Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2000-2004  (154)
  • Safari Tech Books Online  (154)
  • Organisation for Economic Co-operation and Development
  • Boston : Addison-Wesley  (154)
Datasource
Material
Language
Years
Year
  • 101
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxi, 510 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Electronic mail systems ; Java (Computer program language) ; Telecommunication ; Message processing ; Electronic books ; local
    Abstract: Java™ Message Service API Tutorial and Reference provides a clear and complete introduction to the Java™ Message Service (JMS) API. This book illustrates how to use the JMS API to build applications that create, send, receive, and read messages. Beginning with comprehensive descriptions of fundamental JMS concepts and building blocks, the coverage extends to all aspects of running and creating JMS applications. Each topic area is supported by relevant and well-crafted JMS program examples that demonstrate how to put the technology to work. The JMS API is an integral part of the Java 2 Platform, Enterprise Edition (J2EE™ platform). Developed by Sun Microsystems in close cooperation with enterprise messaging partners, JMS works together with other technologies to provide reliable, asynchronous communication between components in a distributed computing environment. It delivers a new, powerful tool for enterprise messaging--the cornerstone of today's enterprise applications. You will find in-depth coverage on how to: Create and run JMS client programs Use the JMS API within the J2EE platform Consume messages asynchronously with a message-driven bean Produce messages from an application client and from a session bean Access an entity bean from a message-driven bean Create applications for the J2EE platform that use the JMS API to Consume messages Produce messages Access an entity bean From BytesMessage to TransactionRolledBackException, a useful alphabetical reference provides complete information on all facets of the JMS API. Additionally, the tutorial example programs are downloadable from the Sun Web site, so that you can adapt them to implementations of the JMS API and the J2EE platform. Written by an expert team, the book offers an unparalleled technical understanding of JMS and its integration into the J2EE platform. Its thorough and practical coverage of JMS makes it easy for developers working in a distributed Java technology environment, and those familiar with the J2EE platform, to efficiently integrate the JMS API. 0201784726B02212002
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 102
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xviii, 392 p. , col. ill. ; , 24 cm. + 1 CD-ROM (4 3/4 in.)
    DDC: 005.2/762
    Keywords: Java (Computer program language) ; Web sites ; Design ; Electronic books ; local
    Abstract: Building Scalable and High-Performance Java™ Web Applications Using J2EE™ Technology provides the concise roadmap Java developers and Web engineers need to build high-performance and scalable enterprise Web applications. It is unique in its focus on building efficient end-to-end solutions based on the widely adopted J2EE specification. Each of the relevant technologies is summarized and analyzed in terms of its scalability and performance implications. Special attention is also given to those parts of Web application design that extend beyond the J2EE specification, including strategies for efficient networking and database design. Packed with general system architecture tips and balanced with succinct examples for each technology, this book allows you to focus on practical strategies for effective application design without getting overwhelmed with useless detail. As a result, you will quickly and easily be able to understand how to use J2EE technologies to build application systems that deliver scalability and high performance. Coverage includes: Essentials of Web application architecture The J2EE standard General techniques for building scalable and high-performance systems The HTTP protocol, with special focus on features that maximize performance Java™ Servlets and JavaServer Pages™ (JSP) Enterprise JavaBeans™ (EJB) Java™ Message Service (JMS) Effective database design techniques Efficient database management with JDBC™ and SQL Essentials of Web Services, including XML, SOAP, WSDL, and UDDI A CD-ROM with relevant source code from various chapters accompanies this book. 0201729563B12172001
    Note: Includes bibliographical references (p. 369-370) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 103
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 456 p. , ill. ; , 22 cm
    DDC: 005.2/762
    Keywords: Embedded computer systems ; Programming ; Java (Computer program language) ; Electronic books ; local
    Abstract: The Java Embedded Server™ from Sun Microsystems, Inc., is a solution for linking consumer devices with services over the Internet. It is based on the Open Services Gateway Initiative (OSGi) Service Gateway Specification 1.0. Written by authors who are intimately involved with the development and implementation of the specification, Programming Open Service Gateways with Java Embedded Server™ Technology reveals the concepts and inner workings of the Java Embedded Server framework and explains how to program and develop services for open gateways using the Java™ programming language. With an emphasis on actual coding, this definitive guide begins by explaining the backdrop in which the residential gateway market emerged. Next, the book discusses the history and mission of the Java Embedded Server product and the OSGi consortium. Throughout the book, the Java Embedded Server technical architecture and the OSGi Service Gateway API are presented with examples and detailed implementations. The book's practical, how-to format shows you how to write code for residential gateway applications that is correct, robust, and efficient while avoiding common traps and pitfalls. Highlights include: Overview of OSGi architecture, including basic concepts and features How to install Java Embedded Server and develop service bundles Design patterns and pitfalls How to use the OSGi standard services: log service and HTTP service OSGi Device Access (DA) service Permission-based security and administration The future undertakings of the OSGi consortium The OSGi Service Gateway Specification 1.0 Programming Open Service Gateways with Java Embedded Server™ Technology gives you an insider's perspective on the development process of new applications and services for the residential gateway environment. 0201711028B09102001
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 104
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 452 p. ill. ; , 24 cm. +
    DDC: 005.8
    Keywords: Computer hackers ; Computer security ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: "The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time." --Stephen Northcutt, The SANS Institute "One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture of the hacker in action." --From the Foreword by Marcus J. Ranum "From the basics of shrink-wrapped honeypots that catch script kiddies to the detailed architectures of next-generation honeynets for trapping more sophisticated bad guys, this book covers it all....This book really delivers new information and insight about one of the most compelling information security technologies today." --Ed Skoudis, author of Counter Hack, SANS instructor, and Vice President of Security Strategy for Predictive Systems Honeypots are unique technological systems specifically designed to be probed, attacked, or compromised by an online attacker. Implementing a honeypot provides you with an unprecedented ability to take the offensive against hackers. Whether used as simple "burglar alarms," incident response systems, or tools for gathering information about hacker motives and tactics, honeypots can add serious firepower to your security arsenal. Honeypots: Tracking Hackers is the ultimate guide to this rapidly growing, cutting-edge technology. The book starts with a basic examination of honeypots and the different roles they can play, and then moves on to in-depth explorations of six specific kinds of real-world honeypots: BackOfficer Friendly, Specter™, Honeyd, Homemade honeypots, ManTrap®, and Honeynets. Honeypots also includes a chapter dedicated to legal issues surrounding honeypot use. Written with the guidance of three legal experts, this section explores issues of privacy, entrapment, and liability. The book also provides an overview of the Fourth Amendment, the Electronic Communications Privacy Act, the Wiretap Act, and the Pen/Trap Statute, with an emphasis on how each applies to honeypots. With this book you will gain an understanding of honeypot concepts and architecture, as well as the skills to deploy the best honeypot solutions for your environment. You will arm yourself with the expertise needed to track attackers and learn about them on your own. Security professionals, researchers, law enforcement agents, and members of the intelligence and military communities will find this book indispensable. 0321108957B08282002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 105
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 429 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: Internet ; Peer-to-peer architecture (Computer networks) ; Electronic books ; local
    Abstract: "The author has given a well-written and comprehensive overview of several representative peer-to-peer technologies. It is diligently researched and gives a lot of insights into a little-understood subject." - Erik Möller , Scientific Review Service and infoArchy.org "Interesting topic, well organized, engagingly written, excellent illustrations; a good read. I think it does a particularly good job of balancing technical, functional, business, and legal information, and presenting it in a way that is useful for both executive and technical people (which is no mean feat)." - Mitchel Ahern , Director, Business Development, AdTools Inc./SonyMusic "It is technical enough that the reader can actually implement or model the methods used in the text. However, it is not presented at such a high level that nontechnical users would get lost in the math." - Austin David , Senior Systems Architect, Wink Communications, Inc. "Peer to Peer offers a contemporary and intelligent insight into the popular technologies that are the building blocks of p2p. It cuts through the media controversy and is a useful resource for exploring these technologies. This book was a pleasant change of pace from my day-to-day technical reading." - John Wegis , Engineering Manager, Kana Software, Inc. "Bo Leuf's book does a particularly good job of balancing technical, functional, business, and legal information, then presenting it in a way that is useful for both the executive and technical reader-no mean feat." -From the foreword by Mitchel Ahern, Director Business Development, AdTools Inc., a Sony Music Company Moving beyond its grassroot and controversial beginnings, peer to peer (p2p) is now entering the mainstream of Internet communications and business as managers and technology professionals look to tap into the vitality of this widespread communication model. But without a common protocol, tool suite, or single networking structure to facilitate development, harnessing peer-to-peer technology is not a simple task. Peer to Peer: Collaboration and Sharing over the Internet provides the first comprehensive resource to help business and communications professionals get started. This complete handbook presents everything industry professionals and interested users need to know. Readers will find a clear overview of peer-to-peer concepts, architectural models, and network applications; a practical guide to installation and deployment; information on specific protocols and tools...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 106
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xv, 262 p. , ill. ; , 24 cm
    DDC: 005.1/068
    Keywords: Computer software ; Development ; Management ; Electronic books ; local
    Abstract: We often hear about software projects that are late, over budget, or unable to satisfy customer needs. Yet some organizations are able to manage project after project successfully with desired results. In this book, Pankaj Jalote looks at one such organization, Infosys Technologies, a highly regarded high-maturity organization, and details the processes it has in place to manage projects. Revealing exactly how Infosys operates, Jalote provides an excellent case study to guide project managers everywhere. The specific Infosys practices described reflect sound management principles and practices. They are also grounded in common sense, and can be incorporated into any organization's software development operation easily. With an actual software project from Infosys used as a running example, the author explains the key aspects of successful project management-from process planning through project monitoring and closure. The practices discussed are also compatible with the widely adopted Capability Maturity Model® (CMM®). In the end, readers will gain a practical framework for systematically improving the planning and execution of any software project. In-depth coverage of the Infosys software project management process includes: Requirement change management Process planning, tailoring, monitoring, and auditing Effort estimation and scheduling Quantitative quality management Risk assessment and control Measurement and tracking planning Project team planning Customer communication Configuration management Reviews Project tracking and closure analysis Milestone analysis Activity level analysis using SPC Defect prevention The process database Many guidelines exist for achieving higher software process maturity. This book shows you how by example. 0201737213B01182002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 107
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xi, 575 p. , ill. ; , 23 cm
    DDC: 005.7/2
    Keywords: JavaServer pages ; Application software ; Development ; Web sites ; Design ; XML (Document markup language) ; Electronic books ; local
    Abstract: The first Internet revolution was all about delivering information to people. We are now in the second revolution, which focuses on delivering information to systems. XML is the tool that makes this new revolution a reality, and Web services are the methods by which businesses will drive system-to-system communication. JSP(TM) and XML takes you beyond the basics, giving you practical advice and in-depth coverage. In the book, you'll learn the technologies and techniques needed to create your own Web services for use in JSP applications. Written by programmers for programmers, the book will help you successfully utilize these exciting technologies with minimal hassle and maximum speed. In JSP™ and XML you will: Learn how to use XML, XSLT, and XPath in your JSP site Program SAX to speed up your XML document processing Understand DOM to learn the W3C standard method of working with XML Coordinate cross-browser client-side XML utilization Understand the Web services alphabet Learn how to leverage Web services to simplify access to your data Learn how SOAP, WSDL, and UDDI integrate into Web Services Use JDOM and dom4J to easily work with XML files Design a balanced JSP site using XML Expand your knowledge of JSP to add new functionality to your Web pages Learn how to practically apply Servlet filters and listeners to a Web site Build dynamic JSP pages that can self- modify, making sites easier to maintain Understand how the new JSP XML syntax works Review the basics of database access within JSP Learn JSP tag library design and how tag libraries simplify using XML and Web Services
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 108
    Language: English
    Pages: vii, 394 p. , ill. ; , 24 cm
    DDC: 005.2/768
    Keywords: Microsoft Visual BASIC ; Application software ; Development ; BASIC (Computer program language) ; Web site development ; Electronic books ; local
    Abstract: Get on the fast track of what is becoming a required skill for software developers--the ability to create Web Services and clients that consume them. Web Services leverage standards such as XML, XSD, SOAP, and WSDL to enable interoperability across programming languages and platforms. They work well to integrate applications on an intranet and on the Internet. Visual Basic .NET, coupled with the .NET Framework, is an attractive environment for Web Services architecture because it provides for rapid development and easy maintenance. This book explains each of the standard protocols needed for Web Service interaction on the client or server. These protocols include SOAP, Web Services Description Language (WSDL), and Universal Description Discovery and Integration (UDDI). Creating and Consuming Web Services in Visual Basic ® also includes Information on how to shape SOAP messages and the data they contain Explanations of how to create applications that consume Web Services Detailed case studies that explore how to use Web Services to help solve real-world B2B and B2C problems Thorough coverage of development concerns such as security and availability Instructions for how to create and consume Web services in earlier versions of VB and convert legacy applications to a Web Services platform 0672321564B06072002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 109
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xx, 334 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; System design ; Electronic books ; local
    Abstract: Java™ is an object-oriented language, but it is also a component-oriented platform. Java's class-loading model and rich type information makes it possible to build flexible and reusable binary components. COMPONENT DEVELOPMENT FOR THE JAVA™ PLATFORM reveals both the potential and pitfalls of developing components using the Java platform. As a platform, Java defines the services needed to connect binary components at runtime safely and reliably. To truly take advantage of all that Java has to offer, you must consider not just development but also deployment, and not just objects but also components. COMPONENT DEVELOPMENT FOR THE JAVA™ PLATFORM delves into the component-oriented features of the Java platform, thoroughly discussing class loading, reflection, serialization, native interoperation, and code generation. KEY TOPICS INCLUDE HOW TO: Use and troubleshoot Class Loaders Build dynamic and generic services through reflection Control an object's serialized representation Load and use native code components Extend the Java class format to add custom services Automate development with code generation This is a cutting-edge approach to Java programming: An emphasis on deployment can be the best way to take advantage of some of the most valuable, yet less heralded, aspects of Java technology. 0201753065B11212001
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 110
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvii, 475 p. , ill. ; , 26 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Praise for Design Patterns Java™ Workbook "An excellent book... I'm incredibly impressed with how readable it is. I understood every single chapter, and I think any reader with any Java familiarity would. This book is going to be required reading in a lot of places, including my office." - Joshua Engel "Provides a new, more Java-literate way to understand the 23 GoF patterns." - Bob Hanmer "This book translates Design Patterns into what Java programmers need to know. It is full of short, engaging programming and design problems with solutions-making it easy for programmers to work through solutions and really make patterns 'stick.'" - Rebecca Wirfs-Brock "This is one exciting book. It's approachable, readable, interesting, instructive, and just plain valuable. It'll eclipse all other books purporting to teach people the GoF patterns in Java-and perhaps any other language." - John Vlissides Java programmers, you now have the resource you need to harness the considerable power of design patterns. This unique book presents examples, exercises, and challenges that will help you apply design pattern theory to real-world problems. Steve Metsker's learn-by-doing approach helps you enhance your practical skills and build the confidence you need to use design patterns effectively in mission-critical applications. Design Patterns Java™ Workbook features the twenty-three foundational design patterns introduced in the classic book Design Patterns (Addison-Wesley, 1995). In this new, hands-on workbook, the patterns are organized into five major categories: interfaces, responsibility, construction, operations, and extensions. Each category begins with a chapter that reviews and challenges your ability to apply facilities built into Java. These introductory sections are followed by chapters that explain a particular pattern in detail, demonstrate the pattern in use with UML diagrams and Java code, and provide programming problems for you to solve. With this book you will build expertise in important areas such as: Adapting domain data to Swing components Creating a FACADE for Swing Handling recursion in composites Understanding the role of BRIDGE in Java database connectivity Making the connection between Model/View/Controller and OBSERVER Maintaining relational integrity with a mediator Using proxies to communicate between computers Letting a service provider decide which class to instantiate Supporting undo operations with MEMENTO Prototyping with clones U...
    Note: Includes bibliographical references (p. 459-462) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 111
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvii, 394 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: C# (Computer program language) ; Electronic books ; local
    Abstract: Using his famous primer format, best-selling author Stan Lippman now brings you an indispensable guide to C#. C# PRIMER is a comprehensive, example-driven introduction to this new object-oriented programming language. C# is a cornerstone of Microsoft's new .NET platform. Inheriting many features from both Java™ and C++, C# is destined to become the high-level programming language of choice for building high-performance Windows® and Web applications and components--from XML-based Web services to middle-tier business objects and system-level applications. HIGHLIGHTS INCLUDE: Coverage of fundamentals, such as namespaces, exception handling, and the unified type system Detailed explanations and examples of both class and interface inheritance, including a discussion of when each is appropriate A wide-ranging tour of the .NET class library, including an introduction to ADO.NET, establishing database connections, regular expressions, threading, sockets programming, XML programming using the firehose and DOM parser models, XSLT, and XPATH Detailed discussion of ASP.NET Web Form Designer, walking through the page life cycle and caching, and providing a large number of examples Introduction to .NET Common Language Runtime (CLR) Adding C# to your toolbox will not only improve your Web-based programming ability, it will increase your productivity. C# PRIMER provides a solid foundation to build upon and a refreshingly unbiased voice on Microsoft's vehicle to effective and efficient Web-based programming. 0201729555B07102002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 112
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: v. 〈1-2 〉 , ill. ; , 23 cm
    DDC: 005.2/762
    Keywords: C++ (Computer program language) ; Computer networks ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: Do you need to develop flexible software that can be customized quickly? Do you need to add the power and efficiency of frameworks to your software? The ADAPTIVE Communication Environment (ACE) is an open-source toolkit for building high-performance networked applications and next-generation middleware. ACE's power and flexibility arise from object-oriented frameworks, used to achieve the systematic reuse of networked application software. ACE frameworks handle common network programming tasks and can be customized using C++ language features to produce complete distributed applications. C++ Network Programming, Volume 2, focuses on ACE frameworks, providing thorough coverage of the concepts, patterns, and usage rules that form their structure. This book is a practical guide to designing object-oriented frameworks and shows developers how to apply frameworks to concurrent networked applications. C++ Networking, Volume 1, introduced ACE and the wrapper facades, which are basic network computing ingredients. Volume 2 explains how frameworks build on wrapper facades to provide higher-level communication services. Written by two experts in the ACE community, this book contains: An overview of ACE frameworks Design dimensions for networked services Descriptions of the key capabilities of the most important ACE frameworks Numerous C++ code examples that demonstrate how to use ACE frameworks C++ Network Programming, Volume 2, teaches how to use frameworks to write networked applications quickly, reducing development effort and overhead. It will be an invaluable asset to any C++ developer working on networked applications.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 113
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 635 p. , ill. ; , 24 cm
    DDC: 004.6/2
    Keywords: Packet switching (Data transmission) ; Routers (Computer networks) ; Electronic books ; local
    Abstract: As a networking professional, you will find this practical guide an invaluable resource for understanding routing technologies and configuring and troubleshooting Cisco routers, as well as for studying for the CCIE exam. Cisco IP Routing presents the most thorough information available on the inner workings of Cisco routers. Focusing on intra-domain dynamic routing protocols, the book provides an in-depth understanding of IP routing and forwarding technologies, and their implementation within Cisco routers. You will find essential background information on IP addressing, general routing and forwarding processes, and routing table maintenance. The book discusses packet forwarding and static routing, and details the specific mechanisms inside the dynamic routing protocols, covering both the distance vector and link-state routing protocols. Routing Information Protocol (RIP), Interior Gateway Routing Protocol (IGRP), Open Shortest Path First (OSPF), and Enhanced IGRP (EIGRP), Cisco's proprietary routing protocol, are covered in depth within the context of Cisco's implementation. Specific topics covered include: Variable length subnet masks Classful and classless addressing and routing Routing and forwarding differences Static and dynamic routing Routing table structure and maintenance in Cisco routers Cisco packet switching mechanisms, including fast, optimum, distributed, NetFlow, and Cisco Express Forwarding Cisco load-sharing techniques The Bellman-Ford and Dijkstra algorithms RIP packet formats, input and outbound messaging, event processing, configuration commands, and more IGRP packet formats, input and outbound messaging, events processing, configuration commands, and more Comparison between ISIS and OSPF OSPF subprotocols and packet formats OSPF intra-area, inter-area and external routing OSPF flooding algorithm and link-state database synchronization LSA installation and SPF scheduling OSPF configuration and implementation in Cisco routers EIGRP operation and configuration EIGRP stub router feature Numerous examples of logs from real Cisco routers illustrate the concepts presented and their practical application. Useful configuration examples are also presented. In addition, many of the chapters include a Frequently Asked Questions section that clarifies common misunderstandings and confusion about IP routing technologies and Cisco routers. Comprehensive, yet detailed and accessible, Cisco IP Routing provides the inside information you n...
    Note: Includes bibliographical references (p. 615-619) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 114
    Language: English
    Pages: xxvii, 910 p. , ill. ; , 23 cm
    DDC: 005.4/4769
    Keywords: Citrix MetaFrame ; Microsoft Windows NT server ; Client/server computing ; Electronic books ; local
    Abstract: Inside Citrix MetaFrame is a comprehensive administrator's guide to deploying applications using thin-client technology. It includes coverage of all aspects of planning, installing, administering and troubleshooting a Windows Terminal Services and Citrix MetaFrame solution. Significant focus is put on building enterprise application web portals using Citrix MetaFrame and NFuse technology. This book offers real-world solutions, top ten tips, command and technical article references, lists of technical resources and web sites available, and lots of technical coverage that will help you when you need it the most. Citrix MetaFrame XP is an add-on product available for either Windows NT 4.0 or 2000 Terminal Server, and complements the existing features available in these products. Using Citrix MetaFrame XP, you can publish your applications rather than have users run them from a Terminal Server desktop. MetaFrame XP also offers better printer management capabilities, a centralized management console and supports non-Windows client connections.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 115
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 548 p. , ill. ; , 24 cm
    Keywords: Computer games ; Programming ; Java (Computer program language) ; Portable computers ; Programming ; Electronic books ; local
    Abstract: Micro Java Games Development explains game development for devices that support J2ME MIDP. The six parts cover a full range of topics, from a tour of all available micro-devices (Palms, cell phones and pagers), a discussion of software standards apart from J2ME (cell phones, messaging, I-mode and wireless enhancements such as Bluetooth), and available J2ME extensions (Siemans, Ericcson, Nokia), development tools and restrictions, to the creation of a meaty J2ME game!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 116
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvii, 648 p. , ill. ; , 23 cm
    DDC: 005.2/76
    Keywords: Active server pages ; Microsoft.net ; Web site development ; Web sites ; Design ; Electronic books ; local
    Abstract: The purpose of ASP.NET JumpStart is to show readers the practical applications of .NET and ASP.NET by illustrating how to build Web-based applications using Web Forms and Web Services. Emphasis will be on good programming standards and practices. The reader will be taken from an introduction of the VB .NET language to intermediate topics through a step-by-step approach, which gives the reader the opportunity to try out the practices presented in each chapter.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 117
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 333 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: "I spend much time helping organizations capture requirements and even more time helping them recover from not capturing requirements. Many of them have gone through some motions regarding requirements as if they were sleepworking. It's time to wake up and do it right-and this book is going to be their alarm clock." - Jerry Weinberg , author of numerous books on productivity enhancement "In today's complex, fast-paced software development environment, collaboration-the intense peer-to-peer conversations that result in products, decisions, and knowledge sharing-is absolutely essential to success. But all too often, attempts to collaborate degenerate into agonizing meetings or ineffectual bull sessions. Ellen's wonderful book will help you bridge the gap-turning the agony of meetings into the ecstasy of effective collaboration." - Jim Highsmith , a pioneer in adaptive software development methods " Requirements by Collaboration presents a wealth of practical tools and techniques for facilitating requirements development workshops. It is suitable-no, essential reading-for requirements workshop facilitators. It will help both technical people and customer representatives participate in these critical contributions to software success." - Karl Wiegers , Principal Consultant, Process Impact, author of Software Requirements "The need for this particular book, at this particular time, is crystal clear. We have entered a new age where software development must be viewed as a form of business problem solving. That means direct user participation in developing 'requirements,' or more accurately, in jointly working the business problem. That, in turn, means facilitated sessions. In this book, Ellen Gottesdiener provides a wealth of practical ideas for ensuring that you have exactly the right stuff for this all-important area of professional art." - Ronald G. Ross , Principal, Business Rule Solutions, LLC, Executive Editor, www.BRCommunity.com "Gottesdiener's years of software development experience coupled with her straight-forward writing style make her book a perfect choice for either a senior developer or a midlevel project manager. In addition to her technical experience, her knowledge of group dynamics balance the book by educating the reader on how to manage conflict and personality differences within a requirements team-something that is missing from most requirements textbooks...It is a required 'handbook' that will be referred to again and again....
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 118
    Language: English
    Pages: xlv, 509 p. , ill. ; , 24 cm
    DDC: 347.73/47
    Keywords: Evidence, Expert ; United States ; Evidence, Expert ; Electronic books ; local
    Abstract: Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical expert is essential. But in order to be effective, an expert technical witness needs much more than an understanding of the technology in question. A Guide to Forensic Testimony is the first book to address the specific needs of the IT expert witness. It will arm you with the tools you need to testify effectively. Inside you'll find everything from an overview of basic witness responsibilities and challenges to a deeper exploration of what produces successful technical testimony. Written by a computer security authority who has served as a technical witness, and a trial attorney who focuses on how digital evidence and computer forensics are altering litigation, this book is your guide to the complicated forensic landscape that awaits the expert technical witness. This book contains a wealth of wisdom and experience from the front lines, including firsthand accounts of the challenges faced by expert technical witnesses, practical in-court examples, and helpful advice. Among the topics covered are: The evolution of the expert IT witness and the growing legal dependence on technical expertise Legal criteria established to determine the qualifications and abilities of a technical expert to stand as a witness The kinds of cases and problems that are apt to be encountered in digital forensic assignments Damage caused when the rules of professionalism and ethics are ignored or misapplied The construction and maintenance of a solid professional relationship between expert and attorney The creation and use of visual tools in courtroom testimony Ways to improve the demeanor and non-verbal communication skills of the technical witness Whether you are an information technologist asked to serve as an expert witness, a legal professional who works with information technology experts, a corporate risk manager, or a client whose interests are affected by the performance of IT experts, you will benefit greatly from A Guide to Forensic Testimony . 0201752794B09092002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 119
    Language: English
    Pages: xxiii, 356 p. , ill. ; , 24 cm
    DDC: 004.6
    Keywords: Cicsco Systems, Inc ; Juniper Networks, Inc ; Routers (Computer networks) ; Electronic books ; local
    Abstract: Increasing numbers of ISPs have begun implementing multicast infrastructure. Soon the Internet will provide multicast connectivity between any two points on the Internet the way it provides for unicast traffic today. Long-evolving protocols are reaching maturity, and enterprise networks and ISPs around the world are ramping up their multicast infrastructure. Now, more than ever, network engineers must be ready to deal with new applications that capitalize on the simultaneous, efficient delivery of data and imagery to multiple recipients. Interdomain Multicast Routing is the key to unlocking the complexities of this growing technology. Starting with a summary of the technology and its relevant protocols, this book shows readers the big picture before revealing a detailed analysis of important protocols and the way they work with one another. Throughout, the authors focus on both Cisco Systems and Juniper Networks technology--the two leading vendors of routers and routing technology. Real-life examples are used to clearly illustrate key concepts. Specific topics covered in Interdomain Multicast Routing include: Background and in-depth analyses of multicast routing using PIM-SM and MSDP Comparison of Any-Source and Source-Specific multicast delivery models Explanation of how MBGP and M-ISIS can be used side by side to build a dedicated multicast environment A detailed breakdown of the differences between IGMP versions 1, 2, and 3 A step-by-step guide to understanding the MSDP RPF-peer selection rules Lists of packet formats for IGMP, PIM, and MSDP A complete glossary that clarifies important terms and acronyms and provides their definitions Practical and thorough in coverage, Interdomain Multicast Routing is an important addition to any network engineer's bookshelf. 0201746123B04022002
    Note: Includes bibliographical references (p. 325-328) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 120
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxi, 484 p. , ill. ; , 23 cm. +
    DDC: 005.26/8
    Keywords: Microsoft Visual BASIC ; BASIC (Computer program language) ; Electronic books ; local
    Abstract: Design patterns provide programmers with a convenient way to reuse object-oriented code across projects and between programmers, offering easy, time-saving solutions to commonly recurring problems in software design. A practical guide to writing Visual Basic (VB6 and VB.NET) programs using some of the most common design patterns, Visual Basic Design Patterns is a tutorial for people who want to learn about design patterns and how to use them in their work. This book also provides a convenient way for VB6 programmers to migrate to VB.NET and use its more powerful object-oriented features. Written from a Visual Basic perspective, this book intends to make you comfortable with using design patterns by laying out the concept of patterns in a practical fashion. Organized as a series of short chapters that each describe a design pattern, Visual Basic Design Patterns provides one or more complete working visual examples of programs using that pattern, along with UML diagrams illustrating how the classes interact. Each example is a visual program that you can run and study on the companion CD making the pattern as concrete as possible. Programmers using this book will see significant improvement in their work by employing the following key concepts: Applying "tried-and-true" object-oriented design patterns in Visual Basic applications. Helping advance programming skills with the power of patterns. Understanding the interactions between classes through the use of UML diagrams. Getting comfortable using design patterns effectively and start using them in day-to-day Visual Basic programming. The idea behind design patterns is simple: it's a catalogue of common interactions between objects that programmers have found useful, enabling them to quickly and easily employ them in their programs. Visual Basic Design Patterns provides practical advice on how to use these patterns in everyday programming. 0201702657B07122001
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 121
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxx, 703 p. , ill. ; , 24 cm
    DDC: 650/.0285/574
    Keywords: Database management ; Electronic books ; local
    Abstract: "One of Craig's hallmarks is his ability to write in a clear, easy-to-read fashion. The main purpose of any technical book is to transfer information from writer to reader, and Craig has done an excellent job. He wants the reader to learn-and it shows." -Chris Foot, Senior Oracle Certified Instructor, Contemporary Technologies "I think every business manager and every IT manager should have a copy of this book." -Dan Hotka, Senior Technical Advisor, Quest Software Inc. With Database Administration , database professionals now have a comprehensive sourcebook of strategies for delivering quality administration across today's challenging multi-DBMS environments. Filled with practical guidelines and strategies, this book provides the most comprehensive survey available of the administrator's world for the existing or aspiring database professional. Part tutorial and part reference, Database Administration explains and examines each of the components that comprise the discipline of database administration. The book opens by providing an overview of the responsibilities of database administrators (DBAs) along with the various "flavors" of DBAs and their tasks. From there, the book proceeds chronologically through every task a DBA is likely to encounter. Although designed as a comprehensive survey of the entire DBA environment, the book's individual chapters are also well suited for quick look-up of specific information. Highlights include: The world of the DBA: types, tasks, daily issues, and much more The DBA environment-installation and upgrading issues, standards, and procedures Data modeling and normalization Database design and application design Performance management, including system, database, and application performance Ensuring data integrity and database security Database back-up and recovery strategies and disaster planning Storage management and data warehouse administration Connectivity, metadata management, Internet-enabled database access, and additional DBA tools Platform-independent coverage applicable for all the major DBMS products including DB2, Oracle, and SQL Server Whether you're a database analyst, architect, or application engineer, this book will provide the strategies and solutions you need to navigate the rocky terrain of today's complex data environments. 0201741296B05142002
    Note: Includes bibliographical references (p. 647-660) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 122
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xiii, 176 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Software patterns ; Electronic books ; local
    Abstract: Take the struggle out of learning about design patterns! Through example-based teaching, The Joy of Patterns reveals the essence of design patterns as an advanced language for describing system design. This book illustrates how to build more efficient, robust, and reusable designs with this powerful programming paradigm. Design patterns have been used as integral techniques for creating better software, but getting started with design patterns has never been easy. Beginning with a description of the rationale behind design patterns, the discussion moves on to an overview of the basic pattern form, and then to a brief review of object-oriented concepts. Following this crucial background, the author presents a series of system design examples from initial conception all the way through code, discussing key design goals and the pros and cons of using various design patterns. Code is presented in Java, C++, and Visual Basic. The reader will gain insight into the inherent forces at work in the application design and the most effective application of numerous core design patterns as solutions to recurring programming problems. You will read and learn about such important ideas and topics as: Patterns as the language of design and the building blocks of architecture The value and use of many standard patterns in system design Extensible software development and change management Utilizing supporting patterns to prevent loose ends Testing and deploying new behaviors Understanding requirements and creating hinge points for entities that are likely to change The Joy of Patterns examines the relationship between specific programming languages and language-independent design patterns. It also looks at the role of patterns in building systems from scratch through system maintenance and product evolution. With the background and deeper understanding harnessed from this book, you will have the ability to unleash the considerable power of design patterns and enhance the quality of your programming efforts. 0201657597B09072001
    Note: Includes bibliographical references (p. 167-169) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 123
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: viii, 419 p. , ill. ; , 24 cm
    Keywords: Linux ; Embedded computer systems ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Embedded Linux will help the user: select an Embedded Linux platform based on hardware requirements; build and boot a custom Linux kernel for the platform; remote debug programs running on the platform using GNU tools; connect data acquisition and control electronics/peripherals using the platform's serial, parallel, USB, I/O port and I2C interfaces; interface the peripherals to the kernel and applications using modules; collect, control, store and present data via open source protocols and applications; and analyze Embedded Linux vendor product offerings.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 124
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xv, 271 p. ; , 24 cm
    DDC: 005.1/4
    Keywords: Computer software ; Testing ; Electronic books ; local
    Abstract: Effective Software Testing explores fifty critically important best practices, pitfalls, and solutions. Gleaned from the author's extensive practical experience, these concrete items will enable quality assurance professionals and test managers to immediately enhance their understanding and skills, avoid costly mistakes, and implement a state-of-the-art testing program. This book places special emphasis on the integration of testing into all phases of the software development life cycle--from requirements definition to design and final coding. The fifty lessons provided here focus on the key aspects of software testing: test planning, design, documentation, execution, managing the testing team, unit testing, automated testing, nonfunctional testing, and more. You will learn to: Base testing efforts on a prioritized feature schedule Estimate test preparation and execution Define the testing team roles and responsibilities Design test procedures as soon as requirements are available Derive effective test cases from requirements Avoid constraints and detailed data elements in test procedures Make unit-test execution part of the build process Use logging to increase system testability Test automated test tools on an application prototype Automate regression tests whenever possible Avoid sole reliance on capture/playback Conduct performance testing with production-sized databases Tailor usability tests to the intended audience Isolate the test environment from the development environment Implement a defect tracking life cycle Throughout the book, numerous real-world case studies and concrete examples illustrate the successful application of these important principles and techniques. Effective Software Testing provides ready access to the expertise and advice of one of the world's foremost software quality and testing authorities. 0201794292B12032002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 125
    Language: English
    Pages: xv, 169 p. , ill. ; , 24 cm
    DDC: 005.1/068
    Keywords: Computer software ; Development ; Computer software ; Quality control ; Software measurement ; Electronic books ; local
    Abstract: "This book hits the mark for three important issues: How to keep focused on real improvements How to develop an implementable improvement plan How to develop meaningful and useful measurements I will definitely recommend it to my clients who are just beginning or are having trouble with their improvement program. " -Norman Hammock, SEI Authorized Lead Assessor "At last a common sense and business-oriented approach to process improvement. This book gives very practical instruction that is easy to apply. Your people will thank you for it." -Nancy K. M. Rees, Vice President and Chief Engineer, Xerox Corporation "...gets right to the heart of process improvement with specific, concrete steps and excellent examples. It's a book you can use today." -Dennis J. Frailey, Principal Fellow, Raytheon Company "Too many organizations develop a checklist mentality targeted at achieving the next process maturity level or passing an audit...Neil and Mary remind us to focus on pragmatic mechanisms for achieving superior business results..." -Karl Wiegers, Principal Consultant, Process Impact Software process improvement too often reflects a significant disconnect between theory and practice. This book bridges the gap-offering a straightforward, systematic approach to planning, implementing, and monitoring a process improvement program. Project managers will appreciate the book's concise presentation style and will be able to apply its practical ideas immediately to real-life challenges. With examples based on the authors' own extensive experience, this book shows how to define goals that directly address the needs of your organization, use improvement models appropriately, and devise a pragmatic action plan. In addition, it reveals valuable strategies for deploying organizational change, and delineates essential metrics for tracking your progress. Appendices provide examples of an action plan, a risk management plan, and a mini-assessment process. You will learn how to: Scope and develop an improvement plan Identify and prioritize risks and mitigate anticipated difficulties Derive metrics that accurately measure progress toward business goals Sell your improvement program in-house Initially target practitioners and projects most-open to new approaches and techniques Stay focused on goals and problems Align the actions of managers and practitioners Delay major policy documents and edicts until solutions have been practiced and tested Use existing resources to sp...
    Note: Includes bibliographical references (p. 161-165) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 126
    Language: English
    Pages: xxii, 582 p. , ill. ; , 24 cm
    DDC: 621.382
    Keywords: Telecommunication ; Electronic books ; local
    Abstract: Praise for Telecommunications Essentials "In Telecommunications Essentials , Goleniewski guides us through the ever-changing world of telecommunications with much sense and a great deal of style. Her wide ranging and in-depth study into this complex field is superbly researched and written. Its emphasis on learning and technology is thought-provoking and never fails to be relevant to the field today. It is essential reading." - Chris Barclay , Director, Strategy & Planning, Retail, Telstra "Lillian Goleniewski has a gift in presenting the complexity of telecommunications to her audiences. The careers of countless people in Australia have benefited from their contact with her. Her material is now captured in this book, which should rightfully grace any self-respecting technical collection." - Dr. Bob Horton , Deputy Chairman, Australian Communications Authority "If you need one good reference book on telecom, this is it. It's comprehensive, easy to understand, and up-to-date on latest technology-definitely a must-have for both beginners and professionals." - To Chee Eng , Principal Anaylst, Telecoms and Internet, Gartner Group "Lili Goleniewski is a gifted communicator and educator who combines clear explanation of complex technologies with a firm grasp of the dynamic commercial environment in which those technologies are being deployed. The author's extensive international experience in communicating to an audience drawn from diverse cultures and differing levels of familiarity with technical concepts and the English language enables her to enliven subject matter that otherwise can be dauntingly unapproachable. I commend this book to anyone seeking to develop their understanding of developing communications technologies, regardless of their technical background." - Peter Leonard , Managing Partner, Technology and Communications, Gilbert & Tobin Lawyers " Telecommunications Essentials provides a thorough overview of all aspects of the telecommunications network. Whether you are new to telecom or have years of experience, this well-organized and detailed reference will help you learn what you need to know or remember what you have forgotten." - David West , Vice President, Equinox Information Systems "Here is a book that demystifies a technical world. Lili applies a matter-of-fact style and laces this with humor and the occasional wonder to weave all the complex building blocks of the telecommunications industry into a readable book. The book wi...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 127
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxi, 348 p. , ill. ; , 24 cm
    DDC: 650/.0285
    Keywords: Business ; Data processing ; Management ; Information technology ; Management ; Management information systems ; Electronic books ; local
    Abstract: Information systems often fail because their requirements are poorly defined. This book shows IT professionals how to specify more precisely and more effectively what their systems need to do. The key lies in the discovery and application of what are called business rules. A business rule is a compact and simple statement that represents some important aspect of a business. By capturing the rules for your business--the logic that governs its operation--you will gain the ability to create systems fully aligned with your business needs. In this book, Tony Morgan provides a thorough introduction to business rules, as well as a practical framework for integrating them into information systems. He shows you how to identify and express business rules, offers practical strategies for their use, and explains the key elements of logic that underpin their application. Topics covered include: Understanding the role of business rules and models in information systems development Using models to structure and manage business activities, including e-commerce Defining and discovering business rules Controlling business rule quality Fitting business rules into varied technical architectures Implementing business rules using available technology Whether you are an analyst, designer, developer, or technical manager, the in-depth information and practical perspective in this valuable resource will guide you in your efforts to build rule-centered information systems that fully support the goals of your organization. 0201743914B03042002
    Note: "Unisys"--Spine. - Includes bibliographical references (p. 339-340) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 128
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xiv, 299 p. , ill. ; , 24 cm
    DDC: 005.133
    Keywords: Perl (Computer program language) ; Python (Computer program language) ; Electronic books ; local
    Abstract: Perl to Python Migration provides a useful and practical resource for programmers that are currently intermediate or expert in using Perl and who want to migrate to using Python for different programming projects. The book achieves this by first giving the user an overview and refresher of the Perl techniques required before giving the information on using Python to achieve the same result. Examples of both Python and Perl will be available on-line on the author's website.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 129
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 279 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Electronic books ; local
    Abstract: Organized in a practical problem-and-solution format, More Exceptional C++ picks up where the widely acclaimed Exceptional C++ leaves off, providing successful strategies for solving real-world problems in C++. Drawing from years of in-the-trenches experience, Herb Sutter provides tested techniques and practical solutions for programmers designing modern software systems with C++, from small projects to enterprise applications. Built around forty programming puzzles, More Exceptional C++ helps you understand the rules and issues critical to successful software design and development in C++. New themes included in this sequel place a strong emphasis on generic programming, memory management, and using the C++ standard library, including coverage of important techniques like traits and predicates. Also included are guidelines and considerations to remember when using standard containers and algorithms--topics rarely covered in-depth in other sources. Readers will find solutions to such important questions as: What pitfalls might you encounter when using std::map and std::set, and how can you safely avoid them? What kinds of predicates are safe to use with the STL, what kinds aren't, and why? What techniques are available for writing powerful generic template code that can change its own behavior based on the capabilities of the types it's given to work with? When and how should you optimize your code? Why can (and do) fancy optimizations get us into trouble? And how can some of these answers change if you're writing multithread-safe code? Does exception safety affect class design, or can it be retrofitted in as an afterthought? How can you avoid the Siamese Twin problem when combining inheritance-based libraries from different vendors? How can you safely use auto_ptr, and then use common design patterns to adapt it to avoid common pitfalls? Can you use auto_ptr as a class member? What must you know before you elect to use it that way? Plus one of the most frequently recurring questions about modern C++: When and how should you use namespaces, anyway? A must-have for the serious programmer, More Exceptional C++ provides a thorough and pragmatic understanding of the language while showing you how to write exceptional code in C++. 020170434XB11092001
    Note: Includes bibliographical references (p. 271-272) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 130
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 361 p. , ill. ; , 24 cm
    DDC: 004.5/3
    Keywords: Cache memory ; Electronic data processing ; Backup processing alternatives ; World Wide Web ; Electronic books ; local
    Abstract: "Rabinovich and Spatscheck report a wealth of detailed information about how to implement Web caching and replication mechanisms, but more importantly, they teach me how to think about the general problem of content distribution. I'm pleased that there is finally a comprehensive book on this important subject." --Larry Peterson, Professor of Computer Science, Princeton University "This book is a remarkable piece of work, well-organized and clearly articulated. The authors have masterfully presented advanced topics in Internet Web infrastructure and content delivery networks in a way that is suitable for both novices and experts." --Steve McCanne, Chief Technology Officer, Inktomi As the Internet grows, evolving from a research tool into a staple of daily life, it is essential that the Web's scalability and performance keep up with increased demand and expectations. Every day, more and more users turn to the Internet to use resource-hungry applications like video and audio on-demand and distributed games. At the same time, more and more computer applications are built to rely on the Web, but with much higher sensitivity to delays of even a few milliseconds. The key to satisfying these growing demands and expectations lies in the practices of caching and replication and in the increased scalability solutions they represent. Web Caching and Replication provides essential material based on the extensive real-world experience of two experts from AT&T Labs. This comprehensive examination of caching, replication, and load-balancing practices for the Web brings together information from and for the commercial world, including real-life products; technical standards communities, such as IETF and W3C; and academic research. By focusing on the underlying, fundamental ideas that are behind the varied technologies currently used in caching and replication, this book will remain a relevant, much-needed resource as the multi-billion dollar industries that rely on the Web continue to grow and evolve. The book approaches its two central topics in two distinct parts. The part on caching includes coverage of: Proxy caching, including latency reduction and TCP connection caching Transparent and nontransparent proxy deployment Cooperative caching Cache consistency Replacement policies Prefetching "Caching the uncacheable" The part on replication includes coverage of: Basic mechanisms for request distribution, including content-blind and content-aware request distr...
    Note: Includes bibliographical references (p. 331-343) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 131
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xi, 590 p. ; , 23 cm
    Keywords: Active server pages ; ActiveX ; C# (Computer program language) ; Microsoft .NET ; XML (Document markup language) ; Electronic books ; local
    Abstract: This is the book every C# developer needs to read to understand how to create effective Internet applications using ASP.NET. As recognized experts in the field, Jeffrey P. McManus and Chris Kinsman explain how to build applications through effective use of ASP.NET, XML, and ADO.NET. In addition, this book will provide: Information about the Common Language Runtime and .NET Foundation Classes, which form the building blocks for application development in the .NET universe Practical C# code examples that illustrate operations used most often by application developers Thorough reference material to the objects available in the Foundation Class libraries 0672321556B11152002
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 132
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 521 p. , ill. ; , 23 cm
    DDC: 005.75/8
    Keywords: ActiveX ; Database design ; Microsoft .NET ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: "Essential ADO.NET is a comprehensive guide for developers of data-aware applications who want to transition to Microsoft's new .NET data access architecture. If you want to dig deep into the how's and why's of ADO.NET, this book will prove to be a worthy guide." -Omri Gazitt, Product Manager of ADO.NET and Product Unit Manager, XML, Microsoft "Bob Beauchemin packs a career's worth of knowledge into ten well-organized chapters, each one dense with information and insights. If you work with databases on Windows, buy this book." -David Chappell, Principal of Chappell & Associates Microsoft's ADO.NET enables Windows-based applications to access many types of databases from a variety of different vendors. This technology offers the advantage of cross-database flexibility that is essential for Internet and distributed-computing success. Essential ADO.NET presents a thorough explanation of ADO.NET, exploring in depth the capabilities of classes, interfaces, properties, and methods. This book also examines the structure of data and demonstrates the ways in which ADO.NET can solve data access challenges. In particular, the discussion focuses on how ADO.NET effectively balances the need for generic functionality with efficiency, and how it is specifically designed to address today's need for scalability, concurrency, and robustness. A convenient reference for programmers moving from other data access APIs, including OLE DB, ADO, ODBC, and JDBC, Essential ADO.NET correlates classes and functions from these other APIs to those of ADO.NET. You will find practical information on: How the ADO.NET model can be used to access relational data stores The DataSet class for in-memory data representation How ADO.NET handles concurrency conflict-resolution problems Guidelines for deciding when to use an online stream (DataReader) or offline cache (DataSet) How to map database information using ASP.NET WebForm How ADO.NET integrates relational data storage and XML representation with Microsoft's SQL Server Essential ADO.NET is the most complete source of information for this crucial piece of the new Microsoft platform. Whether you are new to this application or have used it before, this book will help you to understand and get the most out of ADO.NET. 0201758660B05132002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 133
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 332 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Keywords: Application software ; Computer network protocols ; Web site development ; Electronic books ; local
    Abstract: Web services enable the new generation of Internet-based applications. These services support application-to-application Internet communication--that is, applications at different network locations can be integrated to function as if they were part of a single, large software system. Examples of applications made possible by Web services include automated business transactions and direct (nonbrowser) desktop and handheld device access to reservations, stock trading, and order-tracking systems. Several key standards have emerged that together form the foundation for Web services: XML (Extensible Markup Language), WSDL (Web Services Definition Language), SOAP (Simple Object Access Protocol), and UDDI (Universal Description, Discovery, and Integration). In addition, ebXML (Electronic Business XML) has been specified to facilitate automated business process integration among trading partners. This book introduces the main ideas and concepts behind core and extended Web services' technologies and provides developers with a primer for each of the major technologies that have emerged in this space. In addition, Understanding Web Services summarizes the major architectural approaches to Web services, examines the role of Web services within the .NET and J2EE communities, and provides information about major product offerings from BEA, Hewlett-Packard, IBM, IONA, Microsoft, Oracle, Sun Microsystems, and others. Key topics include: XML facilities for structuring and serializing data How WSDL maps services onto communication protocols and transports WSDL support for RPC-oriented and document-oriented interactions SOAP's required and optional elements Message processing and the role of intermediaries in SOAP UDDI data formats and APIs How ebXML offers an alternative to Web services that supports reliable messaging, security, and trading-partner negotiations With Understanding Web Services , you will be well informed and well positioned to participate in this vast, emerging marketplace. 0201750813B05172002
    Note: Includes bibliographical references (p. 309-315) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 134
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvii, 187 p. ; , 24 cm
    DDC: 005.3
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: By recognizing that software development is not a mechanical task, you can create better applications. Today's software development projects are often based on the traditional software engineering model, which was created to develop large-scale defense projects. Projects that use this antiquated industrial model tend to take longer, promise more, and deliver less. As the demand for software has exploded, the software engineering establishment has attempted to adapt to the changing times with short training programs that teach the syntax of coding languages. But writing code is no longer the hard part of development; the hard part is figuring out what to write. This kind of know-how demands a skilled craftsman, not someone who knows only how to pass a certification course. Software Craftsmanship presents an alternative-a craft model that focuses on the people involved in commercial software development. This book illustrates that it is imperative to turn from the technology-for-its-own-sake model to one that is grounded in delivering value to customers. The author, Pete McBreen , presents a method to nurture mastery in the programmer, develop creative collaboration in small developer teams, and enhance communications with the customer. The end result-skilled developers who can create, extend, and enhance robust applications. This book addresses the following topics, among others: Understanding customer requirements Identifying when a project may go off track Selecting software craftsmen for a particular project Designing goals for application development Managing software craftsmen Software Craftsmanship is written for programmers who want to become exceptional at their craft and for the project manager who wants to hire them. 0201733862B07242001
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 135
    Language: English
    Pages: xix, 540 p. , ill. ; , 24 cm
    DDC: 004.6/2
    Keywords: Computer network protocols ; Routers (Computer networks) ; Standards ; Electronic books ; local
    Abstract: "A detailed and clearly written book that is an invaluable resource to all VRRP users and implementers." --Scott Bradner, Senior Technical Consultant, Harvard University By employing the Virtual Router Redundancy Protocol (VRRP), administrators can ensure that their networks remain up and running, thereby eliminating expensive downtime. Using VRRP to avoid network outages is essential to building accessible, robust networks, and central to the implementation of successful disaster recovery models. Written by experts who contributed to the design of the VRRP protocol and participated actively in its deployment, VRRP: Increasing Reliability and Failover with the Virtual Router Redundancy Protocol is your best introduction to this powerful high-availability tool. VRRP examines the general characteristics of the protocol and its usage. The emphasis is on translating the protocol specification into a tutorial form ideal for day-to-day users of VRRP. In addition to introducing the technology, this book provides an in-depth analysis, featuring extensive material on configuring, managing, and troubleshooting VRRP. Precursors to this protocol, such as Cisco's HSRP and DEC's IPSTP, are also discussed. Various vendor-specific extensions to VRRP--and their use in solving specific high-availability problems not addressed by VRRP--are also examined. Network administrators and managers, protocol implementers, practicing professionals, researchers, and students exploring the area of high availability will gain a solid understanding of the core concepts of reliability and redundancy based on VRRP, as well as the particulars of the VRRP protocol and how to implement it. The appendixes provide the necessary background for networking and TCP/IP, the full text of VRRP MIB, a study of actual VRRP implementations and an analysis of public-domain software available for VRRP over Linux, an overview of the VRRP state machine using SDL flowcharts and UML diagrams, and an analysis of the protocol through formal logic. 0201715007B09052002
    Note: Includes bibliographical references (p. 511-514) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 136
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvii, 793 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer security ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: In 1997, Microsoft embarked on a "bet the company" strategy that was to reinvent the way the company did business. Even before its release, .NET made major strides in reinventing the way that software developers viewed the software they wrote. Now that it is released, .NET and the .NET Framework will change the software development process for good. .NET Framework Security provides the ultimate high-end comprehensive reference to all of the new security features available in .NET. Through extensive code samples and step-by-step walkthroughs of configuration techniques, the reader is taken deep into the world of secure applications. Demonstrations of creating custom procedures and a full explanation of each aspect separate this book from many other "lecture books." Many of the concepts expressed in this book are not only viable in .NET, but on the Internet in general. These factors combined make this the one reference that every developer and system administrator should have. .NET Framework Security provides An extensive introduction to explanation of Code Access Security, the powerful new security system shipping in the .NET Framework Information on how to write and test safe applications using the .NET Framework Extensive coverage on how to effectively administer .NET Framework security In-depth introduction to the cryptography library shipping in the .NET Framework, including an introduction to XML digital signatures An overview of all of the new security features available in .NET Code samples that can be used to implement security on your own Web site or application Step-by-step guidelines for modifying the various configuration files associated with .NET, and an explanation of the elements involved Instructions for all of the aspects of security in the CLR and what it means How to use ASP.NET to create a secure application Explanations for using the CryptoAPI libraries to create your own custom functionality Guidelines on how to create secure network applications as well as applications that exist on the Internet Detailed examples of how to establish security parameters in IIS that relate to ASP.NET Instructions for administering .NET applications hosted in IE 067232184XB04232002
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 137
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    ISBN: 0321118863
    Language: English
    Pages: p. cm
    DDC: 658.4/78
    Keywords: Computer security ; Management ; Electronic books ; local
    Abstract: Information security requires far more than the latest tool or technology. Organizations must understand exactly what they are trying to protect--and why--before selecting specific solutions. Security issues are complex and often are rooted in organizational and business concerns. A careful evaluation of security needs and risks in this broader context must precede any security implementation to insure that all the relevant, underlying problems are first uncovered. The OCTAVE approach for self-directed security evaluations was developed at the influential CERT(R) Coordination Center. This approach is designed to help you: Identify and rank key information assets Weigh threats to those assets Analyze vulnerabilities involving both technology and practices OCTAVE(SM) enables any organization to develop security priorities based on the organization's particular business concerns. The approach provides a coherent framework for aligning security actions with overall objectives. Managing Information Security Risks , written by the developers of OCTAVE, is the complete and authoritative guide to its principles and implementations. The book: Provides a systematic way to evaluate and manage information security risks Illustrates the implementation of self-directed evaluations Shows how to tailor evaluation methods to different types of organizations Special features of the book include: A running example to illustrate important concepts and techniques A convenient set of evaluation worksheets A catalog of best practices to which organizations can compare their own 0321118863B05172002
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 138
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xviii, 752 p. , ill. ; , 24 cm
    DDC: 005.4/469
    Keywords: Linux ; Computer networks ; Operating systems (Computers) ; Electronic books ; local
    Abstract: With an increasing number of networks and mission-critical applications running on Linux, system and network administrators must be able to do more than set up a server and rely on its default configuration. Advanced Linux Networking is designed to help you achieve a higher level of competence. It focuses on powerful techniques and features of Linux networking and provides you with the know-how you need to improve server efficiency, enhance security, and adapt to new requirements. This book begins with a brief introduction to low-level configuration, including a guide to getting your network up and running. Part II outlines those servers and procedures most likely to be used by the computers on your local network: DHCP servers, Kerberos, Samba, time servers, and network backups, among others. Part III covers Internet servers: DNS, SMTP (sendmail, Postfix, and Exim), Apache, and FTP servers. Part IV examines network security, exploring such topics as using a chroot jail, iptables configuration, and VPNs. Wherever pertinent, the author addresses the differences between Caldera OpenLinux, Debian GNU/Linux, Mandrake, Red Hat, Slackware, SuSE, and TurboLinux. Specific topics covered include: Configuring small but potentially important servers quickly and easily Optimizing Linux network operation Using advanced system features effectively Using systems and software in alternative ways to reach your goals Avoiding possible damage to your system and violations of ISP policies Securing your system Advanced Linux Networking is the single-volume tutorial and reference for Linux networking that will help you achieve expert status. 0201774232B05172002
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 139
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxvii, 404 p. , col. ill. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: In a highly volatile software development environment, developers must be nimble, responsive, and able to hit a moving target--in short, they must be agile. Agile software development is designed to address this need for speed and flexibility. Agility describes a holistic, collaborative environment in which you can both create and respond to change by focusing on adaptability over predictability, people over process. Agile software development incorporates proven software engineering techniques, but without the overhead and restrictions of traditional development methodologies. Above all, it fulfills its promise of delivering software that serves the client's business needs. Written by one of the leaders of the Agile movement, and including interviews with Agile gurus Kent Beck, Robert Charette, Alistair Cockburn, Martin Fowler, Ken Schwaber, and Ward Cunningham, Agile Software Development Ecosystems crystallizes the current understanding of this flexible and highly successful approach to software development. It presents the key practices of all Agile development approaches, offers overviews of specific techniques, and shows how you can choose the approach that best suits your organization. This book describes--in depth--the most important principles of Agile development: delivering value to the customer, focusing on individual developers and their skills, collaboration, an emphasis on producing working software, the critical contribution of technical excellence, and a willingness to change course when demands shift. All major Agile methods are presented: Scrum Dynamic Systems Development Method Crystal Methods Feature-Driven Development Lean Development Extreme Programming Adaptive Software Development Throughout the book, case stories are used to illustrate how Agile practices empower success around the world in today's chaotic software development industry. Agile Software Development Ecosystems also examines how to determine your organization's Agile readiness, how to design a custom Agile methodology, and how to transform your company into a truly Agile organization. 0201760436B03042002
    Note: Includes bibliographical references (p. 383-388) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 140
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 330 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: Business ; Data processing ; Java (Computer program language) ; Electronic books ; local
    Abstract: The Java 2 Platform Enterprise Edition (J2EE TM ) offers great promise for dramatically improving the way that enterprise applications are built, and organizations that have adopted the J2EE are gaining a competitive advantage. The industry-standard Unified Modeling Language (UML) has helped countless organizations achieve software success through visual modeling. Together, the UML and J2EE form a powerful set of tools, but the intricacies involved with using them in tandem are considerable. While UML is highly effective for specifying, designing, constructing, visualizing, and documenting software systems, J2EE offers enterprise developers a simplified, component-based approach to application development. However, when using the two technologies together, developers must first consider--and attempt to reconcile--the different characteristics of each. Developing Enterprise Java Applications with J2EE TM and UML examines the best ways to jointly leverage these technologies. Exploring concrete methods for completing a successful development project, the authors cover the use of UML and J2EE in detail. Using practical examples and a case study, they illustrate the pros and cons of specific design approaches, show how personal experience can affect design decisions, and demonstrate proven approaches for building better, software faster. With this book as a guide, developers will be able to overcome the challenges in using UML and J2EE together, and be on their way to building robust, scalable, and complex applications. 0201738295B09042001
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 141
    Language: English
    Pages: xxiv, 512 p. , ill. ; , 24 cm. + 1 CD-ROM (4 3/4 in.)
    DDC: 005.8
    Keywords: Computer security ; Computers ; Access control ; Testing ; Electronic books ; local
    Abstract: "This book covers not just the glamorous aspects such as the intrusion act itself, but all of the pitfalls, contracts, clauses, and other gotchas that can occur. The authors have taken their years of trial and error, as well as experience, and documented a previously unknown black art." --From the Foreword by Simple Nomad, Senior Security Analyst, BindView RAZOR Team Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from compromising systems and exploiting proprietary information. Hack I.T. introduces penetration testing and its vital role in an overall network security plan. You will learn about the roles and responsibilities of a penetration testing professional, the motivation and strategies of the underground hacking community, and potential system vulnerabilities, along with corresponding avenues of attack. Most importantly, the book provides a framework for performing penetration testing and offers step-by-step descriptions of each stage in the process. The latest information on the necessary hardware for performing penetration testing, as well as an extensive reference on the available security tools, is included. Comprehensive in scope Hack I.T. provides in one convenient resource the background, strategies, techniques, and tools you need to test and protect your system--before the real hackers attack. Specific topics covered in this book include: Hacking myths Potential drawbacks of penetration testing Announced versus unannounced testing Application-level holes and defenses Penetration through the Internet, including zone transfer, sniffing, and port scanning War dialing Enumerating NT systems to expose security holes Social engineering methods Unix-specific vulnerabilities, such as RPC and buffer overflow attacks The Windows NT Resource kit Port scanners and discovery tools Sniffers and password crackers Web testing tools Remote control tools Firewalls and intrusion detection systems Numerous DoS attacks and tools 0201719568B01042002
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 142
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 774 p. , ill. ; , 24 cm. + 1 CD-ROM (4 3/4 in.)
    DDC: 005.75/85
    Keywords: SQL server ; Client/server computing ; Electronic books ; local
    Abstract: "This is a book that deserves a prominent place by anyone who aspires to be a real professional developer of SQL Server applications." --from the Foreword by Ron Soukup The message of this book is that building stored procedures in Transact-SQL is very much like building programs in any other language. It requires the same type of skill, planning, attention to detail, and overall grasp of technology that successful development in other languages requires. To master Transact-SQL, one must first master the fundamental concepts of software development, then build on this foundation by embracing and studying Transact-SQL as a programming language in its own right. This book teaches you how to do that and more. More than just a catalog of coding tricks and syntax subtleties, The Guru's Guide to SQL Server(TM) Stored Procedures, XML, and HTML explores the philosophy of Transact-SQL programming. It teaches readers how to apply this philosophy in order to develop their own coding techniques and discover their own solutions to real-world programming problems. A follow-up to the widely acclaimed The Guru's Guide to Transact-SQL, this book teaches that stored procedure development does not occur in a vacuum--it involves a wide variety of skills, subjects, and technologies--and helps the reader become a better software engineer, not just a stored procedure expert. Blending theoretical detail with practical application, this comprehensive reference begins with a foundational overview of SQL Server(TM) stored procedure programming. From there, the focus moves on to best practices and design considerations before progressing to advanced topics and a general philosophy of software craftsmanship. In all, this book provides the most complete coverage of SQL Server stored procedure programming available in one source. Topics such as user-defined functions, views, triggers, extended procedures, error handling, OLE Automation, database design, and XML are covered in detail. The book spotlights undocumented language features and brings the first application of design patterns to the SQL language. The preview of .NET and a groundbreaking approach to adding arrays to Transact-SQL make for the most thorough and engaging read published to date on SQL Server programming. The accompanying CD-ROM contains the book's source code. More than 700 SQL scripts, programming utilities, and extended procedures provide a veritable treasure trove of high-quality example code. Theore...
    Note: Includes bibliographical references (p. 747-748) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 143
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxv, 371 p. , ill. ; , 24 cm. +
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Parser building is a powerful programming technique that opens a world of opportunity for designing how users interact with applications. By creating mini-languages, you can precisely address the requirements of your application development domain. Writing your own parsers empowers you to access a database more effectively than SQL to efficiently control the movement of an order through its workflow, to command the actions of a robot, and to control access privileges to transactions in a system. The repertoire of today's professional programmer should include the know-how to create custom languages. Building Parsers with Java ™ shows how to create parsers that recognize custom programming languages. This book and its accompanying CD provide an in-depth explanation and clearly written tutorial on writing parsers, following the Interpreter Design Pattern. An easy-to-follow demonstration on how to apply parsers to vital development tasks is included, using more than a hundred short examples, numerous UML diagrams, and a pure Java parser toolkit to illustrate key points. You will learn How to design, code, and test a working parser How to create a parser to read a data language, and how to create new computer languages with XML How to translate the design of a language into code How to accept an arithmetic formula and compute its result How to accept and apply matching expressions like th* one How to use tokenizers to define a parser in terms of logical nuggets instead of individual characters How to build parsers for a custom logic language like Prolog How to build parsers for a custom query language that goes beyond SQL How to construct an imperative language that translates text into commands that direct a sequence of actions 0201719622B04062001
    Note: Includes bibliographical references (p. 357) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 144
    Language: English
    Pages: xxxvi, 469 p. , ill. ; , 23 cm. +
    Edition: 4th ed.
    DDC: 005.75/6
    Keywords: Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Abstract: This latest edition of the best-selling implementation guide to the Structured Query Language teaches SQL fundamentals while providing practical solutions for critical business applications. The Practical SQL Handbook, Fourth Edition now includes expanded platform SQL coverage and extensive real-world examples based on feedback from actual SQL users. The Practical SQL Handbook begins with a step-by-step introduction to SQL basics and examines the issues involved in designing SQL-based database applications. It fully explores SQL's most popular implementations from industry leaders, Oracle, Microsoft, Sybase, and Informix. Highlights include: Detailed coverage of SQL commands for creating databases, tables, and indexes, and for adding, changing, and deleting data Using the SELECT command to retrieve specific data Handling NULL values (missing information) in a relational database Joining tables, including self joins and outer joins (ANSI and WHERE-clause syntax) Working with nested queries (subqueries) to get data from multiple tables Creating views (virtual tables) to provide customized access to data Using SQL functions A bonus CD-ROM contains a time-limited, full-feature version of the Sybase® Adaptive Server Anywhere™ software as well as the sample database, scripts, and examples included in the book. The Practical SQL Handbook is the most complete reference available for day-to-day SQL implementations. 0201703092B05222001
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 145
    Language: English
    Pages: xiv, 153 p. , ill. (some col.) ; , 26 cm
    DDC: 005.1/17
    Keywords: Electronic commerce ; Object-oriented methods (Computer science) ; UML (Computer science) ; Use cases (Systems engineering) ; Electronic books ; local
    Abstract: Applying Use Case Driven Object Modeling with UML: An Annotated e-Commerce Example is a practical, hands-on guide to putting use case methods to work in real-world situations. This workbook is a companion to Use Case Driven Object Modeling with UML. It bridges the gap between the theory presented in the main book and the practical issues involved in the development of an Internet e-commerce application. Uniquely conceived as a workbook and featuring as a running example an e-commerce system for an online bookstore, Applying Use Case Driven Object Modeling with UML examines design in detail, demonstrating the most common design mistakes and the correct design solutions. The hands-on exercises allow you to detect, identify, and correct critical errors on your own, before reviewing the solutions provided in the book. Structured around the proven ICONIX Process, this workbook presents a streamlined approach to UML modeling designed to avoid analysis paralysis without skipping analysis and design. The book presents the four key phases of this minimalist approach to use case driven design--domain modeling, use case modeling, robustness analysis, and sequence diagramming--and for each topic provides an overview, detailed discussion, list of common mistakes, and a set of exercises for honing object modeling and design skills. The three chapters on reviews are also unique. The authors devote a chapter each to requirements review, preliminary design review, and critical design review. This focus on "designing quality in" by teaching how to review UML models fills a major gap in the published literature. Through examples, Applying Use Case Driven Object Modeling with UML shows you how to avoid more than seventy specific design errors, as illustrated by the "Top 10" error lists included as a handy key on the inside covers and within each chapter. With the information, examples, and exercises found here, you will develop the knowledge and skills you need to apply use case modeling more effectively to your next application. 0201730391B08022001
    Note: Includes bibliographical references (p. 147-148)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 146
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 754 p. , ill. ; , 24 cm
    DDC: 005.2/762
    Keywords: Internet programming ; Perl (Computer program language) ; Electronic books ; local
    Abstract: "This is a superb book. Another splendid book from Lincoln, whose mastery and lucid exposition make this a must-have for the serious Perl programmer." --Jon Orwant, Chief Technology Officer, O'Reilly & Associates Founder of The Perl Journal, author of Mastering Algorithms with Perl, (O'Reilly & Associates) and co-author of Programming Perl, Third Edition (O'Reilly & Associates) Network Programming with Perl is a comprehensive, example-rich guide to creating network-based applications using the Perl programming language. Among its many capabilities, modern Perl provides a straightforward and powerful interface to TCP/IP, and this book shows you how to leverage these capabilities to create robust, maintainable, and efficient custom client/server applications. The book quickly moves beyond the basics to focus on high-level, application programming concepts, tools, and techniques. Readers will find a review of basic networking concepts and Perl fundamentals, including Perl's I/O functions, process model, and object-oriented extensions. In addition, the book examines a collection of the best third-party modules in the Comprehensive Perl Archive Network, including existing network protocols for e-mail, news, and the Web. The core of the book focuses on methods and alternatives for designing TCP-based client/server systems and more advanced techniques for specialized applications. Specific topics covered include: The Berkeley Sockets API The TCP protocol and the IO::Socket API FTP filesharing service The Net::Telnet module for adapting clients to interactive network services SMTP, including how to create and send e-mails with multimedia attachments POP, IMAP, and NNTP for receiving and processing e-mail HTTP and the LWP module for communicating with Web servers Forking servers and the UNIX and Windows inetd daemons Perl's experimental multithreaded API Multiplexed operations and nonblocking I/O Bulletproofing servers TCP urgent data UDP protocol and servers Broadcasting and multicasting Interprocess communication with UNIX-domain sockets Useful, working programs demonstrate ideas and techniques in action, including a real-time chat and messaging system, a program for processing e-mail containing MIME attachments, a program for mirroring an FTP site, and a Web robot. Network Programming with Perl focuses on TCP/IP rather than just the common Web protocols. Modeled after the critically acclaimed TCP/IP Illustrated by W. Richard Stevens, this book achie...
    Note: Includes bibliographical references (p. 721-726) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 147
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvii, 139 p. , ill. ; , 24 cm
    DDC: 005.3
    Keywords: Computer software ; Development ; eXtreme programming ; Electronic books ; local
    Abstract: "XP is the most important movement in our field today. I predict that it will be as essential to the present generation as the S.E.I. and its Capability Maturity Model were to the last." --From the foreword by Tom DeMarco The hallmarks of Extreme Programming--constant integration and automated testing, frequent small releases that incorporate continual customer feedback, and a teamwork approach--make it an exceptionally flexible and effective approach to software development. Once considered radical, Extreme Programming (XP) is rapidly becoming recognized as an approach particularly well-suited to small teams facing vague or rapidly changing requirements--that is, the majority of projects in today's fast-paced software development world. Within this context of flexibility and rapid-fire changes, planning is critical; without it, software projects can quickly fall apart. Written by acknowledged XP authorities Kent Beck and Martin Fowler, Planning Extreme Programming presents the approaches, methods, and advice you need to plan and track a successful Extreme Programming project. The key XP philosophy: Planning is not a one-time event, but a constant process of reevaluation and course-correction throughout the lifecycle of the project. You will learn how planning is essential to controlling workload, reducing programmer stress, increasing productivity, and keeping projects on track. Planning Extreme Programming also focuses on the importance of estimating the cost and time for each user story (requirement), determining its priority, and planning software releases accordingly. Specific topics include: Planning and the four key variables: cost, quality, time, and scope Deciding how many features to incorporate into a release Estimating scope, time, and effort for user stories Prioritizing user stories Balancing the business value and technical risk of user stories Rebuilding the release plan based on customer and programmer input Choosing the iteration length Tracking an iteration What to do when you're not going to make the date Dealing with bugs Making changes to the team Outsourcing Working with business contracts In addition, this book alerts you to the red flags that signal serious problems: customers who won't make decisions, growing defect reports, failing daily builds, and more. An entire chapter is devoted to war stories from the trenches that illustrate the real-world problems many programmers encounter and the solutions they've devised. ...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 148
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 262 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Debugging in computer science ; Perl (Computer program language) ; Electronic books ; local
    Abstract: "This book was a joy to read. It covered all sorts of techniques for debugging, including 'defensive' paradigms that will eliminate bugs in the first place. As coach of the USA Programming Team, I find the most difficult thing to teach is debugging. This is the first text I've even heard of that attacks the problem. It does a fine job. Please encourage these guys to write more ."-Rob Kolstad Perl Debugged provides the expertise and solutions developers require for coding better, faster, and more reliably in Perl. Focusing on debugging, the most vexing aspect of programming in Perl, this example-rich reference and how-to guide minimizes development, troubleshooting, and maintenance time resulting in the creation of elegant and error-free Perl code. Designed for the novice to intermediate software developer, Perl Debugged will save the programmer time and frustration in debugging Perl programs . Based on the authors' extensive experience with the language, this book guides developers through the entire programming process, tackling the benefits, plights, and pitfalls of Perl programming . Beginning with a guided tour of the Perl documentation, the book progresses to debugging, testing, and performance issues, and also devotes a chapter to CGI programming in Perl. Throughout the book, the authors espouse defensible paradigms for improving the accuracy and performance of Perl code . In addition, Perl Debugged includes Scott and Wright's "Perls of Wisdom" which summarize key ideas from each of the chapters, and an appendix containing a comprehensive listing of Perl debugger commands. In this exceptional reference and debugging guide, the authors cover every aspect of efficient Perl programming, including: CGI programming-special tips for debugging this type of Perl program How to develop the proper mindset for developing and programming effectively in Perl Perl "gotchas"-how to understand them, work around them, and avoid them "Antibugging"-the authors' rules of thumb on how to code defensively The Perl debugger -the authors' guide to using this Perl built-in Common syntax errors and how to track down their causes Semantical errors-why code may appear correct but the programs do not work How to improve the performance of resource-hungry programs Tips and advice for programmers moving to Perl from other language environments Focusing on the process of Perl programming and guidelines for identifying and correcting mistakes, Perl Debugged helps the de...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 149
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvi, 252 p. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 0321356683 ISBN-13: 9780321356680
    Note: Includes bibliographical references (p. 233-237) and indexes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 150
    Language: English
    Pages: xvii, 309 p. , ill. ; , 24 cm
    DDC: 005.2/762
    Keywords: Business ; Data processing ; Java (Computer program language) ; Electronic books ; local
    Abstract: Since its introduction, The Java 2 Platform, Enterprise Edition (J2EE) has achieved remarkable success among application server providers and their customers. More than a dozen leading application server companies have announced J2EE compatible products, and over one million developers have downloaded the J2EE SDK from Sun's J2EE Web site (http://java.sun.com/j2ee). Today, numerous enterprises face the challenge of developing distributed applications. IT professionals deal with a variety of issues: connecting dispersed users with centralized applications, building applications quickly and efficiently, and connecting heterogeneous clients and servers. J2EE in Practice provides ten examples of ways that J2EE technology has helped leading corporations, educational institutions, and government organizations face these challenges and reap significant rewards. Chapters in this book explore how: JCrew enhanced its traditional catalog sales operation using J2EE technology from Art Technology Group (ATG). One of the country's largest mortgage companies, HomeSide Lending, produced innovative online lending services using the BEA WebLogic server. The Borland Application Server enabled AT&T Unisource to respond quickly to demand in long-distance voice traffic routing. Codexa Corporation used Brokat's GemStone/J platform to deliver information for widely dispersed financial services professionals. eTapestry.com delivers applications to assist nonprofits in their fundraising using GemStone/J and Sun Microsystem's Forte for Java development environment. Altura International used the HP BlueStone J2EE platform to implement the Web's first online catalog shopping portal, catalogcity.com. IBM customers Honeywell and Bekins use Java technology to improve processes on the manufacturing floor and in the warehousing and delivery of large consumer products. International Data Post (IDP), a service owned by seven European postal operators, brought snail mail to the Internet age using iPlanet's J2EE technology. Physics research institute CERN worked with Oracle to provide electronic document handling services to over 5000 users worldwide. J2EE technology helps the US Military Traffic Management Command, Freight Systems Office (FSO) manage and control costs of small package shipping. 0201746220B01172002
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 151
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvii, 300 p. , ill. ; , 24 cm
    DDC: 005.74
    Keywords: Database design ; UML (Computer science) ; Electronic books ; local
    Abstract: The Unified Modeling Language (UML), the standard graphical notation for modeling business and software application needs, has emerged as an effective modeling tool for database design. When used as a common modeling language for the many facets of system development, the UML can serve as a unifying framework that facilitates the integration of database models with the rest of a system design. This pragmatic guide introduces you to the UML and leads you through the process of UML-based database modeling and design. The book presents the different types of UML diagrams, explaining how they apply to the database world, and shows how data modeling with the UML can be tied into the Rational Unified Process. UML for Database Design is structured around the database design process: business use case modeling, business object modeling, database requirements definition, analysis and preliminary design, and, finally, detailed design and deployment. For each phase of development the book describes the overall objectives and workflow of that phase, the status of the case study, the relevant UML constructs, and the nuts and bolts of database modeling and design with the UML. Drawing on their extensive industry experience, the authors reveal the trials and tribulations of database development teams, lessons learned, and pointers for success. Topics covered include: The business use case model Activity and sequence diagrams for modeling database functions and tasks Moving from the business to system model Class diagrams and statecharts Mapping classes to tables Transformation of attributes Rational's UML Profile for Database Design Creating tables from classes DDL scripts, component diagrams, and deployment diagrams Jump starting the database design process A case study runs throughout the book to illustrate key concepts and techniques, and appendixes containing the actual UML models from this case study are used to catalog the type and extent of models that would be developed for such a system. Practical, concrete, and based on real-life experience, UML for Database Design brings you exactly the information you need to begin working with the UML and take full advantage of the technology for high-quality database modeling and design. 0201721635B06292001
    Note: Includes bibliographical references (p. 287-288) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 152
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xx, 265 p. , ill. ; , 24 cm
    DDC: 005.3
    Keywords: Computer software ; Development ; eXtreme programming ; Electronic books ; local
    Abstract: Software that performs required tasks and meets expectations Accurate estimation of time to completion and cost of development The opportunity to decide which features to include and which to defer Frequent small releases that incorporate continual customer feedback Constant integration and automated testing that insures clean code and robust performance These are some of the many benefits of Extreme Programming (XP), a software development approach especially geared for smaller teams facing vague or rapidly changing requirements. Despite the "extreme" in its name, XP actually reduces risks--the risk of putting out software that is faulty, out of date at its release, over budget, or not fully capable of performing the tasks for which it was intended. Initially considered radical, XP has proven itself successful and is entering the mainstream of software development. The greatest challenge now facing software development managers and engineers is how to implement this beneficial approach. Extreme Programming Installed explains the core principles of Extreme Programming and details each step in the XP development cycle. This book conveys the essence of the XP approach--techniques for implementation, obstacles likely to be encountered, and experience-based advice for successful execution. You will learn the best approaches to Working with an on-site customer Defining requirements with user "stories" Estimating the time and cost of each story Delivering small, frequent releases Performing constant integration and frequent iterations Running design sessions to help programmers move forward with confidence xUnit automated testing Handling defects in the fast-paced, team-oriented XP environment How to refine estimates and steer the development effort through frequent changes The authors present the personal reflections of those who have been through the eXtreme Programming experience. Readers will benefit from first hand accounts of hard-won wisdom on topics such as the art of estimation, managing development infrastructure, solving problems without finger-pointing, the importance of simplicity, and how to introduce modern development tools into an environment where none existed. 0201708426B04062001
    Note: Includes bibliographical references (p. 245-259) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 153
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 368 p. , ill. ; , 22 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Smart cards ; Electronic books ; local
    Abstract: Java Card™ technology provides a secure, vendor-independent, ubiquitous Java™ platform for smart cards and other memory constrained devices. It opens the smart card marketplace to third-party application development and enables programmers to develop smart card applications for a wide variety of vendors' products. This book is the comprehensive guide to developing applications with Java Card technology. It introduces you to the Java Card platform and features detailed discussions of programming concepts. It also provides a step-by-step Java Card applet development guide to get you up and running. Specific topics covered include: Smart card basics Java Card virtual machine Persistent and transient objects Atomicity and transactions Handling APDUs Applet firewall and object sharing Java Card platform security A step-by-step applet development guide Applet optimization guidelines A comprehensive reference to Java Card APIs With Java Card technology, smart card programming will finally enter the mainstream of application development. This book provides the authoritative and practical information you need to enter this rapidly growing arena. 0201703297B04062001
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 154
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xviii, 368 p. ; , 24 cm
    DDC: 005.7/2
    Keywords: XML (Document markup language) ; Electronic books ; local
    Abstract: The Extensible Markup Language (XML) has been anointed as the universal duct tape for all software integration problems despite XML's relatively humble origins in the world of document management systems. Essential XML presents a software engineering-focused view of XML and investigates how XML can be used as a component integration technology much like COM or CORBA. Written for software developers and technical managers, this book demonstrates how XML can be used as the glue between independently developed software components (or in the marketecture terminology du jour, how XML can act as the backplane for B2B e-commerce applications). Authors Don Box, Aaron Skonnard, and John Lam cover the key issues, technologies, and techniques involved in using XML as the adhesive between disparate software components and environments. They explain the fundamental abstractions and concepts that permeate all XML technologies, primarily those documented in the XML Information Set (Infoset). XML-based approaches to metadata, declarative, and procedural programming through transformation and programmatic interfaces are covered. Don Box, co-author of the Simple Object Access Protocol (SOAP) specification, provides readers with insight into this emerging XML messaging technology for bridging COM, CORBA, EJB, and the Web. Readers acquire a better understanding of XML's inner workings and come to see how its platform, language, and vendor independence--along with its accessibility--make it an extraordinarily effective solution for software interoperation. 0201709147B04062001
    Note: Inlcudes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...