Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2000-2004  (1,556)
  • Safari Tech Books Online  (1,556)
  • Electronic books ; local  (1,556)
Datasource
Material
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    ISBN: 0789732807
    Language: English
    Pages: p. cm
    Edition: 3rd ed.
    Keywords: Electronic books ; local
    Abstract: This updated edition covers all of the updates to Windows XP since it was released, including Service Packs 1 and 2, and Reloaded. From-the-trenches advice on upgrading to Windows XP Pro - including detailed rollout advice for IT managers. Plan and manage deployment of Windows easily and efficiently - whether you're upgrading just a handful of computers, or an entire corporation! Includes hands-on coverage of installing, configuring and surviving on a Windows XP-based network. We not only show you how to set up Windows networking features, we show you how to install and set up basic networking hardware.Sharing files with other platforms, such as Novell Netware, Unix and Linux, Macintosh and other Windows flavors.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    ISBN: 9780321146182 , 0321146182 , 9781282650015 , 1282650017 , 0321146182
    Language: English
    Pages: p. cm
    Parallel Title: Erscheint auch als
    DDC: 005.2/762
    Keywords: Web services ; Internet programming ; Java (Computer program language) ; Electronic books ; local ; Internet programming ; Java (Computer program language) ; Web services ; Services Web ; Programmation Internet ; Java (Langage de programmation)
    Abstract: " J2EE™ Web Services is written in the tradition of great books people have come to expect from author Richard Monson-Haefel. More than a complete and concise Web services reference, this essential guide is the way for J2EE developers to quickly master Web services architecture and development." - Floyd Marinescu Author, EJB Design Patterns Director, TheServerSide.com "Written in a straightforward and approachable style, Monson-Haefel's latest book is a mustread for any Java developer who is serious about understanding and applying the J2EE APIs in support of Web services. By concentrating on the core technologies endorsed by the WS-I, it clearly explains why Web services will succeed in realizing the interoperability promise where previous attempts have failed." - James McCabe Software IT Architect IBM "This is the best-and most complete-description of J2EE Web services that I've seen. If you're a Java developer, you need this book." - David Chappell Chappell & Associates "For Java Web service developers, this book is going to be there on their desk next to their PC for easy reference. The book has it all, clear guides as to what WSDL, SAAJ, UDDI are, and how they are used in a variety of examples. Monson-Haefel has created another classic with this volume." - Dr. Bruce Scharlau Department of Computing Science University of Aberdeen, Scotland "Richard Monson-Haefel provides the most comprehensive analysis of J2EE Web services that I've seen so far to date. This book covers the core Web services technologies (XML, SOAP, WSDL, and UDDI), as well as the Java APIs for Web services (JAX-RPC, SAAJ, JAXR, JAXP, and Web Services for J2EE, version 1.1). Richard also goes into detail on issues such as fault handling, type mapping, and JAX-RPC handlers. Developers will find this book to be a very valuable reference." - Anne Thomas Manes Research Director, Burton Group Author, Web Services: A Manager's Guide " J2EE™ Web Services is an excellent reference and tutorial for both beginning and seasoned Web services architects and developers. This book is the first to fully cover the WS-I 1.0 Web services standards and their integration with J2EE 1.4 components. Spend time with this book, and you'll soon master J2EE Web Services and be able to successfully use this technology to solve key business integration problems in your enterprise." - Tom Marrs Senior J2EE/XML/Web Services Architect Distributed Computing Solutions, Inc. Web services are revolutionizing ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Financial Times Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xviii, 206 p. ; , 24 cm
    DDC: 303.48/273
    Keywords: Advertising ; Moral and ethical aspects ; United States ; Anti-Americanism ; Export marketing ; Moral and ethical aspects ; United States ; Export marketing ; Political aspects ; United States ; Electronic books ; local
    Abstract: Globalization, commercialization and Americanization are changing the lives of almost everybody on the planet. The uniqueness of this book is that it tackles these trends together, and head-on. The balance of knowledge and feeling makes it an important book in a field plagued by one-sided pro- and anti- pieces.-David Arnold, author of The Mirage of Global Markets Millions of people around the world have come to despise the United States. One of the biggest reasons is American "in-your-face" marketing, which treats people everywhere as 24 × 7 consumers, drives U.S. free market materialism at the expense of local values, and seeks to "McDonaldize" the entire globe. In this book, one of the world's leading experts on global marketing steps back to see its true impact. Johny K. Johansson looks at American marketing from the perspective of the non-U.S. consumer: as the first wave of a cultural assault by an arrogant, wasteful society of overfed, gas-guzzling, SUV-driving bullies. Johansson considers the Bush administration's "repositioning" of America and the post-9/11 collapse of American popularity from the perspective of a professional global marketer. He then offers practical guidance for marketers who wish to succeed in global markets without becoming "ugly Americans." Meet the new "ugly American"-American marketers abroad: loud, short-sighted, and ineffective Live by the brand, die by the brand-Why American brands are the #1 targets of the anti-globalization movement One size does not fit all-No matter how much global marketers say it does After 9/11: The disastrous "repositioning" of America-Bush unilateralism versus traditional American values Toward a more humane global marketing-Local awareness and respect and the long-term route to sustainable profit The new global rebellion against American marketing "In-your-face" American marketing-the not-so-hidden cause of global anti-Americanism. The "repositioning" of America and why American popularity overseas has collapsed How to profitably market internationally, without promoting anti-Americanism A desperately needed wake-up call for American companies in global markets In Your Face reveals the new worldwide rebellion that's brewing against American marketing. Renowned international marketing expert Johny K. Johansson explains why global customers will no longer put up with the traditional tactics of western companies. Most important, he offers a new path to sustainable profits-a path based o...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    ISBN: 0201914670
    Language: English
    Pages: xiii, 770 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.13/3
    Keywords: Java foundation classes ; Graphical user interfaces (Computer systems) ; Electronic books ; local
    Abstract: The JFC Swing Tutorial is back, fully revised and updated to include the latest revisions to the JFC Swing API and the Java™ 2 platform. In this book, authors and Java experts Kathy Walrath, Mary Campione, Alison Huml, and Sharon Zakhour-working closely with the Sun Microsystems Swing team-explore the ins and outs of creating GUIs with Swing components. This task-oriented, example-driven tutorial allows you to create user interfaces that work without change on multiple platforms, appearing and performing as well as or better than native interfaces. Leveraging the full power of the latest edition of the Java 2 platform, the authors bring the art of GUI creation to life with content new to this edition. This includes an easy-to-use tabbed reference section, new introductory chapters, and coverage of newer features such as JSpinner, JFormattedTextField, JProgressBar, mouse wheel support, the rearchitected focus subsystem, and improved support for drag and drop. Coverage includes: Introductory material for developers getting started with Swing, including sections on basic components such as text fields, labels, and buttons, as well as on using images The latest advice from the Swing team about thread safety Advanced Swing material, including changing key bindings, manipulating the focus, using data models, and adding painting code that uses the powerful Java 2D™ API How-to discussions on using individual components and containers, including advanced components such as tables, trees, and text editors Over 150 complete, working code examples For the novice or experienced Java developer looking to create robust, powerful, and visually stunning GUIs, The JFC Swing Tutorial, Second Edition, is an indispensable tutorial and reference.
    Note: Includes index. - Previous ed. cataloged under Walrath
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: v. 〈1 〉 , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.2/762
    Keywords: JavaServer pages ; Java (Computer program language) ; Servlets ; Web servers ; Electronic books ; local
    Abstract: The J2EE(TM) Platform has become the technology of choice for developing professional e-commerce applications, interactive Web sites, and Web-enabled applications and services. Servlet and JSP(TM) technology is the foundation of this platform: it provides the link between Web clients and server-side applications. In this 2nd edition of the worldwide bestseller, the authors show you how to apply the latest servlet and JSP capabilities. Unlike other books that treat servlet or JSP technology in isolation, Core Servlets and JavaServer Pages provides a unified treatment, showing you when servlet technology is best, when the JSP approach is preferred, and when (and how) servlets and JSP should work together. Part I provides exhaustive coverage of the servlet 2.4 specification. It starts with server configuration, basic syntax, the servlet life cycle, and use of form data. It moves on to applying HTTP 1.1, cookies, and session tracking. Advanced topics include compressing Web content, incrementally updating results, dynamically generating images, and creating shopping carts. Part II gives an in-depth guide to JSP 2.0. It covers both the "classic" JSP scripting elements and the new JSP 2.0 expression language. It shows how to control the content type, designate error pages, include files, and integrate JavaBeans components. Advanced topics include sharing beans, generating Excel spreadsheets, and dealing with concurrency. Part III covers two key supporting technologies: HTML forms and database access with JDBC(TM). It explains every standard HTML input element and shows how to use appropriate JDBC drivers, perform database queries, process results, and perform updates. Advanced topics include parameterized queries, stored procedures, and transaction control. Design strategies include ways to integrate servlet and JSP technology, best practices for invoking Java code from JSP pages, plans for dealing with missing and malformed data, and application of the MVC architecture. Handy guides walk you through use of three popular servlet and JSP engines (Apache Tomcat, Macromedia JRun, and Caucho Resin) and some of the most widely used database systems (MySQL, Oracle9i, Microsoft Access). Volume 2 of this book covers advanced topics: filters, custom tag libraries, database connection pooling, Web application security, the JSP Standard Tag Library (JSTL), Apache Struts, JavaServer Faces (JSF), JAXB, and more. The same clear step-by-step explanations that made...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Greensboro, N.C. : Center For Creative Leadership | Boston, MA :Safari,
    Language: English
    Pages: 31 p. , ill. ; , 23 cm
    Keywords: Complex organizations ; Cross-functional teams ; Intergroup relations ; Interorganizational relations ; Organizational effectiveness ; Teams in the workplace ; Electronic books ; local
    Abstract: Dispersed teams have members in different countries, cultures, and time zones. Such teams share some important characteristics with local teams, but they also present unique challenges. Organizations need to prepare for and support them properly to realize their full potential.
    Note: CCL no. 423
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Your first step into the world of routing No routing experience required Includes clear and easily understood explanations Makes learning easy Your first step to understanding routing begins here! Learn routing basics simply and easily Explore how network traffic gets from here to there Understand routing tools and technologies Reinforce your understanding with chapter review questions Welcome to the world of routing! Routing is the technology that enables worldwide Internet communication. Many people involved with networking technologies or companies need to know how routing works. But learning about routing tends to involve a complex web of terms and acronyms-a language that can be difficult and unfamiliar. No routing experience needed! Routing First-Step explains the basics of Internet routing in language all of us can understand. This book takes you on a guided tour of routing, starting with systems you are familiar with: the postal system, the telephone system, and the interstate highway system. From there, you'll learn routing simply and easily. Whether you are looking to take your first step into a career in networking or are interested only in gaining knowledge of the technology, this book is for you!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 860 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Firewalls (Computer security) ; Examinations ; Study guides ; Electronic books ; local
    Abstract: Cisco authorized self-study book for CCSP 642-521 foundation learning Gain proficiency with new features of PIX Firewall version 6.3, including OSPF, 802.1Q VLANs, NAT-T, and more Learn the ins and outs of the PIX product family and its complete feature set Use the PIX Device Manager (PDM) 3.0 to configure and manage the PIX Firewall Use advanced techniques to control traffic on your network using ACLs (access control lists), content filtering, and object groups Improve security using PIX Firewall attack guards, intrusion detection, and shunning features Learn about techniques and security considerations for configuring OSPF on PIX Firewall version 6.3 Configure scalable site-to-site and client remote access VPNs using the PIX Firewall version 6.3 Configure high-availability solutions using stateful and LAN-based failover techniques Use logical interfaces and 802.1Q trunks to scale your PIX Firewall implementation Master enterprise management and maintenance techniques using CiscoWorks Management Center for Firewalls 1.2 and Auto Update Server 1.1 Configure the PIX Firewall Services Module (FWSM) The use of firewalls-devices residing at the network perimeter to protect against intrusion-is an essential building block to even the most basic security program. Cisco Systems has continued the support and development of the PIX OS to provide networks top-notch security while maintaining compatibility with the latest standards and protocols. Now offered in many models, the PIX Firewall is perfectly suited to meet the requirements of small offices (501 model), medium to large businesses (506E, 515E, and 525 models), and large enterprise and service provider customers (525 and 535 models and the Firewall Services Module). CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA) , Second Edition, offers in-depth configuration and deployment information for this popular and versatile firewall solution. CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA) , Second Edition, teaches you the skills needed to configure and operate the PIX Firewall product family. Chapter overviews bring you quickly up to speed and help you get to work right away. Lab exercises and scenario-based solutions allow you to adapt configurations to your network for rapid implementation, helping you make the most of your PIX Firewall. Chapter-ending review questions test your knowledge. PIX Device Manager (PDM) configuration procedures are presented to complement extensive...
    Note: Includes bibliographical references (p. [837]-841) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxvii, 828 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review techniques applicable to both network- and host-based platforms Review the security wheel concepts and apply security to AVVID using the SAFE Blueprint Install and configure the Cisco IDS to monitor your network for malicious activity Understand Cisco Threat Response (CTR) benefits and how it operates Apply alarm signatures and gain the proficiency to create your own custom signatures Deploy Cisco IDS effectively in your network using sensor and management platforms Get inside the Cisco Security Agent (CSA) architecture In addition to firewalls and other security appliances intended to limit outsider access to a network, intrusion detection and targeted countermeasures are a critical component of a complete network security plan. The Cisco Intrusion Detection Sensors and Management options work as a united system to provide detection, notification, and aggressive lockdown to malicious network breaches. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS), Second Edition , offers in-depth configuration and deployment information for the reliable and intensive intrusion detection solutions from Cisco Systems. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is a Cisco authorized, self-paced learning tool that helps you gain mastery over the use of both the host-based and network-based IDS options (as well as the Cisco Threat Response functionality) by presenting a consolidated all-inclusive reference on all of the current Cisco IDS sensor platforms and management platforms. Chapter overviews bring you quickly up to speed and help you get to work right away. Configuration examples are designed to show you how to make the most of your IDS system, and unique chapter-ending review questions test your knowledge. Whether you are seeking a reference guide to working with the CIDS sensor and management platforms or a study guide for the 642-531 exam, CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, supports your effective use of the Cisco IDS. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is part of a recommended learning path from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, an...
    Note: Includes index. - Rev. ed. of: Cisco secure intrusion detection system. c2002
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: l, 1078 p. , ill. ; , 24 cm
    Edition: 4th ed.
    Series Statement: Networking technology series
    DDC: 004.6
    Keywords: Computer networks ; Handbooks, manuals, etc ; Internetworking (Telecommunication) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: The updated edition of the best-selling all-in-one networking reference provides coverage of essential and cutting-edge technologies Concise overviews of technologies essential to networking professionals at all levels, from novice to expert. New chapters include coverage of important topics like VoIP and EAP Coverage of cutting edge technologies like optical networking and storage Authored by Cisco Systems, worldwide leader in networking for the Internet. Internetworking Technologies Handbook , Fourth Edition, is a comprehensive reference that enables networking professionals to understand and implement contemporary internetworking technologies. Master the terms, concepts, technologies, and devices used in today's networking industry. Learn how to incorporate internetworking technologies into a LAN/WAN environment. Complete with new and updated chapters on security, storage, optical networking, scalability, and speed, this book is a complete and up-to-date reference to the topics that are essential to all networking professionals, regardless of expertise. Readers will obtain a greater understanding of LAN and WAN networking, particularly the hardware, protocols, and services involved. Fundamental technology information is provided on a broad range of integral systems and services, including detailed descriptions, review questions to ensure concept comprehension and retention, and additional resources for further study. Coverage is also extended not only to new networking concepts, but also to older, legacy systems, providing a more realistic picture of the real-world networking environments in which professionals operate. Tools and guidelines for optimizing system performance will increase productivity and improve efficiency, helping the reader make more intelligent, cost-efficient decisions for their networks. Cisco Systems, Inc. is the worldwide leader in networking for the Internet. Cisco solutions, which include industry-leading publications from Cisco Press, educate and a provide competitive advantage to customers through more efficient and timely exchange of information, leading to cost saving, process efficiencies, and closer business relationships. These solutions form the networking foundation for many organizations worldwide.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 234 p. ; , 24 cm
    Edition: 1st ed.
    DDC: 004.692
    Keywords: Qmail ; Electronic mail systems ; Electronic books ; local
    Abstract: qmail has quietly become one of the most widely used applications on the Internet today. It's powerful enough to handle mail for systems with millions of users--Like Yahoo! Mail and Hotmail, while remaining compact and manageable enough for the smallest Unix- and Linux-based PC systems. Its component design makes it easy to extend and customize while keeping its key functions secure, so it's no wonder that adoption of qmail continues at a rapid pace.The downside? Apparently none. Except that qmail's unique design can be disorienting to those familiar with other popular MTAs (Mail Transfer Agents). If you're coming from sendmail, for instance, you might have trouble recasting your problems and solutions in qmail terms. qmail first helps you establish a "qmail frame of mind," then explores the installation, configuration, administration, and extension of this powerful MTA. Whether you're installing from scratch or managing mailing lists with thousands of users, qmail provides detailed information about how to make qmail do precisely what you wantqmail concentrates on common tasks like moving a sendmail setup to qmail, or setting up a "POP toaster," a system that provides mail service to a large number of users on other computers sending and retrieving mail remotely. The book also fills crucial gaps in existing documentation, detailing exactly what the core qmail software does.Topics covered include: Installation and configuration, including patching qmail Moving from sendmail to qmail Handling locally and remotely originated messages Managing virtual domains Logging qmail activity Tuning qmail performance Running multiple copies of qmail on the same computer Mailing list setup and management Integrating the qmail MTA with POP and IMAP delivery Filtering out spam and viruses If you need to manage mailing lists, large volumes of mail, or simply find sendmail and other MTAs too complicated, qmail may be exactly what's called for. Our new guide, qmail, will provide the guidance you need to build an email infrastructure that performs well, makes sense, and is easy to maintain.
    Note: "Managing Unix-based mail systems"--Cover. - Includes bibliographical references (p. 220-221) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 281 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: IEEE 802.11 (Standard) ; Wireless LANs ; Electronic books ; local
    Abstract: Master the basics in designing, building, and managing a Cisco Aironet WLAN. Master the basics of Wireless LANs with this concise design and deployment guide Understand implementation issues for a variety of environments including vertical, SOHO, and enterprise networks Learn design and troubleshooting advice from real-world case studies 802.11 Wireless LAN Fundamentals gives networking engineers and IT professionals the knowledge they need to design, deploy, manage, and troubleshoot their own wireless local-area networks (WLANs). Starting with an overview of the technology and architecture of WLANs, the book goes on to explain services and advanced features that such applications can provide. Most importantly, it provides practical design guidance and deployment recommendations. Wireless LANs connect computer networks via radio transmissions instead of traditional phone lines or cables. Benefits to these systems go well beyond getting rid of all the cables and wires. Campus networks can grow geographically larger while still retaining all their efficiency and speed. Additionally, cost savings can be realized when third-party phone lines are no longer necessary, saving the cost of line rental and equipment upkeep. Finally, flexibility in campus network design increases significantly for the networking professional, while the network accessibility and usefulness increases for the individual users. 802.11 Wireless LAN Fundamentals helps networking professionals realize these benefits by helping them understand how to design, build, and maintain these networks, as well as how to justify their value within organizations.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    [Alexandria, Va. : ASTD Press] | Boston, MA :Safari,
    Language: English
    Keywords: Project management ; Handbooks, manuals, etc ; Teaching ; Aids and devices ; Electronic books ; local
    Abstract: Effective project management skills are essential to every employee in an organization from the CEO to a line manager. Here is a book that will allow you to quickly create comprehensive half-day to two-day training programs that provide skills your learners can put to use immediately. All the tools you need are in this handy, practical guide from classroom handouts to customizable presentations.
    Note: Includes link to CD content. - Title from title screen. - Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Language: English
    Pages: xxviii, 475 p. , ill. ; , 24 cm. +
    DDC: 004/.01/51
    Keywords: Computer games ; Programming ; Computer science ; Mathematics ; Physics ; Data processing ; Electronic books ; local
    Abstract: Whether you're a hobbyist or a budding game design pro, your objective is probably the same: To create the coolest games possible using today's increasingly sophisticated technology. To do that, however, you need to understand some basic math and physics concepts. Not to worry: You don't need to go to night school if you get this handy guide! Through clear, step-by-step instructions, author Wendy Stahler covers the trigonometry snippets, vector operations, and 1D/2D/3D motion you need to improve your level of game development. Each chapter includes exercises to make the learning stick, and Visualization Experience sections are sprinkled throughout that walk you through a demo of the chapter's content. By the end of the volume, you'll have a thorough understanding of all of the math and physics concepts, principles, and formulas you need to control and enhance your user's gaming experience.
    Note: Includes bibliographical references (p. [441]-443) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    [Indianapolis, IN] : New Riders Pub. | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 249 p. , col. ill. ; , 24 cm
    DDC: 006.7/8
    Keywords: Dreamweaver (Computer file) ; Web sites ; Authoring programs ; Web sites ; Design ; Electronic books ; local
    Abstract: With its powerful combination of visual layout tools, application development features, and code editing support, Dreamweaver MX 2004 is sure to become your tool of choice for creating and managing Web sites. This book offers the key to all of its magic. Sure, you could wade your way through a thousand-page tome to learn the ins and outs of every Dreamweaver feature, but as a Web developer or designer focused on deadlines, details, and putting across an effective message, what you really need is somebody else to do that work for you: to dig up the time-saving tips and shortcuts that will get you to your destination fast. Lucky for you, authors Joseph Lowery and Angela C. Buraglia have done just that, drawing on their own vast Dreamweaver experience to deliver a book that's nothing but those cool sidebar tips. In the process, they cover all of Dreamweaver MX 2004's new features: built-in image-editing technology that lets you edit your images without leaving Dreamweaver, painless cross-browser development, and more.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 958 p. , ill. ; , 24 cm
    DDC: 004.6
    Keywords: Electronic data processing personnel ; Certification ; Telecommunication ; Switching systems ; Examinations ; Study guides ; Telecommunications engineers ; Certification ; Study guides ; Electronic books ; local
    Abstract: Gain necessary hands-on experience implementing CCNP BCMSN concepts with this practical lab guide Lab configurations include explanations of equipment set-up and execution Valuable reference tool for Catalyst switches, including shortcuts, caveats, and application of the most advanced features Real-world scenarios represent the whole range of CCNP BCMSN 642-811 exam topics CCNP Practical Studies: Switching (CCNP Self-Study) provides CCNP candidates with an in-depth, hands-on experience in configuring Cisco Catalyst switches. This practical guide shows intermediate level networkers how to apply the theoretical knowledge they have gained through CCNP coursework and exam preparation. Configuration labs performed within this book will cover all technologies tested on the BCMSN 642-811 exam, as well as a number of real world scenarios that will test users' overall understanding of multilayer switching. The labs come complete with full explanations, highlighting why the chosen commands and techniques are recommended. In addition to applicable labs, this book also provides general information on various switching technologies, as well as tips, tricks, shortcuts, and caveats for deploying Cisco switching gear in production environments. This book also includes exercises (similar to traditional mathematics exercises) that will help readers internalize, practice, and memorize certain concepts and thought processes necessary to successfully deploy a switched network. Part of the Practical Studies series from the Cisco Press, CCNP Practical Studies: Switching provides self-study based hands-on experience. As such, it can be used in conjunction with other Cisco Press titles and is an excellent companion to instructor-led training from a Cisco Learning Partner.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Berkeley, CA : Macromedia Press in association with Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xxx, 1238 p. , ill. ; , 23 cm
    DDC: 05.7/2
    Keywords: Dreamweaver (Computer file) ; Web sites ; Design ; Electronic books ; local
    Abstract: As an experienced Dreamweaver developer, you don't need a guide to step you through every new Dreamweaver MX 2004 button and feature. Chances are, you'll be able to figure most of those out on your own. What you need--and this volume delivers--is an in-depth exploration of how you can leverage all of Dreamweaver's power to take your own Web development process to the next level. Moving beyond the explanations that are readily available in the product's documentation and the commonly available introductory guides, author Laura Gutman draws on her own extensive experience as a multimedia Web application developer to explore some of the software's more creative and complex uses--many of which involve features new to Dreamweaver MX 2004: editing files, manipulating databases, and changing code directly on remote FTP and network servers without first stetting up a Dreamweaver site; using CSS to improve your design procedures; and more. Easy-to-follow explanations, insightful exercises, render a complex topic painless.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Take your Windows XP knowledge to the next level! Designed for advanced home and office users, this thoroughly updated second edition delivers in-depth information on core and advanced Windows XP topics, including all-new coverage of Windows XP Service Pack 2, Microsoft Windows Server 2003, Microsoft Windows XP Media Center Edition, Windows Media Series 9, and Windows Movie Maker 2. The award-winning Inside Out format makes it easy to find the timesaving solutions, troubleshooting tips, and workarounds you needand it features new Reality Check sidebars, which offer the straight scoop on popular wisdom about Windows XP.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 754 p. , ill. ; , 23 cm. +
    DDC: 005.75/85
    Keywords: SQL server ; Client/server computing ; Electronic books ; local
    Abstract: Ensuring 24/7 database availability is crucial to your company's success. Discover the best ways to help keep your critical, Microsoft SQL Server 2000-based systems up and running-and secure-with this in-depth guide, straight from the source.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Microsoft Outlook ; Electronic mail systems ; Computer programs ; Personal information management ; Computer programs ; Time management ; Computer programs ; Electronic books ; local
    Abstract: Teach yourself how to use the personal information management and communication power of Outlook 2003-one step at a time! Use easy, self-paced lessons to build exactly the skills you need to manage your e-mail messages, calendar, contacts, and more.
    Note: Includes index. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 808 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Extranets (Computer networks) ; Electronic books ; local
    Abstract: Master advanced troubleshooting techniques for IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs Learn the step-by-step, end-to-end methodology essential for troubleshooting virtual private networks (VPNs) Gain the in-depth knowledge necessary for fast and efficient troubleshooting of IPSec, MPLS Layer-3, MPLS Layer-2 (AToM), L2TPv3, L2TPv2, PPTP, and L2F VPNs Master advanced troubleshooting tools and techniques for all applicable VPN types Debug and fix IPSec site-to-site and remote access VPN issues, such as IKE (ISAKMP) phase 1 and phase 2 negotiation failure, ESP and AH traffic drops, certificate enrollment failures, and maximum transmission unit (MTU) problems Locate and resolve MPLS Layer-3 VPN problems, such as those involving route exchange and label switched path (LSP) failure, MPLS VPN over traffic engineering tunnels, and Multicast VPNs (MVPN) Discover solutions for issues in AToM and L2TPv3-based Layer-2 VPNs, including pseudowire setup failures, attachment circuit problems, and MTU issues Obtain answers for L2TPv2, PPTP, and L2F control connection establishment, session setup, PPP negotiation, and VPN performance issues Refer to specially designed flowcharts to identify issues and find solutions fast Consolidate VPN troubleshooting knowledge through bonus hands-on labs Read and understand detailed analysis of all relevant VPN show and debug command output Troubleshooting Virtual Private Networks presents a systematic troubleshooting methodology for network engineers, administrators, and architects tasked with managing and deploying Cisco IOS VPNs. With eight self-contained chapters designed to facilitate rapid and straightforward troubleshooting, this book provides detailed information on addressing all common and not-so-common issues with IPSec VPNs, MPLS Layer-3 VPNs, Any Transport over MPLS (AToM)-based Layer-2 VPNs, L2TP Version 3 (L2TPv3)-based Layer-2 VPNs, L2TP Version 2 (L2TPv2) VPNs, PPTP VPNs, and L2F VPNs. This book not only shows you how to correct problems but also how to avoid them in the first place with expert VPN configuration guidance and optimization tips. Each chapter in Troubleshooting Virtual Private Networks includes a step-by-step, end-to-end troubleshooting approach to a different VPN technology. In-depth technical discussions and configuration reviews orient you to the VPN technology and get you ready to work. To help you access the answers you need, you'll find flowcharts in ea...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Language: English
    Pages: xxi, 284 p. , ill. ; , 24 cm
    DDC: 658.0546
    Keywords: Business enterprises ; Computer networks ; Management ; Electronic books ; local
    Abstract: Measure, manage, and improve the speed and reliability of web services Complete reference for creating relevant, effective Service Level Agreements Detailed discussions of both technical and business performance metrics and their statistical treatment Performance and management implications of various web services delivery infrastructures, including caching and load distribution Discussion of the transport infrastructure, including quality of service (QoS) technology and traffic shaping Instrumentation system design Measurement collection, aggregation, correlation, and use for real-time service level control and reporting Quick problem detection, "triage" problem diagnosis, and root-cause analysis Automated, policy-based system management Load testing, modeling, and capacity planning for web systems Calculation of return on investment for web infrastructure improvements Structured plan for implementation of SLM techniques The web has become a major vehicle for transforming business processes, but ineffective management of web-based services can result in high costs and user dissatisfaction. Service Level Management (SLM) is therefore a competitive weapon in the web marketplace, providing the tools needed to improve performance and reliability of web services while simultaneously controlling costs. Practical Service Level Management: Delivering High-Quality Web-Based Services shows you how you can measure, manage, and improve network performance and quality of experience (QoE) for critical web services. Starting with an explanation of SLM and common performance metrics, the book provides detailed discussions of methods to measure and improve performance. Service Level Agreements, instrumentation, performance-improvement technologies, load testing, and long-term planning are all covered in detail. This book provides both technical engineers and non-technical managers with an organized, cohesive plan for measuring, improving, and evaluating the performance of web-based services. Whether you are delivering services to other businesses or directly to customers, Practical Service Level Management: Delivering High-Quality Web-Based Services walks you through the complete process of designing a balanced solution for your situation. Use it to help design a system with the speed, reliability, and flexibility that are critical success factors for your business. This book is part of the Networking Technology Series from Cisco Press, which offers networkin...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Microsoft FrontPage ; Web publishing ; Web sites ; Design ; Electronic books ; local
    Abstract: Teach yourself how to use the Web site creation and management capabilities in FrontPage 2003-one step at a time! Learn how to create professional-looking Web sites using easy, self-paced lessons and hands-on practice exercises.
    Note: Includes index and link to CD content. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Microsoft Outlook ; Business ; Computer programs ; Electronic mail systems ; Computer programs ; Personal information management ; Computer programs ; Time management ; Computer programs ; Electronic books ; local
    Abstract: Take your Microsoft Outlook experience to the next level! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and handy workarounds for Microsoft Office Outlook 2003 in concise, fast-answers format.
    Note: Includes index and link to CD content. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 177 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Series Statement: The developer's notebook series
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Java 5.0, code-named "Tiger", promises to be the most significant new version of Java since the introduction of the language. With over a hundred substantial changes to the core language, as well as numerous library and API additions, developers have a variety of new features, facilities, and techniques available. But with so many changes, where do you start? You could read through the lengthy, often boring language specification; you could wait for the latest 500 page tome on concepts and theory; you could even play around with the new JDK, hoping you figure things out--or you can get straight to work with Java 5.0 Tiger: A Developer's Notebook . This no-nonsense, down-and-dirty guide by bestselling Java authors Brett McLaughlin and David Flanagan skips all the boring prose and lecture, and jumps right into Tiger. You'll have a handle on the important new features of the language by the end of the first chapter, and be neck-deep in code before you hit the halfway point. Using the task-oriented format of this new series, you'll get complete practical coverage of generics, learn how boxing and unboxing affects your type conversions, understand the power of varargs, learn how to write enumerated types and annotations, master Java's new formatting methods and the for/in loop, and even get a grip on concurrency in the JVM. Light on theory and long on practical application, Java 5.0 Tiger: A Developer's Notebook allows you to cut to the chase, getting straight to work with Tiger's new features. The new Developer's Notebooks series from O'Reilly covers important new tools for software developers. Emphasizing example over explanation and practice over theory, they focus on learning by doing--you'll get the goods straight from the masters, in an informal and code-intensive style that suits developers. If you've been curious about Tiger, but haven't known where to start, this no-fluff, lab-style guide is the solution.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 343 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: You've probably heard the buzz about Eclipse, the powerful open source platform that gives Java developers a new way to approach development projects. It's like a shiny new car--no longer content to just admire Eclipse, you're now itching to get in and drive. Eclipse is to Java developers what Visual Studio is to .NET developers--it's an integrated development environment (IDE) that combines a code editor, compiler, debugger, text editor, graphical user interface (GUI) builder, and other components into a single, user-friendly application. It provides a solid foundation that enables Java developers to construct and run integrated software-development tools for web development, application design, modeling, performance, testing, and much more. As with any extensive programming tool, however, there's a lot to learn. And there s no better guy than well-known Java expert Steve Holzner to teach you. An award-winning and best-selling author who has been writing about Java topics since the language first appeared, Holzner delivers just the kind of targeted, practical, everyday knowledge you need to hone your mastery of Eclipse. Perfect as a companion to an Eclipse programming tutorial (such as Holzner's own Eclipse , O'Reilly, April 2004) or an ideal stand-alone for all those developers who either don't want or don't need the tutorial approach, the Eclipse Cookbook contains task-oriented recipes for more than 800 situations you may encounter while using this new Java platform--from deploying a web application automatically to reverse engineering compiled code, from re-naming all references to a class across multiple packages to initializing the SWT JNI libraries. Each recipe in the ever-popular and utterly practical problem-solution-discussion format for O'Reilly cookbooks contains a clear and thorough description of the problem, a brief but complete discussion of a solution, and in-action examples illustrating that solution. The Eclipse Cookbook will satiate Java programmers at all levels who are ready to go beyond tutorials--far beyond writing plug-ins and extensions--and actually use the powerful and convenient Eclipse day to day.
    Note: "Covers Eclipse 3.0"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxi, 479 p. , ill. ; , 24 cm. +
    Edition: 3rd ed.
    DDC: 005.3
    Keywords: Application software ; Development ; UML (Computer science) ; Electronic books ; local
    Abstract: Learn UML, the Unified Modeling Language, to create diagrams describing the various aspects and uses of your application before you start coding, to ensure that you have everything covered. Millions of programmers in all languages have found UML to be an invaluable asset to their craft. More than 50,000 previous readers have learned UML with Sams Teach Yourself UML in 24 Hours . Expert author Joe Schmuller takes you through 24 step-by-step lessons designed to ensure your understanding of UML diagrams and syntax. This updated edition includes the new features of UML 2.0 designed to make UML an even better modeling tool for modern object-oriented and component-based programming. The CD-ROM includes an electronic version of the book, and Poseidon for UML, Community Edition 2.2, a popular UML modeling tool you can use with the lessons in this book to create UML diagrams immediately.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Language: English
    Pages: xvii, 650 p. , ill. ; , 23 cm
    DDC: 005.2/762
    Keywords: PHP (Computer program language) ; Web sites ; Design ; Electronic books ; local
    Abstract: Over the past three years PHP has evolved from being a niche language used to add dynamic functionality to small sites to a powerful tool making strong inroads into large-scale, business-critical Web systems. The rapid maturation of PHP has created a skeptical population of users from more traditional "enterprise" languages who question the readiness and ability of PHP to scale, as well as a large population of PHP developers without formal computer science backgrounds who have learned through the hands-on experimentation while developing small and midsize applications in PHP. While there are many books on learning PHP and developing small applications with it, there is a serious lack of information on "scaling" PHP for large-scale, business-critical systems. Schlossnagle's Advanced PHP Programming fills that void, demonstrating that PHP is ready for enterprise Web applications by showing the reader how to develop PHP-based applications for maximum performance, stability, and extensibility.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 247 p. , ill. ; , 25 cm
    Edition: 1st ed.
    DDC: 004.22
    Keywords: Computer architecture ; Web services ; XML (Document markup language) ; Electronic books ; local
    Abstract: Large IT organizations increasingly face the challenge of integrating various web services, applications, and other technologies into a single network. The solution to finding a meaningful large-scale architecture that is capable of spanning a global enterprise appears to have been met in ESB, or Enterprise Service Bus. Rather than conform to the hub-and-spoke architecture of traditional enterprise application integration products, ESB provides a highly distributed approach to integration, with unique capabilities that allow individual departments or business units to build out their integration projects in incremental, digestible chunks, maintaining their own local control and autonomy, while still being able to connect together each integration project into a larger, more global integration fabric, or grid. Enterprise Service Bus offers a thorough introduction and overview for systems architects, system integrators, technical project leads, and CTO/CIO level managers who need to understand, assess, and evaluate this new approach. Written by Dave Chappell, one of the best known and authoritative voices in the field of enterprise middleware and standards-based integration, the book drills down into the technical details of the major components of ESB, showing how it can utilize an event-driven SOA to bring a variety of enterprise applications and services built on J2EE, .NET, C/C++, and other legacy environments into the reach of the everyday IT professional.With Enterprise Service Bus , readers become well versed in the problems faced by IT organizations today, gaining an understanding of how current technology deficiencies impact business issues. Through the study of real-world use cases and integration patterns drawn from several industries using ESB--including Telcos, financial services, retail, B2B exchanges, energy, manufacturing, and more--the book clearly and coherently outlines the benefits of moving toward this integration strategy. The book also compares ESB to other integration architectures, contrasting their inherent strengths and limitations.If you are charged with understanding, assessing, or implementing an integration architecture, Enterprise Service Bus will provide the straightforward information you need to draw your conclusions about this important disruptive technology.
    Note: Includes bibliographical references (p. 235-238) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 269 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Snort (Computer file) ; Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools . This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
    Note: "Intrusion detection with open source tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 450 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.3
    Keywords: Apache (Computer file : Apache Group) ; JavaServer pages ; Application software ; Development ; Internet programming ; Struts framework ; Web site development ; Electronic books ; local
    Abstract: While the look and feel of an enterprise web application is certainly important, developers usually find themselves spending far too much time on the front-end presentation before they can get to coding the good stuff--the business logic at the heart of the program. Jakarta Struts addresses this issue by combining Java Servlets, Java ServerPages (JSP), custom tags, and messaging resources (like Java Message Service) into a unified, re-usable framework. The result is a cooperative, synergistic platform that's efficient and suitable for independent developers, large development teams, and everyone in between. The Struts Framework has become a highly popular open source project, but there's still woefully little documentation on the technology. What does exist is far too basic and lacks critical information for developers like you writing today's complex web applications. The revised and expanded Programming Jakarta Struts , 2nd Edition covers everything the successful earlier edition did--including an overview of the concepts involved in writing web applications; installation and configuration instructions for getting Struts up and running; a thorough discussion of how Struts implements the Model-View-Controller (MVC) design paradigm (known as the Model 2 approach) and how to interface with that pattern in your own applications; Logging, Validation, and Exception Handling with Struts; using Tiles; writing internationalization and localization code using Struts; and practical, real-world best practices for web applications--as well as plenty more: now fully up to date with Struts 1.1, this edition covers the latest material on tag libraries and the new JavaServerFaces (JSF) APIs and even includes all-new chapters on JSF, JSTL/EL, and security. With each enterprise system he s developed, author Chuck Cavaness has spent many grueling hours learning invaluable lessons about Struts and figuring out the dos and the don'ts of building web applications. He saves you time and headaches by sharing that invaluable real-world experience here, with his realistic, practical, here's how to do it approach to using the Struts Framework to its fullest potential.
    Note: "Building Web applications with servlets and JSPs"--cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Microsoft Exchange server ; Client/server computing ; Electronic books ; local
    Abstract: The fast-answers, on-the-go guide to administering Microsoft Exchange Server 2003. This pocket-sized reference features concise tables, listings, and step-by-step instructions for concise, accurate answers on the spot.
    Note: "Body Part No. X09-99961.". - Includes index. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxi, 276 p. , ill. ; , 25 cm
    DDC: 005.4'3765
    Keywords: Mac OS (Computer file) ; User interfaces (Computer systems) ; Electronic books ; local
    Abstract: Modding Mac OS X isn't about cutting up your Power Mac's case with a saws-all; it's about modifying Mac OS X's user interface and unlocking secrets and dispelling your fears of the Unix command line so you can take command of your Mac. Modding Mac OS X starts out with the very basics of showing you how to configure your Mac and do simple things like change Finder views, use an image from iPhoto's library on your desktop, and how to find and use screen savers. From there, Modding Mac OS X shows you how to: Find hidden features in your favorite applications Dive inside application bundles to find hidden resources Change application and system-wide keyboard shortcuts Work with the Property List Editor to read and edit property list files Wrap your head around the defaults command to tweak an application's settings Hack on NIB files to change an application's interface Control an application with AppleScript, even if it isn't scriptable Each Modding example includes detailed step-by-step instructions that even a novice Mac user can follow, while also providing the necessary detail to satisfy the experienced hacker. The knowledge you gain from tweaking one application can be easily applied to the next. So go on, empower your inner Mac geek. You know you want to.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 350 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: Internet programming ; PHP (Computer program language) ; Electronic books ; local
    Abstract: PHP has gained a following among non-technical web designers who need to add interactive aspects to their sites. Offering a gentle learning curve, PHP is an accessible yet powerful language for creating dynamic web pages. As its popularity has grown, PHP's basic feature set has become increasingly more sophisticated. Now PHP 5 boasts advanced features--such as new object-oriented capabilities and support for XML and Web Services--that will please even the most experienced web professionals while still remaining user-friendly enough for those with a lower tolerance for technical jargon.If you've wanted to try your hand at PHP but haven't known where to start, then Learning PHP 5 is the book you need. If you've wanted to try your hand at PHP but haven't known where to start, then Learning PHP 5 is the book you need. With attention to both PHP 4 and the new PHP version 5, it provides everything from a explanation of how PHP works with your web server and web browser to the ins and outs of working with databases and HTML forms. Written by the co-author of the popular PHP Cookbook , this book is for intelligent (but not necessarily highly-technical) readers. Learning PHP 5 guides you through every aspect of the language you'll need to master for professional web programming results. This book provides a hands-on learning experience complete with exercises to make sure the lessons stick. Learning PHP 5 covers the following topics, and more: How PHP works with your web browser and web server PHP language basics, including data, variables, logic and looping Working with arrays and functions Making web forms Working with databases like MySQL Remembering users with sessions Parsing and generating XML Debugging Written by David Sklar, coauthor of the PHP Cookbook and an instructor in PHP, this book offers the ideal classroom learning experience whether you're in a classroom or on your own. From learning how to install PHP to designing database-backed web applications, Learning PHP 5 will guide you through every aspect of the language you'll need to master to achieve professional web programming results.
    Note: "A pain-free introduction to building interactive web sites"--Cover. - 1st ed., 2004. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 427 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.4/32
    Keywords: Berkeley BSD (Computer file) ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, BSD also offers plenty of fertile ground for creative, time-saving tweaks and tricks, and yes, even the chance to have some fun."Fun?" you ask. Perhaps "fun" wasn't covered in the manual that taught you to install BSD and administer it effectively. But BSD Hacks , the latest in O'Reilly's popular Hacks series, offers a unique set of practical tips, tricks, tools--and even fun--for administrators and power users of BSD systems. BSD Hacks takes a creative approach to saving time and getting more done, with fewer resources. You'll take advantage of the tools and concepts that make the world's top Unix users more productive. Rather than spending hours with a dry technical document learning what switches go with a command, you'll learn concrete, practical uses for that command.The book begins with hacks to customize the user environment. You'll learn how to be more productive in the command line, timesaving tips for setting user-defaults, how to automate long commands, and save long sessions for later review. Other hacks in the book are grouped in the following areas: Customizing the User Environment Dealing with Files and Filesystems The Boot and Login Environments Backing Up Networking Hacks Securing the System Going Beyond the Basics Keeping Up-to-Date Grokking BSD If you want more than your average BSD user--you want to explore and experiment, unearth shortcuts, create useful tools, and come up with fun things to try on your own-- BSD Hacks is a must-have. This book will turn regular users into power users and system administrators into super system administrators.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley Professional | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Praise for Tom Patterson's Mapping Security "Tom Patterson captures a compelling and practical view of security in a multinational environment. Your CSO needs to read this book!" -Dr. Vint Cerf, senior vice president of Technology Strategy at MCI and founder of Internet Protocol (IP) "The power of the Internet is that it's a global network, seamlessly crossing borders. But it also brings security risks that can cross borders just as easily. Patterson has more than a decade of first-hand experience in defending against such risks and it shows. He uses real-world examples and stories, many from his own career, and offers clear, action-oriented descriptions of the different threats and how to deal with them. This book avoids security jargon and speaks directly to businesspeople around the globe." -Chris Anderson, Editor in Chief, Wired Magazine Whether consumers or global giants, we all need to be spending a greater share of our budgets on security. The threats are greater than ever and increasing daily, and yet there is a challenge as to how to justify the expenditure. Mapping Security offers business-oriented and in-depth thinking on how and why to build security into the fabric of the organization. After reading Tom Patterson's book, you will want to make changes with a sense of urgency. -John R Patrick, president of Attitude LLC and former vice president of Internet Technology at IBM Corporation As companies of all sizes go global in their search for profit and growth, they will need to understand how to use security as a tool for success in different markets, and Mapping Security shows them how. -Dr. Craig Fields, former director of Advanced Research Projects Agency (ARPA) for the U.S. Government The Definitive Guide to Effective Security in Complex Global Markets Companies are global today and have complex security supply chains, out-sourced operations, and customer relationships that span the world. Today, more than ever, companies must protect themselves against unprecedented threats, understand and adhere to a global mosaic of regulations, and leverage security to enable today's business realities. In Mapping Security, global security expert Tom Patterson shows how to meet these challenges by presenting security best practices, rules, and customs for virtually every country where you do business. Writing for executives, business managers, security professionals, and consultants, Patterson offers an exceptionally thorough and authoritativ...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley Professional | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: Second ed.
    Keywords: Electronic books ; local
    Abstract: "One of the great things about the book is the way the authors explain concepts very simply using analogies rather than programming examples-this has been very inspiring for a product I'm working on: an audio-only introduction to OOP and software development." -Bruce Eckel "...I would expect that readers with a basic understanding of object-oriented programming and design would find this book useful, before approaching design patterns completely. Design Patterns Explained complements the existing design patterns texts and may perform a very useful role, fitting between introductory texts such as UML Distilled and the more advanced patterns books." -James Noble Leverage the quality and productivity benefits of patterns-without the complexity! Design Patterns Explained, Second Edition is the field's simplest, clearest, most practical introduction to patterns. Using dozens of updated Java examples, it shows programmers and architects exactly how to use patterns to design, develop, and deliver software far more effectively. You'll start with a complete overview of the fundamental principles of patterns, and the role of object-oriented analysis and design in contemporary software development. Then, using easy-to-understand sample code, Alan Shalloway and James Trott illuminate dozens of today's most useful patterns: their underlying concepts, advantages, tradeoffs, implementation techniques, and pitfalls to avoid. Many patterns are accompanied by UML diagrams. Building on their best-selling First Edition, Shalloway and Trott have thoroughly updated this book to reflect new software design trends, patterns, and implementation techniques. Reflecting extensive reader feedback, they have deepened and clarified coverage throughout, and reorganized content for even greater ease of understanding. New and revamped coverage in this edition includes Better ways to start "thinking in patterns" How design patterns can facilitate agile development using eXtreme Programming and other methods How to use commonality and variability analysis to design application architectures The key role of testing into a patterns-driven development process How to use factories to instantiate and manage objects more effectively The Object-Pool Pattern-a new pattern not identified by the "Gang of Four" New study/practice questions at the end of every chapter Gentle yet thorough, this book assumes no patterns experience whatsoever. It's the ideal "first book" on patterns, and a per...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 637 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: In an ideal world, an operating system would do its job in the background, while you did yours in the foreground. In reality, though, operating systems often get in the way, fouling up the process at the most inopportune times. And Windows XP is no exception.O'Reilly's popular series for customizing and troubleshooting Windows once again comes to the rescue with Windows XP Annoyances for Geeks . Offering dozens of on-target tips, workarounds, and warnings, Windows XP Annoyances for Geeks allows users to improve their overall experience with the Windows XP operating system in every way possible.You'll learn how to use the Registry Editor; how to customize the interface beyond Microsoft's own intentions; and how to master Windows' built-in networking capabilities, including advanced technologies such as Internet Connection sharing, Remote Desktop sharing, and virtual private networking. And now, with this updated edition, you can also expect detailed coverage of the newly released Service Pack 2 (SP2) technology.SP2 is designed to make your work with the Windows XP operating system even easier and safer by providing superior protection against viruses, hackers, and worms. Among the core SP2 components covered in Windows XP Annoyances for Geeks are Windows Firewall, Pop-up Blocker for Internet Explorer, and the new Windows Security Center.David Karp, veteran author of several titles in the Windows Annoyances series, is behind the wheel of this comprehensive guide, as well. Karp points out numerous SP2-related quirks and unaccountable behaviors that are guaranteed to increase your level of perplexity and frustration. By recognizing these shortcomings, Windows XP Annoyances for Geeks arms you with the knowledge to overcome them.Karp leaves no stone unturned in providing the ultimate resource for the ever-expanding Windows XP market. As a result, you'll be able to seize complete control of the Windows XP operating system--instead of the other way around.
    Note: "Covers service pack 2"--Cover. - "Tips, secrets and solutions"--Cover. - First ed. entitled: Windows XP annoyances. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 278 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: C# (Computer program language) ; Compilers (Computer programs) ; Microsoft .NET Framework ; Open source software ; Electronic books ; local
    Abstract: The Mono Project is the much talked-about open source initiative to create a Unix implementation of Microsoft's .NET Development Framework. Its purpose is to allow Unix developers to build and deploy cross-platform .NET applications. The project has also sparked interest in developing components, libraries and frameworks with C#, the programming language of .NET. The controversy? Some say Mono will become the preferred platform for Linux development, empowering Linux/Unix developers. Others say it will allow Microsoft to embrace, extend, and extinguish Linux. The controversy rages on, but--like many developers--maybe you've had enough talk and want to see what Mono is really all about. There's one way to find out: roll up your sleeves, get to work, and see what you Mono can do. How do you start? You can research Mono at length. You can play around with it, hoping to figure things out for yourself. Or, you can get straight to work with Mono: A Developer's Notebook --a hands-on guide and your trusty lab partner as you explore Mono 1.0. Light on theory and long on practical application, Mono: A Developer's Notebook bypasses the talk and theory, and jumps right into Mono 1.0. Diving quickly into a rapid tour of Mono, you'll work through nearly fifty mini-projects that will introduce you to the most important and compelling aspects of the 1.0 release. Using the task-oriented format of this new series, you'll learn how to acquire, install, and run Mono on Linux, Windows, or Mac OS X. You'll work with the various Mono components: Gtk#, the Common Language Runtime, the class libraries (both .NET and Mono-provided class libraries), IKVM and the Mono C# compiler. No other resource will take you so deeply into Mono so quickly or show you as effectively what Mono is capable of. The new Developer's Notebooks series from O'Reilly covers important new tools for software developers. Emphasizing example over explanation and practice over theory, they focus on learning by doing--you'll get the goods straight from the masters, in an informal and code-intensive style that suits developers. If you've been curious about Mono, but haven't known where to start, this no-fluff, lab-style guide is the solution.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 343 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 332.178
    Keywords: PayPal (Firm) ; Electronic commerce ; Electronic funds transfers ; Electronic books ; local
    Abstract: If you've bought or sold items through eBay, or through hundreds of other online sites, then you're familiar with PayPal, the online payment service. With PayPal, a valid email address, and a credit card or bank account, you can easily send and receive payments online. Not a bank or financial institution itself, PayPal describes its service as one that builds on the financial infrastructure of bank accounts and credit cards, and using advanced propriety fraud prevention systems, creates a safe, global, real-time payment solution. Put simply, PayPal provides the means for people to conduct financial transactions online, instantly and securely.But there's more to PayPal than meets the eye. PayPal Hacks shows you how to make the most of PayPal to get the most out of your online business or transactions. Authors Shannon Sofield of Payloadz.com and PayPal evangelist David Nielsen guide you through the rigors of using and developing with PayPal. Whether you're building an ecommerce site using PayPal as a transaction provider, or simply trying to pay for an eBay auction without getting burned, PayPal Hacks will give you the skinny on this leading global online payment service.The collection of tips and tricks in PayPal Hacks shows you how to find or even build the right tools for using PayPal to buy and sell on eBay or as a transaction provider for ecommerce on your own site. Written for all PayPal users, from those just starting out to those developing sophisticated ecommerce sites, this book begins with the basics such as setting up your account, then moves quickly into specific tips and tools for buyers, sellers, and developers.With PayPal Hacks, you can: Learn extra steps to help protect yourself while buying or selling on eBay Save time and money with advanced tips and undocumented features Learn dozens of easy-to-follow procedures to help you request and receive payments and fill orders Use PayPal to handle subscriptions, affiliate systems, and donations Create and customize your customers' checkout process Effortlessly integrate PayPal's shopping cart system into your own website Implement digital fulfillment with Instant Payment Notification (IPN) and Payment Data Transfer (PDT) Develop and distribute ecommerce applications with the PayPal API Each hack consists of a task to be accomplished or a creative solution to a problem, presented in a clear, logical, and task-oriented format. PayPal Hacks provides the tools and details necessary to ma...
    Note: "100 industrial-strength tips & tools"--Cover. - Includes bibliographical references (p. xx-xxi) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 460 p. , ill. ; , 23 cm
    DDC: 005.72
    Keywords: XML (Document markup language) ; Electronic books ; local
    Abstract: Developers and system administrators alike are uncovering the true power of XML, the Extensible Markup Language that enables data to be sent over the Internet from one computer platform to another or one application to another and retain its original format. Flexible enough to be customized for applications as diverse as web sites, electronic data interchange, voice mail systems, wireless devices, web services, and more, XML is quickly becoming ubiquitous. XML Hacks is a roll-up-your-sleeves guide that distills years of ingenious XML hacking into a complete set of practical tips, tricks, and tools for web developers, system administrators, and programmers who want to go far beyond basic tutorials to leverage the untapped power of XML.With plenty of useful real-world projects that illustrate how to define, read, create, and manipulate XML documents, XML Hacks shows readers how to put XML's power to work on the Internet and within productivity applications. Each Hack in this book can be read easily in a few minutes, saving programmers and administrators countless hours of searching for the right answer. And this is an O'Reilly Hacks book, so it's not just practical, imminently useful, and time-saving. It's also fun.From Anatomy of an XML Document to Exploring SOAP Messages XML Hacks shows you how to save time and accomplish more with fewer resources. If you want much more than the average XML user--to explore and experiment, do things you didn't know you could do with XML, discover clever shortcuts, and show off just a little--this invaluable book is a must-have.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    San Jose, CA : Adobe | Boston, MA :Safari,
    Language: English
    Pages: ix, 690 p. , ill. (some col.) ; , 24 cm. +
    DDC: 006.6/86
    Keywords: Adobe Photoshop ; Computer graphics ; Electronic books ; local
    Abstract: Photoshop is one of those programs that's so cool you just want to dive right in and start creating--but by plunging in head-first, without any guidance, you're likely to miss a lot. There's a solution: With this book, you learn by doing, getting your feet wet immediately as you progress through a series of hands-on projects that build on your growing Photoshop knowledge. Simple step-by-step instructions, review questions at the end of each chapter, and a companion CD with all of the book's project files make learning a breeze as the Adobe Creative Team takes you on a self-paced tour of the image-editing powerhouse. Completely revised to cover all of Photoshop CS's new features (including a new file browser, nonsquare pixel support, Layer comps for creating design variations, and more), the book starts with an introductory tour of the software and then progresses on through lessons on everything from Photoshop's interface to more complex topics like color management, Web graphics, and photo retouching.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Language: English
    Pages: xxx, 337 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 004.36
    Keywords: Computer architecture ; Information technology ; Middleware ; Electronic books ; local
    Abstract: The challenges of designing, building, and maintaining large-scale, distributed enterprise systems are truly daunting. Written by and for IT professionals, IT Architectures and Middleware, Second Edition, will help you rise above the conflicts of new business objectives, new technologies, and vendor wars, allowing you to think clearly and productively about the particular challenges you face. This book focuses on the essential principles and priorities of system design and emphasizes the new requirements emerging from the rise of e-commerce and distributed, integrated systems. It offers a concise overview of middleware technology alternatives and distributed systems. Numerous increasingly complex examples are incorporated throughout, and the book concludes with some short case studies. Topics covered include: Middleware technology review Key principles of distributed systems: resiliency, performance and scalability, security, and systems management Information access requirements and data consistency Application integration design Recasting existing applications as services In this new edition, with updates throughout, coverage has been expanded to include: Service-oriented architecture concepts Web services and .NET technology A more structured approach to system integration design
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Pearson/Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xvii, 152 p. , ill. ; , 23 cm
    DDC: 158
    Keywords: Conduct of life ; Electronic books ; local
    Abstract: "Orloff and Levinson guide us in how to actively take control of what we cancontrol with concrete strategies, mindfulness, and respect for ourselves." --EDMUND C. NEUHAUS, Ph.D., HARVARD MEDICAL SCHOOL AND MCLEAN HOSPITAL Life out of balance? Stop worrying about it. Start fixing it. Discover what you're already doing right...and how to do more of it. Start taking small steps in the right direction...right this minute. No more fuzzy thinking. No more blame. No more feeling sorry for yourself. This book's solution-focused strategies will energize you, invigorate you,help you get beyond burnout to balance and on to the life you've always wanted. "The bewildering pace in which we live today seems contrary to a healthy rate of human development. Those in the know will come to an 'age of reconciliation' where we will create a balance between ourselves and other aspects of our lives, be it job, marriage, finances, or spirituality. Walking the Tightrope provides a stepwise guide to this change. The authors gently, through their own self disclosure, support the reader in a realistic commitment to a balance of the 'self.'" --Dr. Phil Heller, Clinical and Forensic Psychologist "In their new book, Walking the Tightrope, Erica Orloff and Kathy Levinson are daring high wire artists who offer hope on a rope by helping us put the balance back into our three-ring circus lives. They show us how to map success and to chart life courses that are fulfilling and dynamic." --Ronald J. Chenail, Ph.D., Assistant to the President for Academic Affairs, Nova Southeastern University "What a large, therapeutic journey to capture life and its core . . . the authors' personal vignettes of the numerous 'insane Kodak moments' we all share has given me room to breathe anew. I am comforted knowing my journey for balance is a shared world view." --Marcy Sirkin, Ph.D., Family Therapist
    Note: Includes bibliographical references (p. 147) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xx, 536 p. , ill. ; , 24 cm
    DDC: 006.7/4
    Keywords: Computer architecture ; Web services ; XML (Document markup language) ; Electronic books ; local
    Abstract: Web services is the integration technology preferred by organizations implementing service-oriented architectures. I would recommend that anybody involved in application development obtain a working knowledge of these technologies, and I'm pleased to recommend Erl's book as a great place to begin. -Tom Glover, Senior Program Manager, Web Services Standards, IBM Software Group, and Chairman of the Web Services Interoperability Organization (WS-I). An excellent guide to building and integrating XML and Web services, providing pragmatic recommendations for applying these technologies effectively. The author tackles numerous integration challenges, identifying common mistakes and providing guidance needed to get it right the first time. A valuable resource for understanding and realizing the benefits of service-oriented architecture in the enterprise. -David Keogh, Program Manager, Visual Studio Enterprise Tools, Microsoft. Leading-edge IT organizations are currently exploring second generation web service technologies, but introductory material beyond technical specifications is sparse. Erl explains many of these emerging technologies in simple terms, elucidating the difficult concepts with appropriate examples, and demonstrates how they contribute to service-oriented architectures. I highly recommend this book to enterprise architects for their shelves. -Kevin P. Davis, Ph. D., Software Architect. Service-oriented integration with less cost and less risk The emergence of key second-generation Web services standards has positioned service-oriented architecture (SOA) as the foremost platform for contemporary business automation solutions. The integration of SOA principles and technology is empowering organizations to build applications with unprecedented levels of flexibility, agility, and sophistication (while also allowing them to leverage existing legacy environments). This guide will help you dramatically reduce the risk, complexity, and cost of integrating the many new concepts and technologies introduced by the SOA platform. It brings together the first comprehensive collection of field-proven strategies, guidelines, and best practices for making the transition toward the service-oriented enterprise. Writing for architects, analysts, managers, and developers, Thomas Erl offers expert advice for making strategic decisions about both immediate and long-term integration issues. Erl addresses a broad spectrum of integration challenges, covering...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PIR | Boston, MA :Safari,
    Language: English
    Pages: xviii, 665 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 621.382/2
    Keywords: Signal processing ; Digital techniques ; Electronic books ; local
    Abstract: Amazon.com's top-selling DSP book for 5 straight years-now fully updated! Real-world DSP solutions for working professionals! Understanding Digital Signal Processing, Second Edition is quite simply the best way for engineers, and other technical professionals, to master and apply DSP techniques. Lyons has updated and expanded his best-selling first edition-building on the exceptionally readable coverage that made it the favorite of professionals worldwide. This book achieves the perfect balance between theory and practice, making DSP accessible to beginners without ever oversimplifying it. Comprehensive in scope and gentle in approach, keeping the math at a tolerable level, this book helps readers thoroughly grasp the basics and quickly move on to more sophisticated techniques. This edition adds extensive new coverage of quadrature signals for digital communications; recent improvements in digital filtering; and much more. It also contains more than twice as many "DSP Tips and Tricks"... including clever techniques even seasoned professionals may have overlooked. Down-to-earth, intuitive, and example-rich, with detailed numerical exercises Stresses practical, day-to-day DSP implementations and problem-solving All-new quadrature processing coverage includes easy-to-understand 3D drawings Extended coverage of IIR filters; plus frequency sampling, interpolated FIR filters New coverage of multirate systems; including both polyphase and cascaded integrator-comb FIR filters Coverage includes: periodic sampling, DFT, FFT, digital filters, discrete Hilbert transforms, sample rate conversion, quantization, signal averaging, and more
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Beijing ; : O'Reilly Media, Inc. | Boston, MA :Safari,
    Language: English
    Pages: xvii, 262 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Application software ; Development ; Client/server computing ; Computer software ; Development ; Database management ; Computer programs ; Relational databases ; Web servers ; Electronic books ; local
    Abstract: The new Oracle Application Server offers a wide range of functionality, including Java runtime and development tools, portal development tools, business intelligence, single sign-on identify management, and much more. It's so powerful and complex, in fact, that many people who use the product (or are considering using it) are familiar with only a portion of the entire range of its capabilities. The choices can be overwhelming. Few people grasp how the larger issues--such as the interplay between components or the various architectural choices in the product--play out in the Oracle Application Server. This new guide provides the perfect introduction to the Oracle Application Server for users of any level. Regardless of which of the server's capabilities you use, you'll benefit from this tightly focused, all-in-one technical overview. It's written for anyone who is concerned with using and managing web servers, doing Java development and deployment, using Oracle's own tools--like Forms and Reports, using or developing for Oracle Portal, or those who use and administer business intelligence, mobile or integration software. Divided into three concise sections, the book covers server basics, core components, and server functionality. The book leads with the history of Oracle Application Server, its architecture, management, standards, and third-party support for languages and tools such as Java, Perl, and HTTP. The next section covers Oracle's web server, containers for Java web caching, and the server's security features. And finally, the book discusses HTML development, Java development, and Oracle development. Although the book refers mainly to Oracle Application Server 10g, the authors also describe features in earlier product releases where necessary, particularly Oracle9i Application Server. More comprehensible than a large reference and more detailed than a primer, the book provides a foundation for understanding and using Oracle Application Server effectively and efficiently. Readers concentrate on the most important issues and components of the server, focusing primarily on principles rather than syntax. Designed to be the ideal first OracleAS book, Oracle Application Server 10g Essentials offers Oracle application developers and administrators everything they need to know about this powerful server.
    Note: "Architecture and components"--Cover. - Includes bibliographical references (p. 233-240) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xv, 361 p. , ill ; , 24 cm
    DDC: 005.5
    Keywords: Microsoft OneNote ; Note-taking ; Computer programs ; Electronic books ; local
    Abstract: Absolute Beginner's Guide to Microsoft Office OneNote 2003 is a from-scratch reference that helps you get up to speed quickly on this new note taking and management program. The book starts from square one, explaining what OneNote is and why you would want to buy it. The book continues to show you how to type in your first note, use the pen, organize notes, draw pictures, add audio and much more. You'll be using OneNote in no time!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que Certification | Boston, MA :Safari,
    Language: English
    Pages: xxxvi, 416 p. , ill. ; , 23 cm. +
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Electronic books ; local
    Abstract: Security is Cisco's top priority in 2003 and few other resources are available for exam preparation on this topic! Industry experts expect the CCSP to be one of the most popular certifications in 2003. The CSI exam is the fifth and final exam required to obtain a CCSP. Cisco's new security certification gives thousands of specialists an opportunity for advancement and credibility, and many will turn to Exam Cram 2 to make sure they're prepared for the exam. Features the Cram Sheet for that last minute review.
    Note: "Exam 642-541."--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: xi, 262 p. , col. ill. ; , 26 cm
    DDC: 005.5/8
    Keywords: Microsoft PowerPoint (Computer file) ; Presentation graphics software ; Electronic books ; local
    Abstract: Easy Microsoft Office PowerPoint 2003 takes the work out of learning this powerful tool by using short, easy-to-follow lessons that show you how to accomplish basic tasks quickly and efficiently! It is the perfect book for beginners who want to learn Microsoft's presentation software through a visual, full-color approach. More than 100 hands-on lessons are designed to teach the easiest, fastest, or most direct way to accomplish common PowerPoint tasks. The book is suited for new PowerPoint users, as well as those upgrading from an earlier version.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: xi, 237 p. , col. ill. ; , 26 cm
    DDC: 005.75/65
    Keywords: Microsoft Access ; Database management ; Electronic books ; local
    Abstract: Easy Microsoft Office Access 2003 takes the work out of learning this powerful database by using short, easy-to-follow lessons that show you how to accomplish basic tasks quickly and efficiently! It is the perfect book for beginners who want to learn Microsoft's database application through a visual, full-color approach. More than 100 hands-on lessons are designed to teach the easiest, fastest, or most direct way to accomplish common Access tasks. The book is suited for new Access users, as well as those upgrading from an earlier version.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    [Indianapolis, Ind.] : Que Certification | Boston, MA :Safari,
    Language: English
    Pages: xi, 416 p. , ill. ; , 23 cm. +
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Study guides ; Electronic books ; local
    Abstract: Your resource to passing the Cisco CCSP SECUR Certification Exam! Join the ranks of readers who have trusted Exam Cram 2 to their certification preparation needs! The CCSP SECUR Exam Cram 2 (Exam 642-501) is focused on what you need to know to pass the CCSP CSI exam. The Exam Cram 2 Method of Study provides you with a concise method to learn the exam topics. The book includes tips, exam notes, acronyms and memory joggers in order to help you pass the exam. Included in the CCSP SECUR Exam Cram 2: A tear-out "Cram Sheet" for last minute test preparation. Covers the current exam objectives for the 642-501 exam. The PrepLogic Practice Tests, test engine to simulate the testing environment and test your knowledge. Trust in the series that has helped many others achieve certification success - Exam Cram 2 .
    Note: "Exam 642-501."--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Enter your Java Garage ... where you do your work, not somebody else's. It's where you experiment, escape, tinker, and ultimately succeed. Java Garage is not your typical Java book. If you're tired of monotonous "feature walks" and dull tutorials, put down those other Java books and pick up Java Garage . Java guru Eben Hewitt takes a fresh look at this popular programming language, providing the insight and guidance to turn the regular programmer into a master. The style is straightforward, thought-provoking and occasionally irreverent. You'll learn the best ways to program with everything that matters: J2SE 5.0 classes, inheritance, interfaces, type conversions, event handling, exceptions, file I/O, multithreading, inner classes, Swing, JARs, etc. Hewitt provides real working code and instructions for making usable applications that you can exploit and incorporate into your own personal projects with ease. Need answers quickly? The book also includes FAQs for speedy reference and a glossary on steroids that gives you the context, not just the definition. With Java Garage , you'll learn the best way to create and finish projects with finesse. Think 'zine. Think blog. But, please, do not think of any other Java book you have ever seen.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xv, 392 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Microsoft .NET ; Electronic books ; local
    Abstract: "As usual, Keith masterfully explains complex security issues in down-to-earth and easy-to-understand language. I bet you'll reach for this book often when building your next software application." --Michael Howard, coauthor, Writing Secure Code "When it comes to teaching Windows security, Keith Brown is 'The Man.' In The .NET Developer's Guide to Windows Security, Keith has written a book that explains the key security concepts of Windows NT, Windows 2000, Windows XP, and Windows Server 2003, and teaches you both how to apply them and how to implement them in C# code. By organizing his material into short, clear snippets, Brown has made a complicated subject highly accessible." --Martin Heller, senior contributing editor at Byte.com and owner of Martin Heller & Co. "Keith Brown has a unique ability to describe complex technical topics, such as security, in a way that can be understood by mere mortals (such as myself). Keith's book is a must read for anyone attempting to keep up with Microsoft's enhancements to its security features and the next major version of .NET." --Peter Partch, principal software engineer, PM Consulting "Keith's book is a collection of practical, concise, and carefully thought out nuggets of security insight. Every .NET developer would be wise to keep a copy of this book close at hand and to consult it first when questions of security arise during application development." --Fritz Onion, author of Essential ASP.NET with Examples in C# The .NET Developer's Guide to Windows Security is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems that run on Windows Server 2003, Windows XP, and Windows 2000. Author Keith Brown crystallizes his application security expertise into 75 short, specific guidelines. Each item is clearly explained, cross-referenced, and illustrated with detailed examples. The items build on one another until they produce a comprehensive picture of what tools are available and how developers should use them. The book highlights new features in Windows Server 2003 and previews features of the upcoming version 2.0 of the .NET Framework. A companion Web site includes the source code and examples used throughout the book. Topics covered include: Kerberos authentication Access control Impersonation Network security Constrained delegation Protocol transition Securing enterprise servi...
    Note: Includes bibliographical references (p. 379-380) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xv, 339 p. , ill. ; , 24 cm
    DDC: 658.8/7
    Keywords: eBay (Firm) ; Electronic commerce ; Management ; Internet auctions ; Electronic books ; local
    Abstract: A real-world business book for the explosion of eBay entrepreneurs! Absolute Beginner's Guide to Launching an eBay Business guides you step-by-step through the process of setting up an eBay business, and offers real-world advice on how to run that business on a day-to-day basis and maximize financial success. This book covers determining what kind of business to run, writing an action-oriented business plan, establishing an effective accounting system, setting up a home office, obtaining starting inventory, arranging initial funding, establishing an eBay presence, and arranging for automated post-auction management.
    Note: "No prior eBay experience necessary!". - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: v. 〈1〉 , ill. ; , 25 cm. +
    DDC: 005.2/768
    Keywords: Microsoft .NET Framework ; Electronic books ; local
    Abstract: Edited by a Lead Program Manager on Microsoft's .NET Framework team, .NET Framework Standard Library Annotated Reference, Volume 1, is the definitive reference for the .NET Framework base class library. This book utilizes extensive annotations and code samples from the creators of the technology to move beyond the online documentation and provide .NET developers with a dictionary-style reference to the most-used parts of the Framework. This volume covers a subset of the ISO CLI Standards, including the Base Class Library and the Extended Numerics Library. In the printed book you will find informative overviews of each namespace covered and an easy-to-follow alphabetic reference of types in the standard, including type-level descriptions, sample code with output, and annotations from the design team and standardization committee. With the ECMA and ISO standards as its core, this book includes: Annotations from key members of the Microsoft design team and the Standardization committee. Comments cover everything from design rationale and history to common problems and shortcomings. An overview of each namespace, describing its functionality and the inheritance hierarchy of types it defines. Type descriptions. Each type is covered in its own chapter, with a detailed description of how the type is to be used and a quick reference of the C# declaration syntax for all members defined on the type. Also noted: which members are only available in the Microsoft implementation of the .NET Framework, which are not available in the .NET Compact Framework, and which are only available in V1.1 of the .NET Framework. Code samples. Types are illustrated by fully compilable code samples with output included. Reference tabs and an exhaustive index, which allow readers to quickly and easily navigate the text. Reusable source code for more than one thousand samples. All code has been tested with versions 1.0, 1.1, and the 2.0 technical preview of the .NET Framework, and, where appropriate, with the .NET Compact Framework.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 236 p. , ill. ; , 24 cm
    DDC: 025.04
    Keywords: Internet addresses ; Internet searching ; Search engines ; Web search engines ; Web sites ; Electronic books ; local
    Abstract: Best-selling author and research expert Tara Calishain offers her insider tips and tricks for web searching in this title from Prentice Hall PTR's Garage Series. The book begins with an in-depth look at search engines and other online tools such as browsers. It describes several principles of web searching to help you leverage the scope of the Internet to discover information. The book also covers specific topic areas of Internet searching, both domestically and internationally. Finally, Web Search Garage includes a special technical support section to teach you how to find the support solutions you need on the Internet. Specific topics covered include Search engines Browsers The principles of web searching Searching for news, jobs, and local information Finding images and audio on the web Searching for people Genealogy research Consumer help Drugs and medical information Kid-safe searching Whether you're a newbie or an Internet search guru, Web Search Garage is a valuable resource for using the Internet wisely to find the information you're looking for. Calishain's thorough explanations and examples, combined with her entertaining wit will help you fine-tune your skills and search the Internet to find convenient solutions.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 309 p. , ill. ; , 25 cm
    DDC: 004
    Keywords: Autonomic computing ; Electronic books ; local
    Abstract: Systems that install, heal, protect themselves and adapt to your needs -automatically Using autonomic computing to reduce costs, improve services, and enhance agility Autonomic components, architectures, standards, and development tools Planning for and implementing autonomic technology Current autonomic solutions from IBM and other leading companies Reducing IT costs, improving service, and enabling the "on-demand" business IT operations costs are accelerating, and today's increasingly complex architectures and distributed computing infrastructures only make matters worse. The solution: autonomic computing. Autonomic systems are self-configuring, self-healing, self-optimizing, and self-protecting. They operate intelligently and dynamically, acting on your policies and service requirements. This book presents everything IT leaders and managers need to know to prepare for autonomic computing-and to begin leveraging its benefits. Coverage includes: How autonomic computing can reduce costs, improve service levels, enhance agility, simplify management, and help deliver the "on demand" business The key elements and attributes of autonomic computing systems Current autonomic technologies from IBM and many other leading suppliers Autonomic computing architectures, open standards, development tools, and enablers Implementation considerations, including a new assessment methodology The future of autonomic computing: business opportunities and research challenges
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xvii, 291 p. , ill. ; , 23 cm
    DDC: 005.75/6
    Keywords: Oracle (Computer file) ; Relational databases ; Electronic books ; local
    Abstract: Fast, easy automation for every Oracle 9 i and 10 g DBA! Quick access to real-world examples Installation, database creation, management, monitoring, tuning, and backup/recovery Oracle Universal Installer (OUI), Oracle Net Configuration Assistant (NetCA), and Oracle Database Configuration Assistant (DBCA) The fast, practical Oracle 9 i /10 g automation reference for every DBA! Automate Oracle-and save your time for more important tasks! This is the Oracle automation reference every working Oracle DBA needs... concise, straightforward, and incredibly easy to use . Discover proven solutions for automating installation, database creation, management, monitoring, tuning, backup/recovery, and more. Keep this book by your desk, near your server...wherever you need fast, reliable automation solutions right now ! Master scripting for both Oracle 9 i and Oracle 10 g ! Use Oracle Universal Installer to create response files for automating any installation Use Oracle Network Configuration Assistant (NetCA) to configure network components during installation Use Oracle Database Configuration Assistant (DBCA) to create and clone databases, and to reverse engineer them into templates and scripts Manage files and tablespaces, tune memory, perform backup/recovery, schedule automated administration tasks, and more Extend and customize any script to your own needs Includes concise reference to Perl DBI and its Oracle-specific components-with real-world examples and syntax
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Upper Saddle River, NJ : FT Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 272 p. , ill. ; , 24 cm
    Keywords: Consumer behavior ; Psychological aspects ; Customer services ; Evaluation ; Customer services ; Quality control ; Organizational effectiveness ; Management ; Electronic books ; local
    Abstract: Good, bad, or indifferent, every customer has an experience with your company and the products or services you provide. But few businesses really manage that customer experience... so they lose the chance to transform customers into lifetime customers. In this book, Lou Carbone shows exactly how to engineer world-class customer experiences, one clue at a time. Carbone draws on the latest neuroscientific research to show how customers transform physical and emotional sensations into powerful perceptions of your business... perceptions that crystallize into attitudes that dictate everything from satisfaction to loyalty. And he explains how to assess and audit existing customer experiences, design and implement new ones... and "steward" them over time, to ensure that they remain outstanding, no matter how yourcustomers change. Experience as a value proposition Building systems that reflect your customers' deepest needs and desires The mouse vs. the orange roof Why Disney succeeded and Howard Johnson's failed The disciplines of experience management Experience assessment, auditing, designing, implementation, and more Experience stewardship for the long term Refreshing your experiences to reflect changing needs and desires Understand how your customers think and feel, and how they interact with your products and services Assess, audit, design, implement, and steward any customer experience Beyond Disney and Harley-Davidson: solutions for every industry, product, or service Customer experience is your best opportunity for differentiation... often, your only opportunity. Clued In gives you the tools to craft an outstanding customer experience--no matter what you sell, or who you sell it to. Lou Carbone reveals the sensory building blocks of experience you're already delivering toc ustomers, whether you know it or not. He shows how to re-craft these "clues" into a consistent, powerful experience that leads directly to customer preference... a preference that can help you differentiate practically anything. Carbone covers the entire process, hands-on: organizing your "experience design" team...evaluating the experience you're already delivering... designing manageable clues that connect with customer desire... rolling out new experiences... and making customer experience both sustainable and profitable. Your company needs to move from creating great products and services to creating great experiences.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall/Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xvii, 806 p. , ill. ; , 24 cm
    DDC: 005.75/85
    Keywords: SQL server ; Database management ; Electronic books ; local
    Abstract: This is the SQL reference you'll reach for first, every time! If you're an SQL programmer, you can easily picture how useful a comprehensive, single-volume Transact-SQL command reference manual would be in streamlining your work. And if that book was rich in examples, was written with users of all levels of expertise in mind, and was even designed to fit comfortably on your desktop, you'd probably buy it right away, wouldn't you? Well, look no further- Transact-SQL Desk Reference , by noted programming instructor Deac Lancaster, is exactly the book you need. As it turns out, Transact-SQL Desk Reference is just the book Deac himself was looking for. The problem was, no such book existed, so he saved programmers everywhere a lot of trouble and he wrote it himself! The book answers the question, "How exactly do I write a statement to do a particular job?" by providing the full syntax of each command along with examples showing each command in action. Then, to assist you in making your code more portable, Transact-SQL Desk Reference shows where Transact-SQL diverges from the ANSI SQL standard. The commands are arranged by functional area and are well indexed and cross-referenced, making it as easy as possible to find what you're looking for-even if you don't know the command's name. Inside, you'll find: SQL commands grouped logically by purpose and function, plus an index so you can jump right to the command Definitions that give the full syntax of each command, along with examples of each command in use plus tips on maximizing portability Additional chapters covering RDBMS concepts, details of Transact-SQL, and advanced SELECT queries! This book is intended for programmers of all levels working with Microsoft SQL Server.
    Note: Includes bibliographical references (p. 783) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    [Indianapolis, Ind.] : Que Certification | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 492 p. , ill. ; , 23 cm. +
    DDC: 004.6
    Keywords: Computer networks ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Multicasting (Computer networks) ; Examinations ; Study guides ; Packet switching (Data transmission) ; Examinations ; Study guides ; Electronic books ; local
    Abstract: Your resource to passing the Cisco CCNP BCMSN Certification Exam! Join the ranks of readers who have trusted Exam Cram 2 to their certification preparation needs! The CCNP BCMSN Exam Cram 2 (Exam 642-811) is focused on what you need to know to pass the CCNP BCMSN exam. The Exam Cram 2 Method of Study provides you with a concise method to learn the exam topics. The book includes tips, exam notes, acronyms and memory joggers in order to help you pass the exam. Included in the CCNP BCMSN Exam Cram 2: A tear-out "Cram Sheet" for last minute test preparation. Updated for the latest exam objectives to cover exam 642-811. The PrepLogic Practice Tests, test engine to simulate the testing environment and test your knowledge. Trust in the series that has helped many others achieve certification success - Exam Cram 2 .
    Note: "Exam 642-811."--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 828 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 006.7
    Keywords: BEA WebLogic server ; Application software ; Development ; Client/server computing ; Java (Computer program language) ; Web servers ; Electronic books ; local
    Abstract: BEA's WebLogic Server implements the full range of J2EE technologies, and includes many additional features such as advanced management, clustering, and web services. Widely adopted, it forms the core of the WebLogic platform, providing a stable framework for building scalable, highly available, and secure applications. In fact, in the long list of WebLogic's strengths and features, only one shortcoming stands out: the documentation that comes with the WebLogic server often leaves users clamoring for more information. WebLogic: The Definitive Guide presents a 360-degree view of the world of WebLogic. Providing in-depth coverage of the WebLogic server, the book takes the concept of "definitive" to a whole new level. Exhaustive treatment of the WebLogic server and management console answers any question that developers or administrators might think to ask. Developers will find a useful guide through the world of WebLogic to help them apply their J2EE expertise to build and manage applications. Administrators will discover all they need to manage a WebLogic-based setup. And system architects will appreciate the detailed analysis of the different system architectures supported by WebLogic, the overall organization of a WebLogic domain and supporting network infrastructure, and more. WebLogic: The Definitive Guide is divided into three sections that explore WebLogic and J2EE, Managing the WebLogic Environment, and WebLogic Enterprise APIs. Some of the topics covered in this comprehensive volume include: Building web applications on the WebLogic Server Building and optimizing RMI applications Using EJBs with WebLogic, including CMP entity beans Packaging and deploying applications Understanding WebLogic's support for clustering Performance tuning and related configuration settings Configuring WebLogic's SSL support Maximizing WebLogic's security features Building web services with XML Using WebLogic's JMX services and MBeans Anyone who has struggled with mastering the WebLogic server will appreciate the thorough, clearly written explanations and examples in this book. WebLogic: The Definitive Guide is the definitive documentation for this popular J2EE application server.
    Note: "Covers versions 7 & 8.1"--Cover. - "Development, deployment & maintenance"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 283 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Business ; Computer programs ; Electronic spreadsheets ; Electronic books ; local
    Abstract: If you think that getting creative with Excel means the underhanded tweaking of numbers, think again. Excel Hacks shows even the most experienced users how to do things with Excel they might never have thought of doing--and lets them have a little fun while they're at it.Microsoft Excel is not just the dominant spreadsheet in the world; it's also one of the most popular applications ever created. Its success lies not only in its power and flexibility, but also in its streamlined, familiar interface that casually conceals its considerable capabilities. You don't need to know everything that Excel can do in order to use it effectively, but if you're like the millions of Excel power users looking to improve productivity, then Excel Hacks will show you a wide variety of Excel tasks you can put to use, most of which are off the beaten path.With this book, Excel power users can bring a hacker's creative approach to both common and uncommon Excel topics--"hackers" in this sense being those who like to tinker with technology to improve it. The "100 Industrial Strength Tips and Tools" in Excel Hacks include little known "backdoor" adjustments for everything from reducing workbook and worksheet frustration to hacking built-in features such as pivot tables, charts, formulas and functions, and even the macro language.This resourceful roll-up-your-sleeves guide is for intermediate to advanced Excel users eager to explore new ways to make Excel do things--from data analysis to worksheet management to import/export--that you never thought possible. Excel Hacks will help you increase productivity with Excel and give you hours of "hacking" enjoyment along the way.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Beijing ; : O'Reilly Media, Inc. | Boston, MA :Safari,
    Language: English
    Pages: xii, 297 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.26/8
    Keywords: Linux ; Operating systems (Computers) ; Wireless communication systems ; Electronic books ; local
    Abstract: In Linux Unwired , you'll learn the basics of wirelesscomputing, from the reasons why you'd want to go wireless in thefirst place, to setting up your wireless network or accessingwireless data services on the road. The book provides a completeintroduction to all the wireless technologies supported by Linux.You'll learn how to install and configure a variety of wirelesstechnologies to fit different scenarios, including an office orhome network and for use on the road. You'll also learn how to getWi-Fi running on a laptop, how to use Linux to create your ownaccess point, and how to deal with cellular networks, Bluetooth,and Infrared. Other topics covered in the book include: Connecting to wireless hotspots Cellular data plans you can use with Linux Wireless security, including WPA and 802.1x Finding and mapping Wi-Fi networks with kismet and gpsd Connecting Linux to your Palm or Pocket PC Sending text messages and faxes from Linux through yourcellular phone Linux Unwired is a one-stop wireless information source foron-the-go Linux users. Whether you're considering Wi-Fi as asupplement or alternative to cable and DSL, using Bluetooth tonetwork devices in your home or office,or want to use cellular dataplans for access to data nearly everywhere, this book will show youthe full-spectrum view of wireless capabilities of Linux, and howto take advantage of them.
    Note: "A complete guide to wireless configuration"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 531 , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 486 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 006.7/4
    Keywords: XML (Document markup language) ; Electronic books ; local
    Abstract: As developers know, the beauty of XML is that it is extensible, even to the point that you can invent new elements and attributes as you write XML documents. Then, however, you need to define your changes so that applications will be able to make sense of them and this is where XML schema languages come into play. RELAX NG (pronounced relaxing), the Regular Language Description for XML Core--New Generation is quickly gaining momentum as an alternative to other schema languages. Designed to solve a variety of common problems raised in the creation and sharing of XML vocabularies, RELAX NG is less complex than The W3C's XML Schema Recommendation and much more powerful and flexible than DTDs.RELAX NG is a grammar-based schema language that's both easy to learn for schema creators and easy to implement for software developers In RELAX NG , developers are introduced to this unique language and will learn a no-nonsense method for creating XML schemas. This book offers a clear-cut explanation of RELAX NG that enables intermediate and advanced XML developers to focus on XML document structures and content rather than battle the intricacies of yet another convoluted standard. RELAX NG covers the following topics in depth: Introduction to RELAX NG Building RELAX NG schemas using XML syntax Building RELAX NG schemas using compact syntax, an alternative non-XML syntax Flattening schemas to limit depth and provide reusability Using external datatype libraries with RELAX NG W3C XML Schema regular expressions Writing extensible schemas Annotating schemas Generating schemas form different sources Determinism and datatype assignment and much more.If you're looking for a schema language that's easy to use and won't leave you in a labyrinth of obscure limitations, RELAX NG is the language you should be using. And only O'Reilly's RELAX NG gives you the straightforward information and everything else you'll need to take advantage of this powerful and intelligible language.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xviii, 605 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Keywords: Business ; Computer programs ; XML (Document markup language) ; Electronic books ; local
    Abstract: "This volume offers relentlessly pragmatic solutions to help your business applications get the most out of XML, with a breezy style that makes the going easy. Mike has lived this stuff; he has a strong command of the solutions and the philosophy that underlies them." --Eve Maler, XML Standards Architect, Sun Microsystems Businesses running legacy applications that do not support XML can face a tough choice: Either keep their legacy applications or switch to newer, XML-enhanced applications. XML presents both challenges and opportunities for organizations as they struggle with their data. Does this dilemma sound familiar? What if you could enable a legacy application to support XML? You can. In Using XML with Legacy Business Applications, e-commerce expert Michael C. Rawlins outlines usable techniques for solving day-to-day XML-related data exchange problems. Using an easy-to-understand cookbook approach, Rawlins shows you how to build XML support into legacy business applications using Java and C++. The techniques are illustrated by building converters for legacy formats. Converting CSV files, flat files, and X12 EDI to and from XML will never be easier! Inside you'll find: A concise tutorial for learning to read W3C XML schemas An introduction to using XSLT to transform between different XML formats Simple, pragmatic advice on transporting XML documents securely over the Internet For developers working with either MSXML with Visual C++ or Java and Xerces: See Chapter 3 for a step-by-step guide to enabling existing business applications to export XML documents See Chapter 2 for a step-by-step guide to enabling existing business applications to import XML documents See Chapter 5 for code examples and tips for validating XML documents against schemas See Chapter 12 for general tips on building commerce support into an application For end users who need a simple and robust conversion utility: See Chapter 7 for converting CSV files to and from XML See Chapter 8 for converting flat files to and from XML See Chapter 9 for converting X12 EDI to and from XML See Chapter 11 for tips on how to use these techniques together for complex format conversions The resource-filled companion Web site (www.rawlinsecconsulting.com/booksupplement) includes executable versions of the utilities described in the book, full source code in C++ and Java, XSLT stylesheets, bug fixes, sample input and output files, and more. 0321154940B07142003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 312 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Perl (Computer program language) ; Electronic books ; local
    Abstract: Bring new power, performance, and scalability to your existing Perl code! Cure whatever ails your Perl code! Maintain, optimize, and scale any Perl software... whether you wrote it or not Perl software engineering best practices for enterprise environments Includes case studies and code in a fun-to-read format Today's Perl developers spend 60-80% of their time working with existing Perl code. Now, there's a start-to-finish guide to understanding that code, maintaining it, updating it, and refactoring it for maximum performance and reliability. Peter J. Scott, lead author of Perl Debugged, has written the first systematic guide to Perl software engineering. Through extensive examples, he shows how to bring powerful discipline, consistency, and structure to any Perl program-new or old. You'll discover how to: Scale existing Perl code to serve larger network, Web, enterprise, or e-commerce applications Rewrite, restructure, and upgrade any Perl program for improved performance Bring standards and best practices to your entire library of Perl software Organize Perl code into modules and components that are easier to reuse Upgrade code written for earlier versions of Perl Write and execute better tests for your software...or anyone else's Use Perl in team-based, methodology-driven environments Document your Perl code more effectively and efficiently If you've ever inherited Perl code that's hard to maintain, if you write Perl code others will read, if you want to write code that'll be easier for you to maintain, the book that comes to your rescue is Perl Medic. If you code in Perl, you need to read this book.-Adam Turoff, Technical Editor, The Perl Review. Perl Medic is more than a book. It is a well-crafted strategy for approaching, updating, and furthering the cause of inherited Perl programs.-Allen Wyke, co-author of several computer books including JavaScript Unleashed and Pure JavaScript. Scott's explanations of complex material are smooth and deceptively simple. He knows his subject matter and his craft-he makes it look easy. Scott remains relentless practical-even the 'Analysis' chapter is filled with code and tests to run.-Dan Livingston, author of several computer books including Advanced Flash 5: Actionscript in Action
    Note: Includes bibliographical references (p. 303-306) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Language: English
    Pages: p. cm
    DDC: 005.1/2
    Keywords: Computer software ; Development ; Software patterns ; Electronic books ; local
    Abstract: Design patterns are immensely powerful, but to build large-scale robust systems, you need more. Pattern-Oriented Analysis and Design introduces a methodology for "composing" proven design patterns into reliable, robust large-scale software systems. Using POAD, you can quickly build systems that are far more robust, scalable, and maintainable-using UML class diagrams as your building blocks. POAD: What it is, how it works, and what problems it solves Structural and behavioral approaches to design pattern composition Design models and UML techniques for pattern composition POAD processes: in depth coverage of analysis, design, and design refinement A systematic process to compose design patterns 4 chapter-length case studies: feedback control, customer behavior simulation, digital content processing, and distributed medical informatics Building on POAD: advanced trends and research Pattern-Oriented Analysis and Design takes design patterns to the next level. Whether you're an architect, designer, developer, or manager, it will help you build better software systems faster.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and respond to such attacks and breaches. The Effective Incident Response Team is the first complete guide to forming and managing a Computer Incident Response Team (CIRT). In this book, system and network administrators and managers will find comprehensive information on establishing a CIRT's focus and scope, complete with organizational and workflow strategies for maximizing available technical resources. The text is also a valuable resource for working teams, thanks to its many examples of day-to-day team operations, communications, forms, and legal references. IT administrators and managers must be prepared for attacks on any platform, exploiting any vulnerability, at any time. The Effective Incident Response Team will guide readers through the critical decisions involved in forming a CIRT and serve as a valuable resource as the team evolves to meet the demands of ever-changing vulnerabilities. Inside, readers will find information on: Formulating reactive or preventative operational strategy Forming, training, and marketing the CIRT Selecting penetration-testing, intrusion-detection, network-monitoring, and forensics tools Recognizing and responding to computer incidents and attacks, including unauthorized access, denial-of-service attacks, port scans, and viruses Tracking, storing, and counting incident reports and assessing the cost of an incident Working with law enforcement and the legal community Benefiting from shared resources Scrutinizing closed incidents to further prevention Offering services such as user-awareness training, vulnerability and risk assessments, penetration testing, and architectural reviews Communicating the CIRT's return on investment through management reporting 0201761750B10062003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: IEEE 802.11 (Standard) ; Wireless LANs ; Security measures ; Electronic books ; local
    Abstract: " Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards." --Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC "This is certainly the definitive text on the internals of 802.11 security!" --John Viega, founder and chief scientist, Secure Software, Inc. "This book keeps the exposition as straightforward as possible and enables you to cut through the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to make educated security decisions when purchasing or deploying WLAN." --Simon Blake-Wilson, Director of Information Security, BCI Business professionals and advanced home users are captivated by the convenience of working on wireless networks. But how can privacy and security be maintained effectively? Real 802.11 Security describes an entirely new approach to wireless LAN security based on the latest developments in Wi-Fi technology. This is the book that will show you how to establish real security within your Wi-Fi LAN. Recent developments in Wi-Fi security achieve what no amount of reconfiguration can do: They solve the problem at the source. Wi-Fi Protected Access (WPA) repairs weaknesses in existing Wi-Fi systems and is designed to allow software upgrades. The upcoming 802.11i standard will offer a much higher level of security than previously offered and will provide flexible, extremely secure solutions for future products. Real 802.11 Security addresses the theory, implementations, and reality of Wi-Fi security. It provides an overview of security issues, explains how security works in Wi-Fi networks, and explores various security and authentication protocols. The book concludes with an in-depth discussion of real-world security issues and attack tools. Written by two experts in wireless security, Jon Edney and William Arbaugh, this book shows you how to stay informed and aware when making security decisions, and what steps you can take to implement the most effective, proactive wireless security now and in the future. 0321136209B06242003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall/PTR | Boston, MA :Safari,
    Language: English
    Pages: xiv, 706 p. , ill. ; , 24 cm
    DDC: 004.67/8
    Keywords: Data transmission systems ; Information networks ; World Wide Web ; Electronic books ; local
    Abstract: Online! The Book "If you go online, see how much more you can gain, without the pain. Fascinating, fun, and delightfully written. The invaluable tool for everyone that makes you laugh out loud to read." --Scott Cook, Founder and Chairman of Intuit Software "There is only one Dvorak. He invented the idea that technology was as worth covering as news, he wrote the first gossip column on the inductry, and even has answered tech questions on call-in shows. He's the Orson Wells to Bill Gates's Kane." --William R. Hearst III, Publisher and Venture Capitalist "For 20 years or more, no one else has given us the same no-nonsense, in-your-face advice John C. Dvorak has. His expertise and influence among makers and consumers of software and hardware are legendary, as is the dry sardonic humor he brings to everything he writes about. If you want to know why you should go online and what to do once you get there, you can trust Dvorak's advice like you would trust your mother's--if Mom were intimately knowledgeable about computing, and if she could make you laugh while pointing out computing's foibles." --Ron White, author How Computers Work, 10th Anniversary Edition "Chris Pirillo is one of those original geeks, dating back to when he first brought common sense to the Help Desk. From there he's built bridges between Silicon Valley and Hollywood, landing somewhere in a conceptual San Luis Obispo--the grey area between content and technology." --Marc Canter, Founder Macromedia "This is the most practical and valuable book about the Internet you can get. A perfect reference for anyone who goes online." --Victoria Recano, "Inside Edition" "Everything you ever wanted to know about the Internet and really ought to ask. I love this book!" --Lance Ulanoff, Executive Editor PCMAG.COM "Pirillo is truly the Internet guru of our times. Hundreds of thousands of his 'Gnomie' followers can't be wrong. Online! is a Rosetta Stone, bringing the priceless, yet nearly costless, millennial treasure of the Internet to the masses. Online! is the first truly practical book about the Internet, exploring the depth of its power, without the typical techno-jargon. Online! will leave you asking how you ever got along without it." --Brett Trout author of Internet Laws Affecting Your Company and Chair of the Iowa State Bar Association Technology Committee "For hundreds of thousands of computer users, Chris Pirillo is the face of the Internet. Combining a sharp wit and the technical know...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: v. , ill. ; , 25 cm
    Edition: 3rd ed.
    Series Statement: Addison-Wesley professional computing series
    Keywords: UNIX (Computer file) ; Computer networks ; Internet programming ; Electronic books ; local
    Abstract: UNIX Network Programming, Volume 1: The Sockets Networking API, Third Edition "Everyone will want this book because it provides a great mix of practical experience, historical perspective, and a depth of understanding that only comes from being intimately involved in the field. I've already enjoyed and learned from reading this book, and surely you will too." --Sam Leffler The classic guide to UNIX networking APIs... now completely updated! To build today's highly distributed, networked applications and services, you need deep mastery of sockets and other key networking APIs. One book delivers comprehensive, start-to-finish guidance for building robust, high-performance networked systems in any environment: UNIX Network Programming, Volume 1, Third Edition. Building on the legendary work of W. Richard Stevens, this edition has been fully updated by two leading network programming experts to address today's most crucial standards, implementations, and techniques. New topics include: POSIX Single UNIX Specification Version 3 IPv6 APIs (including updated guidance on IPv6/IPv4 interoperability) The new SCTP transport protocol IPsec-based Key Management Sockets FreeBSD 4.8/5.1, Red Hat Linux 9.x, Solaris 9, AIX 5.x, HP-UX, and Mac OS X implementations New network program debugging techniques Source Specific Multicast API, the key enabler for widespread IP multicast deployment The authors also update and extend Stevens' definitive coverage of these crucial UNIX networking standards and techniques: TCP and UDP transport Sockets: elementary, advanced, routed, and raw I/O: multiplexing, advanced functions, nonblocking, and signal-driven Daemons and inetd UNIX domain protocols ioctl operations Broadcasting and multicasting Threads Streams Design: TCP iterative, concurrent, preforked, and prethreaded servers Since 1990, network programmers have turned to one source for the insights and techniques they need: W. Richard Stevens' UNIX Network Programming . Now, there's an edition specifically designed for today's challenges--and tomorrow's.
    Note: Includes bibliographical references and indexes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 426 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: JavaBeans ; Computer security ; Java (Computer program language) ; Servlets ; Web services ; Electronic books ; local
    Abstract: J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place, at the right time, and in the right way. Kumar covers every significant J2SE and J2EE security mechanism, presenting practical implementation techniques for the entire J2EE project lifecycle: analysis, design, development, deployment and operations. The book's example-rich coverage includes: Implementing cryptography with the JCA (Java Cryptography Architecture) and JCE (Java Cryptography Extension) security APIs Building PKI systems with Java: implementing X.509 certificates, Certification Authorities, Certificate Revocation Lists, and repositories Java security managers, policy files, and JAAS: implementing access control based on code origin, code signer and user credentials Securing the wire: Using SSL and the JSSE API to secure data exchange over unprotected networks Ensuring XML message integrity, authentication, and confidentiality with the standards: XML Signature & XML Encryption using the VeriSign TSIK, and Infomosaic SecureXML libraries Addressing security issues in RMI-based distributed applications Developing and deploying servlets and EJBs for authenticated and secure access Securing Web services with transport- and message-based security: SSL for transport-based and WS Security for message-based security Covering security aspects of best-of-breed products: Apache Tomcat, Apache Axis, and BEA WebLogic Server.
    Note: Includes bibliographical references (p. 413-414) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall in association with Trolltech Press | Boston, MA :Safari,
    Language: English
    Pages: xvi, 440 p. , ill. ; , 24 cm. +
    DDC: 005.4/37
    Keywords: C++ (Computer program language) ; Graphical user interfaces (Computer systems) ; Electronic books ; local
    Abstract: "...not only the best book on Qt I have ever seen, but also the best book presenting any programming framework. Every sentence appears to be carefully worded, and every chapter has a sound concept, and so does the work as a whole." --Matthias Ettrich, Trolltech's lead developer, founder of the KDE project "The 'Tao of Qt'.... The Qt system is a beautiful example of object oriented design, and the authors take advantage of this.... The authors have done an excellent job of presenting the subject in an interesting and engaging way...." --Ron McCarty, Instructor and Chair of the Department of Computer Science, Penn State Erie, The Behrend College The first official Trolltech guide to Qt 3.2 programming! Straight from Trolltech, this book covers all you need to build industrial-strength applications with Qt 3.2.x and C++--applications that run natively on Windows, Linux/Unix, Mac OS X, and embedded Linux with no source code changes! The book teaches solid Qt programming practices; it is not a rehash of the documentation. Build powerful C++ GUI applications quickly and easily Design dialogs and main windows visually and in code Learn Qt's innovative typesafe signals and slots mechanism Use layouts to create forms that automatically size and scale Create custom signals, slots, events, and controls Program the ''Qt way'' with techniques for Qt 3.2 that'll work with Qt 4 Code applications with menus, toolbars, dialogs, and drag and drop Utilize 2D and 3D graphics, multithreading, and networking Write database and XML applications Internationalize to reach foreign markets Exploit platform-specific-features like ActiveX Already using Qt or just starting out? Evaluating Qt or managing it? Building open source applications--or commercial applications? Want to develop for Windows without buying an expensive compiler? Whatever your goal, this is the only book you need!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 252 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Biometric identification ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: The complete guide to implementing biometric security solutions for your network Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application. In Biometrics for Network Security , biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems. Coverage includes: An introduction to authentication technologies and biometrics Dealing with privacy issues Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face Security concerns related to biometrics, including attempts to spoof or fake results Deployment of biometric security systems, including vendor selection and roll out procedures Real-life case studies For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!
    Note: Includes bibliographical references (p. 239-241) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Language: English
    Pages: xxi, 114 p. ; , 24 cm
    DDC: 650.1
    Keywords: Work and family ; Electronic books ; local
    Abstract: Working 24x7? Delaying life until it's too late? You have the ability stop! Having it All ... and Making it Work is a fast-paced, easy-to-use book offering you a new pathway towards managing personal life and professional life--without sacrificing either one of them. This book isn't just more whining and exhortation: it delivers specific, bite-sized, no-fluff solutions for managing your life, including crucial execution steps you can take immediately. Mills teaches you how to identify and balance what's most important to you--and give up what you don't want badly enough. He also shows how to make the balance real, not just talk; how to make career decisions that promote balance; and how to make course corrections that refine your balance over time. Mills also exposes the potentially disastrous myths and rationalizations many people use to avoid the realities of work/life imbalance--fallacies like "I'll devote all my time to work for 15 years, get rich, and then I'll pay attention to family." Mills' breakthrough work/life courses at the Harvard Business School are helping business people find the balance they're searching for. The techniques he's developed will help anyone struggling to get a grasp on the work/life balance challenge.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxxvi, 313 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Management ; Software engineering ; Electronic books ; local
    Abstract: "This book does a good job of describing the methods employed at Sprintpcs.com ... over 250 people practicing Feature Driven Development and reporting their progress to me at the monthly operations review." --Scott B. Relf, Chief Marketing Officer, Sprint PCS "A tremendous contribution to the literature in the field. This should be required reading for all development teams going forward." --John F. Yuzdepski, VP & GM, Openwave Systems A breakthrough approach to managing agile software development, Agile methods might just be the alternative to outsourcing. However, agile development must scale in scope and discipline to be acceptable in the boardrooms of the Fortune 1000. In Agile Management for Software Engineering, David J. Anderson shows managers how to apply management science to gain the full business benefits of agility through application of the focused approach taught by Eli Goldratt in his Theory of Constraints. Whether you're using XP, Scrum, FDD, or another agile approach, you'll learn how to develop management discipline for all phases of the engineering process, implement realistic financial and production metrics, and focus on building software that delivers maximum customer value and outstanding business results.Coverage includes: Making the business case for agile methods: practical tools and disciplines How to choose an agile method for your next project Breakthrough application of Critical Chain Project Management and constraint-driven control of the flow of value Defines the four new roles for the agile manager in software projects-- and competitive IT organizations Whether you're a development manager, project manager, team leader, or senior IT executive, this book will help you achieve all four of your most urgent challenges: lower cost, faster delivery, improved quality, and focused alignment with the business.
    Note: Includes bibliographical references (p. 301-313) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxv, 384 p. , ill. ; , 24 cm
    DDC: 004.6/8
    Keywords: Local area networks (Computer networks) ; Telecommunication ; Switching systems ; Electronic books ; local
    Abstract: Your first step into the world of LAN switching No LAN switching experience required Includes clear and easily understood explanations Makes learning easy Your first step to LAN switching begins here! Learn local-area network (LAN) key concepts and terminology Identify key issues involved with designing and managing a switched LAN Answer the question: do I need a hub, a bridge, or a switch? Welcome to the world of LAN switching! Network switches work by connecting network paths together and making intelligent decisions about moving traffic in a network. By keeping track of changes in the network, switches reduce congestion and improve speed. No LAN switching experience needed! LAN Switching First-Step explains the basics of LAN switching in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the key concepts behind how bridges and switches work. Whether you are looking to take your first step into a career in networking or are interested in just gaining a conversational knowledge of the technology, this book is for you!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 292 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    DDC: 004.67
    Keywords: Computer networks ; Management ; Network performance (Telecommunication) ; Electronic books ; local
    Abstract: Learn about the technologies that drive fast broadband access in the first mile and master the design of first mile access networks Understand the motivating forces behind first mile access networks and learn about the technology and business requirements for first mile access solutions Master the design of passive optical networks (PON) Build EPON solutions and differentiate them from BPON and GPON Enhance bandwidth capacity in the access area using CWDM technology Learn about and design DSL and power-line communication (PLC) networks Discover the use of WiFi in the first mile and study the subsystems involved in a WiFi solution Learn the importance of management in first mile access networks and create a business case for diverse first mile access networks First Mile Access Networks and Enabling Technologies provides a platform for showcasing first mile access technologies and associated network solutions. Using this book, you learn about the bandwidth bottleneck within the first mile and explore the resulting business prospects. Benefit from a thorough and thoughtful discussion of the business case for the first mile, which helps you approach the issue from multiple perspectives. Examine multiple access technologies, understand the diversity of solutions within this area, and take your solutions further using sound and unique management techniques. Utilize the solid and tested implementation method provided by this book to remove networking anomalies, such as the digital divide. This book helps you understand and capitalize on the market opportunity presented by the first mile. First Mile Access Networks and Enabling Technologies covers multiple technologies, protocols, and business methods and can be used to understand the growth of first mile access networks and resulting business opportunities. This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    New York : American Management Association | Boston, MA :Safari,
    Language: English
    Pages: v, 330 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    DDC: 658.4/52
    Keywords: Business presentations ; Electronic books ; local
    Abstract: Business growth is becoming increasingly dependent on partnerships, joint ventures, and other strategic alliances. Consequently, the ability of professionals to articulate their ideas well to others has become increasingly essential. How to Prepare, Stage, and Deliver Winning Presentations , now in a thoroughly updated edition, gives readers a proven and practical approach to increase their knowledge, capabilities, confidence, and success. The book provides proven, practical advice on communicating essential information when it matters most. Readers will learn how to: Make their case using persuasive supporting materials that illuminate and inspire Win over audiences with sound strategy, organization, and persuasive evidence Use visual aids using current technologies such as computer graphics, LCD projectors, and Web-interactive methods Create a positive impression through voice, language, and nonverbal impressions This is an essential book for all professionals seeking to influence decision makers, win contracts, and enhance their careers.
    Note: Rev. ed. of: How to prepare, stage, & deliver winning presentations. New and updated ed. c1993. - Includes bibliographical references (p. 317-323) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que ; | Boston, MA :Safari,
    Language: English
    Pages: 350 p. ; , 24cm
    DDC: 005.133
    Keywords: Microsoft Visual BASIC. (Computer file) ; Electronic books ; local
    Abstract: Visual Basic for Applications (VBA) is a set of tools based on the Visual Basic language. The great thing about using it to enhance Office applications is that it's easier to learn than Visual Basic and it comes with your Office license. After reading this book, the reader will be proficient in the VBA language and will have extensive knowledge of the Office 2003 Object Model. This book will cover all features of the VBA editor and show how to program some of the more useful new features in the Office 2003 applications. This book assumes no prior programming experience, so even programming novices can get up to speed quickly on the basics of the VBA language. It is very practical and offers the reader tested programs and projects that he or she can implement right away. This book reinforces the reader's learning by presenting useful, end-of-chapter pedagogical resources, including question-and-answer sessions and quizzes, as well as practical exercises that cement and extend the reader's knowledge. It explorers not only the object models of Word and Excel, but also other members of the Office 2003 suite, including PowerPoint, Access, and Outlook.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: viii, 366 p. , ill. ; , 24 cm
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Business ; Computer programs ; Electronic spreadsheets ; Electronic books ; local
    Abstract: You have learned the methods to the madness of Excel. Formulas and functions are friends instead of foes. Yet you know there's something missing that could make your job even easier. That "something" is efficient and effective data management. Managing Data with Excel is the only book on the market that focuses on just that. Learn how to efficiently move data, automate data storage and import data into worksheets and pivot tables. Case studies are included in each chapter to illustrate real-world applications of these functions. Invest your time in learning this now so that you can stop wasting your time figuring out how to work around problems.
    Note: "Applicable for versions of Microsoft Excel 97 to 2003"--P. [4] of cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Microsoft Exchange server ; Client/server computing ; Electronic books ; local
    Abstract: This comprehensive, daily-operations guide provides the hands-on information you need to install, configure, and manage Microsoft Exchange Server 2003.
    Note: Includes index. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Redmond, WA : Microsoft Press | Boston, MA :Safari,
    Language: English
    Series Statement: Step by step
    Keywords: Microsoft Project ; Project management ; Computer programs ; Electronic books ; local
    Abstract: Teach yourself how to use the latest version of Microsoft Project-one step at a time! Use easy, self-paced lessons to build exactly the skills you need to manage simple to complex projects.
    Note: Includes link to CD content. - Title from title screen. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Java (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: Bridge the gap between the Microsoft .NET Framework and Java 2 Enterprise Edition (J2EE) by implementing the best interoperability solutions available today-and by learning to build compatible solutions and workarounds of your own.
    Note: Includes index. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Keywords: Microsoft PowerPoint (Computer file) ; Business presentations ; Graphic methods ; Computer programs ; Computer graphics ; Electronic books ; local
    Abstract: Teach yourself how to use the presentation graphics capabilities in PowerPoint 2003-one step at a time! Learn how to turn your ideas into powerful presentations through easy-to-follow lessons and hands-on practice exercises.
    Note: Includes index. - Title from title screen
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: lxxviii, 908 p. , ill. ; , 24 cm. +
    Edition: 2003 ed.
    Series Statement: Step by step
    DDC: 005.369
    Keywords: Microsoft Office ; Business ; Computer programs ; Electronic books ; local
    Abstract: Build exactly the skills you need to succeed with Microsoft Office 2003-one step at a time! Self-paced lessons and exercises teach you to easily create great documents, spreadsheets, e-mail messages, slide presentations, databases, Web sites, and more.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Hands-on techniques for enabling authentication, authorization, and accounting Understand the security concepts behind the AAA framework Learn message formats, communication, and message encryption using the TACACS+ and RADIUS protocols Configure and troubleshoot AAA on Cisco routers Understand where to position and install the CSACS in your network Explore and customize the CSACS interface Configure CSACS user accounts, user groups, and shared profile components Add AAA clients and manage network connections Configure external databases and perform database replication and backup Explore the various reports and logs available in CSACS Learn how AAA models apply to service provider environments Install and configure Cisco Access Registrar As network infrastructures evolve, it is increasingly important that access to vital corporate resources is vigilantly monitored and controlled. The Cisco identity management solutions, including Cisco Secure Access Control Server (CSACS), address this requirement, enabling security, control, and administration of the growing population of users that connect to corporate networks. CSACS, an essential component of the Cisco Identity Based Networking Services (IBNS) architecture, extends access security by combining authentication, user and administrator access, and policy control from a centralized identity-networking framework. This allows greater flexibility and mobility, increased security, and user productivity gains. Cisco Access Control Security provides you with the skills needed to configure authentication, authorization, and accounting (AAA) services on Cisco devices. Separated into three parts, this book presents hard-to-find configuration details of centralized identity networking solutions. Part I provides an overview of the AAA architecture, complete with discussions of configuring Cisco routers for AAA. Part II addresses enterprise AAA management with CSACS, including installation, configuration, and management details. Part III looks at service provider AAA management with Cisco Access Registrar. Full of detailed overviews, diagrams, and step-by-step instructions for enabling essential access control solutions, Cisco Access Control Security is a practical tool that can help enforce assigned access policies and simplify user management. "This book manages the rare combination of being highly accurate and technically astute, while maintaining an easy readability and flow. It is a great guide for s...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: xi, 705 p. , ill. ; , 23 cm. +
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Join an estimated 85% of the U.S. Linux market in using Red Hat's Linux distributions by learning it from a Fedora authority. Sams Teach Yourself Red Hat Fedora 4 All in One is a starter kit that will help you install, configure, and use Red Hat's Fedora 4 distribution and desktop applications. The easy-to-understand, step-by-step instructions will also show you how to: Use the OpenOffice.org productivity suite and other leading applications. Troubleshoot hardware issues and install new components. Set up a small Linux-based network to share files and resources. Also included is a DVD, which will provide you with the complete Fedora Core Linux distribution, OpenOffice.org desktop suite, and the leading applications for e-mail, Web browsing, and graphics. Find out how you can safely and reliably use Linux and Linux-based applications to accomplish your day-to-day work in the office and at home with Sams Teach Yourself Red Hat Fedora 4 All in One .
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 1216 p. , ill. ; , 23 cm. +
    Keywords: Microsoft Internet information server ; Microsoft Windows server ; Internet ; Computer programs ; Web servers ; Electronic books ; local
    Abstract: Deploy and support Internet Information Services (IIS) 6.0 with tools and technical information-straight from the Microsoft IIS product team.
    Note: Subtitle from cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Indianapolis, IN : SAMS | Boston, MA :Safari,
    Language: English
    Pages: ix, 317 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.4/476
    Keywords: Microsoft Windows server ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Why should new versions of mission-critical technologies mean starting from scratch? If you already know how to use Microsoft Windows Server 2000 or NT, leverage those skills to quickly become an expert on Microsoft Windows Server 2003. Microsoft Windows Server 2003 Delta Guide skips the basics and moves straight to what's new and what has changed. The result? You save time and money while preparing yourself for the next generation of Microsoft Server! Skip the basic concepts and move straight to what's new and different. Focus on learning advanced new technologies, techniques, and concepts. Use topic-focused chapters to quickly upgrade the skills you use the most. See important security changes that can affect server upgrades. Master new techniques for installing, administering, and securing servers. Build headless servers using Emergency Management Services. Take advantage of powerful new Group Policy capabilities.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Indianapolis, IN : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: In a world where everything from how we take pictures to how we get our food is designed to happen as quickly and easily as possible, it can take a lot longer to learn how to make it all work behind the scenes. Theories and concepts can weigh you down when all you really want to know is how to create, design and go. That's where OpenGL SuperBible comes in. Complete with supporting figures and a CD packed with free tools, demos and libraries, OpenGL SuperBible simplifies 3D programming concepts without wasting your time with programming theory. Mac and Windows users will both find this comprehensive hands-on guide helpful as you learn to program for games, visualization applications and multi-platforms. This is the ultimate resource for any new programmer.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Sebastopol, CA : Pogue Press/O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 689 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.446
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: With the release of Windows XP Service Pack 2 (SP2), Microsoft latest and most reliable corporate desktop operating system now provides better protection against viruses, worms, and malicious hackers. SP2 includes Windows Firewall, Pop-up Blocker for Internet Explorer, and the new Windows Security Center. But it still comes without a single page of printed instructions. This superbly written guide fills the gap. Coauthored by David Pogue, New York Times technology columnist and Missing Manuals creator, Windows XP Pro: The Missing Manual uses wit, technical insight, and scrupulous objectivity to light the way for first-time and intermediate network and standalone PC users. In fact, this jargon-free book explains XP's features so clearly revealing which work well and which don't that it should have been in the box in the first place. The book reveals which features work well and which don't, such as the Remote Desktop software that enables people to connect to the office from home, the encryption file system that protects sensitive information, and the Windows Messenger that enables real-time text, voice and video communication. Contents include: Getting started . The book's early chapters cover using menus, finding lost files, reducing window clutter, and taming the new, multi-column Start menu. Mastering the network . Special chapters help you navigate the corporate network, dial in from the road, and even set up your own small-office (peer-to-peer) network, step by step. Understanding security . User accounts, file encryption, and the NTFS file system keep your private files private, while still offering network access to coworkers you specify. Flying the Net . This book demystifies Outlook Express 6 for email, Internet Explorer 6 for Web browsing, and the new Windows Messenger for voice, chat, and video conferencing. Windows XP Pro: The Missing Manual isn't for system administrators or OS theory geeks; it's for the novice or budding power user who wants to master the machine and get down to work. Yet, anyone who uses XP Pro (including hardcore techies) will find this new system much easier-- and more fun--to digest with this new Missing Manual.
    Note: "Covers service pack 2"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xxi, 433 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 006.5
    Keywords: iTunes ; Handbooks, manuals, etc ; MP3 players ; Handbooks, manuals, etc ; Music ; Data processing ; Handbooks, manuals, etc ; Pocket computers ; Handbooks, manuals, etc ; iPod (Digital music player) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Some people are content to use their iPod simply to play music. Some people want to do much more. Those people, and you know who you are,aren't satisfied until they get under the hood and tap every iPod trick available to them.They want to explore and experiment, create shortcuts, and unearth cool and unexpected things to do with their iPod that have never even occurred to their friends. Maybe they want to use their iPod to read email. Maybe they want to use it as a voice recorder, or a device to store their digital photos. Maybe they want to use iTunes visuals as a screensaver, use Java to expand iTunes functionally, or use a cheap Linux box as a server and access MP3 tunes. Or, maybe they just want to paint their iPod a custom color. For those people who want to get more much more out of their iPod iPod and iTunes Hacks is brimming with undocumented tips, tricks, and trade secrets for getting the very most from your iPod.This guide takes curious and clever iPod owners beyond the obvious with 100 ingenious hacks that will delight, entertain, and add astonishing power to the iPod and iTunes experience.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xix, 380 p. , ill. ; , 24 cm
    Keywords: Microsoft FrontPage ; Web publishing ; Web sites ; Design ; Electronic books ; local
    Abstract: Absolute Beginner's Guide to Microsoft FrontPage is written for beginning users of the software. The book assumes the reader has no prior knowledge, and teaches the reader everything from planning a site to working with text to adding graphics. By the end of this book, the reader has the confidence and knowledge to create, edit, and publish Web sites of their own.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xi, 207 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: SpamAssassin (Computer file) ; Internet ; Security measures ; Open source software ; Unsolicited electronic mail messages ; Electronic books ; local
    Abstract: The annoyance factor for individual users whose email is crammedwith pitches for pornography, absurd moneymaking schemes, anddubious health products is fierce. But for organizations, the costof spam in lost productivity and burned bandwidth is astronomical.While society is grappling with a solution to the burgeoning crisisof spam proliferation, the pressure is on system administrators tofind a solution to this massive problem in-house. And fast. Sysadmins can field scores of complaints and spend months testingsoftware suites that turn out to be too aggressive, too passive, ortoo complicated to setup only to discover that SpamAssassin (SA),the leading open source spam-fighting tool, is free, flexible,powerful, highly-regarded, and remarkably effective. The drawback?SpamAssassin's lack of published documentation. SpamAssassin by Alan Schwartz, is the only published resource devoted toSpamAssassin and how to integrate it effectively into yournetworks. This clear, concise guide clarifies the installation,configuration, and use of the SpamAssassin spam-checking system(versions 2.63 and 3.0) for Unix system administrators using thePostfix, Sendmail, Exim, or qmail mail servers, helpingadministrators make the right integration decision for theirparticular environments. It covers concrete advice on how to: Customize SpamAssassin's rules, and even create new ones TrainSpamAssassin's Bayesian classifier, a statistical engine fordetecting spam, to optimize it for the sort of email that youtypically receive Block specific addresses, hosts, and domains using third-partyblacklists like the one maintained by Spamcop.net. Whitelist known good sources of email, so that messages fromclients, coworkers, and friends aren't inadvertently lost. Configure SpamAssassin to work with newer spam-filteringmethods such as Hashcash (www.hashcash.org) and Sender PolicyFramework (SPF). Sys admins, network administrators, and ISPs pay for spam withhours of experimentation and tedious junk email management, frayeduser tempers, and their sanity. SpamAssassin, together with thisessential book, give you the tools you need to take back yourorganization's inboxes. "Detailed, accurate andinformative--recommended for spam-filtering beginners and expertsalike." --Justin Mason, SpamAssassin development team
    Note: "Covers SpamAssassin version 3.0"--Cover. - "The open source solution to SPAM"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 409 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.7/1376
    Keywords: Internet Relay Chat ; Electronic books ; local
    Abstract: IRC (Internet Relay Chat) may very well turn out to be the world's most successful hack. In 1988, Jarkko Oikarinen wrote the original IRC program at the University of Oulu, Finland. As he says in his foreword, "IRC started as one summer trainee's programming exercise. A hack grew into a software development project that hundreds of people participated in, and then became a worldwide environment where tens of thousands of people now spend time with each other. I have found many of my friends through IRC and learnt a significant part of my present software engineering knowledge while using and working with IRC. That would not have been possible without learning from code examples and hacks from others".IRC has continued to grow in popularity since its inception. Millions of people from all over the world now use IRC to chat with friends, discuss projects and collaborate on research. With a simple, clearly defined protocol, IRC has become one of the most accessible chat environments, with clients written for a multitude of operating systems. And IRC is more than just a simple chat system it is a network of intercommunicating servers, allowing thousands of clients to connect from anywhere in the world using the IRC protocol.While IRC is easy to get into and many people are happy to use it without being aware of what's happening under the hood, there are those who hunger for more knowledge, and this book is for them. IRC Hacks is a collection of tips and tools that cover just about everything needed to become a true IRC master, featuring contributions from some of the most renowned IRC hackers, many of whom collaborated on IRC, grouping together to form the channel #irchacks on the freenode IRC network (irc.freenode.net).Like all of our Hacks books, there are many different ways to use IRC Hacks . You can read the book from cover to cover, but you might be better served by picking an interesting item from the table of contents and just diving in.If you're relatively new to IRC, you should considering starting with a few hacks from each progressive chapter. Chapter 1 starts you off by showing you how to connect to IRC, while Chapter 2 acquaints you with the everyday concepts you'll need to use IRC effectively. Chapter 3 is all about users and channels, and introduces the first pieces of code. Chapter 4 shows you how to make useful enhancements to IRC clients.Chapter 5 is where you will learn the basics about creating IRC bots, with Chapters 6-...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 243 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Java (Computer program language) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Sometimes the simplest answer is the best. Many Enterprise Java developers, accustomed to dealing with Java's spiraling complexity, have fallen into the habit of choosing overly complicated solutions to problems when simpler options are available. Building server applications with "heavyweight" Java-based architectures, such as WebLogic, JBoss, and WebSphere, can be costly and cumbersome. When you've reached the point where you spend more time writing code to support your chosen framework than to solve your actual problems, it's time to think in terms of simplicity.In Better, Faster, Lighter Java , authors Bruce Tate and Justin Gehtland argue that the old heavyweight architectures are unwieldy, complicated, and contribute to slow and buggy application code. As an alternative means for building better applications, the authors present two "lightweight" open source architectures: Hibernate--a persistence framework that does its job with a minimal API and gets out of the way, and Spring--a container that's not invasive, heavy or complicated.Hibernate and Spring are designed to be fairly simple to learn and use, and place reasonable demands on system resources. Better, Faster, Lighter Java shows you how they can help you create enterprise applications that are easier to maintain, write, and debug, and are ultimately much faster.Written for intermediate to advanced Java developers, Better, Faster, Lighter Java , offers fresh ideas--often unorthodox--to help you rethink the way you work, and techniques and principles you'll use to build simpler applications. You'll learn to spend more time on what's important. When you're finished with this book, you'll find that your Java is better, faster, and lighter than ever before.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...