848-1925 ; Philosophie ; Frege, Gottlob 1848-1925 ; Philosophie
    Abstract: Biography -- Function and argument -- Sense and reference -- Frege's Begriffsschrift theory of identity -- Concept and object -- Names and descriptions -- Existence -- Thought, truth value and assertion -- Indirect reference -- Through the quotation marks
    Description / Table of Contents: Biography -- Function and argument -- Sense and reference -- Frege's Begriffsschrift theory of identity -- Concept and object -- Names and descriptions -- Existence -- Thought, truth value and assertion -- Indirect reference -- Through the quotation marks
    Description / Table of Contents: BiographyFunction and argument -- Sense and reference -- Frege's Begriffsschrift theory of identity -- Concept and object -- Names and descriptions -- Existence -- Thought, truth value and assertion -- Indirect reference -- Through the quotation marks.
    Note: Includes bibliographical references (p. 203-222) and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    ISBN: 1417552654 , 9781417552658 , 008047876X , 9780080478760
    Language: English
    Edition: Boulder, Colo NetLibrary Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Investigating child exploitation and pornography
    Keywords: Child abuse. ; Children in pornography. ; Child abuse ; Child pornography ; Child pornography ; Child abuse ; Child abuse. ; Children in pornography. ; FAMILY & RELATIONSHIPS ; Abuse ; Child Abuse ; Child abuse ; Child pornography ; SELF-HELP ; Abuse ; Gerichtliche Wissenschaften ; Internet ; Kinderpornographie ; Verbreitung ; USA ; Electronic books. ; Electronic books ; Electronic books. ; Electronic books ; USA ; Kinderpornografie ; Verbreitung ; Internet ; Forensik ; USA ; Kinderpornografie ; Verbreitung ; Internet ; Forensik
    Abstract: Cover -- COVER -- CONTENTS -- ABOUT THE AUTHORS -- PREFACE -- ACKNOWLEDGMENTS -- SECTION I THE INFLUENCE OF TECHNOLOGY -- 1. OVERVIEW -- 1.1 BACKGROUND -- 1.2 HISTORY OF CHILD SEXUAL EXPLOITATION -- 1.3 CHILD PORNOGRAPHY -- 1.4 TECHNOLOGY AND CHILD EXPLOITATION -- 1.5 TECHNOLOGY AND PREFERENTIAL SEX OFFENDERS -- 1.6 DEVELOPMENT OF CHILD PORNOGRAPHY LAW -- 1.7 INTERNATIONAL: THE UNITED NATIONS CONVENTION ON THE RIGHTS OF THE CHILD -- 1.8 CONCLUSION -- REFERENCES -- 2. INTERNET APPLICATIONS -- 2.1 IP ADDRESSES AND DOMAIN NAME SYSTEM -- 2.2 E-MAIL -- 2.3 E-GROUPS AND MAILING LISTS -- 2.4 NEWSGROUPS, DISCUSSION BOARDS, AND BULLETIN BOARDS -- 2.5 WEB SITES -- 2.6 CHAT ROOMS AND INSTANT MESSAGING -- 2.7 WEB CAMERAS AND VIDEOPHONES -- 2.8 FILE TRANSFER PROTOCOL (FTP) -- 2.9 PEER-TO-PEER (P2P) -- 2.10 CONCLUSION -- RESOURCES -- 3. CYBER VICTIMS -- 3.1 VICTIMOLOGY -- 3.2 HOW TO PROTECT CHILDREN ONLINE -- 3.3 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 4. CYBER OFFENDERS -- 4.1 THE ONLINE SEXUAL PREDATOR -- 4.2 THE CHILD MOLESTER -- 4.3 MODUS OPERANDI: HOW ONLINE CHILD MOLESTERS OPERATE -- 4.4 SIGNATURE AND THE ONLINE CHILD MOLESTER -- 4.5 PROFILING THE CHILD MOLESTER -- 4.6 THE SUBCULTURE OF CHILD PORNOGRAPHY -- 4.7 CONCLUSION -- REFERENCES -- 5. SOURCES OF DIGITAL EVIDENCE -- 5.1 OPEN COMPUTER SYSTEMS -- 5.2 EMBEDDED COMPUTER SYSTEMS -- 5.3 COMMUNICATION SYSTEMS -- 5.4 PERIPHERAL DEVICES -- REFERENCES -- SECTION II INVESTIGATING INTERNET CHILD EXPLOITATION -- 6. UNDERCOVER OPERATIONS -- 6.1 SELF-PROTECTION -- 6.2 USING PERSONAL EQUIPMENT -- 6.3 SETTING UP INTERNET AND TELEPHONE CONNECTIONS -- 6.4 USING ONLINE UNDERCOVER IDENTITIES -- 6.5 CONDUCTING AN ONLINE INVESTIGATION -- 6.6 DOCUMENTING PREDISPOSITION OF THE SUSPECT TO COMMIT A CRIME -- 6.7 PREPARING FOR A MEETING OR SEARCH -- 6.8 AGENCIES AND RESOURCES -- 6.9 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 7. COLLECTING AND PRESERVING EVIDENCE ON THE INTERNET -- 7.1 PRESERVING EVIDENCE ON THE INTERNET -- 7.2 FINDING EVIDENCE ON THE INTERNET -- 7.3 COLLECTING REMOTE EVIDENCE -- REFERENCES -- 8. TRACKING ON THE INTERNET -- 8.1 ATTRIBUTION AND CONTINUITY OF OFFENSE -- 8.2 TRACKING INTERNET ACTIVITIES -- 8.3 OVERCOMING CHALLENGES TO ATTRIBUTION -- REFERENCES -- 9. SEARCH AND SEIZURE IN CYBERSPACE I: DRAFTING WARRANTS AND WARRANTLESS SEARCHES -- 9.1 SEARCH WARRANT DRAFTING -- 9.2 SEARCH WARRANTS IN GENERAL -- 9.3 CHILD PORNOGRAPHY SENT VIA THE INTERNET- SEARCH WARRANT FOR INTERNET ACCOUNT -- 9.4 ENTICEMENT OF A MINOR -- 9.5 GROOMING EVIDENCE -- 9.6 THE AFFIDAVIT-PROBABLE CAUSE -- 9.7 ARREST WARRANTS -- 9.8 WARRANTLESS SEARCHES -- 9.9 CONCLUSION -- REFERENCES -- 10. SEARCH AND SEIZURE IN CYBERSPACE II: EXECUTING THE SEARCH -- 10.1 SEARCH WARRANTS -- 10.2 EVIDENCE HANDLING -- 10.3 OBTAINING A SECOND WARRANT -- 10.4 EXECUTING INTERNET SERVICE PROVIDER SEAR
    Description / Table of Contents: CoverCOVER -- CONTENTS -- ABOUT THE AUTHORS -- PREFACE -- ACKNOWLEDGMENTS -- SECTION I THE INFLUENCE OF TECHNOLOGY -- 1. OVERVIEW -- 1.1 BACKGROUND -- 1.2 HISTORY OF CHILD SEXUAL EXPLOITATION -- 1.3 CHILD PORNOGRAPHY -- 1.4 TECHNOLOGY AND CHILD EXPLOITATION -- 1.5 TECHNOLOGY AND PREFERENTIAL SEX OFFENDERS -- 1.6 DEVELOPMENT OF CHILD PORNOGRAPHY LAW -- 1.7 INTERNATIONAL: THE UNITED NATIONS CONVENTION ON THE RIGHTS OF THE CHILD -- 1.8 CONCLUSION -- REFERENCES -- 2. INTERNET APPLICATIONS -- 2.1 IP ADDRESSES AND DOMAIN NAME SYSTEM -- 2.2 E-MAIL -- 2.3 E-GROUPS AND MAILING LISTS -- 2.4 NEWSGROUPS, DISCUSSION BOARDS, AND BULLETIN BOARDS -- 2.5 WEB SITES -- 2.6 CHAT ROOMS AND INSTANT MESSAGING -- 2.7 WEB CAMERAS AND VIDEOPHONES -- 2.8 FILE TRANSFER PROTOCOL (FTP) -- 2.9 PEER-TO-PEER (P2P) -- 2.10 CONCLUSION -- RESOURCES -- 3. CYBER VICTIMS -- 3.1 VICTIMOLOGY -- 3.2 HOW TO PROTECT CHILDREN ONLINE -- 3.3 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 4. CYBER OFFENDERS -- 4.1 THE ONLINE SEXUAL PREDATOR -- 4.2 THE CHILD MOLESTER -- 4.3 MODUS OPERANDI: HOW ONLINE CHILD MOLESTERS OPERATE -- 4.4 SIGNATURE AND THE ONLINE CHILD MOLESTER -- 4.5 PROFILING THE CHILD MOLESTER -- 4.6 THE SUBCULTURE OF CHILD PORNOGRAPHY -- 4.7 CONCLUSION -- REFERENCES -- 5. SOURCES OF DIGITAL EVIDENCE -- 5.1 OPEN COMPUTER SYSTEMS -- 5.2 EMBEDDED COMPUTER SYSTEMS -- 5.3 COMMUNICATION SYSTEMS -- 5.4 PERIPHERAL DEVICES -- REFERENCES -- SECTION II INVESTIGATING INTERNET CHILD EXPLOITATION -- 6. UNDERCOVER OPERATIONS -- 6.1 SELF-PROTECTION -- 6.2 USING PERSONAL EQUIPMENT -- 6.3 SETTING UP INTERNET AND TELEPHONE CONNECTIONS -- 6.4 USING ONLINE UNDERCOVER IDENTITIES -- 6.5 CONDUCTING AN ONLINE INVESTIGATION -- 6.6 DOCUMENTING PREDISPOSITION OF THE SUSPECT TO COMMIT A CRIME -- 6.7 PREPARING FOR A MEETING OR SEARCH -- 6.8 AGENCIES AND RESOURCES -- 6.9 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 7. COLLECTING AND PRESERVING EVIDENCE ON THE INTERNET -- 7.1 PRESERVING EVIDENCE ON THE INTERNET -- 7.2 FINDING EVIDENCE ON THE INTERNET -- 7.3 COLLECTING REMOTE EVIDENCE -- REFERENCES -- 8. TRACKING ON THE INTERNET -- 8.1 ATTRIBUTION AND CONTINUITY OF OFFENSE -- 8.2 TRACKING INTERNET ACTIVITIES -- 8.3 OVERCOMING CHALLENGES TO ATTRIBUTION -- REFERENCES -- 9. SEARCH AND SEIZURE IN CYBERSPACE I: DRAFTING WARRANTS AND WARRANTLESS SEARCHES -- 9.1 SEARCH WARRANT DRAFTING -- 9.2 SEARCH WARRANTS IN GENERAL -- 9.3 CHILD PORNOGRAPHY SENT VIA THE INTERNET- SEARCH WARRANT FOR INTERNET ACCOUNT -- 9.4 ENTICEMENT OF A MINOR -- 9.5 GROOMING EVIDENCE -- 9.6 THE AFFIDAVIT-PROBABLE CAUSE -- 9.7 ARREST WARRANTS -- 9.8 WARRANTLESS SEARCHES -- 9.9 CONCLUSION -- REFERENCES -- 10. SEARCH AND SEIZURE IN CYBERSPACE II: EXECUTING THE SEARCH -- 10.1 SEARCH WARRANTS -- 10.2 EVIDENCE HANDLING -- 10.3 OBTAINING A SECOND WARRANT -- 10.4 EXECUTING INTERNET SERVICE PROVIDER SEAR.
    Note: Title from ebook title screen (viewed Nov. 9, 2004) , Includes bibliographical references and index , Made available through NetLibrary; access may be limited to NetLibrary affiliated libraries , Mode of access: World Wide Web.
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Hershey : IRM Press
    ISBN: 1591402328 , 9781591402855 , 159140231X , 9781591402312 , 1591402859 , 9781591402329
    Language: English
    Pages: xvi, 318 p , ill , 26 cm
    Edition: Boulder, Colo NetLibrary 2004 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version E-collaborations and virtual organizations
    Keywords: Virtual work teams. ; Virtual reality in management. ; Virtual corporations Management. ; Virtual work teams ; Virtual reality in management ; Virtual corporations Management ; Virtual work teams ; Virtual corporations Management ; Virtual reality in management ; Virtual work teams. ; Virtual reality in management. ; Virtual corporations Management. ; Management ; Virtuelles Unternehmen ; Electronic books. ; Electronic books. ; Electronic books ; Virtuelles Unternehmen ; Management ; Virtuelles Unternehmen ; Management
    Abstract: Chapter I Knowledge Sharing Infrastructure and Methods for Virtual Enterprises Farhad Daneshgar, Pradeep Ray, Fethi Rabhi, Hala Skaf-Molli, Pascal Molli, Claude Godart 1 -- Chapter II Workplace e-Collaboration in Practice: Practical Guidelines for Implementing e-Collaboration in Organizations David Mayrhofer, Andrea Back 29 -- Chapter III Using Web Services in Business-to-Business Integration Frank Goethals, Jacques Vandenbulcke, Wilfried Lemahieu 61 -- Chapter IV Peer-to-Peer Corporate Resource Sharing and Distribution with Mesh Ramesh Subramanian, Brian Goodman 98 -- Chapter V Collaborative Engineering Communities -- Architecture and Integration Approaches Norbert Gronau 120 -- Chapter VI Strategic Use of Virtual Organization Jinyoul Lee, Mike (Tae-In) Eom, Bonn-Oh Kim 151 -- Chapter VII Successful Virtual Organizations as Collaboration Networks: Descriptions and Experiences from Two Norwegian Examples Jan Frick 169 -- Chapter VIII Virtualization as a Process of Transformation of Small and Medium Enterprises (SMEs) in the Global Virtual Organization Jerzy Kisielnicki 184 -- Chapter IX Impact of Activities in the Virtual Environment Michelle W. L. Fong 206 -- Chapter X Seamless Multiparty Videoconference T. Lertrusdachakul, A. Taguchi, T. Aoki, H. Yasuda 231 -- Chapter XI ITFG: Design and Experience with a Groupware System Georg Peters, Tobias Lang, Mike Lie 252 -- Chapter XII E-School Administration Systems Moh'd A. Radaideh, Sharaf S. Horani, Harmain M. Harmain 276
    Note: Includes bibliographical references and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2004 , Chapter IKnowledge Sharing Infrastructure and Methods for Virtual Enterprises , Mode of access: Internet via World Wide Web.
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Amsterdam : Boston
    ISBN: 141757206X , 9781417572069 , 0080479855 , 9780080479859
    Language: English
    Pages: 1 v
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Organization design
    Keywords: Personnel management. ; Organizational change. ; Personnel management ; Organizational change ; Personnel management ; Organizational change ; Personnel management. ; Organizational change. ; Innerbetriebliche Kooperation ; Organisationsentwicklung ; Organisationsgestaltung ; Electronic books. ; Electronic books. ; Electronic books ; Organisationsgestaltung ; Organisationsentwicklung ; Innerbetriebliche Kooperation ; Organisationsgestaltung ; Organisationsentwicklung ; Innerbetriebliche Kooperation
    Note: Includes bibliographical references and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    ISBN: 1410611647
    Language: English
    Pages: xiv, 253 pages , 23 cm
    Edition: Boulder, Colo NetLibrary 2004 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    DDC: 371.195
    Keywords: Business and education ; Commercialism in schools ; Privatization in education ; Business and education ; Commercialism in schools ; Privatization in education ; Bildungswesen ; Kommerzialisierung ; USA ; Electronic books. ; Electronic books. ; Aufsatzsammlung ; USA ; Bildungswesen ; Kommerzialisierung ; USA ; Bildungswesen ; Kommerzialisierung
    Note: Includes bibliographical references and indexes , Electronic reproduction, Boulder, Colo : NetLibrary, 2004
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Hershey, PA : Idea Group Pub
    ISBN: 1591403804 , 9781591403784 , 1591403790 , 9781591403791 , 1591403782 , 9781591403807
    Language: English
    Pages: 1 v
    Edition: Boulder, Colo NetLibrary 2004 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Managing business with SAP
    Keywords: SAP R/3. ; SAP R/3 SAP R/3 ; SAP R/3 ; SAP R/3. ; Business Data processing. ; Management information systems. ; Business Data processing ; Management information systems ; Business Data processing ; Management information systems ; Business Data processing. ; Management information systems. ; Management ; SAP R/3 ; Electronic books. ; Electronic books. ; Electronic books ; SAP R/3 ; Management ; SAP R/3 ; Management
    Abstract: At a time when many companies, particularly in the technological field, are continuously laying off workers, SAP, Inc. and organizations using the Enterprise Resource Planning (ERP) and SAP concepts and software packages, on the other hand, are in need of more IT professionals familiar with their software applications. Although the popularity of ERP/SAP has reached an all time high, there are not many studies available in this field. This book provides both practitioners and academicians with a comprehensive review and an in-depth understanding of this interesting area, and at the same time
    Abstract: At a time when many companies, particularly in the technological field, are continuously laying off workers, SAP, Inc. and organizations using the Enterprise Resource Planning (ERP) and SAP concepts and software packages, on the other hand, are in need of more IT professionals familiar with their software applications. Although the popularity of ERP/SAP has reached an all time high, there are not many studies available in this field. This book provides both practitioners and academicians with a comprehensive review and an in-depth understanding of this interesting area, and at the same time
    Description / Table of Contents: Preface; Chapter I Principles, Foundations & Issues in Enterprise Systems; Chapter II An Overview of SAP Technology; Chapter III Integrating SAP Across the Business Curriculum; Chapter IV The Impact of Agile SAP on the Supply Chain; Chapter V B2E SAP Portals: Employee Self-Service Case Study; Chapter VI Enterprise Systems and the Challenge of Integrated Change: A Focus on Occupational Communities; Chapter VII A Successful ERP Implementation Plan: Issues and Challenges; Chapter VIII Benefit Realisation with SAP: A Case Study; Chapter IX The e-ERP Transformation Matrix
    Note: Includes bibliographical references and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2004
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Hershey PA : Idea Group Pub
    ISBN: 1591403200 , 9781591403180 , 1591403197 , 9781591403197 , 1591403189 , 9781591403203
    Language: English
    Pages: 1 volume
    Edition: Boulder, Colo NetLibrary 2004 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Inter-organizational information systems in the internet age
    Keywords: Business enterprises Computer network resources. ; Business information services. ; Information resources management. ; Business enterprises Computer network resources ; Business information services ; Information resources management ; Information resources management ; Business information services ; Business enterprises Computer network resources ; Business enterprises Computer network resources. ; Business information services. ; Information resources management. ; Electronic book collection ; Betriebliches Informationssystem ; Electronic books. ; Electronic books. ; Electronic books ; Betriebliches Informationssystem ; Betriebliches Informationssystem
    Abstract: Foundations -- An introduction to inter-organizational information systems with selected bibliography / Sean B. Eom -- A typology of inter-organizational information systems / Joseph B. O'Donnell, Bonnie C. Glassberg -- Classifying B2B inter-organizational systems : a role linkage perspective / Ilyoo B. Hong -- Technology infrastructure -- Information technology infrastructure for inter-organizational systems / Sean B. Eom, Choong Kwon Lee -- Application service provision : a working tool for inter-organization systems in the internet age / Matthew W. Guah and Wendy L. Currie -- Systems analysis/planning -- Business associations as hubs of inter-organizational information systems for SMEs : the 2Cities portal / F. Pigni ... [et al.] -- Systems management -- IOIS and interfirm networks : interdependencies and managerial challenges / Stefan Klein ... [et al.] -- Implementation and applications -- Inter-organizational information system adoption and diffusion : a review and analysis of empirical research / Hope Koch -- Evolution of DSS from single-user DSS to inter-organizational DSS / Sean B. Eom -- An examination of inter-organizational decision support systems / Daniel J. Power, Shashidhar Kaparthi -- Evaluation -- Evaluating inter-organizational information systems / Jill Drury, Jean Scholtz -- Research method and empirical study -- Comparative pairs analysis for inter-organizational information systems research / Christine Storer, Geoffrey N. Soutar, Mohammed Quaddus -- Empirical evidence on how information technology encourages the creation of strategic networks / Jose A. Medina-Garrido, Sebastian Bruque-Camara, Jose Ruiz-Navarro
    Description / Table of Contents: Foundations -- An introduction to inter-organizational information systems with selected bibliography / Sean B. Eom -- A typology of inter-organizational information systems / Joseph B. O'Donnell, Bonnie C. Glassberg -- Classifying B2B inter-organizational systems : a role linkage perspective / Ilyoo B. Hong -- Technology infrastructure -- Information technology infrastructure for inter-organizational systems / Sean B. Eom, Choong Kwon Lee -- Application service provision : a working tool for inter-organization systems in the internet age / Matthew W. Guah and Wendy L. Currie -- Systems analysis/planning -- Business associations as hubs of inter-organizational information systems for SMEs : the 2Cities portal / F. Pigni ... [et al.] -- Systems management -- IOIS and interfirm networks : interdependencies and managerial challenges / Stefan Klein ... [et al.] -- Implementation and applications -- Inter-organizational information system adoption and diffusion : a review and analysis of empirical research / Hope Koch -- Evolution of DSS from single-user DSS to inter-organizational DSS / Sean B. Eom -- An examination of inter-organizational decision support systems / Daniel J. Power, Shashidhar Kaparthi -- Evaluation -- Evaluating inter-organizational information systems / Jill Drury, Jean Scholtz -- Research method and empirical study -- Comparative pairs analysis for inter-organizational information systems research / Christine Storer, Geoffrey N. Soutar, Mohammed Quaddus -- Empirical evidence on how information technology encourages the creation of strategic networks / Jose A. Medina-Garrido, Sebastian Bruque-Camara, Jose Ruiz-Navarro
    Description / Table of Contents: FoundationsAn introduction to inter-organizational information systems with selected bibliography / Sean B. Eom -- A typology of inter-organizational information systems / Joseph B. O'Donnell, Bonnie C. Glassberg -- Classifying B2B inter-organizational systems : a role linkage perspective / Ilyoo B. Hong -- Technology infrastructure -- Information technology infrastructure for inter-organizational systems / Sean B. Eom, Choong Kwon Lee -- Application service provision : a working tool for inter-organization systems in the internet age / Matthew W. Guah and Wendy L. Currie -- Systems analysis/planning -- Business associations as hubs of inter-organizational information systems for SMEs : the 2Cities portal / F. Pigni ... [et al.] -- Systems management -- IOIS and interfirm networks : interdependencies and managerial challenges / Stefan Klein ... [et al.] -- Implementation and applications -- Inter-organizational information system adoption and diffusion : a review and analysis of empirical research / Hope Koch -- Evolution of DSS from single-user DSS to inter-organizational DSS / Sean B. Eom -- An examination of inter-organizational decision support systems / Daniel J. Power, Shashidhar Kaparthi -- Evaluation -- Evaluating inter-organizational information systems / Jill Drury, Jean Scholtz -- Research method and empirical study -- Comparative pairs analysis for inter-organizational information systems research / Christine Storer, Geoffrey N. Soutar, Mohammed Quaddus -- Empirical evidence on how information technology encourages the creation of strategic networks / Jose A. Medina-Garrido, Sebastian Bruque-Camara, Jose Ruiz-Navarro.
    Note: Includes bibliographical references and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2004
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 3rd ed.
    Keywords: Electronic books ; local
    Abstract: Official self-study test preparation guide for the Cisco IPS exam 642-532 The official study guide helps you master all the topics on the IPS exam, including: IPS concepts Command-line interface (CLI) and IPS Device Manager (IDM) configuration modes Basic sensor and IPS signature configuration IPS signature engines Sensor tuning IPS event monitoring Sensor maintenance Verifying system configuration Using the Cisco IDS Module (IDSM) and Cisco IDS Network Module Capturing network traffic CCSP IPS Exam Certification Guide is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the IPS exam. Cisco Security Test Engineer Earl Carter shares preparation hints and test-taking tips, helping you identify areas of weakness and improve your Intrusion Prevention System (IPS) knowledge. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. CCSP IPS Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists and Foundation Summary materials make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, presenting question-by-question remediation to the text. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP IPS Exam Certification Guide is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains an electronic copy of the book and more than 200 practice questions for the IPS ex...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: The practical guide to building resilient and highly available IP networks Learn from an all-in-one introduction to new features and developments in building a resilient IP network Enable your organization to meet internal service-level agreements (SLAs) for mission-critical resources Understand how a resilient IP network can help in delivering mission-critical information such as video and voice services Work with configuration examples that are based on real-world issues and customer requirements Get tips and best practices from field personnel who have worked on some of the largest networks with stringent uptime requirements and SLAs More companies are building networks with the intention of using them to conduct business. Because the network has become such a strategic business tool, its availability is of utmost importance to companies and their service providers. The challenges for the professionals responsible for these networks include ensuring that the network remains up all the time, keeping abreast of the latest technologies that help maintain uptime, and reacting to ever-increasing denial-of-service (DoS) attacks. Building Resilient IP Networks helps you meet those challenges. This practical guide to building highly available IP networks captures the essence of technologies that contribute to the uptime of networks. You gain a clear understanding of how to achieve network availability through the use of tools, design strategy, and Cisco IOS® Software. With Building Resilient IP Networks , you examine misconceptions about five-nines availability and learn to focus your attention on the real issues: appreciating the limitations of the protocols, understanding what has been done to improve them, and keeping abreast of those changes. Building Resilient IP Networks highlights the importance of having a modular approach to building an IP network and, most important, illustrates how a modular design contributes to a resilient network. You learn how an IP network can be broken down to various modules and how these modules interconnect with one another. Then you explore new network resiliency features that have been developed recently, categorized with respect to the design modules. Building Resilient IP Networks is relevant to both enterprise and service provider customers of all sizes. Regardless of whether the network connects to the Internet, fortifying IP networks for maximum uptime and prevention of attacks is mandatory for anyone's b...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: 418 p. ; , 24 cm. +
    DDC: 794.816693
    Keywords: Computer games ; Programming ; Three-dimensional display systems ; Electronic books ; local
    Abstract: There are many programming hobbyists who write 2D games but there are far fewer that grasp the concepts of 3D programming. Although there are also quite a few ¿game development¿ books on the market, few deal with 3D game development. Those that do are mainly aimed at advanced readers. This book will provide a practical, example driven approach to learning the unique art of 3D Game Development that even the beginner can grasp. It won¿t get bogged down in page after page of boring theory but instead will teach through many interesting hands on examples. Tom Miller brings years and years of 3D game programming to the table and couples that with an engaging writing style to mentor readers in the intricacies of game development. The book starts out with a crash course in game programming concepts and then progresses into developing 3 different types of games with many useful tips, notes, and cautions along the way. This title will serve as a useful guide to either current 2D game developers or programmers that want to learn to program games.
    Note: Includes CD-ROM
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 624 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    Keywords: Internet programming ; Microsoft .NET ; Electronic books ; local
    Abstract: Brilliantly compiled by author Juval Lowy, Programming .NET Components , Second Edition is the consummate introduction to the Microsoft .NET Framework--the technology of choice for building components on Windows platforms. From its many lessons, tips, and guidelines, readers will learn how to use the .NET Framework to program reusable, maintainable, and robust components.Following in the footsteps of its best-selling predecessor, Programming .NET Components , Second Edition has been updated to cover .NET 2.0. It remains one of the few practical books available on this topic. This invaluable resource is targeted at anyone who develops complex or enterprise-level applications with the .NET platform--an ever-widening market. In fact, nearly two million Microsoft developers worldwide now work on such systems. Programming .NET Components , Second Edition begins with a look at the fundamentals of component-oriented programming and then progresses from there. It takes the time to carefully examine how components can simplify and add flexibility to complex applications by allowing users to extend their capabilities. Next, the book introduces a variety of .NET essentials, as well as .NET development techniques. Within this discussion on component development, a separate chapter is devoted to each critical development feature, including asynchronous calls, serialization, remoting, security, and more. All the while, hazardous programming pitfalls are pointed out, saving the reader from experiencing them the hard way.A .NET expert and noted authority on component-oriented programming, Lowy uses his unique access to Microsoft technical teams to the best possible advantage, conveying detailed, insider information in easy-to-grasp, activity-filled language. This hands-on approach is designed to allow individuals to learn by doing rather than just reading. Indeed, after digesting Programming .NET Components , Second Edition, readers should be able to start developing .NET components immediately. Programming .NET Components , Second Edition is the consummate introduction to the Microsoft .NET Framework--the technology of choice for building components on Windows platforms. From its many lessons, tips, and guidelines, readers will learn how to use the .NET Framework to program reusable, maintainable, and robust components.Following in the footsteps of its best-selling predecessor, Programming .NET Components , Second Edition has been updated to cover...
    Note: "Covers .NET 2.0 & Visual Studio 2005"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: Build Powerful, Cross-Platform Rich Client Applications Eclipse is more than a state-of-the-art IDE: its Rich Client Platform (RCP) plug-ins form an outstanding foundation for any desktop application, from chat applications to enterprise software front-ends. In Eclipse Rich Client Platform , two leaders of the Eclipse RCP project show exactly how to leverage Eclipse for rapid, efficient, cross-platform desktop development. In addition to explaining the power of Eclipse as a desktop application development platform, the authors walk step-by-step through developing a fully featured, branded RCP application. They introduce a wide range of techniques, including developing pluggable and dynamically extensible systems, using third-party code libraries, and packaging applications for diverse environments. You'll build, refine, and refactor a complete prototype; customize the user interface; add Help and Update features; and build, brand, and ship the finished software. For every Java developer, regardless of previous Eclipse experience Thoroughly covers Eclipse 3.1's new RCP features and its extensive new tools for designing, coding, and packaging RCP applications Presents techniques for branding and customizing the look and feel of RCP applications Shows how to overcome the challenges and "rough edges" of RCP development Discusses the similarities and differences between RCP and conventional plug-in development Includes an overview of OSGi, the base execution framework for Eclipse If you want to develop and deploy world-class Java applications with rich, native GUIs, and use Eclipse RCP- get this book . CD-ROM contains the Eclipse 3.1 SDK, Eclipse 3.1 RCP SDK, and Eclipse 3.1 RCP Delta Pack appropriate for Windows, Linux, and Mac OS X. It also contains all the code samples developed in the book. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 713 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Computer viruses ; Electronic books ; local
    Abstract: "Of all the computer-related books I've read recently, this one influenced my thoughts about security the most. There is very little trustworthy information about computer viruses. Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book." -Halvar Flake, Reverse Engineer, SABRE Security GmbH Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published-addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code-and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Boston, Mass. ; : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 651 p. ; , 24 cm
    Edition: 3rd ed.
    Series Statement: The Java series
    DDC: 005.71262
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Written by the inventors of the technology, The Java™ Language Specification, Third Edition , is the definitive technical reference for the Java™ programming language. If you want to know the precise meaning of the language's constructs, this is the source for you. The book provides complete, accurate, and detailed coverage of the Java programming language. It provides full coverage of all new features added since the previous edition, including generics, annotations, asserts, autoboxing, enums, for-each loops, variable arity methods, and static import clauses.
    Note: Previous ed.: 2000
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 342 p. , ill. ; , 24 cm
    DDC: 005.74/068
    Keywords: Business ; Data processing ; Data warehousing ; Database management ; Electronic books ; local
    Abstract: The definitive best-practices guide to enterprise data-management strategy. You can no longer manage enterprise data "piecemeal." To maximize the business value of your data assets, you must define a coherent, enterprise-wide data strategy that reflects all the ways you capture, store, manage, and use information. In this book, three renowned data management experts walk you through creating the optimal data strategy for your organization. Using their proven techniques, you can reduce hardware and maintenance costs, and rein in out-of-control data spending. You can build new systems with less risk, higher quality, and improve data access. Best of all, you can learn how to integrate new applications that support your key business objectives. Drawing on real enterprise case studies and proven best practices, the author team covers everything from goal-setting through managing security and performance. You'll learn how to: Identify the real risks and bottlenecks you face in delivering data-and the right solutions Integrate enterprise data and improve its quality, so it can be used more widely and effectively Systematically secure enterprise data and protect customer privacy Model data more effectively and take full advantage of metadata Choose the DBMS and data storage products that fit best into your overall plan Smoothly accommodate new Business Intelligence (BI) and unstructured data applications Improve the performance of your enterprise database applications Revamp your organization to streamline day-to-day data management and reduce cost Data Strategy is indispensable for everyone who needs to manage enterprise data more efficiently-from database architects to DBAs, technical staff to senior IT decision-makers. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. [317]-321) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Language: English
    Pages: xxxii, 346 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.1
    Keywords: Rational Clearcase ; Software configuration management ; Electronic books ; local
    Abstract: "I wrote that the first edition of this book "communicates much of the experience, wisdom, and insight that was acquired along the way to discovering what SCM best practices are and how to implement/deploy them." The second edition is full of even more practical experience! It not only refines and expands upon earlier strategies and best practices, it also contains even more concrete "how-to" information about implementing and deploying them." -Brad Appleton co-author of Software Configuration Management Patterns: Effective Teamwork, Practical Integration "Read this book when you're getting started with configuration management (CM); read it again in six months and once more two years later. Software Configuration Management Strategies and IBM Rational ClearCase goes beyond the basics to provide a coherent review of CM strategies for projects of all sizes and complexities." -Jennie Brown, CM Specialist IBM Corporation "This book covers practical software configuration management (SCM), ClearCase UCM and ClearCase use for project teams. Every project lead and SCM specialist should (re)read this book before starting a project." -Roger Jarrett, Senior Software Engineer IBM Rational Software "This second edition captures vital Unified Change Management (UCM) features and concepts. It brings the entire UCM feature set full circle and lays the ground work for a successful UCM implementation; Bellagio and Milligan continue where the first edition left off. The inclusion of composite baseline concepts, single stream development, performance tuning, and other features and concepts make this the core of any old or new Unified Change Management implementation. It is rare that a second edition of a book can hold your interest like the first. This publication does just that...this continues to be the standard for users interested in Unified Change Management deployment." -Adam Levensohn, Manager IBM Rational Software Software Configuration Management (SCM) can help even the largest, most complex project teams manage change, so they can deliver higher quality products faster. The First Edition of Software Configuration Management Strategies and Rational ClearCase established itself as the definitive single source for guidance on both SCM best practices and the market's leading product, IBM Rational ClearCase. This fully updated Second Edition systematically addresses the latest ClearCase and ClearQuest® innovations, while offering even deeper insight into S...
    Note: Previous ed.: published under title: Software configuration management strategies and Rational ClearCase / by Brian A. White, 2000. - Includes bibliographical references (p. 325-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 434 p. , ill. ; , 24 cm
    DDC: 004.6/2
    Keywords: BGP (Computer network protocol) ; Electronic books ; local
    Abstract: PRACTICAL BGP "I would recommend this book to network engineers, Internet service providers, network software developers, and IT staff who need to deal with network planning and routing." -Enke Chen, Redback Networks Hands-on guidance for deploying and optimizing BGP networks-enterprise and ISP Now there's a practical guide to deploying and managing BGPv4 in any environment-from small enterprises to the largest Tier 2 and Tier 3 service providers. A team of the world's leading BGP experts brings together powerful insights into network design, configuration, and deployment with the latest version of BGP-including hands-on guidance for leveraging its key enhancements. Coverage includes • Best practices and diverse real-world scenarios for applying BGPv4 • Understanding the impact of BGP design on local networks and the global Internet backbone • Building effective BGP policies: aggregation, propagation, accounting, and more • Maximizing scalability and performance in BGPv4 networks • BGP and network security, including Secure Origin BGP • Deploying BGP/MPLS Layer 3 VPNs • Extensive troubleshooting guidance unavailable in any other book If you're a network engineer or administrator looking to drive maximum reliability and performance from BGP-based networks, Practical BGP will help you get the job done-from start to finish. RUSS WHITE is a Network Protocols Deployment Engineer in Cisco Systems Routing DNA Team specializing in routing protocols. A widely recognized expert in networking, he co-chairs the IETF Routing Protocols Security working group, and co-authored Advanced IP Network Design, IS-IS for IP Networks, and Inside Cisco IOS Software Architecture. DANNY McPHERSON is a member of the Architecture Team at Arbor Networks. He has held technical leadership positions with several global ISPs, is active within the IETF, and is an acknowledged expert in Internet architecture and security. He co-authored Internet Routing Architectures, Second Edition. SRIHARI SANGLI , Senior Manager for MPLS and routing development at Procket Networks, was formerly Senior Technical Leader in Cisco's IOS Routing Protocols group. He, along with others at Cisco, coded the industry-first implementation of BGP/MPLS based Layer-3 VPN.
    Note: Includes index. - The author's name Sangli Srihari is listed as Srihari Sangli on cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Upper Saddle River, NJ. : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations of UNIX and UNIX-like environments. And yet, it does all this while retaining the style and taste of the original classic." --Mukesh Kacker, cofounder and former CTO of Pronto Networks, Inc. "One of the essential classics of UNIX programming." --Eric S. Raymond, author of The Art of UNIX Programming "This is the definitive reference book for any serious or professional UNIX systems programmer. Rago has updated and extended the classic Stevens text while keeping true to the original. The APIs are illuminated by clear examples of their use. He also mentions many of the pitfalls to look out for when programming across different UNIX system implementations and points out how to avoid these pitfalls using relevant standards such as POSIX 1003.1, 2004 edition and the Single UNIX Specification, Version 3." --Andrew Josey, Director, Certification, The Open Group, and Chair of the POSIX 1003.1 Working Group " Advanced Programming in the UNIX® Environment, Second Edition, is an essential reference for anyone writing programs for a UNIX system. It's the first book I turn to when I want to understand or re-learn any of the various system interfaces. Stephen Rago has successfully revised this book to incorporate newer operating systems such as GNU/Linux and Apple's OS X while keeping true to the first edition in terms of both readability and usefulness. It will always have a place right next to my computer." --Dr. Benjamin Kuperman, Swarthmore College Praise for the First Edition " Advanced Programming in the UNIX® Environment is a must-have for any serious C programmer who works under UNIX. Its depth, thoroughness, and clarity of explana-tion are unmatched." -- UniForum Monthly "Numerous readers recommended Advanced Programming in the UNIX® Environment by W. Richard Stevens (Addison-Wesley), and I'm glad they did; I hadn't even heard of this book, and it's been out since 1992. I just got my hands on a copy, and the first few chapters have been fascinating." -- Open Systems Today "A much more readable and detailed treatment of UNIX internals can be found in Advanced Programming in the UNIX® Environment by W. Richard Steven...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive book on Security Patterns, which are critical for secure programming. --Li Gong, former Chief Java Security Architect, Sun Microsystems, and coauthor of Inside Java 2 Platform Security As developers of existing applications, or future innovators that will drive the next generation of highly distributed applications, the patterns and best practices outlined in this book will be an important asset to your development efforts. --Joe Uniejewski, Chief Technology Officer and Senior Vice President, RSA Security, Inc. This book makes an important case for taking a proactive approach to security rather than relying on the reactive security approach common in the software industry. --Judy Lin, Executive Vice President, VeriSign, Inc. Core Security Patterns provides a comprehensive patterns-driven approach and methodology for effectively incorporating security into your applications. I recommend that every application developer keep a copy of this indispensable security reference by their side. --Bill Hamilton, author of ADO.NET Cookbook , ADO.NET in a Nutshell , and NUnit Pocket Reference As a trusted advisor, this book will serve as a Java developers security handbook, providing applied patterns and design strategies for securing Java applications. --Shaheen Nasirudheen, CISSP,Senior Technology Officer, JPMorgan Chase Like Core J2EE Patterns , this book delivers a proactive and patterns-driven approach for designing end-to-end security in your applications. Leveraging the authors strong security experience, they created a must-have book for any designer/developer looking to create secure applications. --John Crupi, Distinguished Engineer, Sun Microsystems, coauthor of Core J2EE Patterns Core Security Patterns is the hands-on practitioners guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisionin...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Learn Linux kernel programming, hands-on : a uniquely effective top-down approach The Linux ® Kernel Primer is the definitive guide to Linux kernel programming. The authors' unique top-down approach makes kernel programming easier to understand by systematically tracing functionality from user space into the kernel and carefully associating kernel internals with user-level programming fundamentals. Their approach helps you build on what you already know about Linux, gaining a deep understanding of how the kernel works and how its elements fit together. One step at a time, the authors introduce all the tools and assembly language programming techniques required to understand kernel code and control its behavior. They compare x86 and PowerPC implementations side-by-side, illuminating cryptic functionality through carefully-annotated source code examples and realistic projects. The Linux ® Kernel Primer is the first book to offer in-depth coverage of the rapidly growing PowerPC Linux development platform, and the only book to thoroughly discuss kernel configuration with the Linux build system. Coverage includes Data structures x86 and PPC assembly language Viewing kernel internals Linux process model User and kernel space Interrupts and exceptions Memory allocation and tracking Tracing subsystem behavior I/O interactions Filesystems and file operations Scheduling and synchronization Kernel boot process Kernel build system Configuration options Device drivers And more... If you know C, this book teaches you all the skills and techniques you need to succeed with Linux kernel programming. Whether you're a systems programmer, software engineer, systems analyst, test professional, open source project contributor, or simply a Linux enthusiast, you'll find it indispensable. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/46
    Keywords: Mac OS ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The Most Useful UNIX Guide for Mac OS X Users Ever, with Hundreds of High-Quality Examples! Beneath Mac OS ® X's stunning graphical user interface (GUI) is the most powerful operating system ever created: UNIX ® . With unmatched clarity and insight, this book explains UNIX for the Mac OS X user-giving you total control over your system, so you can get more done, faster. Building on Mark Sobell's highly praised A Practical Guide to the UNIX System, it delivers comprehensive guidance on the UNIX command line tools every user, administrator, and developer needs to master-together with the world's best day-to-day UNIX reference. This book is packed with hundreds of high-quality examples. From networking and system utilities to shells and programming, this is UNIX from the ground up-both the "whys" and the "hows"-for every Mac user. You'll understand the relationships between GUI tools and their command line counterparts. Need instant answers? Don't bother with confusing online "manual pages": rely on this book's example-rich, quick-access, 236-page command reference! Don't settle for just any UNIX guidebook. Get one focused on your specific needs as a Mac user! A Practical Guide to UNIX ® for Mac OS ® X Users is the most useful, comprehensive UNIX tutorial and reference for Mac OS X and is the only book that delivers Better, more realistic examples covering tasks you'll actually need to perform Deeper insight, based on the authors' immense knowledge of every UNIX and OS X nook and cranny Practical guidance for experienced UNIX users moving to Mac OS X Exclusive discussions of Mac-only utilities, including plutil , ditto , nidump , otool , launchctl , diskutil , GetFileInfo , and SetFile Techniques for implementing secure communications with ssh and scp -plus dozens of tips for making your OS X system more secure Expert guidance on basic and advanced shell programming with bash and tcsh Tips and tricks for using the shell interactively from the command line Thorough guides to vi and emacs designed to help you get productive fast, and maximize your editing efficiency In-depth coverage of the Mac OS X filesystem and access permissions, including extended attributes and Access Control Lists (ACLs) A comprehensive UNIX glossary Dozens of exercises to help you practice and gain confidence And much more, including a superior introduction to UNIX programming tools such as awk , sed , otool , make , gcc , gdb , and CVS
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: 360 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The fastest route to true Linux mastery! You know your way around Windows (or maybe a Mac, or even UNIX). Now, you're ready for Linux. And you don't have a minute to waste. Welcome. This book's for you . Janet Valade has spent thirteen years helping new users master Linux and related technologies. She knows the "magic words" that'll help you get the job done, fast. (And she knows exactly how to keep you out of trouble, too!) You'll learn Linux through dozens of focused, bite-size examples, each one carefully designed to build on what you've learned before. Need specific solutions? This book's carefully crafted, high-efficiency format delivers them... instantly . Working on Fedora? Mandrake? SuSE? No matter. This book is for you. No other introduction to Linux covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with Linux- without the hassles! Choose the best Linux distribution for your personal or business needs Get Linux installed quickly and running reliably Handle your day-to-day tasks and efficiently manage your files Master KDE, GNOME, and the Linux command line Write documents and build spreadsheets with OpenOffice.org Set up Web access, email, and instant messaging Work with powerful Linux multimedia and graphics software Find, install, and run new Linux software Set up your printer to work with Linux Supercharge Linux with shell scripts and customized configuration files Includes concise Linux command reference and quick guide to building powerful Regular Expressions Spring Into ... is a new series of fast-paced tutorials from Addison-Wesley Professional Publishers. Each book in the series is designed to bring you up-to-speed quickly. Complex technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working... now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Wharton School Pub. | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 282 p. , ill., maps ; , 24 cm
    Keywords: Economic forecasting ; Globalization ; Economic aspects ; Industrial management ; International business enterprises ; International economic integration ; Electronic books ; local
    Abstract: Globalization is a fact. You can't stop it; it has already happened; it is here to stay. And we are moving into a new global stage. A radically new world is taking shape from the ashes of yesterday's nation-based economic world. To succeed, you must act on the global stage, leveraging radically new drivers of economic power and growth. Legendary business strategist Kenichi Ohmae-who in The Borderless World , published in 1990, predicted the rise and success of globalization, coining the very word-synthesizes today's emerging trends into the first coherent view of tomorrow's global economy-and its implications for politics, business, and personal success. Ohmae explores the dynamics of the new "region state," tomorrow's most potent economic institution, and demonstrates how China is rapidly becoming the exemplar of this new economic paradigm. The Next Global Stage offers a practical blueprint for businesses, governments, and individuals who intend to thrive in this new environment. Ohmae concludes with a detailed look at strategy in an era where it's tougher to define competitors, companies, and customers than ever before. As important as Huntington's The Clash of Civilizations , as fascinating as Friedman's The Lexus and the Olive Tree , this book doesn't just explain what's already happened: It offers a roadmap for action in the world that's beginning to emerge. Why Keynes' and Milton Friedman's economics are -and what might replace them New economics for a borderless world history From Windows to English to your global brand Leveraging today's most powerful platforms for growth Anticipating technological obsolescence-and jumping ahead of it Technology: driving business death-and rebirth What government can do when nation-states don't matter Government in the post-national era Honing your global vision and global leadership skills Leadership and strategy on the global stage
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: The all-in-one practical guide to supporting your Cisco network Provides detailed tips for using freeware and open-source tools readily available from the Internet, including the reasons behind choosing a particular tool Refer to a single source for common Cisco network administration issues Dedicated section for network security aids administrators in effectively dealing with security issues Deploy fully functional RADIUS and TACACS+ for servers for controlling access to Cisco devices Deploy Linux- and Windows-based syslog servers to centrally collect syslog information generated by Cisco devices Deploy Linux- and Windows-based network monitoring systems to monitor interface traffic through Cisco devices including routers, switches, VPN concentrators, and Cisco PIX® firewalls Use the trending feature of network monitoring systems for long-term network analysis and capacity planning Automatically detect and report configuration changes on Cisco IOS® Software-based devices and Cisco PIX firewalls Deploy Cisco-based VPNs in mixed environments using Linux- and Windows-based VPN servers Network Administrators Survival Guide solves many common network administration problems by providing administrators with an all-in-one practical guide to supporting Cisco® networks using freeware tools. It is a single reference source that explains particular issues, their significance for administrators, and the installation and configuration process for the tools. The solutions are Cisco centric and provide detail not available in generic online information. Network Administrators Survival Guide emphasizes solutions for network managers and administrators of small to medium-sized businesses and enterprises. Each chapter is broadly based on a network administration function, starting with an overview of the topic, followed by the methodology involved to accomplish that function. This includes the tools available, why they are the right choice, and their installation, configuration, and usage methods. For any given function, Network Administrators Survival Guide covers both Windows- and Linux-based tools as appropriate. Most of the Windows-based tools offer the advantage of GUI for ease of use, whereas the Linux-based tools are command-line based and can be used in automated scripts. Both are significant for network administrators. Based on author Anand Deveriya's extensive field experience, this practical guide to maintaining Cisco networks will save you signifi...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: A complete configuration manual for MPLS, MPLS VPNs, MPLS TE, QoS, Any Transport over MPLS (AToM), and VPLS Understand the crucial Cisco commands for various MPLS scenarios Understand fundamentals of MPLS operation and learn to configure basic MPLS in Frame Relay and ATM-based environments Master fundamentals of MPLS VPN operation including Multiprotocol BGP (MBGP) operation, VPNv4 route exchange, and basic MPLS VPN configuration in the provider network Understand and configure various PE-CE routing protocols in MPLS VPN networks Understand MPLS VPN provisioning in an Inter-provider VPN (Inter-AS) and Carrier Supporting Carrier (CSC) environment Learn MPLS TE and its advanced features Examine AToM with configuration examples for like-to-like and any-to-any L2 VPN implementations and VPLS components and operation, VPLS configuration and verification, and VPLS topologies Learn about MPLS QoS, including configuration and implementation of uniform and short pipe modes MPLS Configuration on Cisco IOS Software is a complete and detailed resource to the configuration of Multiprotocol Label Switching (MPLS) networks and associated features. Through its practical, hands-on approach, you'll become familiar with MPLS technologies and their configurations using Cisco IOS® Software. MPLS Configuration on Cisco IOS Software covers basic-to-advanced MPLS concepts and configuration. Beyond its emphasis on MPLS, you'll learn about applications and deployments associated with MPLS, such as traffic engineering (TE), Layer 2 virtual private networks (VPN), and Virtual Private LAN Service (VPLS). You'll receive practical guidance and deployment scenarios that can be enhanced by re-creation of the setups and configurations demonstrated within this book. You'll move quickly from a brief overview of MPLS technology and basic MPLS configuration on Cisco® routers to more advanced topics. Several chapters provide instruction on VPN connectivity options, including implementing Border Gateway Protocol (BGP) in MPLS VPNs. You'll receive configuration guidelines for advanced MPLS implementations such as MPLS TE, quality of service (QoS), and extranet VPNs. You'll learn about implementation of Layer 2 VPNs versus Layer 3 VPNs with Cisco Any Transport over MPLS (AToM). And you'll see demonstrations of implementing VPLS on Cisco routers complete with the configurations and platform support. "I highly recommend MPLS Configuration on Cisco IOS Software as required reading for th...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xxi, 370 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Broadband communication systems ; Extranets (Computer networks) ; MPLS standard ; Electronic books ; local
    Abstract: Implement the design principles and configurations behind MPLS-based VPNs for broadband access networks The book discusses how MPLS and its VPN service are best used in a broadband environment, concentrating on key design issues and solutions, including How to manage tens of thousands of interfaces and host routes and hundreds of dynamic VPNs When a Virtual Home Gateway is necessary Why use dynamic address assignment How routes should be summarized into the core Deploy MPLS VPNs successfully in broadband networks with Building MPLS-Based Broadband Access VPNs . This book helps you understand why and how today's broadband networks function, covering the principal access technologies: DSL, Ethernet, and cable. The book also examines the different tunneling protocols used for VPN solutions today, namely GRE, IPSec, and L2TP, with examples of how these solutions are deployed and a discussion of their strengths and weaknesses. Building MPLS-Based Broadband Access VPNs also includes an in-depth description of the IOS VRF Lite, which helps you use VRF-aware features with an IP core. Detailed descriptions of the technologies, design principles, network configurations, and case studies are provided throughout the book, helping you develop a pragmatic understanding of MPLS-based broadband access VPNs. Obtain a realistic understanding of large-scale broadband access network design requirements Recognize the business impact of using MPLS to provide access VPN services, including the advantages of QoS, availability, and provisioning Use MPLS in access VPN and transport networks and deal with the unique scalability problems that such networks pose Leverage VRF-aware features to deploy IP-based VPNs Includes detailed Cisco IOS configuration examples based on real-world scenarios This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references (p. [341]-355) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 658.4/038
    Keywords: Chief information officers ; Information resources management ; Information technology ; Management ; Management ; Electronic books ; local
    Abstract: World-class IT leadership solutions from working CIOs: detailed, realistic, proven Every year, IT leadership becomes more challenging. Don't go it alone. Get practical help from the people who know what you're up against, and know what works: your most successful peers . In CIO Wisdom II, more than a dozen of today's leading CIOs share specific, realistic, up-to-the-minute techniques for maximizing agility, cost-effectiveness, and business value . You'll find solutions for managing both the internal and external forces impacting IT, and for dealing with more than 20 of your toughest issues -- business, technical, and human . You'll find specific, realistic approaches to everything from architecture to outsourcing, new technology selection to governance. CIO Wisdom II: it's more valuable than your last consultant -- and a whole lot more cost-effective. Anticipating the next transformation in your role as CIO -- and getting ahead of the curve Delivering real-time, mission-critical business intelligence: lessons from the military Integrating the enterprise: New best practices and cost-effective technical options Quantifying and maximizing software return on investment Mastering five crucial lessons for successful IT outsourcing Managing outsourced environments for maximum responsiveness, flexibility, and efficiency Leveraging the value of open source -- and minimizing its risks Using IT to improve business processes -- and improving your own internal processes, including procurement Systematically securing your IT facilities Achieving compliance -- and leveraging those investments for competitive advantage Previewing tomorrow's key trends in information management © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Praise for Mark Sobell's Books "I keep searching for books that collect everything you want to know about a subject in one place, and keep getting disappointed. Usually the books leave out some important topic, while others go too deep in some areas and must skim lightly over the others. A Practical Guide to Red Hat® Linux® is one of those rare books that actually pulls it off. Mark G. Sobell has created a single reference for Red Hat Linux that cannot be beat! This marvelous text (with a 4-CD set of Linux Fedora Core 2 included) is well worth the price. This is as close to an 'everything you ever needed to know' book that I've seen. It's just that good and rates 5 out of 5." -Ray Lodato, Slashdot contributor "Mark Sobell has written a book as approachable as it is authoritative." -Jeffrey Bianchine, Advocate, Author, Journalist "Excellent reference book, well suited for the sysadmin of a linux cluster, or the owner of a PC contemplating installing a recent stable linux. Don't be put off by the daunting heft of the book. Sobell has striven to be as inclusive as possible, in trying to anticipate your system administration needs." -Wes Boudville, Inventor " A Practical Guide to Red Hat® Linux® is a brilliant book. Thank you Mark Sobell." -C. Pozrikidis, University of California at San Diego "This book presents the best overview of the Linux operating system that I have found. . . . It should be very helpful and understandable no matter what the reader's background is: traditional UNIX user, new Linux devotee, or even Windows user. Each topic is presented in a clear, complete fashion and very few assumptions are made about what the reader knows. . . . The book is extremely useful as a reference, as it contains a 70-page glossary of terms and is very well indexed. It is organized in such a way that the reader can focus on simple tasks without having to wade through more advanced topics until they are ready." -Cam Marshall, Marshall Information Service LLC, Member of Front Range UNIX Users Group FRUUG, Boulder, Colorado "Conclusively, this is THE book to get if you are a new Linux user and you just got into RH/Fedora world. There's no other book that discusses so many different topics and in such depth." -Eugenia Loli-Queru, Editor in Chief, OSNews.com The Most Useful Linux Tutorial and Reference Ever, with Hundreds of High-Quality Examples Covering Every Linux Distribution! To be truly productive with Linux, you need to thoroughly mast...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 689 p. , ill. ; , 24 cm
    DDC: 005.2'762
    Keywords: PHP (Computer program language) ; Web sites ; Design ; Electronic books ; local
    Abstract: "This book, written by my colleague, Andi Gutmans, and two very prominent PHP developers, Stig Bakken and Derick Rethans, holds the key to unlocking the riches of PHP 5. It thoroughly covers all of the features of this new version, and is a must have for all PHP developers interested in exploring PHP 5's advanced features" -Zeev Suraski, Co-Designer of PHP 5 and Co-Creator of the Zend Engine Expert PHP 5 programming techniques, direct from PHP 5 co-creator and key developers Definitive coverage of the PHP object model, design patterns, XML/SOAP integration, and more Solid introduction and expert insights into performance tuning, PEAR, extensions, and database access The definitive introduction to PHP 5's advanced features! The definitive introduction for today's most powerful PHP 5 techniques In this book, PHP 5's co-creator and two leading PHP developers show you how to make the most of PHP 5's industrial-strength enhancements in any project-no matter how large or complex. Their unique insights and realistic examples illuminate PHP 5's new object model, powerful design patterns, improved XML Web services support, and much more. Whether you're creating web applications, extensions, packages, or shell scripts-or migrating PHP 4 code-here are high-powered solutions you won't find anywhere else. Review PHP's syntax and master its object-oriented capabilities-from properties and methods to polymorphism, interfaces, and reflection Master the four most important design patterns for PHP development Write powerful web applications: handle input, cookies, session extension, and more Integrate with MySQL, SQLite, and other database engines Provide efficient error handling that's transparent to your users Leverage PHP 5's improved XML support-including parsing, XSLT conversions, and more Build XML-based web services with XML-RPC and SOAP Make the most of PEAR: work with the repository, use key packages, and create your own Upgrade PHP 4 code to PHP 5-compatibility issues, techniques, and practical workarounds Improve script performance: tips and tools for PHP optimization Use PHP extensions to handle files/streams, regular expressions, dates/times, and graphics Create original extensions and shell scripts If you're a software developer new to PHP, you'll leap quickly into PHP and its new object-oriented capabilities. If you're an experienced PHP programmer, you already recognize PHP's convenience and simplicity. Now, discover all of its extraordinary pow...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 396 p. , ill. ; , 23 cm
    DDC: 004.692
    Keywords: Spam (Electronic mail) ; Spam filtering (Electronic mail) ; Electronic books ; local
    Abstract: Real Anti-Spam Help for System Administrators In Slamming Spam , two spam fighters show you how to fight back-and win. Unlike most spam books, this one is written specifically for in-the-trenches system administrators: professionals who need hands-on solutions for detecting, managing, and deterring spam in Unix/Linux and/or Microsoft Windows environments. The authors offer deep, administrator-focused coverage of the most valuable open-source tools for reducing spam's impact in the enterprise-especially SpamAssassin. Drawing on their extensive experience in developing and implementing anti-spam tools, the authors present expert insights into every leading approach to fighting spam, including Bayesian filtering, distributed checksum filtering, and email client filtering. Coverage includes Step-by-step junk mail filtering with Procmail Protecting Sendmail, Postfix, qmail, Microsoft Exchange, and Lotus Domino servers from spam Making the most of native MTA anti-spam features, including whitelists/blacklists, DNS black hole services, and header checking Distributed checksum filtering solutions, including Vipul's Razor and Distributed Checksum Clearinghouse McAfee SpamKiller for Lotus Domino McAfee SpamKiller for Microsoft Exchange Implementing and managing SpamAssassin Implementing SMTP AUTH, providing effective outbound SMTP authentication and relaying with any mail client; and STARTTLS, encrypting outbound mail content, user names, and passwords Sender verification techniques, including challenge/response, special use addresses, and sender compute Anti-spam solutions for Outlook, Outlook Express, Mozilla Messenger, and Unix mail clients Whatever your IT environment and mail platform, Slamming Spam's defense in-depth strategies can help you dramatically reduce spam and all its attendant costs-IT staff time, network/computing resources, and user productivity. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 363-374) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Mahwah, N.J : L. Erlbaum
    ISBN: 141061171X , 9781410611710
    Language: English
    Pages: xxi, 174 p , ill , 24 cm
    Edition: 2nd ed
    Edition: Boulder, Colo NetLibrary 2004 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Adolescent psychological development
    RVK:
    Keywords: Adolescent psychology Textbooks. ; Adolescent psychology Textbooks ; Adolescent psychology Textbooks ; Adolescent psychology Textbooks. ; Jugendpsychologie ; Electronic books. ; Electronic books. ; Electronic books Textbooks ; Electronic books ; Jugendpsychologie ; Jugendpsychologie
    Note: Includes bibliographical references (p. 145-162) and indexes , Electronic reproduction, Boulder, Colo : NetLibrary, 2004
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Boca Raton : Taylor and Francis
    ISBN: 0203496353 , 9780203496350
    Language: English
    Pages: 407 p , ill. (some col.) , 24 cm
    Edition: 3rd ed
    Edition: Boulder, Colo NetLibrary 2006 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Solid state chemistry
    RVK:
    Keywords: Solid state chemistry. ; Solid state chemistry ; Solid state chemistry ; Solid state chemistry. ; Ferromagnetismus ; Festkörperchemie ; Gitterbaufehler ; Supraleiter ; Electronic books. ; Electronic books. ; Einführung ; Festkörperchemie ; Gitterbaufehler ; Supraleiter ; Ferromagnetismus ; Festkörperchemie ; Gitterbaufehler ; Supraleiter ; Ferromagnetismus
    Note: Includes bibliographical references and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2006
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Mahwah, N.J : Lawrence Erlbaum Associates
    ISBN: 1410611698
    Language: English
    Pages: xix, 228 p , ill , 24 cm
    Edition: Online-Ausg. Boulder, Colo NetLibrary 2004 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    DDC: 150.287
    Keywords: Psychometrics. ; Psychology Research ; Methodology. ; Psychometrics. ; Psychology Research ; Methodology. ; Psychometrie ; Test ; Electronic books. ; Electronic books. ; Psychometrie ; Test ; Psychometrie ; Test
    Note: Includes bibliographical references (p. 211-220) and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2004
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Mahwah, N.J : L. Erlbaum
    ISBN: 1410611639 , 9780805842241 , 080584225X , 9780805842258 , 0805842241 , 9781410611635
    Language: English
    Pages: xiii, 277 p , 24 cm.
    Additional Material: 1 CD-ROM (4 3/4 in.)
    Edition: Boulder, Colo NetLibrary 2004 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Teaching psychology
    Keywords: Psychology Study and teaching. ; Psychology Study and teaching ; Psychology Study and teaching ; Psychology Study and teaching. ; Psychologiestudium ; Electronic books. ; Electronic books. ; Electronic books ; Psychologiestudium ; Psychologiestudium
    Note: Includes bibliographical references (p. 249-264) and indexes , Electronic reproduction, Boulder, Colo : NetLibrary, 2004
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Mahwah, N.J : L. Erlbaum Associates, Publishers
    ISBN: 141061252X
    Language: English
    Pages: xviii, 286 pages , 24 cm
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: LEA series in personality and clinical psychology
    Series Statement: EBSCOhost eBook Collection
    DDC: 155.2842
    Keywords: Rorschach-Test ; Rorschach Test. ; Rorschach Test. ; Persönlichkeitspsychologie ; Electronic books. ; Electronic books. ; Rorschach, Hermann 1884-1922 Rorschach-Test ; Persönlichkeitspsychologie ; Rorschach, Hermann 1884-1922 Rorschach-Test ; Persönlichkeitspsychologie
    Note: Includes bibliographical references and indexes , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Hackensack, NJ : World Scientific
    ISBN: 9812565817 , 9812389253 , 9789812389251 , 9789812565815
    Language: English
    Pages: xix, 416 p , ill , 24 cm
    Edition: 2nd ed
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Electromagnetic origin of quantum theory and light
    Keywords: Quantum theory. ; Quantum optics. ; Electromagnetism. ; Théorie quantique. ; Optique quantique. ; Électromagnétisme. ; Théorie quantique ; Optique quantique ; Électromagnétisme ; Quantum theory ; Quantum optics ; Electromagnetism ; Quantum theory ; Quantum optics ; Electromagnetism ; Quantum theory. ; Quantum optics. ; Electromagnetism. ; Théorie quantique. ; Optique quantique. ; Électromagnétisme. ; Electronic books ; Quantum optics ; Quantum theory ; SCIENCE ; Physics ; Quantum Theory ; Electromagnetism ; Electronic books. ; Electronic book ; Electronic books. ; Electronic books ; Quantentheorie ; Elektromagnetisches Feld ; Photon
    Abstract: Classical electrodynamics -- Selected boundary value problems -- Antenna Q -- Quantum theory -- Radiative energy exchanges -- Photons -- Epilogue
    Description / Table of Contents: Classical electrodynamicsSelected boundary value problems -- Antenna Q -- Quantum theory -- Radiative energy exchanges -- Photons -- Epilogue.
    Note: Includes bibliographical references and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Mahwah, N.J : L. Erlbaum Associates
    ISBN: 141061140X
    Language: English
    Pages: xii, 347 p , ill , 24 cm
    Edition: Boulder, Colo NetLibrary 2004 Online-Ressource E-Books von NetLibrary
    Series Statement: LEA's organization and management series
    Series Statement: EBSCOhost eBook Collection
    DDC: 158.4
    Keywords: Leadership Congresses. Psychological aspects ; Leadership Congresses. Psychological aspects ; Führungspsychologie ; Electronic books. ; Electronic books. ; Konferenzschrift ; Führungspsychologie ; Führungspsychologie
    Note: Includes bibliographical references and indexes , Electronic reproduction, Boulder, Colo : NetLibrary, 2004
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Mahwah, N.J : Lawrence Erlbaum Associates
    ISBN: 1410612945 , 9781410612946
    Language: English
    Pages: xix, 335 p , ill , 24 cm
    Edition: 2nd ed
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Gender, nature, and nurture
    RVK:
    RVK:
    Keywords: Gender identity. ; Nature and nurture. ; Sex differences (Psychology) ; Gender identity ; Nature and nurture ; Nature and nurture ; Sex differences (Psychology) ; Gender identity ; Gender identity. ; Nature and nurture. ; Sex differences (Psychology) ; Erbe-Umwelt-Problem ; Erziehung ; Geschlechtsidentität ; Geschlechtsunterschied ; Electronic books. ; Electronic books. ; Electronic books ; Geschlechtsunterschied ; Geschlechtsidentität ; Erziehung ; Erbe-Umwelt-Problem ; Geschlechtsunterschied ; Geschlechtsidentität ; Erziehung ; Erbe-Umwelt-Problem
    Abstract: This text presents scientific findings on gender differences, similarities, and variations - in sexuality, cognitive abilities, occupational preferences, personality, and social behaviours. It offers a synthesis of diverse points of view
    Abstract: Preface; Introduction; CHAPTER 1: WHAT'S THE DIFFERENCE ANYWAY?; CHAPTER 2: MASCULINITY AND FEMININITY: GENDER WITHIN GENDER; CHAPTER 3: THEORIES OF GENDER; CHAPTER 4: THE CASE FOR NATURE; CHAPTER 5: THE CASE FOR NURTURE; CHAPTER 6: CROSS-EXAMINATIONS; CHAPTER 7: GENDER, NATURE, AND NURTURE: LOOKING TO THE FUTURE; Glossary of Key Terms and Concepts; References; Author Index; Subject Index
    Description / Table of Contents: Preface; Introduction; CHAPTER 1: WHAT'S THE DIFFERENCE ANYWAY?; CHAPTER 2: MASCULINITY AND FEMININITY: GENDER WITHIN GENDER; CHAPTER 3: THEORIES OF GENDER; CHAPTER 4: THE CASE FOR NATURE; CHAPTER 5: THE CASE FOR NURTURE; CHAPTER 6: CROSS-EXAMINATIONS; CHAPTER 7: GENDER, NATURE, AND NURTURE: LOOKING TO THE FUTURE; Glossary of Key Terms and Concepts; References; Author Index; Subject Index;
    Note: Includes bibliographical references (p. 270-310) and indexes , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Cambridge, UK : Cambridge University Press
    ISBN: 0511130988 , 9780511130984
    Language: English
    Pages: xv, 432 p , ill , 26 cm
    Edition: 2nd ed
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Erscheint auch als Landau, David P Guide to Monte Carlo simulations in statistical physics
    Keywords: Monte Carlo method. ; Statistical physics. ; Monte Carlo method ; Statistical physics ; Monte Carlo method. ; Statistical physics. ; SCIENCE ; Physics ; General ; Statistical physics ; Monte Carlo method ; Monte Carlo method ; Statistical physics ; Monte-Carlo-Simulation ; Statistische Physik ; Electronic books. ; Electronic books ; Electronic books. ; Electronic books ; Monte-Carlo-Simulation ; Statistische Physik ; Monte-Carlo-Simulation ; Statistische Physik
    Abstract: Introduction -- Some necessary background -- Simple sampling Monte Carlo methods -- Importance sampling Monte Carlo methods -- More on importance sampling Monte Carlo methods for lattice systems -- Off-lattice models -- Reweighting methods -- Quantum Monte Carlo methods -- Monte Carlo Renormalization Group methods -- Non-equilibrium and irreversible processes -- Lattice gauge models: a brief introduction -- A brief review of other methods of computer simulation -- Monte Carlo methods outside of physics -- Outlook.
    Abstract: This updated edition deals with the Monte Carlo simulation of complex physical systems encountered in condensed-matter physics, statistical mechanics, and related fields. It contains many applications, examples, and exercises to help the reader. It is an excellent guide for graduate students and researchers who use computer simulations in their research
    Note: Previous ed.: 2000 , Includes bibliographical references and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Boca Raton, FL : Taylor & Francis/CRC Press
    ISBN: 0203504755 , 9780849322471 , 0849322472 , 9780203504758
    Language: English
    Pages: 350 p , ill , 25 cm.
    Additional Material: 1 CD-ROM (4 3/4 in.)
    Edition: 2nd ed
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Ion mobility spectrometry
    RVK:
    Keywords: Ion mobility spectroscopy. ; Ion mobility spectroscopy ; Ion mobility spectroscopy ; Ion mobility spectroscopy. ; Ionenaustauschchromatographie ; Ionenbeweglichkeitsspektroskopie ; Electronic books. ; Electronic books. ; Electronic books ; Ionenaustauschchromatographie ; Ionenbeweglichkeitsspektroskopie ; Ionenchromatographie ; Ionenbeweglichkeitsspektroskopie
    Note: Includes bibliographical references and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Cambridge : Cambridge University Press
    ISBN: 0511115830 , 9780521850117 , 0521850118 , 9780511115837 , 0511114206 , 9780511114205
    Language: English
    Pages: x, 374 p , ill , 26 cm
    Edition: 3rd ed
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Erscheint auch als Shabana, Ahmed A., 1951- Dynamics of multibody systems
    RVK:
    Keywords: Dynamics. ; Kinematics. ; Dynamics ; Kinematics ; Dynamics. ; Kinematics. ; SCIENCE ; Mechanics ; Dynamics ; Dynamics ; Kinematics ; Dynamik ; Mehrkörpersystem ; Electronic books. ; Electronic books. ; Electronic books ; Mehrkörpersystem ; Dynamik ; Mehrkörpersystem ; Dynamik ; Kinematik
    Abstract: 1. Introduction -- 2. Reference kinematics -- 3. Analytical techniques -- 4. Mechanics of deformable bodies -- 5. Floating frame of reference formulation -- 6. Finite-element formulation -- 7. The large deformation problem.
    Abstract: Dynamics of Multibody Systems, 3rd Edition, first published in 2005, introduces multibody dynamics, with an emphasis on flexible body dynamics. Many common mechanisms such as automobiles, space structures, robots and micromachines have mechanical and structural systems that consist of interconnected rigid and deformable components. The dynamics of these large-scale, multibody systems are highly nonlinear, presenting complex problems that in most cases can only be solved with computer-based techniques. The book begins with a review of the basic ideas of kinematics and the dynamics of rigid and deformable bodies before moving on to more advanced topics and computer implementation. This revised third edition now includes important developments relating to the problem of large deformations and numerical algorithms as applied to flexible multibody systems. The book's wealth of examples and practical applications will be useful to graduate students, researchers, and practising engineers working on a wide variety of flexible multibody systems
    Note: Previous ed.: 1998 , Includes bibliographical references (p. 357-368) and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    ISBN: 0321267974
    Language: English
    Pages: xviii, 475 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    Series Statement: The Addison-Wesley object technology series
    Parallel Title: Erscheint auch als
    DDC: 005.1
    Keywords: Computer software Development ; UML (Computer science) ; Electronic books ; local ; Computer software ; Development ; UML (Computer science) ; UML (Informatique) ; Engenharia de software ; Uml
    Abstract: For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, constructing, and documenting the artifacts of a software-intensive system. As the de facto standard modeling language, the UML facilitates communication and reduces confusion among project stakeholders. The recent standardization of UML 2.0 has further extended the language's scope and viability. Its inherent expressiveness allows users to model everything from enterprise information systems and distributed Web-based applications to real-time embedded systems. In this eagerly anticipated revision of the best-selling and definitive guide to the use of the UML, the creators of the language provide a tutorial to its core aspects in a two-color format designed to facilitate learning. Starting with an overview of the UML, the book explains the language gradually by introducing a few concepts and notations in each chapter. It also illustrates the application of the UML to complex modeling problems across a variety of application domains. The in-depth coverage and example-driven approach that made the first edition of The Unified Modeling Language User Guide an indispensable resource remain unchanged. However, content has been thoroughly updated to reflect changes to notation and usage required by UML 2.0. Highlights include: A new chapter on components and internal structure, including significant new capabilities for building encapsulated designs New details and updated coverage of provided and required interfaces, collaborations, and UML profiles Additions and changes to discussions of sequence diagrams, activity diagrams, and more Coverage of many other changes introduced by the UML 2.0 specification With this essential guide, you will quickly get up to speed on the latest features of the industry standard modeling language and be able to apply them to your next software project.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    ISBN: 1423716116 , 9781423716112
    Language: English
    Pages: xxvi, 564 pages , Illustrationen , 25 cm
    Edition: 2nd ed
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Human resource development
    Parallel Title: Buchausg. u.d.T.: International human resource development
    RVK:
    RVK:
    RVK:
    Keywords: Personalentwicklung ; Internationales Personalmanagement ; Personalmanagement ; Lernende Organisation ; Berufsbildung ; Wissensmanagement ; Theorie ; Großbritannien ; Welt ; Personnel management. ; Personnel management ; Personnel Direction ; Personnel management ; Personnel management. ; Personnel management ; Personalpolitik ; Electronic books. ; Electronic books. ; Electronic books ; Electronic books. ; Electronic books. ; Electronic books ; Personalpolitik ; Personalpolitik ; Personalpolitik ; Personalentwicklung
    Abstract: The role of learning, training and development in organizations -- The identification of learning, training and development needs -- The planning and designing of learning, training and development -- Delivering learning, training and development -- Assessment and evaluation of learning, training and development -- Managing the human resource development function
    Description / Table of Contents: The role of learning, training and development in organizationsThe identification of learning, training and development needs -- The planning and designing of learning, training and development -- Delivering learning, training and development -- Assessment and evaluation of learning, training and development -- Managing the human resource development function.
    Note: Includes bibliographical references (p. [521]-549) and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network. Unlike other books on hacking, this book is specifically geared towards penetration testing. It includes important information about liability issues and ethics as well as procedures and documentation. Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization's network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wireless networks. Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks. Full of real-world examples and step-by-step procedures, this book is both an enjoyable read and full of practical advice that will help you assess network security and develop a plan for locking down sensitive data and company resources. "This book goes to great lengths to explain the various testing approaches that are used today and gives excellent insight into how a responsible penetration testing specialist executes his trade." -...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Field-proven MPLS designs covering MPLS VPNs, pseudowire, QoS, traffic engineering, IPv6, network recovery, and multicast Understand technology applications in various service provider and enterprise topologies via detailed design studies Benefit from the authors' vast experience in MPLS network deployment and protocol design Visualize real-world solutions through clear, detailed illustrations Design studies cover various operator profiles including an interexchange carrier (IXC), a national telco deploying a multiservice backbone carrying Internet and IP VPN services as well as national telephony traffic, an international service provider with many POPs all around the globe, and a large enterprise relying on Layer-3 VPN services to control communications within and across subsidiaries Design studies are thoroughly explained through detailed text, sample configurations, and network diagrams Definitive MPLS Network Designs provides examples of how to combine key technologies at the heart of IP/MPLS networks. Techniques are presented through a set of comprehensive design studies. Each design study is based on characteristics and objectives common to a given profile of network operators having deployed MPLS and discusses all the corresponding design aspects. The book starts with a technology refresher for each of the technologies involved in the design studies. Next, a series of design studies is presented, each based on a specific hypothetical network representative of service provider and enterprise networks running MPLS. Each design study chapter delivers four elements. They open with a description of the network environment, including the set of supported services, the network topology, the POP structure, the transmission facilities, the basic IP routing design, and possible constraints. Then the chapters present design objectives, such as optimizing bandwidth usage. Following these are details of all aspects of the network design, covering VPN, QoS, TE, network recovery, and-where applicable-multicast, IPv6, and pseudowire. The chapters conclude with a summary of the lessons that can be drawn from the design study so that all types of service providers and large enterprise MPLS architects can adapt aspects of the design solution to their unique network environment and objectives. Although network architects have many resources for seeking information on the concepts and protocols involved with MPLS, there is no single resource that illustrat...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 454 p. , ill. ; , 24 cm
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: An introduction to the key tools and technologies used to secure network access Examine common security vulnerabilities and the defenses used to protect network resources Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates Learn how to design, adopt, and enforce security policies Evaluate the nuances of secure network design Secure HTTP traffic by hardening operating systems, servers, and browsers Protect routers through administrative access policies and services Understand what firewalls do and how to implement them to maximum effect Inspect and monitor network activity with IDS Utilize VPNs for secure remote access Learn about PKI technologies Examine secure wireless design techniques Use logging and auditing tools, such as syslog, SNMP, RMON, and SAA, to manage network traffic Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise to implement complex, multilayered solutions. Network Security Fundamentals introduces the topic of network security in an easy-to-understand and comprehensive manner. This book is designed to provide a fundamental understanding of the various components of a network security architecture and to demonstrate how each component can be implemented to achieve best results. The book uses straightforward language to introduce topics and to show the features, mechanics, and functionality of various network security devices. A series of case studies helps illuminate concepts and shows how you can apply the concepts to solve real-world problems. Divided into four parts, Network Security Fundamentals takes you on a tour of all the essential technologies and modern defenses at your disposal to help you maintain network uptime and data integrity. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks. Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Separate chapters cover web security, router security, firewalls, intrusion detectio...
    Note: Includes bibliographical references (p. [427]-430) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Alexandria, VA : ASTD Press | Boston, MA :Safari,
    Language: English
    Pages: x, 193 p. , ill. ; , 28 cm. +
    Keywords: Diversity in the workplace ; Handbooks, manuals, etc ; Diversity in the workplace ; Study and teaching ; Handbooks, manuals, etc ; Employees ; Training of ; Handbooks, manuals, etc ; Intercultural communication ; Handbooks, manuals, etc ; Interpersonal relations ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Traditionally, diversity education initiatives involve the catch phrase celebrate diversity. While the authors applaud this approach, this book offers a fresh perspective that focuses instead on the search for common ground among individuals and groups. In addition, the four fully scripted diversity modules allow you to develop a customized program quickly or enhance an existing diversity imitative. All ready-to-use PowerPoint slides, handouts, and other materials are included on a companion CD-ROM.
    Note: Accompanying CD-ROM includes: Adobe.pdf documents (assessments, tools, training instruments); Microsoft PowerPoint presentations which add to training activities in the book; Microsoft PowerPoint files of overhead transparency masters to facilitate printing of viewgraphs and handouts. - Includes bibliographical references (p. 189-191)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Become a savvy Microsoft Excel user. Pivot tables are a great feature in Excel that help you organize and analyze data, but not many Excel users know how to use pivot tables. Pivot Table Data Crunching offers a comprehensive review of all the functionalities of Pivot Tables from author Bill Jelen , otherwise known as Mr. Excel from www.mrexcel.com, and Michael Alexander , a Microsoft Certified Application Developer. The authors' practical scenarios and real-world advice demonstrate the benefits of Pivot Tables and how to avoid the common pitfalls of every day data crunching. Each solution presented in the book can be accomplished with resources available in the Excel interface, making Pivot Table Data Crunching a beneficial resource for all levels of Excel users.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...