Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari Tech Books Online  (271)
  • Beijing ; : O'Reilly  (199)
  • Indianapolis, Ind. : New Riders  (48)
  • Upper Saddle River, NJ : Addison-Wesley  (24)
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/465
    Keywords: Macintosh (Computer) ; Software ; Operating systems (Computers) ; Software ; Electronic books ; local
    Abstract: A Step-by-Step Guide to the Xcode Mac OS Development Environment Every copy of Mac OS X comes with Xcode, the powerful development suite that Apple uses to build applications ranging from Safari to iTunes. But because Xcode is complex and subtle, even experienced Mac programmers rarely take full advantage of it. Now, Mac developer Fritz Anderson has written the definitive introduction and guide to using Xcode to build applications with any Macintosh technology or language. Anderson helps you master Xcode's powerful text editor, industry-standard gcc compiler, graphical interactive debugger, mature UI layout and object linkage editor, and exceptional optimization tools. One step at a time, you'll develop a command-line utility, then use Xcode tools to evolve it into a full-fledged Cocoa application. Anderson provides expert guidance on development frameworks, source code management, Core Data modeling, localization, and much more. Coverage includes Understanding Xcode workflow and the Mac OS X application lifecycle Porting established legacy projects into Xcode Using the Model-View-Controller design pattern to build robust graphical applications Building static libraries and working with Xcode's build system Making the most of bundles and package directories Creating applications compatible with older versions of Mac OS X Creating universal binaries to run on both Intel and PowerPC Macintoshes Adding Spotlight searchability to data files Leveraging Xcode's built-in support for unit testing Using Xcode on makefile-based UNIX development projects Step Into Xcode 's breadth, depth, and practical focus make it indispensable to every Mac developer: current Xcode users upgrading to Xcode 2.1, experienced Mac programmers migrating from CodeWarrior, UNIX/Linux programmers moving to Mac OS X, and even novices writing their first programs or scripts.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: "When it comes to software security, the devil is in the details. This book tackles the details." --Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies "McGraw's book shows you how to make the 'culture of security' part of your development lifecycle." --Howard A. Schmidt, Former White House Cyber Security Advisor "McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn't), buy this book and post it up on the lunchroom wall." --Avi Rubin, Director of the NSF ACCURATE Center; Professor, Johns Hopkins University; and coauthor of Firewalls and Internet Security Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have their basis in good software engineering and involve explicitly pondering security throughout the software development lifecycle. This means knowing and understanding common risks (including implementation bugsand architectural flaws), designing for security, and subjecting all software artifacts to thorough, objective risk analyses and testing. Software Security is about putting the touchpoints to work for you. Because you can apply these touchpoints to the software artifacts you already produce as you develop software, you can adopt this book's methods without radically changing the way you work. Inside you'll find detailed explanations of Risk management frameworks and processes Code review using static analysis tools Architectural risk analysis Penetration testing Security testing Abuse case development In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs. Now that the world agrees that software security is central to computer security, it is time to put philosophy into practice. Create your own secure development lifecycle by enhancing your existing software development lifecycle with the touchpoints described in this book. Let this expert author show you how to build more secure software by building security in.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.1
    Keywords: Microsoft Windows (Computer file) ; Computer software ; Development ; Microsoft .NET ; User interfaces (Computer systems) ; Electronic books ; local
    Abstract: "Brian Noyes' writing style easily captures your attention as he elaborates on all aspects of data binding in his book. He has a refreshingly clear and crisp delivery as he starts each chapter with a simple tour of each topic, and then leads you into practical concerns for sound practices and extensibility opportunities. Most importantly, as Brian explains approaches to data-binding architecture, patterns of usage, the value of data sets, binding controls and the rest, he always describes how he reaches his recommendations on the topic. This book is perfect for newcomers to .NET 2.0, but also for those that have some experience. Anyone who cares about data in their applications (okay, that should be almost everyone) is guaranteed to learn something new and useful by reading Brian's book." -Michele Leroux Bustamante, IDesign chief architect, Microsoft regional director, and MVP "Brian has saved me a lot of time. I'm writing The Hitchhiker's Guide to Visual Studio and SQL Server 2005 (7th Edition) and I'm not going to have to cover data binding nearly as deeply because Brian has done it for me. His book gets right to the meat of the subject and makes data binding look easy. I was also pleased to see that the book focuses on the misunderstood and under-applied Windows Forms architecture. It's a must-read for anyone trying to make their application more interactive and to leverage the new Visual Studio 2005 technology. I'm planning to point my readers to this resource when they need an in-depth treatment of data binding." -William Vaughn, president, Beta V Corporation "Data binding has finally come of age in Windows applications. Back in the Visual Studio 6.0 days, I ignored data binding completely and wrote my own repetitive code to encapsulate my business logic. With Visual Studio 2005, we finally have a robust and compelling data-binding technology. To ignore it today would make you inefficient and put you behind the curve. Brian delivers a clear and concise discussion of a core topic of development for Windows today. A combination of an easy-to-follow conversational yet technical tone, excellent examples, and solid explanations make this a must-read for any developer writing for Windows or learning to write for Windows." -Stephen Forte, chief technical officer, Corzen Inc. "This book provides a clear, readable, and in-depth treatment of data binding, with detailed discussions of best practices in the presentation and use of data. Brian c...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 006.6/86
    Keywords: OpenGL ; Computer graphics ; Electronic books ; local
    Abstract: "As the 'Red Book' is known to be the gold standard for OpenGL, the 'Orange Book' is considered to be the gold standard for the OpenGL Shading Language. With Randi's extensive knowledge of OpenGL and GLSL, you can be assured you will be learning from a graphics industry veteran. Within the pages of the second edition you can find topics from beginning shader development to advanced topics such as the spherical harmonic lighting model and more." -David Tommeraasen, CEO/Programmer, Plasma Software "This will be the definitive guide for OpenGL shaders; no other book goes into this detail. Rost has done an excellent job at setting the stage for shader development, what the purpose is, how to do it, and how it all fits together. The book includes great examples and details, and good additional coverage of 2.0 changes!" -Jeffery Galinovsky, Director of Emerging Market Platform Development, Intel Corporation "The coverage in this new edition of the book is pitched just right to help many new shader-writers get started, but with enough deep information for the 'old hands.'" -Marc Olano, Assistant Professor, University of Maryland "This is a really great book on GLSL-well written and organized, very accessible, and with good real-world examples and sample code. The topics flow naturally and easily, explanatory code fragments are inserted in very logical places to illustrate concepts, and all in all, this book makes an excellent tutorial as well as a reference." -John Carey, Chief Technology Officer, C.O.R.E. Feature Animation OpenGL® Shading Language, Second Edition , extensively updated for OpenGL 2.0, is the experienced application programmer's guide to writing shaders. Part reference, part tutorial, this book thoroughly explains the shift from fixed-functionality graphics hardware to the new era of programmable graphics hardware and the additions to the OpenGL API that support this programmability. With OpenGL and shaders written in the OpenGL Shading Language, applications can perform better, achieving stunning graphics effects by using the capabilities of both the visual processing unit and the central processing unit. In this book, you will find a detailed introduction to the OpenGL Shading Language (GLSL) and the new OpenGL function calls that support it. The text begins by describing the syntax and semantics of this high-level programming language. Once this foundation has been established, the book explores the creation and manipulation of sha...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 004.6/2
    Keywords: IS-IS (Computer network protocol) ; Open Shortest Path First (Computer network protocol) ; Electronic books ; local
    Abstract: The practical guide to large-scale networking with OSPF and IS-IS This is the definitive guide to using OSPF and IS-IS protocols in large-scale IP enterprise, carrier, and service provider networks. Well-known network designer Jeff Doyle draws on his consulting experience, offering realistic advice and straight answers on every aspect of working with link-state protocols-from scalability, reliability, and security to area design and database synchronization. This book is organized to help network engineers and architects compare OSPF and IS-IS. One feature at a time, Doyle first demonstrates how a topic or feature is implemented in OSPF, and then walks through a similar implementation using IS-IS. Professionals who are relatively new to large-scale networking will welcome his practical introduction to the concepts, goals, and history of link state protocols. Coverage includes Understanding message types, encapsulation, architecture, LSAs, and LSPs Optimizing addressing, neighbor discovery, adjacencies, and router designation Improving scalability: controlling the scope of flooding, link state database size, SPF calculation efficiency, and much more Designing and operating large-scale networks for maximum security and reliability Hardening networks to thwart attacks against routing protocols Comparing OSPF and IS-IS extensibility Utilizing extensions for MPLS-based traffic engineering, IPv6, and multi-topology routing Troubleshooting OSPF and IS-IS log entries, debug output, and LS databases Doyle's thorough explanations, end-of-chapter review questions, and many wide-ranging examples for both Cisco's IOS and Juniper's JUNOS also make this book an exceptional resource for anyone pursuing a CCIE or JNCIE certification. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    ISBN: 9780596517168 , 0596517165 , 0596005040
    Language: English
    Pages: xxxv, 816 p. , ill. ; , 24 cm
    Parallel Title: Erscheint auch als
    DDC: 384.5/35
    Keywords: Flash (Computer file) ; Mobile communication systems ; Multimedia communications ; Electronic books ; local ; Flash (Computer file) ; Mobile communication systems ; Multimedia communications ; Réseaux multimédias ; TECHNOLOGY & ENGINEERING ; Mobile & Wireless Communications ; Flash (Logiciel) ; Radiocommunications mobiles
    Abstract: With the advent of Flash Communication Server MX (FCS), Macromedia believes that it's on the edge of a breakthrough in how people think about the Internet. FCS has been designed to provide web developers with the means to add polished interactive audio and video features to their sites, the sort of features that users have come to expect. Naturally, the process of efficiently integrating rich media into applications, web sites, and web content is a complex one, to say the least. That's where Programming Flash Communication Server factors in. As the foremost reference on FCS, it helps readers understand how FCS can facilitate: Video on demand Live webcasts Video chat and messaging Shared desktop conferences Live auctions Interactive whiteboard presentations Workflow collaboration Multi-user games Programming Flash Communication Server not only explains how to use the pre-built FCS components to construct a simple application, it also explains the architecture so that developers can program custom components to make even more advanced applications. In addition, the book explains how to truly optimize performance, and talks about considerations for networked applications as well as the media issues pertaining to FCS. Programming Flash Communication Server gives developers a sorely needed leg up on this potentially intimidating technology. It lets users develop cool web applications ranging from direct dating experiences with real-time video, to pre-recorded corporate presentations, to news services with video and audio, and much more. At last, the ability to build web sites with rich interactive features--minus the complex downloads and installation hassles--is a reality. And now, with Programming Flash Communication Server from O'Reilly by your side, you can do more quickly and easily than you ever dreamed possible.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 250 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Electronic books ; local
    Abstract: "We live in a time when, perhaps surprisingly, the best printed works on C++ are just now emerging. This is one of those works. Although C++ has been at the forefront of innovation and productivity in software development for more than two decades, it is only now being fully understood and utilized. This book is one of those rare contributions that can bear repeated study by practitioners and experts alike. It is not a treatise on the arcane or academic-rather it completes your understanding of things you think you know but will bite you sooner or later until you really learn them. Few people have mastered C++ and software design as well as Steve has; almost no one has such a level head as he when it comes to software development. He knows what you need to know, believe me. When he speaks, I always listen-closely. I invite you to do the same. You (and your customers) will be glad you did." -Chuck Allison, editor, The C++ Source "Steve taught me C++. This was back in 1982 or 1983, I think-he had just returned from an internship sitting with Bjarne Stroustrup inventor of C++ at Bell Labs. Steve is one of the unsung heroes of the early days, and anything Steve writes is on my A-list of things to read. This book is an easy read and collects a great deal of Steve's extensive knowledge and experience. It is highly recommended." -Stan Lippman, coauthor of C++ Primer, Fourth Edition "I welcome the self-consciously non-Dummies approach of a short, smart book." -Matthew P. Johnson, Columbia University "I agree with the author's assessment of the types of programmers. I have encountered the same types in my experience as a developer and a book like this will go far to help bridge their knowledge gap.... I think this book complements other books, like Effective C++ by Scott Meyers. It presents everything in a concise and easy-to-read style." -Moataz Kamel, senior software designer, Motorola Canada "Dewhurst has written yet another very good book. This book should be required reading for people who are using C++ (and think that they already know everything in C++)." -Clovis Tondo, coauthor of C++ Primer Answer Book What Every Professional C++ Programmer Needs to Know-Pared to Its Essentials So It Can Be Efficiently and Accurately Absorbed C++ is a large, complex language, and learning it is never entirely easy. But some concepts and techniques must be thoroughly mastered if programmers are ever to do professional-quality work. This book cut...
    Note: Includes bibliographical references (p. 235) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxi, 793 p. , ill. (some col.) ; , 24 cm. +
    DDC: 006.696
    Keywords: Maya (Computer file) ; Computer animation ; Three-dimensional display systems ; Electronic books ; local
    Abstract: If you thought Angelina Jolie was responsible for Lara Croft's curves, think again! Long before the Hollywood actress brought the Tomb Raider heroine to life, Alias' 3D modeling software Maya was used to create the lovely Lara; Ms. Jolie simply filled in her curves! When you're ready to start creating equally compelling characters of your own, you need this comprehensive volume! In these pages, gaming-industry veteran Antony Ward uses a combination of informative narrative, hands-on tutorials, and a slew of illustrations and screen shots to show you how to use Maya to address the most complex element of game creation-developing great characters! As you follow along, Antony uses the development of two diverse characters-a female figure and a fantastical character with outrageous proportions, wings, and a demon-like face-to demonstrate the techniques involved in modeling detailing, optimizing, texturing, rigging, binding, and animating characters with Maya. The companion CD includes lesson files, scripts, an automatic rigging tool, demo software, and more!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 377 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.2/762
    Keywords: Apache (Computer file : Apache Group) ; Application software ; Development ; Java (Computer program language) ; Open source software ; Electronic books ; local
    Abstract: As a Java developer, you're always looking for tools to help in your web and application development. Maybe you've heard of the Jakarta Commons open source Java tools. The Jakarta Commons is an open source Jakarta subproject where developers create and maintain a collection of twenty-plus independent Java components and utilities that serve useful purposes. Jakarta Commons packages include utilities for web, XML, networking, building and testing applications, and some that help other packages work better together. Jakarta Commons packages are designed to be reusable. Each one is a time saver by itself, and when used in combination the results can be very powerful. But in searching for information on the Jakarta Commons tools, you find it hard to locate documentation relevant to your needs. You don't have lots of time to spend searching for information on a specific Jakarta Commons tool to determine what it does and how to incorporate it in your code. If you are looking for a single source for clear information and samples on how to use the Jakarta Commons tools, then the Jakarta Commons Cookbook is for you. The Jakarta Commons Cookbook summarizes each of the available Jakarta Commons packages and contains practical and efficient recipes for making the most out of the Jakarta Commons open source Java tools. You don't have to be an expert, since the book explains how and why to use a utility, pitfalls to avoid, and where to look for additional information on Jakarta Commons utilities. It introduces design possibilities and explores combining Jakarta Commons utilities in novel assemblies to create complex applications. The book offers detailed code samples and insider tips--making it a valuable resource whether you are an expert Java developer or a novice. If you want to quickly learn how to use Jakarta Commons timing-saving utilities or have an invaluable resource for Jakarta Commons questions and techniques, then the Jakarta Commons Cookbook is for you.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 381 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 621.389/3
    Keywords: Home entertainment systems ; Home video systems ; Stereophonic sound systems ; Electronic books ; local
    Abstract: It might be the long lines at the theater, the $4.00 for a small bag of popcorn, or the cutting-edge technology that's now so readily available to the home market. Whatever the reason, the home theater market today is booming like the soundtrack to Star Wars! Want proof? A Google search for home theater reveals over three million results. Yikes! It's simply undeniable: More and more people prefer watching their favorite movies, television shows, and videos from the comfort of their own sofas and couches. What's also undeniable is the inexperience of most people who choose to install or upgrade their home theaters. Until now, the knowledge, technique, and experiences of those who've encountered similar conditions to yours could only be accessed through laborious web searches, stacks of magazines, and water cooler conversations. Home Theater Hacks from O'Reilly is the perfect remedy for this group. A smart collection of insider tips and tricks, Home Theater Hacks covers home theater installation from start to finish, purchase to experience. Just imagine: no frustrating trial-and-error process and better yet, no expensive appointments with installation experts. Home Theater Hacks prevents both by imparting down-and-dirty technique not found anywhere else. The book begins with a quick glossary of terms so you can speak the lingo when you go shopping, and then dives right into hush-hush, insider tricks. It's all covered where to find the right audio and video components, how to deal with speakers and wiring, understanding cable connectivity, mastering remote controls, how to fully grasp TiVo, and so much more. And to top it off, each of these insider tips is presented in a concise yet delightfully entertaining style. Bringing the Jurassic Park dinosaurs into your living room has never been so easy! A seasoned veteran with numerous O'Reilly titles under his belt, author Brett McLaughlin leaves no stone unturned in helping you customize your home theater experience to your own personal environment.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 004.67/8
    Keywords: Extranets (Computer networks) ; IPSec (Computer network protocol) ; Electronic books ; local
    Abstract: Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually work, networking expert Jon Snader shows software engineers and network administrators how to use tunneling, authentication, and encryption to create safe, effective VPNs for any environment. Using an example-driven approach, VPNs Illustrated explores how tunnels and VPNs function by observing their behavior "on the wire." By learning to read and interpret various network traces, such as those produced by tcpdump, readers will be able to better understand and troubleshoot VPN and network behavior. Specific topics covered include: Block and stream symmetric ciphers, such as AES and RC4; and asymmetric ciphers, such as RSA and EIGamal Message authentication codes, including HMACs Tunneling technologies based on gtunnel SSL protocol for building network-to-network VPNs SSH protocols as drop-in replacements for telnet, ftp, and the BSD r-commands Lightweight VPNs, including VTun, CIPE, tinc, and OpenVPN IPsec, including its Authentication Header (AH) protocol, Encapsulating Security Payload (ESP), and IKE (the key management protocol) Packed with details, the text can be used as a handbook describing the functions of the protocols and the message formats that they use. Source code is available for download, and an appendix covers publicly available software that can be used to build tunnels and analyze traffic flow. VPNs Illustrated gives you the knowledge of tunneling and VPN technology you need to understand existing VPN implementations and successfully create your own.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 310 p. , ill. ; , 24 cm
    Keywords: Intranets (Computer networks) ; Web servers ; Electronic books ; local
    Abstract: Want to work more efficiently and effectively? Want to improve productivity? Microsoft is betting that you do. That's why it created Windows SharePoint Services--a set of collaboration tools that helps organizations increase individual and team productivity by enabling them to create web sites for information sharing and document collaboration.Through these team-oriented web sites, users capture and share ideas, and work together on documents, tasks, contacts, etc.--either among themselves or with partners and customers. And if you have Windows 2003 Server, then you already have SharePoint, since it's built right in. But before you can enjoy the benefits of SharePoint, you need to know how to turn it on, set it up, and get your applications working with it. Essential Sharepoint will help you do just that. It's not only the most complete guide for setting up and using these increasingly popular sites, but it also explains in detail the integration that makes SharePoint exciting. Everything you need to know about SharePoint is covered, including: hosting choices administration customization integration with Microsoft Office developing new SharePoint functionality when to use SharePoint portal server Essential Sharepoint covers all the key topics for getting up and running with this powerful and popular set of collaboration tools. And it's not just for members of the IT staff. This comprehensive guide is for anyone in an organization who wants to explore Microsoft SharePoint in order to foster collaboration with other users.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 478 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Linux's unparalleled functionality and adaptability have made it the main alternative to Unix and Microsoft Windows operating systems. And with good reason. System administrators realize that this robust alternative can greatly improve their operating system's reliability and save them money, too. Linux systems are even less vulnerable to attacks by computer viruses and worms. Not surprisingly, businesses, government agencies, schools, and a wealth of other institutions are all looking to Linux to replace the Windows desktop for these same benefits. Linux in a Windows World takes an in-depth look at exactly how Linux can be brought into an organization that's currently based on Microsoft Windows systems. Featuring a litany of insider tips and techniques, Linux in a Windows World dispenses all the practical advice you need to migrate to this revolutionary open source software. Author Roderick W. Smith, himself a renowned system administrator and Linux convert, understands that the skills required to install, deploy, and maintain Linux are not easy to find. That's why he has tapped the absolute best source of information available: the Linux server experts who have made it their life's work to build and manage the Linux system. The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment.
    Note: "A system administrator's guide to hetrogeneous networking"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 582 p. , ill. ; , 24 cm. +
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Open source software ; Electronic books ; local
    Abstract: "If you're a Java developer interested in leveraging open source tools to build multitier applications, Larne Pekowsky can help--this book will walk you all the way through development, build, testing, and deployment. This soup-to-nuts coverage is a rare find." --Angela Yochem, author of J2EE Applications and BEA WebLogic Server, Second Edition (Prentice Hall, 2004) The Jakarta project consists of many powerful open source tools for the Java platform, but most lack tutorials or clear online help documentation. Apache Jakarta and Beyond is the definitive guide to using Jakarta and other Java open source tools to develop Web applications more efficiently and effectively. In this example-packed book, readers will find An introduction to the philosophy behind the Jakarta project Details on many ready-to-use Java toolkits, including Ant, JUnit, Cactus, Log4J, POI, Tomcat, James, Struts, and more In-depth guidelines on how to develop with multiple toolkits A guide to splitting work along lines of "what is available" and "what must be written" Best practices for development, such as the model/view/controller paradigm Numerous examples that can serve as templates for readers' own projects The accompanying CD-ROM contains templates and complete code examples from the book. Whether you are developing client applications, Web applications, or Web services, Apache Jakarta and Beyond will help you use existing code to simplify the task at hand.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 357 p. , ill. ; , 25 cm
    DDC: 621.3893
    Keywords: Computer sound processing ; Multimedia systems ; Music ; Computer network resources ; Music ; Computer programs ; Sound ; Recording and reproducing ; Digital techniques ; Electronic books ; local
    Abstract: Join the digital audio revolution! Tens of millions of users are embracing digital music, and with Digital Audio Essentials , you can, too. Nearly every personal computer built in the last few years contains a CD-burning drive; MP3 and other portable player sales dominate the consumer electronics industry; and new networkable stereo equipment lets you use your digital music collection to power your home entertainment system. Whether it's downloading music, ripping CDs, organizing, finding, and creating higher quality music files, buying music players and accessories, or constructing a home stereo system, Digital Audio Essentials helps you do get it done. An indispensable reference for music enthusiasts, digital archivists, amateur musicians, and anyone who likes a good groove, Digital Audio Essentials helps you avoid time-consuming, costly trial and error in downloading audio files, burning CDs, converting analog music to digital form, publishing music to and streaming from the Web, setting up home stereo configurations, and creating your own MP3 and other audio files. The book--for both Mac and PC users--includes reliable hardware and software recommendations, tutorials, resources, and file sharing, and it even explains the basics of the DMCA and intellectual property law. You may (or may not) already know the basics of ripping CDs or downloading music, but Fries will show you so much more--including advice on the multitude of MP3 players on the market, stereo options, file formats, quality determinations, and the legalities of it all. Both a timely, entertaining guide and an enduring reference, this is the digital audio handbook you need to make the most of your expanding digital music collection.
    Note: "A comprehensive guide to creating, recording, editing, and sharing music and other audio"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 444 p. , ill. ; , 24 cm
    DDC: 004.6/5
    Keywords: Computer network architectures ; Web services ; Electronic books ; local
    Abstract: Praise for Understanding SOA with Web Services "This book does the best job of describing not only "where we are" in the timeline of enterprise integration efforts, but also providing strategic guidance for where we need to be. The authors have worked diligently to break down the integration problem into functional areas, and send you down the path of strategic integration utilizing XML Web Services and Service-Oriented Architecture as the vehicle of choice. You will love this book!" - Daniel Edgar, Architect, Portland General Electric "E-Government needs a comprehensive guide to SOA with Web Services standards and best practices for implementation to get from the current "as is" to the future "to be" architecture. This book meets that need superbly." - Brand Niemann, Ph.D., Co-Chair, Semantic (Web Services) Interoperability Community of Practice, U.S. Federal CIO Council. "There are many books on SOA available today, but Understanding SOA with Web Services stands out from the pack because of its thorough, outstanding coverage of transactions, reliability, and process. Where most SOA books focus on integration and architecture basics, Lomow and Newcomer fearlessly dive into these more advanced, yet critical, topics, and provide a depth of treatment unavailable anywhere else." - Jason Bloomberg, Senior Analyst, ZapThink LLC "This book provides a wealth of content on Web Services and SOA not found elsewhere. Although the book is technical in nature, it is surprisingly easy to read and digest. Managers who would like to keep up with the most effective technical strategies will find this book required reading." - Hari Mailvaganam, University of British Columbia, Vancouver "I have been teaching companies and lecturing on SOA and XML Web Services for years and sort of felt at home with these technologies. I didn't think anyone else could teach me anything more significant about either of them. This book surprised me. If a person teaching SOA and Web Services can learn something from this book, you can too. This book is a must-read for all architects, senior developers, and concerned CTOs." - Sayed Y. Hashimi, SOA Consultant "Newcomer and Lomow are no doubt the industry luminaries on the topics of Web Services, Service-Oriented Architecture, and integration. This book is sure to be a must-have for developers and architects looking to take advantage of the coming wave of standards-based, loosely coupled integration." - Ronald Schmelzer, Senior Analyst...
    Note: Includes bibliographical references (p. 421-430) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 1224 p. , ill. ; , 23 cm
    Edition: 5th ed.
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Object-oriented programming (Computer science) ; Web servers ; Electronic books ; local
    Abstract: With more than 700,000 copies sold to date, Java in a Nutshell from O'Reilly is clearly the favorite resource amongst the legion of developers and programmers using Java technology. And now, with the release of the 5.0 version of Java, O'Reilly has given the book that defined the "in a Nutshell" category another impressive tune-up. In this latest revision, readers will find Java in a Nutshell , 5th Edition, does more than just cover the extensive changes implicit in 5.0, the newest version of Java. It's undergone a complete makeover--in scope, size, and type of coverage--in order to more closely meet the needs of the modern Java programmer. To wit, Java in a Nutshell , 5th Edition now places less emphasis on coming to Java from C and C++, and adds more discussion on tools and frameworks. It also offers new code examples to illustrate the working of APIs, and, of course, extensive coverage of Java 5.0. But faithful readers take comfort: it still hasn't lost any of its core elements that made it such a classic to begin with. This handy reference gets right to the heart of the program with an accelerated introduction to the Javaprogramming language and its key APIs--ideal for developers wishing to start writing code right away. And, as was the case in previous editions, Java in a Nutshell , 5th Edition is once again chock-full of poignant tips, techniques, examples, and practical advice. For as longas Java has existed, Java in a Nutshell has helped developers maximize the capabilities of the program's newest versions. And this latest edition is no different.
    Note: "Covers Java 5.0"--Cover p. [1]. - Contains an accelerated introduction to Java for C and C++ programmers who want to learn the language fast. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 735 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.2762
    Keywords: Computer networks ; Programming ; Java (Computer program language) ; Electronic books ; local
    Abstract: The new third edition of this highly regarded introduction to Java networking programming has been thoroughly revised to cover all of the 100+ significant updates to Java Developers Kit (JDK) 1.5. It is a clear, complete introduction to developing network programs (both applets and applications) using Java, covering everything from networking fundamentals to remote method invocation (RMI). Java Network Programming , 3rd Edition includes chapters on TCP and UDP sockets, multicasting protocol and content handlers, servlets, multithreaded network programming, I/O, HTML parsing and display, the Java Mail API, and the Java Secure Sockets Extension. There's also significant information on the New I/O API that was developed in large part because of the needs of network programmers.This invaluable book is a complete, single source guide to writing sophisticated network applications. Packed with useful examples, it is the essential resource for any serious Java developer.
    Note: Includes index. - Previous ed.: Beijing; Sebastopol, Calif.: O'Reilly, 2000
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 519 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Swing (Computer file) ; Java (Computer program language) ; Electronic books ; local
    Abstract: Swing Hacks helps Java developers move beyond the basics of Swing, the graphical user interface (GUI) standard since Java 2. If you're a Java developer looking to build enterprise applications with a first-class look and feel, Swing is definitely one skill you need to master. This latest title from O'Reilly is a reference to the cool stuff in Swing. It's about the interesting things you learn over the years--creative, original, even weird hacks--the things that make you say, "I didn't know you could even do that with Swing!" Swing Hacks will show you how to extend Swing's rich component set in advanced and sometimes non-obvious ways. The book touches upon the entire Swing gamut-tables, trees, sliders, spinners, progress bars, internal frames, and text components. Detail is also provided on JTable/JTree, threaded component models, and translucent windows. You'll learn how to filter lists, power-up trees and tables, and add drag-and-drop support. Swing Hacks will show you how to do fun things that will directly enhance your own applications. Some are visual enhancements to make your software look better. Some are functional improvements to make your software do something it couldn't do before. Some are even just plain silly, in print only to prove it could be done. The book will also give you give you a small glimpse of the applications coming in the future. New technology is streaming into the Java community at a blistering rate, and it gives application developers a whole new set of blocks to play with. With its profusion of tips and tricks, Swing Hacks isn't just for the developer who wants to build a better user interface. It's also ideally suited for client-side Java developers who want to deliver polished applications, enthusiasts who want to push Java client application boundaries, and coders who want to bring powerful techniques to their own applications. Whatever your programming needs, Swing Hacks is packed with programming lessons that increase your competency with interface-building tools.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 554 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.75/65
    Keywords: Oracle (Computer file) ; Database management ; Electronic books ; local
    Abstract: Despite its wide availability and usage, few developers and DBAs have mastered the true power of Oracle SQL Plus. This bestselling book--now updated for Oracle 10g--is the only in-depth guide to this interactive query tool for writing SQL scripts. It's an essential resource for any Oracle user.The new second edition of Oracle SQL Plus: The Definitive Guide clearly describes how to perform, step-by-step, all of the tasks that Oracle developers and DBAs want to perform with SQL Plus--and maybe some you didn't realize you could perform.With Oracle SQL Plus: The Definitive Guide, you'll expertly: write and execute script files generate ad hoc reports extract data from the database query the data dictionary tables customize an SQL Plus environment and much more It also includes a handy quick reference to all of its syntax options and an often-requested chapter on SQL itself, along with a clear, concise, and complete introduction.This book is truly the definitive guide to SQLPlus. It's an indispensable resource for those who are new to SQL*Plus, a task-oriented learning tool for those who are already using it, and an immediately useful quick reference for every user. If you want to leverage the full power and flexibility of this popular Oracle tool, you'll need this book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxv, 367 p. , ill. ; , 24 cm
    DDC: 005.446
    Keywords: Mac OS ; Electronic books ; local
    Abstract: Tips rule! Have you ever noticed that in just about every Mac book, the author will include a couple of tips in each chapter (you'll usually find them in the sidebar, or at the bottom of the page in a tinted box). Sometimes it's a shortcut, a faster way to do something, or a clever workaround that just makes your life easier. People really love those tips, but there's only one problem--there's never enough of them. That's why Scott Kelby, bestselling author and Editor-in-Chief of Mac Design magazine came up with the idea to create a book that's nothing but "sidebar" tips. That's right--this entire book, cover-to-cover is packed with nothing but those cool inside secrets, slick workarounds, undocumented shortcuts, and sneaky little tricks that will make you faster, better, and have more fun using Mac OS 10.4 (Tiger). Nothing but the tips! You're not going to find complicated descriptions on how to configure a network, how to partition a hard drive, or lines and lines of scary-looking UNIX code--instead this book is nothing but cool tips--and it's all written in Scott's casual, plain English style so you can start using these tips today. Plus, this book does the standard "sidebar tip" one better by including a clear screen capture with nearly every tip, so you can see exactly how it's all done. Not just tips. Killer tips! To be in this book, every tip has got to be a "Killer Tip" (the kind of tip that makes you nod and smile, then call all your Mac buddies to tune them up with your new-found power). Scott's a total "hip hound" (in fact, it was Scott who created the entire smash-bestselling "Killer Tips" book series), and he doesn't hold anything back--it's all here from the man who literally "wrote the book" on cool productivity tips.If you like doing things the easy way, if you like getting twice the work done in half the time, and if you get a kick out of knowing all the "inside secrets and undocumented shortcuts" that will wow your friends and coworkers, you're absolutely going to love this book.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 185 p. , ill. ; , 23 cm
    Keywords: Computer programming ; Java (Computer program language) ; Electronic books ; local
    Abstract: Bruce Tate, author of the Jolt Award-winning Better, Faster, Lighter Java has an intriguing notion about the future of Java, and it's causing some agitation among Java developers. Bruce believes Java is abandoning its base, and conditions are ripe for an alternative to emerge. In Beyond Java , Bruce chronicles the rise of the most successful language of all time, and then lays out, in painstaking detail, the compromises the founders had to make to establish success. Then, he describes the characteristics of likely successors to Java. He builds to a rapid and heady climax, presenting alternative languages and frameworks with productivity and innovation unmatched in Java. He closes with an evaluation of the most popular and important programming languages, and their future role in a world beyond Java. If you are agree with the book's premise--that Java's reign is coming to an end--then this book will help you start to build your skills accordingly. You can download some of the frameworks discussed and learn a few new languages. This book will teach you what a new language needs to succeed, so when things do change, you'll be more prepared. And even if you think Java is here to stay, you can use the best techniques from frameworks introduced in this book to improve what you're doing in Java today.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 291 p. , ill. (some col.) ; , 23 cm
    Edition: 1st ed.
    DDC: 004.165
    Keywords: Apple Computer, Inc. ; Macintosh Division ; History ; Computer industry ; United States ; History ; Macintosh (Computer) ; Electronic books ; local
    Abstract: There was a time, not too long ago, when the typewriter and notebook ruled, and the computer as an everyday tool was simply a vision. Revolution in the Valley traces this vision back to its earliest roots: the hallways and backrooms of Apple, where the groundbreaking Macintosh computer was born. The book traces the development of the Macintosh, from its inception as an underground skunkworks project in 1979 to its triumphant introduction in 1984 and beyond. The stories in Revolution in the Valley come on extremely good authority. That's because author Andy Hertzfeld was a core member of the team that built the Macintosh system software, and a key creator of the Mac's radically new user interface software. One of the chosen few who worked with the mercurial Steve Jobs, you might call him the ultimate insider. When Revolution in the Valley begins, Hertzfeld is working on Apple's first attempt at a low-cost, consumer-oriented computer: the Apple II. He sees that Steve Jobs is luring some of the company's most brilliant innovators to work on a tiny research effort the Macintosh. Hertzfeld manages to make his way onto the Macintosh research team, and the rest is history. Through lavish illustrations, period photos (many never before published), and Hertzfeld's vivid first-hand accounts, Revolution in the Valley reveals what it was like to be there at the birth of the personal computer revolution. The story comes to life through the book's portrait of the talented and often eccentric characters who made up the Macintosh team. Now, over 20 years later, millions of people are benefiting from the technical achievements of this determined and brilliant group of people.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xviii, 439 p. , col. ill. ; , 26 cm
    DDC: 775
    Keywords: Adobe Photoshop elements ; Image processing ; Digital techniques ; Photography ; Digital techniques ; Electronic books ; local
    Abstract: Are you ready for an Elements book that breaks all the rules-again? Like the best-selling former edition, The Photoshop Elements 4 Book for Digital Photographers breaks new ground by doing something for digital photographers that's rarely done-it cuts through the bull and shows you exactly "how to do it." It's not a bunch of theory; it doesn't challenge you to come up with your own settings or figure things out on your own. Instead, it does something that virtually no other Elements book has ever done-it tells you flat-out which settings to use, when to use them, and why. If you're looking for one of those "tell-me-everything-about-the-Unsharp-Mask-filter" books, this isn't it. You can grab any other Elements book on the shelf, because they all do that. Instead, this book gives you the inside tips and tricks of the trade for correcting, editing, sharpening, retouching, and presenting your photos like a pro. You'll be absolutely amazed at how easy and effective these techniques are-once you know the secrets. Newly updated to cover Photoshop Elements 4, this full-color, easy-to-follow guide includes new tips that take advantage of Elements 4's hottest new features, including the Magic Selection Brush, which offers a quick way to make accurate selections in your photos; Magic Extractor, which lets you select an image and instantly remove the background; Auto Red Eye and Auto Skin tone tools; cool slideshow effects (text, graphics, narration, pans and zooms, and more); online sharing service; and more! This book is for Windows users only.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 233 p. , ill. ; , 24 cm
    DDC: 006.776
    Keywords: QuickTime ; Java (Computer program language) ; Electronic books ; local
    Abstract: QuickTime Java (QJT) is a terrific multimedia toolkit, but it's also terrifying to the uninitiated. Java developers who need to add audio, video, or interactive media creation and playback to their applications find that QTJ is powerful, but not easy to get into. In fact, when it comes to class-count, QuickTime Java is nearly as large as all of Java 1.1. Once you learn the entire scope of Apple's QuickTime software, you really appreciate the problem. At its simplest, QuickTime allows Mac and Windows users to play audio and video on their computers. But QuickTime is many things: a file format, an environment for media authoring, and a suite of applications that includes browser plug-ins for viewing media within a web page, a PictureViewer for working with still pictures, QuickTime Streaming Server for delivering streaming media files on the Internet in real time, and QuickTime Broadcaster for delivering live events on the Internet. Among others. As if that weren't daunting enough, the javadocs on QJT are wildly incomplete, and other books on the topic are long out of date and not well regarded, making progress with QTJ extremely difficult. So what can you do? Our new hands-on guide, QuickTime Java: A Developer's Notebook , not only catches up with this technology, but de-mystifies it. This practical "all lab, no lecture" book is an informal, code-intensive workbook that offers the first real look at this important software. Like other titles in our Developer's Notebook series, QuickTime Java: A Developer's Notebook is for impatient early adopters who want get up to speed on what they can use right now. It's deliberately light on theory, emphasizing example over explanation and practice over concept, so you can focus on learning by doing. QuickTime Java: A Developer's Notebook gives you just the functionality you need from QTJ. Even if you come to realize that 95% of the API is irrelevant to you, this book will help you master the 5% that really counts.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Language: English
    Pages: xviii, 615 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 004.5/6
    Keywords: Linux device drivers (Computer programs) ; Electronic books ; local
    Abstract: Device drivers literally drive everything you're interested in--disks, monitors, keyboards, modems--everything outside the computer chip and memory. And writing device drivers is one of the few areas of programming for the Linux operating system that calls for unique, Linux-specific knowledge. For years now, programmers have relied on the classic Linux Device Drivers from O'Reilly to master this critical subject. Now in its third edition, this bestselling guide provides all the information you'll need to write drivers for a wide range of devices.Over the years the book has helped countless programmers learn: how to support computer peripherals under the Linux operating system how to develop and write software for new hardware under Linux the basics of Linux operation even if they are not expecting to write a driver The new edition of Linux Device Drivers is better than ever. The book covers all the significant changes to Version 2.6 of the Linux kernel, which simplifies many activities, and contains subtle new features that can make a driver both more efficient and more flexible. Readers will find new chapters on important types of drivers not covered previously, such as consoles, USB drivers, and more.Best of all, you don't have to be a kernel hacker to understand and enjoy this book. All you need is an understanding of the C programming language and some background in Unix system calls. And for maximum ease-of-use, the book uses full-featured examples that you can compile and run without special hardware.Today Linux holds fast as the most rapidly growing segment of the computer market and continues to win over enthusiastic adherents in many application areas. With this increasing support, Linux is now absolutely mainstream, and viewed as a solid platform for embedded systems. If you're writing device drivers, you'll want this book. In fact, you'll wonder how drivers are ever written without it.
    Note: On t.p. of previous ed. Alessandro Rubini's name appeared first. - Includes bibliographical references (p. 575-577) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 350 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.26/8
    Keywords: Linux ; Electronic data processing ; Distributed processing ; High performance computing ; Operating systems (Computers) ; Parallel processing (Electronic computers) ; Electronic books ; local
    Abstract: To the outside world, a "supercomputer" appears to be a single system. In fact, it's a cluster of computers that share a local area network and have the ability to work together on a single problem as a team. Many businesses used to consider supercomputing beyond the reach of their budgets, but new Linux applications have made high-performance clusters more affordable than ever. These days, the promise of low-cost supercomputing is one of the main reasons many businesses choose Linux over other operating systems.This new guide covers everything a newcomer to clustering will need to plan, build, and deploy a high-performance Linux cluster. The book focuses on clustering for high-performance computation, although much of its information also applies to clustering for high-availability (failover and disaster recovery). The book discusses the key tools you'll need to get started, including good practices to use while exploring the tools and growing a system. You'll learn about planning, hardware choices, bulk installation of Linux on multiple systems, and other basic considerations. Then, you'll learn about software options that can save you hours--or even weeks--of deployment time.Since a wide variety of options exist in each area of clustering software, the author discusses the pros and cons of the major free software projects and chooses those that are most likely to be helpful to new cluster administrators and programmers. A few of the projects introduced in the book include: MPI, the most popular programming library for clusters. This book offers simple but realistic introductory examples along with some pointers for advanced use. OSCAR and Rocks, two comprehensive installation and administrative systems openMosix (a convenient tool for distributing jobs), Linux kernel extensions that migrate processes transparently for load balancing PVFS, one of the parallel filesystems that make clustering I/O easier C3, a set of commands for administering multiple systems Ganglia, OpenPBS, and cloning tools (Kickstart, SIS and G4U) are also covered. The book looks at cluster installation packages (OSCAR & Rocks) and then considers the core packages individually for greater depth or for folks wishing to do a custom installation. Guidelines for debugging, profiling, performance tuning, and managing jobs from multiple users round out this immensely useful book.
    Note: "A comprehensive getting started guide"--Cover. - Includes bibliographical references (p. 329-337) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Apache (Computer file : Apache Group) ; Web servers ; Computer programs ; Web sites ; Security measures ; Computer programs ; Electronic books ; local
    Abstract: "Ryan Barnett has raised the bar in terms of running Apache securely. If you run Apache, stop right now and leaf through this book; you need this information." -Stephen Northcutt, The SANS Institute The only end-to-end guide to securing Apache Web servers and Web applications Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications. Firewalls and SSL won't protect you: you must systematically harden your Web application environment. Preventing Web Attacks with Apache brings together all the information you'll need to do that: step-by-step guidance, hands-on examples, and tested configuration files. Building on his groundbreaking SANS presentations on Apache security, Ryan C. Barnett reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how they can be defended against. Exploits discussed include: buffer overflows, denial of service, attacks on vulnerable scripts and programs, credential sniffing and spoofing, client parameter manipulation, brute force attacks, web defacements, and more. Barnett introduces the Center for Internet Security Apache Benchmarks, a set of best-practice Apache security configuration actions and settings he helped to create. He addresses issues related to IT processes and your underlying OS; Apache downloading, installation, and configuration; application hardening; monitoring, and more. He also presents a chapter-length case study using actual Web attack logs and data captured "in the wild." For every sysadmin, Web professional, and security specialist responsible for Apache or Web application security. With this book, you will learn to Address the OS-related flaws most likely to compromise Web server security Perform security-related tasks needed to safely download, configure, and install Apache Lock down your Apache httpd.conf file and install essential Apache security modules Test security with the CIS Apache Benchmark Scoring Tool Use the WASC Web Security Threat Classification to identify and mitigate application threats Test Apache mitigation settings against the Buggy Bank Web application Analyze an Open Web Proxy Honeypot to gather crucial intelligence about attackers Master advanced techniques for detecting and preventing intrusions
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 439 p. , ill. ; , 24 cm
    Keywords: eBay (Firm) ; Internet auctions ; Electronic books ; local
    Abstract: It's the undisputed king of Internet auction sites. It's a global bazaar offering a range of goods from Antiques to Zulu Daisies. Cars, clothing, collectibles: you name it, and it's likely that you can find on eBay. But along with the vast selection of goods available, buyers and sellers also encounter all the other elements that markets are known for: tricks and swindlers, overpriced goods, deceptive labeling, small print, recycled items marked as new, and the occasional rare priceless find or undiscovered treasure.Seasoned eBay traders know that to successfully buy and sell within this mega-shopping platform, you need to understand the system. Unfortunately, the secrets of the site are often tightly held by other buyers and sellers seeking a competitive edge. But what if you're a newcomer? Or an experienced trader who wants to make the jump to power buyer or seller? eBay: The Missing Manual gives you the inside information you'll need to become an eBay expert.Buyers will find the most effective ways to find you want and pay prices that are sure to bring a smile to your face. And you'll get authoritative advice on strategic bidding: how to watch for elusive items, time your bids to take the competition by surprise, and--above all--avoid paying more than you ought to.Sellers will get sure-fire tips from eBay veterans who have discovered ways to ramp up their own auctions and sell at the highest possible prices. From the smallest details, such as how to take and post the most effective photos of your goods, to pricing strategies, inventory management, and shipping methods, this user-friendly manual will help you make more money on eBay. Whether you're selling a single item or running fulltime business on the site, you'll find tips to help you do it more effectively.As in any community, problems and disputes arise, and you'll learn how other eBayers resolve such troubles or work around them. eBay: The Missing Manual has gems of wisdom for everyone from total novices to more experienced traders. If you're looking to improve your eBay auction experience, you'll savor the tips and trick revealed in this guided exploration.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 280 p. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.13
    Keywords: GNU Emacs ; Make (Computer file) ; Utilities (Computer programs) ; Electronic books ; local
    Abstract: The utility simply known as make is one of the most enduring features of both Unix and other operating systems. First invented in the 1970s, make still turns up to this day as the central engine in most programming projects; it even builds the Linux kernel. In the third edition of the classic Managing Projects with GNU make , readers will learn why this utility continues to hold its top position in project build software, despite many younger competitors. The premise behind make is simple: after you change source files and want to rebuild your program or other output files, make checks timestamps to see what has changed and rebuilds just what you need, without wasting time rebuilding other files. But on top of this simple principle, make layers a rich collection of options that lets you manipulate multiple directories, build different versions of programs for different platforms, and customize your builds in other ways. This edition focuses on the GNU version of make , which has deservedly become the industry standard. GNU make contains powerful extensions that are explored in this book. It is also popular because it is free software and provides a version for almost every platform, including a version for Microsoft Windows as part of the free Cygwin project. Managing Projects with GNU make , 3rd Edition provides guidelines on meeting the needs of large, modern projects. Also added are a number of interesting advanced topics such as portability, parallelism, and use with Java. Robert Mecklenburg, author of the third edition, has used make for decades with a variety of platforms and languages. In this book he zealously lays forth how to get your builds to be as efficient as possible, reduce maintenance, avoid errors, and thoroughly understand what make is doing. Chapters on C++ and Java provide makefile entries optimized for projects in those languages. The author even includes a discussion of the makefile used to build the book.
    Note: Includes index. - Rev. ed. of: Managing projects with Make / Andrew Oram and Steve Talbott
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxi, 548 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: A smart collection of insider tips and tricks, Windows XP Hacks , Second Edition covers the XP operating system from start to finish. Among the multitude of topics addressed, this must-have resource includes extensive coverage of hot-button issues such as: security web browsing controlling the control panel removing uninstallable XP components pop-up ads You'll also find timesaving hacks for file distribution; digital media, such as iTunes; and high-visibility web software, services, and exploits that have emerged since the book's last edition. Each hack in the book can be read easily in just a few minutes, saving countless hours of searching for the right answer.Now completely revised and updated to cover Service Pack 2 (SP2), the second edition of this bestseller carefully breaks down the new features that come with SP2, including IE pop-up blocker, Windows Firewall, and the new wireless client.Written by Preston Gralla, the compact and affordable Windows XP Hacks , Second Edition provides direct, hands-on solutions that can be applied to the challenges facing XP beginners, as well as the more experienced power user. Each year, Windows XP is pre-installed on 90 million PCs worldwide, making it the world's most popular operating system.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 316 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    Keywords: Ant (Computer file) ; Java (Computer program language) ; Electronic books ; local
    Abstract: Soon after its launch, Ant succeeded in taking the Java world by storm, becoming the most widely used tool for building applications in Java environments. Like most popular technologies, Ant quickly went through a series of early revision cycles. With each new version, more functionality was added, and more complexity was introduced. Ant evolved from a simple-to-learn build tool into a full-fledged testing and deployment environment. Ant: The Definitive Guide has been reworked, revised and expanded upon to reflect this evolution. It documents the new ways that Ant is being applied, as well as the array of optional tasks that Ant supports. In fact, this new second edition covers everything about this extraordinary build management tool from downloading and installing, to using Ant to test code. Here are just of a few of the features you'll find detailed in this comprehensive, must-have guide: Developing conditional builds, and handling error conditions Automatically retrieving source code from version control systems Using Ant with XML files Using Ant with JavaServer Pages to build Web applications Using Ant with Enterprise JavaBeans to build enterprise applications Far exceeding its predecessor in terms of information and detail, Ant: The Definitive Guide , 2nd Edition is a must-have for Java developers unfamiliar with the latest advancements in Ant technology. With this book at your side, you'll soon be up to speed on the premiere tool for cross-platform development.Author Steve Holzner is an award-winning author who s been writing about Java topics since the language first appeared; his books have sold more than 1.5 million copies worldwide.
    Note: Includes index. - Prev. ed. by Jesse Tilly and Eric M. Burke, pub. May 2002
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: x, 329 p. , ill. ; , 25 cm. +
    Keywords: Digital video ; Editing ; Electronic books ; local
    Abstract: Apple's DVD Studio Pro, released in 2001, provided a low-cost, professional solution for home and small business DVD authoring. Today, the highly sophisticated yet easy-to-use DVD Studio Pro 3 allows independent filmmakers, video producers, trainers, event videographers, and enthusiasts to create professional-grade DVDs on the Macintosh platform. Pair the program with DVD Studio Pro 3: In the Studio , and you've got everything you need to embrace the digital video revolution.This indispensable book gives you the tools and know-how to master DVD Studio Pro 3. Oversized and in full color, the highly visual DVD Studio Pro 3: In the Studio is ideal for Macintosh ProApps developers--those who use Final Cut Pro 4 and Shake 3--as well as for prosumer and professional filmmakers who wish to transfer their projects to DVDs. The book goes well beyond the program's features list to demystify the entire process of DVD design and authoring.Author Marc Loy, who has been using DVD Studio Pro since its inception, goes beyond a simple discussion about the DVD Studio Pro 3 interface and entices readers to experience the program's powerful capabilities as they create eye-catching, innovative DVD designs. He covers the actual protocols involved with the DVD files and filesystems, pixel aspect ratio issues, and common "gotchas" using both still and motion media. He also delivers plenty of tips and tricks for using dynamic buttons. DVD Studio Pro 3: In the Studio explores most everything you need and want to know, including importing from Photoshop and Final Cut Pro, making motion video menus available, effective looping of video and audio, adding multilingual menus and subtitles, encoding rules for DVDs, scripting, and mass duplication hunts. DVD Studio Pro 3: In the Studio is a professional-level book for anyone who's serious about creating high-impact, professional-level DVDs to make your unique vision a digital video reality.
    Note: One DVD inside back cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 1142 p. , ill. ; , 24 cm
    DDC: 005.4/476
    Keywords: Microsoft Windows server ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Once again, Roberta Bragg proves why she is a leading authority in the security field! It's clear that Roberta has had a great deal of experience in real-world security design and implementation. I'm grateful that this book provides clarity on what is often a baffling subject!" James I. Conrad, MCSE 2003, Server+, Certified Ethical Hacker Jamesaccusource.net "Full of relevant and insightful information. Certain to be a staple reference book for anyone dealing with Windows Server 2003 security. Roberta Bragg's Windows Server 2003 Security is a MUST read for anyone administering Windows Server 2003." Philip Cox, Consultant, SystemExperts Corporation phil.cox@systemexperts.com "Few people in the security world understand and appreciate every aspect of network security like Roberta Bragg. She is as formidable a security mind as I have ever met, and this is augmented by her ability to communicate the concepts clearly, concisely, and with a rapier wit. I have enjoyed working with Roberta more than I have on any of the other 20 some odd books to which I have contributed. She is a giant in the field of network security." Bob Reinsch bob.reinsch@fosstraining.com " Windows Server 2003 Security explains why you should do things and then tells you how to do it! It is a comprehensive guide to Windows security that provides the information you need to secure your systems. Read it and apply the information." Richard Siddaway, MCSE rsiddaw@hotmail.com "Ms. Bragg's latest book is both easy to read and technically accurate. It will be a valuable resource for network administrators and anyone else dealing with Windows Server 2003 security." Michael VonTungeln, MCSE, CTT mvontung@yahoo.com "I subscribe to a number of newsletters that Roberta Bragg writes and I have 'always' found her writing to be perfectly focused on issues I 'need' to know in my workplace when dealing with my users. Her concise writing style and simple solutions bring me back to her columns time after time. When I heard she had written a guide on Windows 2003 security, I 'had' to have it. Following her guidance on deployment, her advice on avoiding common pitfalls, and her easy to follow guidelines on how to lock down my network and user environments (those darned users!) has me (and my clients) much more comfortable with our Win2k3 Server deployments. From AD to GPO's to EFS, this book covers it all." Robert Laposta, MCP, MCSA, MCSE, Io Network Services, Sierra Vista AZrob.laposta@cox.net "R...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: "It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits." --Mark Russinovich, editor, Windows IT Pro / Windows & .NET Magazine "This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding." --Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible." --Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight. "Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine. "Understanding the ultimate attacker's tool provides ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 342 p. , ill. ; , 24 cm
    DDC: 005.74/068
    Keywords: Business ; Data processing ; Data warehousing ; Database management ; Electronic books ; local
    Abstract: The definitive best-practices guide to enterprise data-management strategy. You can no longer manage enterprise data "piecemeal." To maximize the business value of your data assets, you must define a coherent, enterprise-wide data strategy that reflects all the ways you capture, store, manage, and use information. In this book, three renowned data management experts walk you through creating the optimal data strategy for your organization. Using their proven techniques, you can reduce hardware and maintenance costs, and rein in out-of-control data spending. You can build new systems with less risk, higher quality, and improve data access. Best of all, you can learn how to integrate new applications that support your key business objectives. Drawing on real enterprise case studies and proven best practices, the author team covers everything from goal-setting through managing security and performance. You'll learn how to: Identify the real risks and bottlenecks you face in delivering data-and the right solutions Integrate enterprise data and improve its quality, so it can be used more widely and effectively Systematically secure enterprise data and protect customer privacy Model data more effectively and take full advantage of metadata Choose the DBMS and data storage products that fit best into your overall plan Smoothly accommodate new Business Intelligence (BI) and unstructured data applications Improve the performance of your enterprise database applications Revamp your organization to streamline day-to-day data management and reduce cost Data Strategy is indispensable for everyone who needs to manage enterprise data more efficiently-from database architects to DBAs, technical staff to senior IT decision-makers. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. [317]-321) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: 360 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The fastest route to true Linux mastery! You know your way around Windows (or maybe a Mac, or even UNIX). Now, you're ready for Linux. And you don't have a minute to waste. Welcome. This book's for you . Janet Valade has spent thirteen years helping new users master Linux and related technologies. She knows the "magic words" that'll help you get the job done, fast. (And she knows exactly how to keep you out of trouble, too!) You'll learn Linux through dozens of focused, bite-size examples, each one carefully designed to build on what you've learned before. Need specific solutions? This book's carefully crafted, high-efficiency format delivers them... instantly . Working on Fedora? Mandrake? SuSE? No matter. This book is for you. No other introduction to Linux covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with Linux- without the hassles! Choose the best Linux distribution for your personal or business needs Get Linux installed quickly and running reliably Handle your day-to-day tasks and efficiently manage your files Master KDE, GNOME, and the Linux command line Write documents and build spreadsheets with OpenOffice.org Set up Web access, email, and instant messaging Work with powerful Linux multimedia and graphics software Find, install, and run new Linux software Set up your printer to work with Linux Supercharge Linux with shell scripts and customized configuration files Includes concise Linux command reference and quick guide to building powerful Regular Expressions Spring Into ... is a new series of fast-paced tutorials from Addison-Wesley Professional Publishers. Each book in the series is designed to bring you up-to-speed quickly. Complex technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working... now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Direct from the creators of the Java™ programming language, the completely revised fourth edition of The Java™ Programming Language is an indispensable resource for novice and advanced programmers alike. Developers around the world have used previous editions to quickly gain a deep understanding of the Java programming language, its design goals, and how to use it most effectively in real-world development. Now, Ken Arnold, James Gosling, and David Holmes have updated this classic to reflect the major enhancements in Java™ 2 Standard Edition 5.0 (J2SE™ 5.0). The authors systematically cover most classes in Java's main packages, java.lang.* , java.util, and java.io, presenting in-depth explanations of why these classes work as they do, with informative examples. Several new chapters and major sections have been added, and every chapter has been updated to reflect today's best practices for building robust, efficient, and maintainable Java software. Key changes in this edition include New chapters on generics, enums, and annotations, the most powerful new language features introduced in J2SE 5.0 Changes to classes and methods throughout to reflect the addition of generics Major new sections on assertions and regular expressions Coverage of all the new language features, from autoboxing and variable argument methods to the enhanced for-loop and covariant return types Coverage of key new classes, such as Formatter and Scanner The Java™ Programming Language, Fourth Edition, is the definitive tutorial introduction to the Java language and essential libraries and an indispensable reference for all programmers, including those with extensive experience. It brings together insights you can only get from the creators of Java: insights that will help you write software of exceptional quality.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 397 p. , ill. ; , 25 cm
    DDC: 005.1/068/5
    Keywords: Capability maturity model (Computer software) ; Electronic books ; local
    Abstract: Use Assessments to Drive Process Improvements in Software, Systems, Human Resources, and Beyond Pioneered by the world's leading innovators in software engineering, assessments have evolved into a remarkably powerful tool for process improvement in areas ranging from systems to services, hardware to human resources. Unlike audits, assessments are conducted from the inside. When handled correctly, assessments can help transform technical and managerial culture, dramatically improving both quality and profitability. In CMMI Assessments: Motivating Positive Change , two of the field's most respected leaders show exactly how to use them for maximum business advantage. Writing for executives, managers, technical professionals, and assessors themselves, Marilyn Bush and Donna Dunaway illuminate every phase of the assessment process-from planning through post-assessment follow-up. The authors begin with an expert overview of what assessments entail, when they make sense, how to set achievable goals for them, and how to lead them to success. Next, they "drill down" into each stage of the process, presenting step-by-step instructions and defining the roles and responsibilities of every participant. Coverage includes creating and training assessment teams; identifying assessment products; consolidating interview data and other onsite activities; presenting results; and using those results productively. Drawing on their unsurpassed experience leading assessments and mentoring assessors, they offer deep insights into the real-world challenges and obstacles you'll face-and proven solutions. They also present an extended case study showing how a real software development organization drove continuous improvement through four years of iterative assessments-moving from CMM Level 2 to elite Level 5 status, and driving dramatic business benefits along the way. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 375-380) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvi, 316 p. , ill. ; , 24 cm
    DDC: 006.74
    Keywords: HTML (Document markup language) ; Electronic books ; local
    Abstract: The fastest route to true HTML/CSS mastery! Need to build a web site? Or update one? Or just create some effective new web content? Maybe you just need to update your skills, do the job better. Welcome. This book's for you. We'll leverage what you already know about the web, so you'll go further, faster than you ever expected. You'll master today's best practices: the real nuts and bolts, not theory or hooey. You'll learn through dozens of focused HTML, XHTML, and CSS examples: crafted for simplicity and easy to adapt for your own projects. Need specific solutions? This book's modular, visual, high-efficiency format delivers them instantly . Molly E. Holzschlag draws on her unparalleled experience teaching Web design and development. No other HTML/CSS guide covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with HTML, XHTML, and CSS in real-world projects Learn how to build web pages that'll work in any environment, on virtually any contemporary browser Construct templates that simplify every page you develop Structure and tag text so it's easy to work with and manage Add images, media, and scripts-quickly and reliably Discover the right ways to use HTML tables Build easy-to-use forms and validate your users' input Use CSS to take total control over your site's look and feel Master core CSS techniques: color, images, text styles, link effects, lists, navigation, and more Control margins, borders, padding, positioning, floats, even Z-index Design efficient, compatible, easy-to-manage CSS layouts Includes concise XHTML and CSS annotated references: quick help for every language element Spring Into... is a new series of fast-paced tutorials from Addison-Wesley. Each book in the series is designed to bring you up to speed quickly. Complex topics and technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working...now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 713 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Computer viruses ; Electronic books ; local
    Abstract: "Of all the computer-related books I've read recently, this one influenced my thoughts about security the most. There is very little trustworthy information about computer viruses. Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book." -Halvar Flake, Reverse Engineer, SABRE Security GmbH Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published-addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code-and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xiv, 282 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: "Every programming language has its quirks. This lively book reveals oddities of the Java programming language through entertaining and thought-provoking programming puzzles." --Guy Steele, Sun Fellow and coauthor of The Java™ Language Specification "I laughed, I cried, I threw up (my hands in admiration)." --Tim Peierls, president, Prior Artisans LLC, and member of the JSR 166 Expert Group How well do you really know Java? Are you a code sleuth? Have you ever spent days chasing a bug caused by a trap or pitfall in Java or its libraries? Do you like brainteasers? Then this is the book for you! In the tradition of Effective Java™ , Bloch and Gafter dive deep into the subtleties of the Java programming language and its core libraries. Illustrated with visually stunning optical illusions, Java™ Puzzlers features 95 diabolical puzzles that educate and entertain. Anyone with a working knowledge of Java will understand the puzzles, but even the most seasoned veteran will find them challenging. Most of the puzzles take the form of a short program whose behavior isn't what it seems. Can you figure out what it does? Puzzles are grouped loosely according to the features they use, and detailed solutions follow each puzzle. The solutions go well beyond a simple explanation of the program's behavior--they show you how to avoid the underlying traps and pitfalls for good. A handy catalog of traps and pitfalls at the back of the book provides a concise taxonomy for future reference. Solve these puzzles and you'll never again fall prey to the counterintuitive or obscure behaviors that can fool even the most experienced programmers.
    Note: Includes bibliographical references (p. 265-269) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 4th ed.
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Electronic books ; local
    Abstract: " C++ Primer is well known as one of the best books for learning C++ and is useful for C++ programmers of all skill levels. This Fourth Edition not only keeps this tradition alive, it actually improves on it." --Steve Vinoski, Chief Engineer, Product Innovation, IONA Technologies " The Primer really brings this large and complex language down to size." --Justin Shaw, Senior Member of Technical Staff, Electronic Programs Division, The Aerospace Corporation "It not only gets novices up and running early, but gets them to do so using good programming practices." --Nevin ":-)" Liber, Senior Principal Engineer (C++ developer since 1988) This popular tutorial introduction to standard C++ has been completely updated, reorganized, and rewritten to help programmers learn the language faster and use it in a more modern, effective way. Just as C++ has evolved since the last edition, so has the authors' approach to teaching it. They now introduce the C++ standard library from the beginning, giving readers the means to write useful programs without first having to master every language detail. Highlighting today's best practices, they show how to write programs that are safe, can be built quickly, and yet offer outstanding performance. Examples that take advantage of the library, and explain the features of C++, also show how to make the best use of the language. As in its previous editions, the book's authoritative discussion of fundamental C++ concepts and techniques makes it a valuable resource even for more experienced programmers. Program Faster and More Effectively with This Rewritten Classic Restructured for quicker learning, using the C++ standard library Updated to teach the most current programming styles and program design techniques Filled with new learning aids that emphasize important points, warn about common pitfalls, suggest good programming practices, and provide general usage tips Complete with exercises that reinforce skills learned Authoritative and comprehensive in its coverage The source code for the book's extended examples is available on the Web at the address below. www.awprofessional.com/cpp_primer
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 369 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Linux ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: Covers Red Hat and SUSE When something goes wrong with your Linux firewall, you need to fix it-right now. You don't have time for endless newsgroup searches, confusing man pages, emails to the developers... it's an emergency! One book brings together all the step-by-step solutions and proven problem-solving techniques you'll need when the time comes: Troubleshooting Linux® Firewalls . Authors Michael Shinn and Scott Shinn are among the world's leading firewall experts; they've even been hired to protect computer security at the White House. In this book, they cover every area where Linux firewalls can go wrong: rules and filtering problems, Layer 2/3/4 issues, trouble with individual services, DNS/DHCP failures, even misconfigured VPNs. They also present an easy, start-to-finish troubleshooting methodology that'll help you identify even the newest or most obscure firewall problem fast-and solve it! Inside, you will find in-depth information on the following areas: What you must know about iptables and netfilter to troubleshoot and avoid problems Using loggers, sniffers, and other tools to diagnose even the most obscure firewall problems Making sure your firewall rules work the way they're supposed to Resolving problems with Network Address Translation and IP Forwarding Troubleshooting SMTP, Apache, Squid, NFS, FTP, instant messaging, and other Web-based services Finding and fixing common problems with IPsec VPN configuration Making your firewalls more failure-resistant: recommendations from the experts If you depend on a Linux firewall, what will you do if it goes down? With Troubleshooting Linux® Firewalls , you can be confident that the solutions are right at hand-so you can sleep at night! © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 396 p. , ill. ; , 23 cm
    DDC: 004.692
    Keywords: Spam (Electronic mail) ; Spam filtering (Electronic mail) ; Electronic books ; local
    Abstract: Real Anti-Spam Help for System Administrators In Slamming Spam , two spam fighters show you how to fight back-and win. Unlike most spam books, this one is written specifically for in-the-trenches system administrators: professionals who need hands-on solutions for detecting, managing, and deterring spam in Unix/Linux and/or Microsoft Windows environments. The authors offer deep, administrator-focused coverage of the most valuable open-source tools for reducing spam's impact in the enterprise-especially SpamAssassin. Drawing on their extensive experience in developing and implementing anti-spam tools, the authors present expert insights into every leading approach to fighting spam, including Bayesian filtering, distributed checksum filtering, and email client filtering. Coverage includes Step-by-step junk mail filtering with Procmail Protecting Sendmail, Postfix, qmail, Microsoft Exchange, and Lotus Domino servers from spam Making the most of native MTA anti-spam features, including whitelists/blacklists, DNS black hole services, and header checking Distributed checksum filtering solutions, including Vipul's Razor and Distributed Checksum Clearinghouse McAfee SpamKiller for Lotus Domino McAfee SpamKiller for Microsoft Exchange Implementing and managing SpamAssassin Implementing SMTP AUTH, providing effective outbound SMTP authentication and relaying with any mail client; and STARTTLS, encrypting outbound mail content, user names, and passwords Sender verification techniques, including challenge/response, special use addresses, and sender compute Anti-spam solutions for Outlook, Outlook Express, Mozilla Messenger, and Unix mail clients Whatever your IT environment and mail platform, Slamming Spam's defense in-depth strategies can help you dramatically reduce spam and all its attendant costs-IT staff time, network/computing resources, and user productivity. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 363-374) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.5/7
    Keywords: Microsoft Outlook ; Electronic mail systems ; Computer programs ; Personal information management ; Computer programs ; Time management ; Computer programs ; Electronic books ; local
    Abstract: Discover many useful customizations you can do with Outlook to improve efficiency both at home and on the job. Get more out of Outlook! The Outlook Answer Book brings together hundreds of bite-size tips and tricks for saving time, using Outlook more efficiently, uncovering its hidden power, and overcoming its quirks and pitfalls. With this book's fast-paced Q&A format, you can find new ideas and better solutions fast. From Favorite Folders to the Journal, you'll learn how to take advantage of Outlook features you've never used-or even noticed! You'll master simple techniques for automating routine tasks...customizations that make Outlook far more powerful...easy backup and troubleshooting solutions...even new ways to protect your privacy and security. Bite-size, useful items include FAQ 1.5 How Can I Get Outlook to Start Automatically? FAQ 1.8 Can I Add Shortcuts to the Quick Launch Bar for Specific Outlook Tasks? FAQ 4.54 How Can I Open Blocked E-mail Attachments? FAQ 6.33 How Do I Share My Notes with Others? FAQ 7.1 What Is the Difference Between Journaling and Other Outlook Features Such As Notes and Tasks? FAQ 9.15 What Is the Research Service? FAQ 10.10 How Do I Customize a Default Outlook Form? FAQ 14.1 What Is Outlook Web Access (OWA)? FAQ 14.39 How Can I Get a Map Showing the Location of a Contact's Address? FAQ 16.26 How Do I Recover Items from a Backup? © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    ISBN: 0321267974
    Language: English
    Pages: xviii, 475 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    Series Statement: The Addison-Wesley object technology series
    Parallel Title: Erscheint auch als
    DDC: 005.1
    Keywords: Computer software Development ; UML (Computer science) ; Electronic books ; local ; Computer software ; Development ; UML (Computer science) ; UML (Informatique) ; Engenharia de software ; Uml
    Abstract: For nearly ten years, the Unified Modeling Language (UML) has been the industry standard for visualizing, specifying, constructing, and documenting the artifacts of a software-intensive system. As the de facto standard modeling language, the UML facilitates communication and reduces confusion among project stakeholders. The recent standardization of UML 2.0 has further extended the language's scope and viability. Its inherent expressiveness allows users to model everything from enterprise information systems and distributed Web-based applications to real-time embedded systems. In this eagerly anticipated revision of the best-selling and definitive guide to the use of the UML, the creators of the language provide a tutorial to its core aspects in a two-color format designed to facilitate learning. Starting with an overview of the UML, the book explains the language gradually by introducing a few concepts and notations in each chapter. It also illustrates the application of the UML to complex modeling problems across a variety of application domains. The in-depth coverage and example-driven approach that made the first edition of The Unified Modeling Language User Guide an indispensable resource remain unchanged. However, content has been thoroughly updated to reflect changes to notation and usage required by UML 2.0. Highlights include: A new chapter on components and internal structure, including significant new capabilities for building encapsulated designs New details and updated coverage of provided and required interfaces, collaborations, and UML profiles Additions and changes to discussions of sequence diagrams, activity diagrams, and more Coverage of many other changes introduced by the UML 2.0 specification With this essential guide, you will quickly get up to speed on the latest features of the industry standard modeling language and be able to apply them to your next software project.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 299 p. ; , 23 cm
    Edition: 1st ed.
    DDC: 302.23/0973
    Keywords: Facts and Comparisons electronic resources ; Digital media ; United States ; Internet ; Political aspects ; United States ; Internet ; Social aspects ; United States ; Mass media and technology ; United States ; Online journalism ; United States ; Web publishing ; United States ; Electronic books ; local
    Abstract: " We the Media , has become something of a bible for those who believe the online medium will change journalism for the better." -Financial Times Big Media has lost its monopoly on the news, thanks to the Internet. Now that it's possible to publish in real time to a worldwide audience, a new breed of grassroots journalists are taking the news into their own hands. Armed with laptops, cell phones, and digital cameras, these readers-turned-reporters are transforming the news from a lecture into a conversation. In We the Media , nationally acclaimed newspaper columnist and blogger Dan Gillmor tells the story of this emerging phenomenon and sheds light on this deep shift in how we make--and consume--the news. Gillmor shows how anyone can produce the news, using personal blogs, Internet chat groups, email, and a host of other tools. He sends a wake-up call tonewsmakers-politicians, business executives, celebrities-and the marketers and PR flacks who promote them. He explains how to successfully play by the rules of this new era and shift from "control" to "engagement." And he makes a strong case to his fell journalists that, in the face of a plethora of Internet-fueled news vehicles, they must change or become irrelevant. Journalism in the 21st century will be fundamentally different from the Big Media oligarchy that prevails today. We the Media casts light on the future of journalism, and invites us all to be part of it. Dan Gillmor is founder of Grassroots Media Inc., a project aimed at enabling grassroots journalism and expanding its reach. The company's first launch is Bayosphere.com, a site "of, by, and for the San Francisco Bay Area." Dan Gillmor is the founder of the Center for Citizen Media, a project to enable and expand reach of grassroots media. From 1994-2004, Gillmor was a columnist at the San Jose Mercury News , Silicon Valley's daily newspaper, and wrote a weblog for SiliconValley.com. He joined the Mercury News after six years with the Detroit Free Press . Before that, he was with the Kansas City Times and several newspapers in Vermont. He has won or shared in several regional and national journalism awards. Before becoming a journalist he played music professionally for seven years.
    Note: "Web site directory": p. 251-257. - Includes bibliographical references (p. 261-279) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Language: English
    Pages: x, 179 p. ; , 24 cm
    Edition: 1st ed.
    DDC: 004.6'92
    Keywords: Electronic mail systems ; Electronic books ; local
    Abstract: If you had a list of the words used to describe sendmail, they'd probably include reliable, flexible, configurable, complex, monolithic, and daunting. But you're not likely to find the word easy. Even seasoned sendmail pros are sometimes frustrated by the intricacies of sendmail's configuration files. With a little determination and the help of a good reference book, like sendmail , Third Edition, you can master this demanding program. But when there's a significant point release, like sendmail V8.13, where do you turn? An excellent companion to our popular sendmail , Third Edition, the sendmail 8.13 Companion provides a timely way to document the improvements in V8.13 in parallel with its release. The book highlights the important changes in the latest update to sendmail, pointing out not just what is handy or nice to have, but what's critical in getting the best behavior from sendmail. This is especially important now that spam is on the rise, and because mobile technology requires roving laptops to use encrypted connections. Not surprisingly, many of the changes and additions to V8.13 have been driven by the ongoing fight against spam. Anyone concerned about spam--and who isn't?--will benefit greatly by upgrading to V8.13 sendmail. Among its many enhancements, V8.13 includes new routines that support the SPF sending site authentication standard (in the Milter library), simultaneous connection control, high connection rate control, and finer tuning of SASL parameters. The additions to the Milter library, alone, make upgrading worthwhile, but sendmail's connection control makes it a no-brainer. The key to understanding them is the sendmail 8.13 Companion . The book is divided into twenty-five chapters that parallel the chapters in the third edition of the sendmail book. For instance, if you're interested in Options configuration (Chapter 24 in sendmail), you'll turn to Chapter 24 in your companion volume to find out what's new in V8.13. For a simple dot release (8.12 to 8.13), V8.13 sendmail has added more features, options, and fundamental changes than any other single dot release has included. If you need to set up or manage sendmail, you'll want this companion volume close at hand. Even if you aren't ready to upgrade to V8.13, you'll find the key to understanding them is the sendmail 8.13 Companion a useful guide to understanding and staying current with the latest changes in sendmail.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 350 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: Internet programming ; PHP (Computer program language) ; Electronic books ; local
    Abstract: PHP has gained a following among non-technical web designers who need to add interactive aspects to their sites. Offering a gentle learning curve, PHP is an accessible yet powerful language for creating dynamic web pages. As its popularity has grown, PHP's basic feature set has become increasingly more sophisticated. Now PHP 5 boasts advanced features--such as new object-oriented capabilities and support for XML and Web Services--that will please even the most experienced web professionals while still remaining user-friendly enough for those with a lower tolerance for technical jargon.If you've wanted to try your hand at PHP but haven't known where to start, then Learning PHP 5 is the book you need. If you've wanted to try your hand at PHP but haven't known where to start, then Learning PHP 5 is the book you need. With attention to both PHP 4 and the new PHP version 5, it provides everything from a explanation of how PHP works with your web server and web browser to the ins and outs of working with databases and HTML forms. Written by the co-author of the popular PHP Cookbook , this book is for intelligent (but not necessarily highly-technical) readers. Learning PHP 5 guides you through every aspect of the language you'll need to master for professional web programming results. This book provides a hands-on learning experience complete with exercises to make sure the lessons stick. Learning PHP 5 covers the following topics, and more: How PHP works with your web browser and web server PHP language basics, including data, variables, logic and looping Working with arrays and functions Making web forms Working with databases like MySQL Remembering users with sessions Parsing and generating XML Debugging Written by David Sklar, coauthor of the PHP Cookbook and an instructor in PHP, this book offers the ideal classroom learning experience whether you're in a classroom or on your own. From learning how to install PHP to designing database-backed web applications, Learning PHP 5 will guide you through every aspect of the language you'll need to master to achieve professional web programming results.
    Note: "A pain-free introduction to building interactive web sites"--Cover. - 1st ed., 2004. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 243 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Java (Computer program language) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Sometimes the simplest answer is the best. Many Enterprise Java developers, accustomed to dealing with Java's spiraling complexity, have fallen into the habit of choosing overly complicated solutions to problems when simpler options are available. Building server applications with "heavyweight" Java-based architectures, such as WebLogic, JBoss, and WebSphere, can be costly and cumbersome. When you've reached the point where you spend more time writing code to support your chosen framework than to solve your actual problems, it's time to think in terms of simplicity.In Better, Faster, Lighter Java , authors Bruce Tate and Justin Gehtland argue that the old heavyweight architectures are unwieldy, complicated, and contribute to slow and buggy application code. As an alternative means for building better applications, the authors present two "lightweight" open source architectures: Hibernate--a persistence framework that does its job with a minimal API and gets out of the way, and Spring--a container that's not invasive, heavy or complicated.Hibernate and Spring are designed to be fairly simple to learn and use, and place reasonable demands on system resources. Better, Faster, Lighter Java shows you how they can help you create enterprise applications that are easier to maintain, write, and debug, and are ultimately much faster.Written for intermediate to advanced Java developers, Better, Faster, Lighter Java , offers fresh ideas--often unorthodox--to help you rethink the way you work, and techniques and principles you'll use to build simpler applications. You'll learn to spend more time on what's important. When you're finished with this book, you'll find that your Java is better, faster, and lighter than ever before.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Language: English
    Pages: xvii, 374 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Relational databases ; Electronic books ; local
    Abstract: An enormous system comprising myriad technologies, options, and releases, Oracle's complexities have spawned numerous areas of specialization. For each area of specialization there are equally specialized how-to books and manuals. O'Reilly's Oracle Essentials claims a unique place among these books. Rather than focusing on one area, the book explains the foundational concepts of the Oracle technology and the core technical and business aspects of using it.The new edition of this classic book, Oracle Essentials, 3rd Edition: Oracle Database 10 g, distills a vast amount of knowledge into an easy-to-read volume covering every aspect of the Oracle database. Readers of all levels will learn about Oracle's features and technologies, including the product line, architecture, data structures, networking, concurrency, tuning, and much more.Featuring focused text, abundant illustrations, and helpful hints, the new edition offers a valuable overview of Oracle's Database 10 g --the industry's first database to support grid computing. Recent releases such as Oracle 9 i and 8 i are also covered. The book contains chapters on: Oracle products, options, and overall architecture for Oracle 10 g and prior recent releases Installing and running Oracle: how to configure, start up, and shut down the database, and various networking issues Oracle data structures, datatypes, and ways of extending datatypes, with an introduction to Oracle objects (e.g., tables, views, indexes) Managing Oracle: security, the Oracle Enterprise Manager, fragmentation and reorganization, and backup and recovery Oracle performance: characteristics of disk, memory, and CPU tuning Multi-user concurrency, online transaction processing (OLTP), and high availability Hardware architectures (e.g., SMP, MPP, NUMA) and their impact on Oracle Data warehousing and distributed databases Network deployment: using Oracle as an Internet computing platform and for grid computing What's new in Oracle 10 g : a summary of the database changes described in the book Oracle Essentials, 3rd Edition: Oracle Database 10 g was written for anyone whose job involves managing or building systems using Oracle DBMS technology or working with staff that uses Oracle technology. This book is the perfect all-in-one source for understanding the complexities and capabilities of Oracle.
    Note: "What you need to know about oracle database architecture and features"--Cover. - Includes bibliographical references (p. 347-355) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 460 p. , ill. ; , 23 cm
    DDC: 005.72
    Keywords: XML (Document markup language) ; Electronic books ; local
    Abstract: Developers and system administrators alike are uncovering the true power of XML, the Extensible Markup Language that enables data to be sent over the Internet from one computer platform to another or one application to another and retain its original format. Flexible enough to be customized for applications as diverse as web sites, electronic data interchange, voice mail systems, wireless devices, web services, and more, XML is quickly becoming ubiquitous. XML Hacks is a roll-up-your-sleeves guide that distills years of ingenious XML hacking into a complete set of practical tips, tricks, and tools for web developers, system administrators, and programmers who want to go far beyond basic tutorials to leverage the untapped power of XML.With plenty of useful real-world projects that illustrate how to define, read, create, and manipulate XML documents, XML Hacks shows readers how to put XML's power to work on the Internet and within productivity applications. Each Hack in this book can be read easily in a few minutes, saving programmers and administrators countless hours of searching for the right answer. And this is an O'Reilly Hacks book, so it's not just practical, imminently useful, and time-saving. It's also fun.From Anatomy of an XML Document to Exploring SOAP Messages XML Hacks shows you how to save time and accomplish more with fewer resources. If you want much more than the average XML user--to explore and experiment, do things you didn't know you could do with XML, discover clever shortcuts, and show off just a little--this invaluable book is a must-have.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 409 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.7/1376
    Keywords: Internet Relay Chat ; Electronic books ; local
    Abstract: IRC (Internet Relay Chat) may very well turn out to be the world's most successful hack. In 1988, Jarkko Oikarinen wrote the original IRC program at the University of Oulu, Finland. As he says in his foreword, "IRC started as one summer trainee's programming exercise. A hack grew into a software development project that hundreds of people participated in, and then became a worldwide environment where tens of thousands of people now spend time with each other. I have found many of my friends through IRC and learnt a significant part of my present software engineering knowledge while using and working with IRC. That would not have been possible without learning from code examples and hacks from others".IRC has continued to grow in popularity since its inception. Millions of people from all over the world now use IRC to chat with friends, discuss projects and collaborate on research. With a simple, clearly defined protocol, IRC has become one of the most accessible chat environments, with clients written for a multitude of operating systems. And IRC is more than just a simple chat system it is a network of intercommunicating servers, allowing thousands of clients to connect from anywhere in the world using the IRC protocol.While IRC is easy to get into and many people are happy to use it without being aware of what's happening under the hood, there are those who hunger for more knowledge, and this book is for them. IRC Hacks is a collection of tips and tools that cover just about everything needed to become a true IRC master, featuring contributions from some of the most renowned IRC hackers, many of whom collaborated on IRC, grouping together to form the channel #irchacks on the freenode IRC network (irc.freenode.net).Like all of our Hacks books, there are many different ways to use IRC Hacks . You can read the book from cover to cover, but you might be better served by picking an interesting item from the table of contents and just diving in.If you're relatively new to IRC, you should considering starting with a few hacks from each progressive chapter. Chapter 1 starts you off by showing you how to connect to IRC, while Chapter 2 acquaints you with the everyday concepts you'll need to use IRC effectively. Chapter 3 is all about users and channels, and introduces the first pieces of code. Chapter 4 shows you how to make useful enhancements to IRC clients.Chapter 5 is where you will learn the basics about creating IRC bots, with Chapters 6-...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 193 , ill., forms ; , 24 cm
    Edition: 1st ed.
    DDC: 346.0482
    Keywords: Computer software industry ; Licenses ; Copyright ; Computer programs ; Free computer software ; law and legislation ; Open source software ; Law and legislation ; Electronic books ; local
    Abstract: If you've held back from developing open source or free software projects because you don't understand the implications of the various licenses, you're not alone. Many developers believe in releasing their software freely, but have hesitated to do so because they're concerned about losing control over their software. Licensing issues are complicated, and both the facts and fallacies you hear word-of-mouth can add to the confusion. Understanding Open Source and Free Software Licensing helps you make sense of the different options available to you. This concise guide focuses on annotated licenses, offering an in-depth explanation of how they compare and interoperate, and how license choices affect project possibilities. Written in clear language that you don't have to be a lawyer to understand, the book answers such questions as: What rights am I giving up? How will my use of OS/FS licensing affect future users or future developers? Does a particular use of this software--such as combining it with proprietary software--leave me vulnerable to lawsuits?Following a quick look at copyright law, contracts, and the definition of "open source," the book tackles the spectrum of licensing, including: The MIT (or X), BSD, Apache and Academic Free licenses The GPL, LGPL, and Mozilla licenses The QT, Artistic, and Creative Commons licenses Classic Proprietary licenses Sun Community Source license and Microsoft Shared Source project The book wraps up with a look at the legal effects--both positive and negative--of open source/free software licensing.Licensing is a major part of what open source and free software are all about, but it's still one of the most complicated areas of law. Even the very simple licenses are tricky. Understanding Open Source and Free Software Licensing bridges the gap between the open source vision and the practical implications of its legal underpinnings. If open source and free software licenses interest you, this book will help you understand them. If you're an open source/free software developer, this book is an absolute necessity.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 1228 p. , ill. ; , 23 cm
    DDC: 005.2/768
    Keywords: Microsoft Visual studio ; Microsoft Windows (Computer file) ; Application software ; Development ; C# (Computer program language) ; Microsoft .NET Framework ; User interfaces (Computer systems) ; Electronic books ; local
    Abstract: For those of you who develop standalone Windows applications for PCs and other devices, Microsoft's .NET Windows Forms provide a much better way to get it done. This new technology gives you more power and flexibility for a fraction of the effort compared to classic Win32 development, with a streamlined programming model that deals automatically with many tedious details that once plagued developers. As with most things .NET, the only hitch is the learning curve. But that's where acclaimed author Jesse Liberty makes the difference with Programming .NET Windows Applications . With this tutorial, you will explore all aspects of using .NET Windows Forms class libraries and the associated programming tools in Visual Studio .NET, enabling you to build applications for the Windows 9x, Windows 2000 and Windows XP desktop platforms. Step-by-step, you'll learn ways to design applications that either function alone on a PC, or work in combination with your web-based application server to take advantage of the richer interface and higher level of security. The book also explains how your new Windows applications can sidestep problems that used to arise from the use of DLLs (known collectively as "DLL hell"), and how .NET Windows Forms can be used as an alternative to ASP.NET and browser-based approaches for building web application clients. Jesse Liberty definitely knows his stuff when it comes to the .NET platform. As the author of O'Reilly's Programming C# and Learning Visual Basic .NET , he's well-known for his clear and concise style that prompted one reviewer to say, "It's as if he knows exactly what questions I'm going to ask ahead of time." Jesse also co-authored Programming ASP.NET with contract programmer Dan Hurwitz, and now the two have teamed up again to bring you this comprehensive tutorial--without a doubt, the best source available for learning how to program with .NET Windows Forms.
    Note: "Covers .NET 1.1 & Visual studio .NET 2003" -- Cover. - "Rich client applications with C# or FB.NET" -- Cover. - Includes index. - Originally published 2003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 327 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: MySQL (Electronic resource) ; Object-oriented programming (Computer science) ; PHP (Computer program language) ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Abstract: If you're using PHP 4, then chances are good that an upgrade to PHP 5 is in your future. The more you've heard about the exciting new features in PHP 5, the sooner that upgrade is probably going to be. Although an in-depth, soup-to-nuts reference guide to the language is good to have on hand, it's not the book an experienced PHP programmer needs to get started with the latest release. What you need is a lean and focused guide that answers your most pressing questions: what's new with the technology, what's different, and how do I make the best use of it? In other words, you need a copy of Upgrading to PHP 5 . This book is targeted toward PHP developers who are already familiar with PHP 4. Rather than serve as a definitive guide to the entire language, the book zeroes in on PHP 5's new features, and covers these features definitively. You'll find a concise appraisal of the differences between PHP 4 and PHP 5, a detailed look at what's new in this latest version, and you'll see how PHP 5 improves on PHP 4 code. See PHP 4 and PHP 5 code side-by-side, to learn how the new features make it easier to solve common PHP problems. Each new feature is shown in code, helping you understand why it's there, when to use it, and how it's better than PHP 4. Short, sample programs are included throughout the book. Topics covered in Upgrading to PHP 5 include: The new set of robust object-oriented programming features An improved MySQL extension, supporting MySQL 4.1, prepared statements, and bound parameters Completely rewritten support for XML: DOM, XSLT, SAX, and SimpleXML Easy web services with SOAP SQLite, an embedded database library bundled with PHP 5 Cleaner error handling with exceptions Other new language features, such as iterators, streams, and more. Upgrading to PHP 5 won't make you wade through information you've covered before. Written by Adam Trachtenberg, coauthor of the popular PHP Cookbook , this book will take you straight into the heart of all that's new in PHP 5. By the time you've finished, you'll know PHP 5 in practice as well as in theory.
    Note: "All that's new in PHP 5, covers MySQL 4.1"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 283 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.54
    Keywords: Microsoft Excel (Computer file) ; Business ; Computer programs ; Electronic spreadsheets ; Electronic books ; local
    Abstract: If you think that getting creative with Excel means the underhanded tweaking of numbers, think again. Excel Hacks shows even the most experienced users how to do things with Excel they might never have thought of doing--and lets them have a little fun while they're at it.Microsoft Excel is not just the dominant spreadsheet in the world; it's also one of the most popular applications ever created. Its success lies not only in its power and flexibility, but also in its streamlined, familiar interface that casually conceals its considerable capabilities. You don't need to know everything that Excel can do in order to use it effectively, but if you're like the millions of Excel power users looking to improve productivity, then Excel Hacks will show you a wide variety of Excel tasks you can put to use, most of which are off the beaten path.With this book, Excel power users can bring a hacker's creative approach to both common and uncommon Excel topics--"hackers" in this sense being those who like to tinker with technology to improve it. The "100 Industrial Strength Tips and Tools" in Excel Hacks include little known "backdoor" adjustments for everything from reducing workbook and worksheet frustration to hacking built-in features such as pivot tables, charts, formulas and functions, and even the macro language.This resourceful roll-up-your-sleeves guide is for intermediate to advanced Excel users eager to explore new ways to make Excel do things--from data analysis to worksheet management to import/export--that you never thought possible. Excel Hacks will help you increase productivity with Excel and give you hours of "hacking" enjoyment along the way.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 531 , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 343 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: You've probably heard the buzz about Eclipse, the powerful open source platform that gives Java developers a new way to approach development projects. It's like a shiny new car--no longer content to just admire Eclipse, you're now itching to get in and drive. Eclipse is to Java developers what Visual Studio is to .NET developers--it's an integrated development environment (IDE) that combines a code editor, compiler, debugger, text editor, graphical user interface (GUI) builder, and other components into a single, user-friendly application. It provides a solid foundation that enables Java developers to construct and run integrated software-development tools for web development, application design, modeling, performance, testing, and much more. As with any extensive programming tool, however, there's a lot to learn. And there s no better guy than well-known Java expert Steve Holzner to teach you. An award-winning and best-selling author who has been writing about Java topics since the language first appeared, Holzner delivers just the kind of targeted, practical, everyday knowledge you need to hone your mastery of Eclipse. Perfect as a companion to an Eclipse programming tutorial (such as Holzner's own Eclipse , O'Reilly, April 2004) or an ideal stand-alone for all those developers who either don't want or don't need the tutorial approach, the Eclipse Cookbook contains task-oriented recipes for more than 800 situations you may encounter while using this new Java platform--from deploying a web application automatically to reverse engineering compiled code, from re-naming all references to a class across multiple packages to initializing the SWT JNI libraries. Each recipe in the ever-popular and utterly practical problem-solution-discussion format for O'Reilly cookbooks contains a clear and thorough description of the problem, a brief but complete discussion of a solution, and in-action examples illustrating that solution. The Eclipse Cookbook will satiate Java programmers at all levels who are ready to go beyond tutorials--far beyond writing plug-ins and extensions--and actually use the powerful and convenient Eclipse day to day.
    Note: "Covers Eclipse 3.0"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 427 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.4/32
    Keywords: Berkeley BSD (Computer file) ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, BSD also offers plenty of fertile ground for creative, time-saving tweaks and tricks, and yes, even the chance to have some fun."Fun?" you ask. Perhaps "fun" wasn't covered in the manual that taught you to install BSD and administer it effectively. But BSD Hacks , the latest in O'Reilly's popular Hacks series, offers a unique set of practical tips, tricks, tools--and even fun--for administrators and power users of BSD systems. BSD Hacks takes a creative approach to saving time and getting more done, with fewer resources. You'll take advantage of the tools and concepts that make the world's top Unix users more productive. Rather than spending hours with a dry technical document learning what switches go with a command, you'll learn concrete, practical uses for that command.The book begins with hacks to customize the user environment. You'll learn how to be more productive in the command line, timesaving tips for setting user-defaults, how to automate long commands, and save long sessions for later review. Other hacks in the book are grouped in the following areas: Customizing the User Environment Dealing with Files and Filesystems The Boot and Login Environments Backing Up Networking Hacks Securing the System Going Beyond the Basics Keeping Up-to-Date Grokking BSD If you want more than your average BSD user--you want to explore and experiment, unearth shortcuts, create useful tools, and come up with fun things to try on your own-- BSD Hacks is a must-have. This book will turn regular users into power users and system administrators into super system administrators.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 317 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Java programmers know how finicky Java can be to work with. An omitted semi-colon or the slightest typo will cause the Java command-line compiler to spew pages of annoying error messages across your screen. And it doesn't fix them--that's up to you: fix them, compile again, and hope that nothing goes wrong this time.Eclipse, the popular Java integrated development environment (IDE) provides an elegant and powerful remedy for this common, frustrating scenario. It doesn't just catch your errors before you compile, it also suggests solutions. All you need to do is point and click. And it's free--what could be better? Still, if you're like most programmers, mastering a new technology--no matter how productive it will make you in the long run--is going to take a chunk out of your productivity now. You want to get up to speed quickly without sacrificing efficiency.O'Reilly's new guide to the technology, Eclipse , provides exactly what you're looking for: a fast-track approach to mastery of Eclipse. This insightful, hands-on book delivers clear and concise coverage, with no fluff, that gets down to business immediately. The book is tightly focused, covering all aspects of Eclipse: the menus, preferences, views, perspectives, editors, team and debugging techniques, and how they're used every day by thousands of developers. Development of practical skills is emphasized with dozens of examples presented throughout the book.From cover-to-cover, the book is pure Eclipse, covering hundreds of techniques beginning with the most basic Java development through creating your own plug-in editors for the Eclipse environment. Some of the topics you'll learn about include: Using Eclipse to develop Java code Testing and debugging Working in teams using CVS Building Eclipse projects using Ant The Standard Widget Toolkit (SWT) Web development Developing Struts applications with Eclipse From basics to advanced topics, Eclipse takes you through the fundamentals of Eclipse and more. You may be an Eclipse novice when you pick up the book, but you'll be a pro by the time you've finished.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 723 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.2/762
    Keywords: JavaServer pages ; Java (Computer program language) ; Servlets ; Web site development ; Electronic books ; local
    Abstract: With literally hundreds of examples and thousands of lines of code, the Java Servlet and JSP Cookbook yields tips and techniques that any Java web developer who uses JavaServer Pages or servlets will use every day, along with full-fledged solutions to significant web application development problems that developers can insert directly into their own applications. Java Servlet and JSP Cookbook presents real-world problems, and provides concise, practical solutions to each. Finding even one tested code "recipe" that solves a gnarly problem in this comprehensive collection of solutions and best practices will save hours of frustration--easily justifying the cost of this invaluable book.But "Java Servlet and JSP Cookbook" is more than just a wealth of cut-and-paste code. It also offers clear explanations of how and why the code works, warns of potential pitfalls, and directs you to sources of additional information, so you can learn to adapt the problem-solving techniques to similar situations.These recipes include vital topics like the use of Ant to setup a build environment, extensive coverage of the WAR file format and web.xml deployment descriptor, file-uploading, error-handling, cookies, logging, dealing with non-HTML content, multimedia, request filtering, web services, I18N, web services, and a host of other topics that frustrate even the most seasoned developers.For Java web developers of all levels who are eager to put into practice the theory presented in other API-focused books, the solutions presented in this practical book will prove invaluable over and over again. This is painless way for less experienced developers who prefer to learn by doing to expand their skills and productivity, while accomplishing practical solutions to the pressing problems they face every day. More experienced developers can use these recipes to solve time-consuming problems quickly, freeing up their time for the more creative aspects of their work.
    Note: Includes bibliographic references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Language: English
    Pages: xvi, 276 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.75/65
    Keywords: Database management ; Relational databases ; SQL (Computer program language) ; Electronic books ; local
    Abstract: As users come to depend on MySQL, they find that they have to deal with issues of reliability, scalability, and performance--issues that are not well documented but are critical to a smoothly functioning site. This book is an insider's guide to these little understood topics.Author Jeremy Zawodny has managed large numbers of MySQL servers for mission-critical work at Yahoo!, maintained years of contacts with the MySQL AB team, and presents regularly at conferences. Jeremy and Derek have spent months experimenting, interviewing major users of MySQL, talking to MySQL AB, benchmarking, and writing some of their own tools in order to produce the information in this book.In High Performance MySQL you will learn about MySQL indexing and optimization in depth so you can make better use of these key features. You will learn practical replication, backup, and load-balancing strategies with information that goes beyond available tools to discuss their effects in real-life environments. And you'll learn the supporting techniques you need to carry out these tasks, including advanced configuration, benchmarking, and investigating logs.Topics include: A review of configuration and setup options Storage engines and table types Benchmarking Indexes Query Optimization Application Design Server Performance Replication Load-balancing Backup and Recovery Security
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xx, 309 p. , ill. (chiefly col.) ; , 23 cm
    Edition: 1st ed.
    DDC: 775
    Keywords: Photography ; Digital techniques ; Electronic books ; local
    Abstract: Your digital camera is more than new incarnation of your old film camera. Yes, it still produces photos, but it also offers new outlets for creativity, including instant gratification of seeing your photos now, the ability to experiment without worrying about expense, the technology to fine-tune your photos with advanced professional techniques, and the means to share your work instantaneously with anyone, anyplace in the world. It's no wonder that digital cameras are outselling traditional cameras for the first time ever. But the question most digital camera users ask is this, "How do I get from taking 'decent' photos to doing the things I'd really like to do? How do I tap into that potential?" Digital Photography Hacks is your passport to taking the kind of digital photos you've always aspired to. Written by Derrick Story, photographer and author of Digital Photography Pocket Guide and other books, it goes beyond the standard fare of most digital photography books--such as camera basics, understanding memory cards, and when to use a flash--to the things that professional photographers have learned through thousands of shots' worth of experience, years of experimentation, and fiddling and hacking. The book includes a foreword by photographer Rick Smolan, author of America 24/7. With exquisite, full-color photos throughout, the book presents a collection of tips, tricks, and techniques for photographers ready to move beyond the basics. And if you don't have the latest in digital camera photography, this book will show you how to extend the life and functionality of your existing camera. All the hacks in the book are platform-agnostic, designed for use on both Mac on Windows-based computers. You'll find 100 proven techniques in the areas of: Daytime and nighttime photo secrets Flash magic Digital camera attachments The computer connection Photoshop magic Fun photo projects Camera phone tricks This book is for the photographer you are now, and the one you want to be. Digital Photography Hacks is for the creative adventurer who resides in each of us.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 269 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Snort (Computer file) ; Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools . This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
    Note: "Intrusion detection with open source tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 298 , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters. Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today. This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks will demonstrate effective methods for defending your servers and networks from a variety of devious and subtle attacks. Network Security Hacks show how to detect the presence (and track every keystroke) of network intruders, methods for protecting your network and data using strong encryption, and even techniques for laying traps for would-be system crackers. Important security tools are presented, as well as clever methods for using them to reveal real, timely, useful information about what is happening on your network. O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. Network Security Hacks lives up to reputation the Hacks series has earned by providing the "roll-up-your sleeves and get-it-done" hacks that most network security tomes don't offer. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Using just one of these amazing hacks will make this slim book's price seem like a remarkable deal. The other 99 make Network Security Hacks absolutely invaluable.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 455 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 006.7/4
    Keywords: Application program interfaces (Computer software) ; Microsoft .NET Framework ; XML (Document markup language) ; Electronic books ; local
    Abstract: If you're seeking ways to build network-based applications or XML-based web services, Microsoft provides most of the tools you'll need. XML is integrated into the .NET Framework and Visual Studio .NET, but if you want to get a grasp on how .NET and XML actually work together, that's a different story. With .NET & XML , you can get under the hood to see how the .NET Framework implements XML, giving you the skills to write understandable XML-based code that interoperates with code written with other tools, and even other languages. .NET & XML starts by introducing XML and the .NET Framework, and then teaches you how to read and write XML before moving on to complex methods for manipulating, navigating, transforming, and constraining it. To demonstrate the power of XML in .NET, author Niel Bornstein builds a simple hardware store inventory system throughout the book. As you move from chapter to chapter, you'll absorb increasingly complex information until you have enough knowledge to successfully program your own XML-based applications. This tutorial also contains a quick reference to the API, plus appendices present additional .NET assemblies that you can use to work with XML, and how to work with the .NET XML configuration file format. One study puts the potential market for new software based on XML at or near $100 billion over the next five years. The .NET Framework gives you a way to become a part of it. But to use XML and .NET effectively, you need to understand how these two technologies work together. This book gives you the insight to take full advantage of the power the two provide.
    Note: "Understanding the code and markup behind the wizards"--Cover. - Includes biblographic references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 831 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: C# (Computer program language) ; Electronic books ; local
    Abstract: Easy to learn and use, the C# language is targeted at developers for Microsoft's .NET platform who've worked with a C-like language before, such as C, C++, or Java. There's no shortage of excellent tutorials and documentation to help new developers get a handle on the language, such as O'Reilly's Learning C# or Programming C# . But when you need practical answers to the day-to-day questions you run up against, a tutorial isn't going to do the trick. The C# Cookbook gets straight to the heart of the problem with code recipes collected especially for developers working on the .NET platform. The C# Cookbook offers a definitive collection of solutions and examples for this new programming language. Recipes range from simple tasks to the more complex, and are organized with respect to the types of problems you'll need to solve as you progress in your experience as a C# programmer. Nearly every recipe contains a complete, documented code sample showing you how to solve the specific problem, as well as a discussion of how the underlying technology works and a discussion of alternatives, limitations, and other considerations where appropriate. The recipes in the C# Cookbook are organized into seventeen chapters, each of which focuses on a particular topic in creating C# solutions. Among the topics covered, you'll find: Numeric data types in C# Strings and characters Classes and structures Exception handling Delegates and events Regular expressions Data structures and algorithms Networking Security Unsafe Code You don't need to be an experienced C# or .NET developer to use this book. The C# Cookbook is designed for users of all levels with recipes targeted at the real-world developer who needs to solve problems now, not learn lots of theory first. With this guide, all developers will be able to learn and improve their mastery of both the language and the .NET Framework Class Libraries.
    Note: "The definitive collection of solutions and examples"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxv, 271 p. , col. ill. ; , 26 cm
    Edition: 1st ed.
    DDC: 005.7/2
    Keywords: Cascading style sheets ; Web publishing ; Web sites ; Design ; Electronic books ; local
    Abstract: Ready to commit to using more CSS on your sites? If you are a hands-on learner who has been toying with CSS and want to experiment with real-world projects that will enable you to see how CSS can help resolve design issues, this book is written just for you! CSS master Eric A. Meyer has picked up where Eric Meyer on CSS: Mastering the Language of Web Design left off. He has compiled 10 new, highly useful projects designed to encourage you to incorporate CSS into your sites and take advantage of the design flexibility, increased accessibility, decreased page weight, and cool visual effects CSS offers. Each project is laid out in an easy-to-follow, full color format complete with notes, warnings, and sidebars to help you learn through example rather than theory. Some of the concepts covered include: • Converting an HTML-based design to a pure positioning layout • Styling a photo gallery • Using background images to achieve cross-browser translucency effects • Using lists of links to create tabs and drop down menus without the use of JavaScript • Styling weblog entries, and placing them in a full-page design • Creating a design for the CSS Zen Garden
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxxiii, 539 p. , ill. (some col.) ; , 26 cm
    DDC: 794.8/1526
    Keywords: Computer games ; Design ; Computer games ; Programming ; Computer graphics ; Electronic books ; local
    Abstract: David Freeman brings you the inside scoop on how to apply the Emotioneering™ techniques he's so well known for. These powerful techniques create a breadth and depth of emotion in a game, and induce a player to identify with the role he or she is playing. Mr. Freeman's techniques are so highly sought after because they're the key to mass market success in today's competitive game market. The over 300 distinct Emotioneering techniques in this book include (to name but a few): ways to give emotional depth to an NPC (non-player character), even if the NPC has just one line of dialogue; techniques to bond a player to a game's NPCs; and techniques to transform a game into an intense emotional journey. In a warm and crystal-clear style, Mr. Freeman provides examples which demonstrate exactly how to apply the techniques. He also shows how some of these techniques were utilized in, and contributed greatly to the success of such games as "Grand Theft Auto: Vice City"; "Deus Ex"; and "Thief" I & II, among others. The book is packed with striking art by some of today's top concept artists and illustrators, including an eight-page color section and a four-color, fold-out cover. When you've finished this book, you'll be equipped to apply Mr. Freeman's powerful Emotioneering techniques to artfully create emotion in the games you design, build, or produce.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxi, 405 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 004.692
    Keywords: Electronic mail systems ; Java (Computer program language) ; Telecommunication ; Message processing ; Electronic books ; local
    Abstract: The authoritative guide to JMS for enterprise developers. JMS API is gaining important popularity for Enterprise applications and there is no adequate documentation for JMS for the J2EE platform. This book covers not only the concepts, but also present simple examples to explain the concepts and real sample applications to show how to use those concepts and techniques. J2EE is commonly used for enterprise applications. The Java(tm) Message Service (JMS) API has been developed by Sun working in close cooperation with the leading enterprise messaging vendors. Enterprise messaging is now recognized as an essential tool for building enterprise applications. By combining Java technology with enterprise messaging, the JMS API provides a new, powerful tool for solving enterprise computing problems. Enterprise messaging provides a reliable, flexible service for the asynchronous exchange of critical business data and events throughout an enterprise. The JMS API adds to this a common API and provider framework that enables the development of portable, message based applications in the Java programming language.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxii, 835 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.75/8
    Keywords: ColdFusion ; Database design ; Web databases ; Electronic books ; local
    Abstract: The most comprehensive guide to learning and maximizing the latest version of ColdFusion. Inside ColdFusion MX begins with a discussion of ColdFusion MX and how it differs from previous versions of ColdFusion. The authors discuss the new ColdFusion Administration/Administration, integration with existing IDE's, recent language extensions, and the planning and development of ColdFusion applications under the new CF architecture. The book delves into a detailed discussion of the CFML language, the heart-and-soul of ColdFusion application development, including real-world example code and discussion on how to solve common problems. Coverage includes advanced application development topics, such as exception handling, interacting with other application/server resources, and extending ColdFusion MX with other technologies. The book discusses complex topics in an easy-to-follow and easy-to-understand way, focusing on the questions developers will ask when using the book for problem-solving.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xix, 910 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.4/465
    Keywords: Solaris (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Inside Solaris 9 gives administrators the information they'll need to upgrade to Solaris 9 and maximize the new features. Author Bill Calkins begins by laying the foundations of Solaris, then explains how to get set up with Solaris 9 (including any potential pitfalls). Next, system maintenance issues are covered such as setting up user accounts, managing file systems and processes, system security, monitoring and tuning, and backup and recovery. Solaris networking and service management issues round out the book, along with some excellent resources and a glossary.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 988 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.2/76
    Keywords: Active server pages ; Microsoft Visual BASIC ; C# (Computer program language) ; Web sites ; Computer programs ; Web sites ; Design ; Electronic books ; local
    Abstract: ASP.NET, successor to Microsoft's Active Server Pages (ASP), is so complete and flexible that a web developer's main difficulty may lie simply in weaving the pieces together for maximum efficiency. The new edition of Programming ASP.NET shows developers how to do just that. Updated for Version 1.1 of the NET framework and Visual Studio .NET 2003, the second edition of this bestselling .NET title will show you how to create dynamic, data-driven web sites and services using both C# and Visual Basic .NET. In Programming ASP.NET , Second Edition authors Jesse Liberty and Dan Hurwitz cover everything you need to know to be effective with ASP.NET. The book includes a comprehensive tutorial on Web Forms, which, in conjunction with Visual Studio .NET 2003, allow you to apply Rapid Application Development techniques (including drag-and-drop control placement) to web development. Programming ASP.NET includes extensive coverage of each type of server control, including Web server controls, HTML server controls, and custom controls. New material covers creating ASP.NET pages for mobile devices. Since most web applications and web services involve retrieving data and returning it to a client browser, Programming ASP.NET Second Edition also offers extensive coverage of data access issues. These include topics such as using ASP.NET's list-bound controls; accessing data using the ADO.NET object model, and updating data with or without transaction support. Programming ASP.NET also discusses such advanced topics as: Caching and performance Security Configuration and deployment If you're already familiar with Active Server Pages technology, you'll appreciate the in-depth focus and straightforward, easy-to-read approach for developing web pages and web services. Succinct, direct, and loaded with examples, Programming ASP.NET , Second Edition will help users at every level master ASP.NET without getting bogged down in the complexity of its features.
    Note: "Building Web applications and services using C# and VB.NET"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 574 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: Perl (Computer program language) ; Web site development ; Electronic books ; local
    Abstract: Among the many different approaches to "templating" with Perl--such as Embperl, Mason, HTML::Template, and hundreds of other lesser known systems--the Template Toolkit is widely recognized as one of the most versatile. Like other templating systems, the Template Toolkit allows programmers to embed Perl code and custom macros into HTML documents in order to create customized documents on the fly. But unlike the others, the Template Toolkit is as facile at producing HTML as it is at producing XML, PDF, or any other output format. And because it has its own simple templating language, templates can be written and edited by people who don't know Perl. In short, the Template Toolkit combines the best features of its competitors, with ease-of-use and flexibility, resulting in a technology that's fast, powerful and extensible, and ideally suited to the production and maintenance of web content and other dynamic document systems.In Perl Template Toolkit you'll find detailed coverage of this increasingly popular technology. Written by core members of the technology's development team, the book guides you through the entire process of installing, configuring, using, and extending the Template Toolkit. It begins with a fast-paced but thorough tutorial on building web content with the Template Toolkit, and then walks you through generating and using data files, particularly with XML. It also provides detailed information on the Template Toolkit's modules, libraries, and tools in addition to a complete reference manual.Topics in the book include: Getting started with the template toolkit The Template language Template directives Filters Plugins Extending the Template Toolkit Accessing databases XML Advanced static web page techniques Dynamic web content and web applications The only book to cover this important tool, Perl Template Toolkit is essential reading for any Perl programmer who wants to create dynamic web content that is remarkably easy to maintain. This book is your surefire guide to implementing this fast, flexible, and powerful templating system.
    Note: "Scalable templating for the Web"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 520 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: DHTML (Document markup language) ; Internet programming ; JavaScript (Computer program language) ; Electronic books ; local
    Abstract: On numerous online forums for JavaScript and DHTML, the majority of questions begin with "How do I...?" This new Cookbook provides the answers. After reading thousands of forum threads over the years, author and scripting pioneer Danny Goodman has compiled a list of problems that frequently vex scripters of various experience levels. He has now applied state-of-the-art ECMA and W3C DOM standards and used best practices to create this extensive collection of practical recipes that can bring your web pages to life.The JavaScript & DHTML Cookbook is all about adding value to the content of a web page. The book focuses on practical and sensible applications of scripting, rather than flying images and gratuitous color changes. For every problem Goodman addresses, there's a solution or "recipe"--a focused piece of code that web developers can insert directly into their applications. Yet, rather than just cut-and-paste code, you also get explanations of how and why the code works, so you can learn to adapt the problem-solving techniques to your designs.The recipes range from simple tasks, such as manipulating strings and validating dates in JavaScript, to entire libraries that demonstrate complex tasks, such as cross-browser positioning of HTML elements and sorting tables. This book contains over 150 recipes on the following topics: Working with interactive forms and style sheets Presenting user-friendly page navigation Creating dynamic content Producing visual effects for stationary content Positioning HTML elements Managing browser windows and multiple frames This book is the ideal companion to O'Reilly's JavaScript: The Definitive Guide and Dynamic HTML: The Definitive Reference . If you own either of these books, the JavaScript & DHTML Cookbook is a must.
    Note: "Solutions & examples for web programmers"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: ix, 118 p. ; , 18 cm
    Keywords: C# (Computer program language) ; Electronic books ; local
    Abstract: C# programmers all have one thing in common -- they're learning a new language. That fact alone brings challenges, frustrations, and constant demands on your patience. And, no matter how good your reference books are, you can't always stop to thumb through hundreds of pages to find the piece of information you need. Your answer is the C# Language Pocket Reference . Concise and easy to use, this handy pocket guide to C# comes from the authors of C# in a Nutshell , and is a must-have quick reference for anyone implementing this new object-oriented language.The C# Language Pocket Reference offers the convenience of a quick reference in a format that will actually fit in your pocket. The book includes a guide to C# language elements, a brief overview of the Framework Class library, a cross-reference for namespaces and assemblies, a list of compiler syntax and switches, a regular expressions reference guide, and more. You'll be surprised at how much information can fit into this slim volume.O'Reilly's Pocket References have become a favorite among programmers everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. When you've reached a sticking point in your work and need to get to a solution quickly, the new C# Language Pocket Reference is the book you'll want to have.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 400 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 006.74
    Keywords: XML (Document markup language) ; Electronic books ; local
    Abstract: This second edition of the bestselling Learning XML provides web developers with a concise but grounded understanding of XML (the Extensible Markup Language) and its potential-- not just a whirlwind tour of XML.The author explains the important and relevant XML technologies and their capabilities clearly and succinctly with plenty of real-life projects and useful examples. He outlines the elements of markup--demystifying concepts such as attributes, entities, and namespaces--and provides enough depth and examples to get started. Learning XML is a reliable source for anyone who needs to know XML, but doesn't want to waste time wading through hundreds of web sites or 800 pages of bloated text.For writers producing XML documents, this book clarifies files and the process of creating them with the appropriate structure and format. Designers will learn what parts of XML are most helpful to their team and will get started on creating Document Type Definitions. For programmers, the book makes syntax and structures clear. Learning XML also discusses the stylesheets needed for viewing documents in the next generation of browsers, databases, and other devices. Learning XML illustrates the core XML concepts and language syntax, in addition to important related tools such as the CSS and XSL styling languages and the XLink and XPointer specifications for creating rich link structures. It includes information about three schema languages for validation: W3C Schema, Schematron, and RELAX-NG, which are gaining widespread support from people who need to validate documents but aren't satisfied with DTDs. Also new in this edition is a chapter on XSL-FO, a powerful formatting language for XML. If you need to wade through the acronym soup of XML and start to really use this powerful tool, Learning XML , will give you the roadmap you need.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 422 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 006.7/6
    Keywords: ColdFusion ; Fusebox ; Application software ; Development ; Internet programming ; Electronic books ; local
    Abstract: Developers face a constant struggle to launch projects on time and under budget, especially without pulling all-nighters. Fusebox helps ensure successful projects by providing a framework that serves as a base for applications. It's a standard process that makes projects more manageable and simplifies maintenance and requests for change during development. With this book, you'll learn to make ColdFusion applications reliably successful by following a standardized system. In addition, relying on the Fusebox framework to help plan and organize your ColdFusion code will allow you to write increasingly complex and specialized applications. Jeff Peters and Nat Papovich , both members of the Fusebox Council, share their extensive experience in this book. They'll teach you to use Fusebox with your ColdFusion applications and develop a set of best practices for managing web projects. Read this book if you want to eliminate frustrations and roadblocks in your projects, such as unmanageable complexity, wasteful redundancy of effort, time-consuming code maintenance, and slow development speed.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxii, 565 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 658.4/038/011
    Keywords: Business enterprises ; Data processing ; Management ; Business records ; Management ; Database management ; Information resources management ; Information technology ; Management ; Knowledge management ; Management information systems ; Web sites ; Design ; Electronic books ; local
    Abstract: Today's businesses are overwhelmed with the need to create more content, faster, cutomized for more customers, and for more media than ever before. Managing Enterprise Content: A Unified Content Strategy provides the concepts, strategies, guidelines, processes, and technological options that will prepare enterprise content managers and authors to meet the increasing demands of creating, managing, and distributing content. Author Ann Rockley, along with the Rockley Group team, provides techniques that will help you define your content management requirements, build your vision, design your content architecture, pick the right tools, and overcome the hurdles of managing enterprise content. This book will help you visualize the broad spectrum of enterprise content, the requirements for effectively creating, managing, and delivering content, and the value of developing a unified content strategy for your organization.
    Note: Includes bibliographical references (p. [445]-448) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 314 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.75/65
    Keywords: (Computer program language) ; Electronic books ; local
    Abstract: A poorly performing database application not only costs users time, but also has an impact on other applications running on the same computer or the same network. SQL Tuning provides an essential next step for SQL developers and database administrators who want to extend their SQL tuning expertise and get the most from their database applications.There are two basic issues to focus on when tuning SQL: how to find and interpret the execution plan of an SQL statement and how to change SQL to get a specific alternate execution plan. SQL Tuning provides answers to these questions and addresses a third issue that's even more important: how to find the optimal execution plan for the query to use.Author Dan Tow outlines a timesaving method he's developed for finding the optimum execution plan--rapidly and systematically--regardless of the complexity of the SQL or the database platform being used. You'll learn how to understand and control SQL execution plans and how to diagram SQL queries to deduce the best execution plan for a query. Key chapters in the book include exercises to reinforce the concepts you've learned. SQL Tuning concludes by addressing special concerns and unique solutions to "unsolvable problems."Whether you are a programmer who develops SQL-based applications or a database administrator or other who troubleshoots poorly tuned applications, SQL Tuning will arm you with a reliable and deterministic method for tuning your SQL queries to gain optimal performance.
    Note: "Covers Oracle, DB2 & SQL server"--Cover. - "Generating optimal execution plans"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxi, 254 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 006.7
    Keywords: Digital media ; Home entertainment systems ; Interactive multimedia ; Electronic books ; local
    Abstract: TiVo Hacks helps you get the most out of your TiVo personal video recorder. Armed with just a screwdriver and basic understanding of PC hardware (or willingness to learn), preeminent hackability awaits. This book includes hacks for changing the order of recorded programs, activating the 30-second skip to blaze through commercials, upgrading TiVo's hard drive for more hours of recording, use of TiVo's Home Media Option to remotely schedule a recording via the Web, log in to the serial port for command-line access to programming data, log files, closed-captioning data, display graphics on the TiVo screen, and even play MP3s.Readers who use advanced hacks to put TiVo on their home network via the serial port, Ethernet, USB, or wireless (with 802.11b WiFi) will watch a whole new world open up. By installing various open source software packages, you can use TiVo for mail, instant messaging, caller-ID, and more. It's also easy to run a web server on TiVo to schedule recordings, access lists of recorded shows, and even display them on a web site. While TiVo gives viewers personalized control of their TVs, TiVo Hacks gives users personalized control of TiVo. Note: Not all TiVos are the same. The original TiVo, the Series 1, is the most hackable TiVo out there; it's a box thrown together with commodity parts and the TiVo code is running on open hardware. The Series 2 TiVo, the most commonly sold TiVo today, is not open. You won't see hacks in this book that involve modifying Series 2 software.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 267 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Parallel Title: Erscheint auch als
    DDC: 005.13/3
    Keywords: Database design ; Java (Computer program language) ; Relational databases ; Electronic books ; local
    Abstract: When creating complex Java enterprise applications, do you spend a lot of time thumbing through a myriad of books and other resources searching for what you hope will be the API that's right for the project at hand? Java Database Best Practices rescues you from having to wade through books on each of the various APIs before figuring out which method to use! This comprehensive guide introduces each of the dominant APIs (Enterprise JavaBeans, Java Data Objects, the Java Database Connectivity API (JDBC) as well as other, lesser-known options), explores the methodology and design components that use those APIs, and then offers practices most appropriate for different types and makes of databases, as well as different types of applications. Java Database Practices also examines database design, from table and database architecture to normalization, and offers a number of best practices for handling these tasks as well. Learn how to move through the various forms of normalization, understand when to denormalize, and even get detailed instructions on optimizing your SQL queries to make the best use of your database structure. Through it all, this book focuses on practical application of these techniques, giving you information that can immediately be applied to your own enterprise projects.Enterprise applications in today's world are about data-- whether it be information about a product to buy, a user's credit card information, or the color that a customer prefers for their auto purchases. And just as data has grown in importance, the task of accessing that data has grown in complexity. Until now, you have been left on your own to determine which model best suits your application, and how best to use your chosen API. Java Database Practices is the one stop reference book to help you determine what's appropriate for your specific project at hand. Whether it's choosing between an alphabet soup of APIs and technologies--EJB, JDO, JDBC, SQL, RDBMS, OODBMS, and more on the horizon, this book is an indispensable resource you can't do without.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 850 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    DDC: 621.39/16
    Keywords: Microcomputers ; Equipment and supplies ; Microcomputers ; Maintenance and repair ; Microcomputers ; Purchasing ; Microcomputers ; Upgrading ; Electronic books ; local
    Abstract: PC Hardware in a Nutshell is the practical guide to buying, building, upgrading, and repairing Intel-based PCs. A longtime favorite among PC users, the third edition of the book now contains useful information for people running either Windows or Linux operating systems. Written for novices and seasoned professionals alike, the book is packed with useful and unbiased information, including how-to advice for specific components, ample reference material, and a comprehensive case study on building a PC.In addition to coverage of the fundamentals and general tips about working on PCs, the book includes chapters focusing on motherboards, processors, memory, floppies, hard drives, optical drives, tape devices, video devices, input devices, audio components, communications, power supplies, and maintenance. Special emphasis is given to upgrading and troubleshooting existing equipment so you can get the most from your existing investments.This new edition is expanded to include: Detailed information about the latest motherboards and chipsets from AMD, Intel, SiS, and VIA Extensive coverage of the Pentium 4 and the latest AMD processors, including the Athlon XP/MP Full details about new hard drive standards, including the latest SCSI standards, ATA/133, Serial ATA, and the new 48-bit "Big Drive" ATA interface Extended coverage of DVD drives, including DVD-RAM, DVD-R/RW, and DVD+R/RW Details about Flat Panel Displays, including how to choose one (and why you might not want to) New chapters on serial communications, parallel communications, and USB communications (including USB 2.0) Enhanced troubleshooting coverage PC Hardware in a Nutshell , 3rd Edition provides independent, useful and practical information in a no-nonsense manner with specific recommendations on components. Based on real-world testing over time, it will help you make intelligent, informed decisions about buying, building, upgrading, and repairing PCs in a cost effective manner that will help you maximize new or existing computer hardware systems. It's loaded with real-world advice presented in a concise style that clearly delivers just the information you want, without your having to hunt for it.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 406 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/465
    Keywords: Mac OS ; Macintosh (Computer) ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Mac OS X is a marvelous confluence of the user-friendly and highly customizable Macintosh of yesteryear and the power and flexibility of Unix under the hood. Those coming to Mac OS X from previous incarnations of the operating system recognize much of the friendly face of the Macintosh but they are also plunged into a whole new world. Unix converts to Mac OS X find a familiar FreeBSD-like operating system at the core and many of the command-line applications that they're familiar with. This presents a unique opportunity for combining traditional Unix hacking and Mac OS know-how. Mac OS X Hacks goes beyond the peculiar mix of man pages and not-particularly-helpful Help Center, pulling the best tips, tricks, and tools from the Mac power users and Unix hackers themselves. The collection reflects the real-world know how and experience of those well steeped in Unix history and expertise, sharing their no-nonsense, sometimes quick-and-dirty solutions to administering and taking full advantage of everything a Unix desktop has to offer: Web, Mail, and FTP serving, security services, SSH, Perl and shell scripting, compiling, configuring, scheduling, networking, and hacking. Add to that the experience of die-hard Macintosh users, customizing and modifying their hardware and software to meet their needs: System Preferences, GUI mods and tweaks, hardware tips, vital shareware and freeware, AppleScript, AppleTalk and equivalents, keyboard modifiers, and general Macintosh-style tomfoolery. Each Hack can be read easily in a few minutes, saving countless hours of searching for the right answer. Mac OS X Hacks provides direct, hands-on solutions that can be applied to the challenges facing both those meeting the Mac for the first time and long-time users delving into Mac OS X and its Unix underpinnings. Mac OS X Hacks is the third in O'Reilly's new Hacks Serier which aims to begin reclaiming the term "hacking" for the good guys. In recent years, the term has come to be associated with those nefarious black hats who break into computers to snoop, steal information or disrupt Internet traffic. But the term originally had a more benign meaning, and you'll still hear it used this way whenever developers get together. Our new Hacks books are written in the spirit of the true hackers -- the people who drive innovation.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 541 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.2/768
    Keywords: Microsoft Visual BASIC ; BASIC (Computer program language) ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: Programming Visual Basic .NET , Second Edition is the complete guide to application development using Visual Basic .NET. Entirely rewritten by .NET expert Jesse Liberty, the new edition of this tutorial will be essential reading for the millions of Visual Basic programmers looking to make the change to Microsoft's .NET programming environment. Thorough, entertaining, and easy to follow, this book provides a comprehensive and detailed overview of the language, object-oriented programming, and the .NET Framework, and goes even further--you'll learn how to create Windows and Web applications, as well as Web services. A comprehensive introduction to the Visual Basic .NET language, this new edition covers topics of greatest concern to VB6 programmers who wish to make the transition from traditional Visual Basic 6 programming to the new object-oriented, component-based world of .NET. Loaded with practical examples for intermediate and advanced programmers, Programming Visual Basic .NET focuses on turning you into a proficient .NET developer. Some of the topics in the book include: Visual Basic .NET and the .NET Framework Object-Oriented Programming Building Windows Applications Accessing Data with ADO.NET ASP.NET Web Services and much more Jesse Liberty's books have successfully guided thousands of new and experienced programmers alike into the world of .NET programming and Programming Visual Basic .NET , Second Edition will be no exception. This book is sure to become a key component of developers' .NET libraries.
    Note: Includes index. - Rev. ed. of: Programming Visual Basic .NET / Dave Grundgeiger. 1st ed., 2002
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 215 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.7/2
    Keywords: Application software ; Development ; HTML (Document markup language) ; Internet programming ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Abstract: The use of forms on the web is so commonplace that most user interactions involve some type of form. XForms--a combination of XML and forms--offers a powerful alternative to HTML-based forms. By providing excellent XML integration, including XML Schema, XForms allows developers to create flexible, web-based user-input forms for a wide variety of platforms, including desktop computers, handhelds, information appliances, and more. XForms Essentials is an introduction and practical guide to the new XForms specification. Written by Micah Dubinko, a member of the W3C XForms working group and an editor of the specification, the book explains the how and why of XForms, showing readers how to take advantage of them without having to write their own code. You'll learn how to integrate XForms with both HTML and XML vocabularies, and how XForms can simplify the connection between client-based user input and server-based processing. XForms Essentials begins with a general introduction to web forms, including information on history and basic construction of forms. The second part of the book serves as a reference manual to the XForms specification. The third section offers additional hints, guidelines, and techniques for working with XForms. Topics covered in the book include: creating XForms files in a text or XML editor converting existing forms (electronic or paper) to XForms collecting XML data from users in a user-friendly way reducing the amount of JavaScript needed within browser interfaces increasing the security and reliability of your current forms system by combining client-side and server-side checks into a common code base creating interactive websites using the latest standard technology XForms Essentials focuses on the practical application of XForms technology. If you work with forms, HTML, or XML information, XForms Essentials will provide you with a much simpler route to more sophisticated interactions with users.
    Note: "Gathering and managing XML information"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 190 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 004.6/2
    Keywords: Computer networks ; Access control ; Computer networks ; Remote access ; RADIUS (Computer network protocol) ; Electronic books ; local
    Abstract: The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS , or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users who want access to a system or service from a central network server. Originally developed for dial-up remote access, RADIUS is now used by virtual private network (VPN) servers, wireless access points, authenticating Ethernet switches, Digital Subscriber Line (DSL) access, and other network access types. Extensible, easy to implement, supported, and actively developed, RADIUS is currently the de facto standard for remote authentication. RADIUS provides a complete, detailed guide to the underpinnings of the RADIUS protocol, with particular emphasis on the utility of user accounting. Author Jonathan Hassell draws from his extensive experience in Internet service provider operations to bring practical suggestions and advice for implementing RADIUS. He also provides instructions for using an open-source variation called FreeRADIUS."RADIUS is an extensible protocol that enjoys the support of a wide range of vendors," says Jonathan Hassell. "Coupled with the amazing efforts of the open source development community to extend RADIUS's capabilities to other applications-Web, calling card security, physical device security, such as RSA's SecureID-RADIUS is possibly the best protocol with which to ensure only the people that need access to a resource indeed gain that access."This unique book covers RADIUS completely, from the history and theory of the architecture around which it was designed, to how the protocol and its ancillaries function on a day-to-day basis, to implementing RADIUS-based security in a variety of corporate and service provider environments. If you are an ISP owner or administrator, corporate IT professional responsible for maintaining mobile user connectivity, or a web presence provider responsible for providing multiple communications resources, you'll want this book to help you master this widely implemented but little understood protocol.
    Note: Includes index. - RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users who want access to a system or service from a central network server. RADIUS provides a complete, detailed guide to the underpinnings of the RADIUS protocol. Author Jonathan Hassell brings practical suggestions and advice for implementing RADIUS and provides instructions for using an open-source variation called FreeRADIUS
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 646 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: Computer programming ; Java (Computer program language) ; Electronic books ; local
    Abstract: As the Java programming language has increased in both functionality and complexity, developers have demanded more of their program editors. Gone are the days when a simple visual editor is sufficient for even small programming projects. While there are numerous IDEs available today for use by Java developers, one stands above the rest, not only for its functionality, but for its extensibility: NetBeans.In NetBeans: The Definitive Guide , you'll find out how to use this IDE to its fullest, making your Java programming more efficient and productive than ever before. You'll understand the basics of the IDE, and quickly be utilizing the various editor and explorer windows. You'll also master many of NetBeans advanced features, and be working with XML documents, CVS repositories, Javadoc trees, and web applications, all within the NetBeans framework.In addition to teaching you how to use the existing features of NetBeans, this work goes on to cover developing additional modules for NetBeans. Through this instructional portion of the book, you will master the NetBeans APIs, and learn how to enhance NetBeans for your own specific needs. Whether you need to add customized behavior to handle your proprietary file formats, or want to redistribute NetBeans as a proprietary product, NetBeans: The Definitive Guide will allow you to master this open source IDE and all of its advanced features. Whether you are an enterprise developer looking for an IDE that can handle your complex program tasks, an open source developer looking to integrate NetBeans into your own visual projects, or a manager trying to maximize your team's development potential, NetBeans: The Definitive Guide is the book for you.
    Note: "Developing, debugging, and deploying Java code"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: iv, 60 p. ; , 18 cm
    Edition: 1st ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; Handbooks, manuals, etc ; Electronic data processing ; Handbooks, manuals, etc ; Text processing (Computer science) ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Support for regular expressions in SQL and PL/SQL is one of the most exciting features of Oracle Database 10G. Oracle has long supported the ANSI-standard LIKE predicate for rudimentary pattern matching, but regular expressions take pattern matching to a new level. They provide a powerful way to select data that matches a pattern, as well as to manipulate, rearrange, and change that data.This concise pocket guide is part tutorial and part quick-reference. It's suitable for those who have never used regular expressions before, as well as those who have experience with Perl and other languages supporting regular expressions. The book describes Oracle Database 10G's support for regular expressions, including globalization support and differences between Perl's syntax and the POSIX syntax supported by Oracle 10G. It also provides a comprehensive reference, including examples, to all supported regular expression operators, functions, and error messages.O'Reilly's Pocket References have become a favorite among developers and database administrators everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. Whether you're using regular expressions for the first time or applying your skills from other languages to the latest version of Oracle, the Oracle Regular Expressions Pocket Reference is the book to have close by.
    Note: "New in Oracle database 10g"--Cover. - "Tutorial & quick reference"--Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 453 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.13/3
    Keywords: Mac OS ; AppleScript (Computer program language) ; Macintosh (Computer) ; Programming ; Electronic books ; local
    Abstract: If you want to know all about AppleScript--the how, where, and why of using it--dig into AppleScript: The Definitive Guide . It doesn't make the mistake that other books do: it isn't about scripting this or that particular application, and it doesn't assume that learning AppleScript is easy or obvious. Instead, the book teaches and documents the language in a clear and rigorous manner, just as you'd expect with any programming or scripting language. AppleScript is a dynamic, object-oriented scripting system that allows Mac users--even novices who know nothing about programming--to directly control Macintosh applications, including the Mac OS itself. You can write scripts to automate repetitive tasks, customize applications, and even control complex workflows. AppleScript has always been useful, but with Mac OS X it's even more so. Nearly every application that comes with Mac OS X is scriptable. Even non-scriptable applications can often be driven with AppleScript, thanks to the new Accessibility API and GUI Scripting technologies. And now AppleScripters can put a true Aqua interface around their scripts! There's never been a more exciting time for AppleScript users. AppleScript: The Definitive Guide explores and teaches the language from the ground up. If you're a beginner and want to learn how to write your first script or just understand what the excitement is all about, you'll be able to do so after reading this book. AppleScript: The Definitive Guide is the quintessential guide to this important Mac tool. Regardless of their level of experience, AppleScripters everywhere will turn to this book again and again.
    Note: "Covers Mac OS X Panther"--Cover. - "Developer connection recommended title"--Cover. - Includes bibliographical references (p. 428-429) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xx, 202 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: Practically every day, we read about a new type of attack on computer systems and networks. Viruses, worms, denials of service, and password sniffers are attacking all types of systems -- from banks to major e-commerce sites to seemingly impregnable government and military computers --at an alarming rate. Despite their myriad manifestations and different targets, nearly all attacks have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding , by Mark G. Graff and Ken vanWyk, looks at the problem of bad code in a new way. Packed with advice based on the authors' decades of experience in the computer security field, this concise and highly readable book explains why so much code today is filled with vulnerabilities, and tells readers what they must do to avoid writing code that can be exploited by attackers. Writing secure code isn't easy, and there are no quick fixes to bad code. To build code that repels attack, readers need to be vigilant through each stage of the entire code lifecycle: Architecture: during this stage, applying security principles such as "least privilege" will help limit even the impact of successful attempts to subvert software. Design: during this stage, designers must determine how programs will behave when confronted with fatally flawed input data. The book also offers advice about performing security retrofitting when you don't have the source code -- ways of protecting software from being exploited even if bugs can't be fixed. Implementation: during this stage, programmers must sanitize all program input (the character streams representing a programs' entire interface with its environment -- not just the command lines and environment variables that are the focus of most security analysis). Testing: during this stage, programs must be checked using both static code checkers and runtime testing methods -- for example, the fault injection systems now available to check for the presence of such flaws as buffer overflow. Operations: during this stage, patch updates must be installed in a timely fashion. In early 2003, sites that had diligently applied Microsoft SQL Server updates were spared the impact of the Slammer worm that did serious damage to thousands of systems. Beyond the technical, Secure Coding sheds new light on the economic, psychological, and sheer practical reasons why...
    Note: Includes bibliographical references (p. 185-194) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xvi, 388 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.2/76
    Keywords: Web site development ; Electronic books ; local
    Abstract: The Unusually Useful Web Book is the only book you need to find out everything you need to know about web sites. In fact, it's 2 books in 1. You can skim the sidebars and checklists for tips and techniques you can use right away. Or you can follow along with the main text for a detailed discussion of planning, designing, building, and maintaining your web site. The Unusually Useful Web Book is jam-packed with: Do-it-yourself worksheets. 20 worksheets walk you through essential tasks such as increasing traffic, improving site speed, writing a product plan, and making your site cross-compatible. Behind-the-scenes info. 25 special Lessons from the Trenches show you how sites such as MSN.com and BabyCenter.com deal with day-to-day challenges such as naming site sections or sending effective emails. Advice from leading experts. More than 50 experts - from the father of the ad banner to the founder of BlackPlanet.com - openly share the lessons they've learned on everything from making money to working with engineers. Includes expert interviews with Adam Berliant (Group Manager at Microsoft), Greg Dotson (Chief Information Office for www.guru.com), Randi Shade (founder of www.CharityGift.com), Emily Simas (former product manager for www.BabyCenter.com), Srinija Srinivasan (VP and Editor in Chief of Yahoo!), and Evany Thomas (managing editor for Webmonkey). Jargon-free explanations. Step-by-step instructions-covering everything from acquiring a domain name to preparing images for the web-are written in language you can understand. But don't just take our word for it. Read what others are saying about The Unusually Useful Web Book : "This book definitely stands out. Most books of this nature are stuffed with irrelevant and non-substantive information that only add confusion to an already complex process. This book delivers an overwhelming amount of information but presents it in a way that is both approachable and useful. There was a lot of information that I could immediately apply to current projects." Garo Green, Director of Publications, lynda.com "The coverage is practical and comprehensive. I'm not aware of other titles that take this comprehensive approach to web building, addressing the entire life cycle of web design and development as well as the roles required in each phase." Laura McCabe, co-author of Special Edition Using Flash MX "Anyone that has a passion for web design, both novices and professionals, will enjoy this book. For the novic...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 286 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 004.68
    Keywords: Computer networks ; Security measures ; Wireless communication systems ; Security measures ; Wireless communication systems ; Standards ; Electronic books ; local
    Abstract: It's an increasingly wired world, but many people are finding that the best way to get connected is to do away with wires entirely. From cable replacement to universal Internet connectivity, wireless technology is changing the way we connect to our machines and to each other. As with any new technology, buying your gear is only the first step. Understanding how to make the best use of it is another story. Wireless Hacks offers 100 industrial-strength tips about wireless networking, contributed by experts who apply what they know in the real world every day. Each Hack can be read in just a few minutes, but can save you hours of research. Inside, you will find a wealth of useful techniques for making the most out of wireless technology, including: Making sense of the alphabet soup of the 802.11 standards, and understanding which technology makes sense for your solving particular problem Using Bluetooth, mobile radios, mobile data networks, and other exotic methods to keep you connected, no matter where you are Practical methods for detecting, analyzing, and monitoring wireless networks Extending the range of your network, and making the best possible use of the available radio spectrum Designing and building your own antennas Engineering long distance network links that span several miles Understanding the security issues of wireless networking, and protecting yourself and your users from unauthorized access and eavesdropping Written for the intermediate to advanced wireless user, Wireless Hacks is full of direct, practical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field" techniques will show you how to get the job done.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 979 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 006.7/882
    Keywords: Active server pages ; Internet programming ; Microsoft .NET ; Web site development ; Electronic books ; local
    Abstract: ASP.NET in a Nutshell is a concise, one-volume reference to everything you need to make effective use of ASP.NET. An invaluable resource that goes beyond the published documentation to highlight little-known details, stress practical uses for particular features, and provide real-world examples that show how features can be used in a working application, ASP.NET in a Nutshell is the definitive guide for developers of both applications and web services. Updated for Visual Studio .NET 2003, the 2nd edition of this book includes fresh information on application and web service development, custom controls, data access, security, deployment, and error handling, new material on web application development for mobile devices, plus an overview of the class libraries. For developers who still use Microsoft's older ASP technology, this book also provides information for migrating to ASP.NET. The material in ASP.NET in a Nutshell is presented in three sections: A fast-paced introduction to ASP.NET that examines topics such as building ASP.NET applications, developing web services, creating custom controls and user controls for maximum code reuse, debugging and handling errors, understanding ASP.NET security, and configuring and deploying an ASP.NET application A detailed reference to the properties, methods, and events of the most frequently used ASP.NET classes which include the Page class and the new .NET classes, such as HttpApplicationState and HttpSessionState, which correspond to the intrinsic objects in classic ASP. Configuration settings in web.config are also documented A Quick Reference to the types (the classes, structures, interfaces, delegates, events, and enumerations) found in web-related namespaces to the .NET Framework Class Library. Like other books in the "In a Nutshell" series, ASP.NET in a Nutshell , 2nd Edition, offers the facts, including critical background information, in a no-nonsense manner that users will refer to again and again. With its wealth of up-to-date information, ASP.NET in a Nutshell is a book that web developers will refer to again and again.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xii, 168 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 004.67
    Keywords: Local area networks (Computer networks) ; Metropolitan area networks (Computer networks) ; Metropolitan area networks (Computer networks) ; Standards ; Wireless communication systems ; Electronic books ; local
    Abstract: Building Wireless Community Networks is about getting people online using wireless network technology. The 802.11b standard (also known as WiFi) makes it possible to network towns, schools, neighborhoods, small business, and almost any kind of organization. All that's required is a willingness to cooperate and share resources. The first edition of this book helped thousands of people engage in community networking activities. At the time, it was impossible to predict how quickly and thoroughly WiFi would penetrate the marketplace. Today, with WiFi-enabled computers almost as common as Ethernet, it makes even more sense to take the next step and network your community using nothing but freely available radio spectrum. This book has showed many people how to make their network available, even from the park bench, how to extend high-speed Internet access into the many areas not served by DSL and cable providers, and how to build working communities and a shared though intangible network. All that's required to create an access point for high-speed Internet connection is a gateway or base station. Once that is set up, any computer with a wireless card can log onto the network and share its resources. Rob Flickenger built such a network in northern California, and continues to participate in network-building efforts. His nuts-and-bolts guide covers: Selecting the appropriate equipment Finding antenna sites, and building and installing antennas Protecting your network from inappropriate access New network monitoring tools and techniques (new) Regulations affecting wireless deployment (new) IP network administration, including DNS and IP Tunneling (new) His expertise, as well as his sense of humor and enthusiasm for the topic, makes Building Wireless Community Networks a very useful and readable book for anyone interested in wireless connectivity.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 928 p. , ill. ; , 23 cm
    Edition: 4th ed.
    Series Statement: In a nutshell
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Linux in a Nutshell , now in its fourth edition, has won awards in the Linux community as the most indispensable book about Linux. It is an essential desktop reference for the commands that users of Linux utilize every day, with the depth of information and the practical, succinct "In a Nutshell" format that made the previous editions so popular. Comprehensive but concise, Linux in a Nutshell covers all substantial user, programming, administration, and networking commands for the most common Linux distributions. It's several quick references rolled into one: sed, gawk, RCS, CVS, vi, Emacs, bash, tcsh, regular expressions, package management, bootloaders, and desktop environments are all covered in this clear, to-the-point volume, along with core command-line utilities. The fourth edition continues to track the major changes in bootloaders, the GNOME and KDE desktops, and general Unix commands. Several commands related to CDs and music reflect the evolution of multimedia on Linux. Coverage has been added for GRUB, which has become the default bootloader on several Linux distributions, and for vim, the popular and feature-loaded extension to vi. The addition of several new options to the iptables firewall command and new commands related to DNSSEC and ssh show the book's value as a security tool. With this book, you no longer have to grope through long manpages and info documents for the information you need; you'll find it here in clear language and an easy-to-read format. Contents include: Programming, system administration, networking, and user commands with complete lists of options GRUB, LILO, and Loadlin bootloaders Shell syntax and variables for the bash, csh, and tcsh shells Pattern matching Emacs, vi, and vim editing commands sed and gawk commands The GNOME and KDE desktops and the fvwm2 window manager Red Hat and Debian package managers
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Language: English
    Pages: vi, 121 p. ; , 18 cm
    Edition: 2nd ed.
    DDC: 005.75/85
    Keywords: Oracle (Computer file) ; PL/SQL (Computer program language) ; Relational databases ; Electronic books ; local
    Abstract: Like most PL/SQL programmers, you've found Oracle PL/SQL Programming to be a reference book you can't do without. Packed with examples and recommendations, it's a book that has helped everyone, from Oracle Forms developers to database administrators, make the most of PL/SQL. But you can't always carry it with you, and even at your desk there are times when you just need a reminder, a quick answer to a problem you're up against. For times like those, PL/SQL experts Stephen Feuerstein, Bill Pribyl, and Chip Dawes have written a new edition of Oracle PL/SQL Language Pocket Reference . Updated for Oracle9i, this little book is easy to take with you and use anywhere for quick problem solving. The second edition of the Oracle PL/SQL Language Pocket Reference boils down the most vital information from Oracle PL/SQL Programming into a convenient quick reference to PL/SQL basics. This compact book will be indispensable for new and seasoned Oracle database developers alike. It summarizes features available in Oracle9i and provides essential information on PL/SQL block structure, fundamental language elements, control statements, and use of procedures, functions, packages, triggers, Oracle objects, external procedures, and methods of calling Java classes from PL/SQL. O'Reilly's Pocket References have become a favorite among developers and database administrators everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. When you've reached a sticking point in your work and need to get to a solution quickly, the new edition of Oracle PL/SQL Language Pocket Reference is the book you'll want to have.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 253 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Access control ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary.Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need.Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting.In addition to covering Microsoft's Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client. The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations.If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems.
    Note: "Covers Unix and Windows"--Cover. - "Cross-platform authentication & single-sign-on"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...