Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari Tech Books Online  (2,139)
  • Boston, MA :Safari,  (2,139)
  • Indianapolis, Ind. : Sams  (113)
  • Indianapolis, IN : Que Pub.  (25)
Datasource
Material
Language
Years
Subjects(RVK)
  • 101
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Praise for Mark Sobell's Books "I keep searching for books that collect everything you want to know about a subject in one place, and keep getting disappointed. Usually the books leave out some important topic, while others go too deep in some areas and must skim lightly over the others. A Practical Guide to Red Hat® Linux® is one of those rare books that actually pulls it off. Mark G. Sobell has created a single reference for Red Hat Linux that cannot be beat! This marvelous text (with a 4-CD set of Linux Fedora Core 2 included) is well worth the price. This is as close to an 'everything you ever needed to know' book that I've seen. It's just that good and rates 5 out of 5." -Ray Lodato, Slashdot contributor "Mark Sobell has written a book as approachable as it is authoritative." -Jeffrey Bianchine, Advocate, Author, Journalist "Excellent reference book, well suited for the sysadmin of a linux cluster, or the owner of a PC contemplating installing a recent stable linux. Don't be put off by the daunting heft of the book. Sobell has striven to be as inclusive as possible, in trying to anticipate your system administration needs." -Wes Boudville, Inventor " A Practical Guide to Red Hat® Linux® is a brilliant book. Thank you Mark Sobell." -C. Pozrikidis, University of California at San Diego "This book presents the best overview of the Linux operating system that I have found. . . . It should be very helpful and understandable no matter what the reader's background is: traditional UNIX user, new Linux devotee, or even Windows user. Each topic is presented in a clear, complete fashion and very few assumptions are made about what the reader knows. . . . The book is extremely useful as a reference, as it contains a 70-page glossary of terms and is very well indexed. It is organized in such a way that the reader can focus on simple tasks without having to wade through more advanced topics until they are ready." -Cam Marshall, Marshall Information Service LLC, Member of Front Range UNIX Users Group FRUUG, Boulder, Colorado "Conclusively, this is THE book to get if you are a new Linux user and you just got into RH/Fedora world. There's no other book that discusses so many different topics and in such depth." -Eugenia Loli-Queru, Editor in Chief, OSNews.com The Most Useful Linux Tutorial and Reference Ever, with Hundreds of High-Quality Examples Covering Every Linux Distribution! To be truly productive with Linux, you need to thoroughly mast...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 102
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 1090 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.26/8
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The best just became BETTER! Completely revised to meet all your Red Hat Linux needs! Fedora Core and Red Hat Enterprise Linux are advanced operating systems. You need a book that's just as advanced. This book explains Linux clearly and effectively--with a focus on the features you care about, including system security, Internet server setup, and sharing files and printers with Windows systems. Best-selling Linux author Mark Sobell starts at the beginning and walks you through everything that matters, from installing Fedora Core using the included CDs to GNOME, KDE, Samba 3, sendmail, Apache, DNS, NIS, and iptables. Along the way, you learn the "hows" and the "whys." Whether you are a user, an administrator, or a programmer, this book gives you all you need and more. Mark Sobell knows every Linux nook and cranny, has taught hundreds of thousands of readers, and never forgets what it's like to be new to Linux. Don't settle for yesterday's Linux book...get the ONLY book that meets today's challenges and tomorrow's! Compared with the other Linux books out there, A Practical Guide to Red Hat® Linux®, Second Edition, delivers... The full Fedora Core operating system on 4 CDs (not the truncated "Publisher's Edition") AND complete coverage of Fedora Core and the 2.6 Linux kernel, PLUS coverage of Red Hat Enterprise Linux Deeper coverage of GNOME and KDE, including customization More practical coverage of file sharing with Samba, NFS, and FTP Easier-to-follow coverage of Internet server configuration including Apache, sendmail, NFS, and DNS More up-to-date coverage of security, including SELinux (Security Enhanced Linux), OpenSSH, and firewall setup using iptables Better coverage of "meat-and-potatoes" system/network administration tasks A more practical introduction to writing bash shell scripts More complete coverage of configuring local and network printers using CUPS And much more...including a 500+ word glossary and a comprehensive index to help you find what you need fast! Includes 4 CDs! Get the full version of Red Hat's Fedora Core 2 release!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 103
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 396 p. , ill. ; , 23 cm
    DDC: 004.692
    Keywords: Spam (Electronic mail) ; Spam filtering (Electronic mail) ; Electronic books ; local
    Abstract: Real Anti-Spam Help for System Administrators In Slamming Spam , two spam fighters show you how to fight back-and win. Unlike most spam books, this one is written specifically for in-the-trenches system administrators: professionals who need hands-on solutions for detecting, managing, and deterring spam in Unix/Linux and/or Microsoft Windows environments. The authors offer deep, administrator-focused coverage of the most valuable open-source tools for reducing spam's impact in the enterprise-especially SpamAssassin. Drawing on their extensive experience in developing and implementing anti-spam tools, the authors present expert insights into every leading approach to fighting spam, including Bayesian filtering, distributed checksum filtering, and email client filtering. Coverage includes Step-by-step junk mail filtering with Procmail Protecting Sendmail, Postfix, qmail, Microsoft Exchange, and Lotus Domino servers from spam Making the most of native MTA anti-spam features, including whitelists/blacklists, DNS black hole services, and header checking Distributed checksum filtering solutions, including Vipul's Razor and Distributed Checksum Clearinghouse McAfee SpamKiller for Lotus Domino McAfee SpamKiller for Microsoft Exchange Implementing and managing SpamAssassin Implementing SMTP AUTH, providing effective outbound SMTP authentication and relaying with any mail client; and STARTTLS, encrypting outbound mail content, user names, and passwords Sender verification techniques, including challenge/response, special use addresses, and sender compute Anti-spam solutions for Outlook, Outlook Express, Mozilla Messenger, and Unix mail clients Whatever your IT environment and mail platform, Slamming Spam's defense in-depth strategies can help you dramatically reduce spam and all its attendant costs-IT staff time, network/computing resources, and user productivity. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 363-374) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 104
    Online Resource
    Online Resource
    Indianapolis, MA : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Proven techniques for optimizing web, file, print, database, and application servers Practical introductions to open source performance management tools Easy-to-understand examples based on Red Hat Enterprise Linux and Novell SUSE Linux Enterprise Server An indispensable guide to maximizing Linux system and application performance From Wall Street to Hollywood, Linux runs many of the world's most businesscritical systems. Linux performance now impacts the entire enterprise. In Performance Tuning for Linux Servers, a team of IBM's most-experienced Linux performance specialists shows you how to find bottlenecks, measure performance, and identify effective optimizations. This book doesn't just cover kernel tuning: it shows how to maximize the end-to-end performance of real-world applications and databases running on Linux. Throughout, the authors present realistic examples based on today's most popular enterprise Linux platforms, Intel-based Red Hat Enterprise Linux, and Novell SUSE Linux Enterprise Server. These examples are designed for simplicity, clarity, and easy adaptation to any contemporary Linux environment. You'll discover how to Install and configure Linux for maximum performance from the outset Evaluate and choose the right hardware architecture for your Linux environment Understand Linux kernels 2.4 through 2.6: components, performance issues, and optimization opportunities Master core Linux performance tuning principles and strategies Utilize free, open source tools for measurement, monitoring, system tracing, and benchmarking Interpret performance data to analyze your Linux server's real-world behavior Optimize Linux system schedulers, memory, I/O, file systems, and networking Tune web, file, database, and application servers running commercial workloads Predict the impact of changes in tuning parameters or configurations Tune Linux code: optimize design, timing, sockets, threads, synchronization, and more Architect for maximum performance: SMP scaling, clustering, and topology Integrate kernel and application tuning in end-to-end system optimization projects Whether you're an administrator, developer, integrator, or consultant, Performance Tuning for Linux Serverswill help you maximize the performance and value of every Linux system and application you run. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 105
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Learn Linux kernel programming, hands-on : a uniquely effective top-down approach The Linux ® Kernel Primer is the definitive guide to Linux kernel programming. The authors' unique top-down approach makes kernel programming easier to understand by systematically tracing functionality from user space into the kernel and carefully associating kernel internals with user-level programming fundamentals. Their approach helps you build on what you already know about Linux, gaining a deep understanding of how the kernel works and how its elements fit together. One step at a time, the authors introduce all the tools and assembly language programming techniques required to understand kernel code and control its behavior. They compare x86 and PowerPC implementations side-by-side, illuminating cryptic functionality through carefully-annotated source code examples and realistic projects. The Linux ® Kernel Primer is the first book to offer in-depth coverage of the rapidly growing PowerPC Linux development platform, and the only book to thoroughly discuss kernel configuration with the Linux build system. Coverage includes Data structures x86 and PPC assembly language Viewing kernel internals Linux process model User and kernel space Interrupts and exceptions Memory allocation and tracking Tracing subsystem behavior I/O interactions Filesystems and file operations Scheduling and synchronization Kernel boot process Kernel build system Configuration options Device drivers And more... If you know C, this book teaches you all the skills and techniques you need to succeed with Linux kernel programming. Whether you're a systems programmer, software engineer, systems analyst, test professional, open source project contributor, or simply a Linux enthusiast, you'll find it indispensable. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 106
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: Your complete guide to building your information technology career in any economy The IT Career Builder's Toolkit features market-focused skills and proven methods you can use to jump-start and advance your career. While other books cover just the mechanics of preparing your résumé, writing a cover letter, and interviewing, this book provides all that plus additional insight from IT career development expert, Matt Moran, to help you plan and create a rewarding IT career over the long term. The toolkit approach allows you to use this book to suit your unique needs: Are you new to the IT field? Benefit by reading the book cover to cover. Just need to fine-tune your IT career? Choose a topic and dive in. Understand and prepare for the various and changing factors that affect your career in both positive and negative ways. Learn how to Present the value of your technical skills in the job market Position yourself as the primary commodity of your career Remove the guesswork out of job searches Highlight on-the-job skills and gain meaningful professional exposure The companion CD-ROM includes career management tools such as résumé and cover letter templates, forms to track important contacts, and self-assessment tools. Start or further your consulting career with sample proposals, opportunity tracking forms, and a time-tracking and billing database. Financial tools, including budget and cash-flow summary worksheets, help you gain financial well-being. Use the Value-Added Technologist presentation to gain a clear understanding of the career-building process and how to use the toolkit to build a dynamic career. Most of all, have fun! Every year, people advance along the path to career stardom. Let Matt help you to be one of them through his career philosophy "Do not accept mediocrity as a career objective-demand more of yourself." "I want you to see the [toolkit] techniques as one more set of skills to adopt in your overall career development program. They are skills, just like your technical skills, that you will use daily during your career. Just as you adopt new technical skills, use the toolkit to define those soft skills that you must learn and put to use. The result will be a more well-rounded and complete professional skill-set." ~ Matthew Moran, from the Introduction Companion CD-ROM The CD-ROM contains valuable tools, forms, spreadsheets, and documents that work with the Toolkit to help you master key areas of your career development.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 107
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occur Learn about the defense-in-depth model for deploying firewall and host protection Examine navigation methods and features of Cisco ASDM Set up Cisco ASA, PIX Firewall, and ASDM hardware and software Use the Cisco ASDM startup wizard to safely connect your network to the Internet and securely add public devices such as mail and web servers to your network Authenticate firewall users and users of public web servers Filter traffic and protect your network from perimeter attacks Deploy Cisco Intrusion Prevention System (IPS) to provide more granular traffic inspection and proactive threat response Stop attacks launched at the desktop by deploying Cisco Security Agent Extend the defense-in-depth model to remote users through IPSec virtual private networks (VPN) Enhance your security posture through proper security management Understand the advanced features available in the Cisco PIX version 7 operating system Recover from software failure with Cisco PIX version 7 Many people view security as a "black-box-voodoo" technology that is very sophisticated and intimidating. While that might have been true a few years ago, vendors have been successful in reducing the complexity and bringing security to a point where almost anyone with a good understanding of technology can deploy network security. Securing Your Business with Cisco ASA and PIX Firewalls is an extension of the work to simplify security deployment. This easy-to-use guide helps you craft and deploy a defense-in-depth solution featuring the newly released Cisco® ASA and PIX® version 7 as well as Cisco Security Agent host intrusion prevention software. The book simplifies configuration and management of these powerful security devices by discussing how to use Cisco Adaptive Security Device Manager (ASDM), which provides security management and monitoring services through an intuitive GUI with integrated online help and intelligent wizards to simplify setup and ongoing management. In addition, informative, real-time, and historical reports provide critical insight into usage trends, performance baselines, and security events. Complete with real-world security design and implementation advice, this book contains everything you need to know to deploy the latest security technology in your network. Securing Your Business with Cis...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 108
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xvii, 254 p. , col. ill. ; , 23 cm
    DDC: 659.144
    Keywords: Internet advertising ; Web search engines ; Web site development ; Electronic books ; local
    Abstract: Get your Web site to "show you the money" by using Google to draw more eyes--and wallets--to your content. In this friendly, four-color guide from veteran author and Web developer Eric Giguere , you'll learn all about Google's AdSense program and how you can use it to make your Web site or blog more profitable. Written in an easy-to-read, non-technical style, this book follows three average people--Claude, Stef, and Anita--as they learn to create money-making blogs and Web sites. Through their experiences, you'll learn: basic Web terminology; the Google Adsense nuts and bolts; how to host, build, and publish targeted ads and Google search boxes to your Web site; filter out inappropriate ads; track page performance; drive traffic to your site; and more. A four-part companion Web site features a blog, includes reader resources, and details the techniques discussed in the book. Online marketers agree that AdSense is one of the best tools you can use to draw dollars to your site. Let Giguere show you how to make the most of Google and have fun doing it!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 109
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 713 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Computer viruses ; Electronic books ; local
    Abstract: "Of all the computer-related books I've read recently, this one influenced my thoughts about security the most. There is very little trustworthy information about computer viruses. Peter Szor is one of the best virus analysts in the world and has the perfect credentials to write this book." -Halvar Flake, Reverse Engineer, SABRE Security GmbH Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published-addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code-and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 110
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley Professional | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Finally, there's a book that treats Excel as the powerful development platform it really is, and covers every facet of developing commercial-quality Excel applications. This is not a book for beginners. Writing for professional developers and true Excel experts, the authors share insider's knowledge they've acquired building Excel applications for many of the world's largest companies-including Microsoft. Professional Excel Development demonstrates how to get the utmost from Excel, addressing everything from application architectures through worksheet and userform design, charting, debugging, error handling and optimizing performance. Along the way, the authors offer best practices for every type of Excel development, from building add-ins through interacting with XML Web services. Coverage includes Building add-ins to provide new Excel functions Designing effective worksheets, userforms and other user interface elements Leveraging Excel's powerful data analysis features Creating sophisticated custom charts Handling errors, debugging applications and optimizing performance Using class modules and interfaces to create custom objects Understanding Windows API calls: when to use them, and how to modify them Adding worksheet functions with C-based XLLs Programming with databases Controlling external applications from Excel Integrating with Visual Basic 6, VB.NET and Visual Studio Tools for Office Using XML to import and export data and communicate with Web services Providing help, securing, packaging and distributing The accompanying CD-ROM contains the book's sample timesheet application at every stage of construction, with detailed code comments. It also includes many examples of the concepts introduced in each chapter and a collection of the authors' Excel development utilities. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 111
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 369 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Linux ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: Covers Red Hat and SUSE When something goes wrong with your Linux firewall, you need to fix it-right now. You don't have time for endless newsgroup searches, confusing man pages, emails to the developers... it's an emergency! One book brings together all the step-by-step solutions and proven problem-solving techniques you'll need when the time comes: Troubleshooting Linux® Firewalls . Authors Michael Shinn and Scott Shinn are among the world's leading firewall experts; they've even been hired to protect computer security at the White House. In this book, they cover every area where Linux firewalls can go wrong: rules and filtering problems, Layer 2/3/4 issues, trouble with individual services, DNS/DHCP failures, even misconfigured VPNs. They also present an easy, start-to-finish troubleshooting methodology that'll help you identify even the newest or most obscure firewall problem fast-and solve it! Inside, you will find in-depth information on the following areas: What you must know about iptables and netfilter to troubleshoot and avoid problems Using loggers, sniffers, and other tools to diagnose even the most obscure firewall problems Making sure your firewall rules work the way they're supposed to Resolving problems with Network Address Translation and IP Forwarding Troubleshooting SMTP, Apache, Squid, NFS, FTP, instant messaging, and other Web-based services Finding and fixing common problems with IPsec VPN configuration Making your firewalls more failure-resistant: recommendations from the experts If you depend on a Linux firewall, what will you do if it goes down? With Troubleshooting Linux® Firewalls , you can be confident that the solutions are right at hand-so you can sleep at night! © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 112
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 397 p. , ill. ; , 25 cm
    DDC: 005.1/068/5
    Keywords: Capability maturity model (Computer software) ; Electronic books ; local
    Abstract: Use Assessments to Drive Process Improvements in Software, Systems, Human Resources, and Beyond Pioneered by the world's leading innovators in software engineering, assessments have evolved into a remarkably powerful tool for process improvement in areas ranging from systems to services, hardware to human resources. Unlike audits, assessments are conducted from the inside. When handled correctly, assessments can help transform technical and managerial culture, dramatically improving both quality and profitability. In CMMI Assessments: Motivating Positive Change , two of the field's most respected leaders show exactly how to use them for maximum business advantage. Writing for executives, managers, technical professionals, and assessors themselves, Marilyn Bush and Donna Dunaway illuminate every phase of the assessment process-from planning through post-assessment follow-up. The authors begin with an expert overview of what assessments entail, when they make sense, how to set achievable goals for them, and how to lead them to success. Next, they "drill down" into each stage of the process, presenting step-by-step instructions and defining the roles and responsibilities of every participant. Coverage includes creating and training assessment teams; identifying assessment products; consolidating interview data and other onsite activities; presenting results; and using those results productively. Drawing on their unsurpassed experience leading assessments and mentoring assessors, they offer deep insights into the real-world challenges and obstacles you'll face-and proven solutions. They also present an extended case study showing how a real software development organization drove continuous improvement through four years of iterative assessments-moving from CMM Level 2 to elite Level 5 status, and driving dramatic business benefits along the way. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 375-380) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 113
    Online Resource
    Online Resource
    Upper Saddle River, NJ. : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations of UNIX and UNIX-like environments. And yet, it does all this while retaining the style and taste of the original classic." --Mukesh Kacker, cofounder and former CTO of Pronto Networks, Inc. "One of the essential classics of UNIX programming." --Eric S. Raymond, author of The Art of UNIX Programming "This is the definitive reference book for any serious or professional UNIX systems programmer. Rago has updated and extended the classic Stevens text while keeping true to the original. The APIs are illuminated by clear examples of their use. He also mentions many of the pitfalls to look out for when programming across different UNIX system implementations and points out how to avoid these pitfalls using relevant standards such as POSIX 1003.1, 2004 edition and the Single UNIX Specification, Version 3." --Andrew Josey, Director, Certification, The Open Group, and Chair of the POSIX 1003.1 Working Group " Advanced Programming in the UNIX® Environment, Second Edition, is an essential reference for anyone writing programs for a UNIX system. It's the first book I turn to when I want to understand or re-learn any of the various system interfaces. Stephen Rago has successfully revised this book to incorporate newer operating systems such as GNU/Linux and Apple's OS X while keeping true to the first edition in terms of both readability and usefulness. It will always have a place right next to my computer." --Dr. Benjamin Kuperman, Swarthmore College Praise for the First Edition " Advanced Programming in the UNIX® Environment is a must-have for any serious C programmer who works under UNIX. Its depth, thoroughness, and clarity of explana-tion are unmatched." -- UniForum Monthly "Numerous readers recommended Advanced Programming in the UNIX® Environment by W. Richard Stevens (Addison-Wesley), and I'm glad they did; I hadn't even heard of this book, and it's been out since 1992. I just got my hands on a copy, and the first few chapters have been fascinating." -- Open Systems Today "A much more readable and detailed treatment of UNIX internals can be found in Advanced Programming in the UNIX® Environment by W. Richard Steven...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 114
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxviii, 651 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Where has this book been all my professional life? It is about time someone wrote this book. The author covers many basic, practical issues that other authors omit in a format that makes for a great troubleshooting reference and for casual perusing. There are a lot of books available that give a broad overview of system and network administration, and there are a lot of detailed books on each specific topic covered in this book, but I don't know of any other place where I can get so much useful, practical information on such a wide range of topics in such a concise and readable form. I will highly recommend it to my friends and colleagues who are trying to manage their own systems. I am anxious to show it to our instructors who teach data communications and networks as a possible text or lab manual." -Ron McCarty, instructor and program chair, Computer Science, Penn State Erie "This book takes a very unique approach and is very flexible. It offers a great deal to the home user, students, small businesses-all the way to any Linux sys admin that needs a handy reference. I found it very refreshing in terms of style, stated goals, presentation, ease of use, direction, and the "present and future" value of the content. In other words the author is very current and knowledgeable. I would recommend this book to every level from programmer to manager." -Joe Brazeal, Information Technician III, Southwest Power Pool "This book is an excellent resource for new Linux administrators. I was impressed with the comprehensive set of 35 topic chapters, making this book a very useful reference. I know of no other work like this." -George Vish II, Linux curriculum program manager and senior education consultant, Hewlett-Packard Education "I would recommend this book to novice Linux users and administrators. It covers a lot of topics, and makes it easy for readers to follow along." -Bret Strong, education consultant, Hewlett-Packard Company "Linux Quick Fix Notebook is a well-written guide to designing, installing, and maintaining Linux servers. Many Linux reference texts are just simple rewrites of Linux ¨man¨ and ¨info¨ pages, but this book addresses the real issues that systems administrators encounter when working with Linux. The author provides a pedagogical guide to learning Linux server administration. In addition, the book includes step-by-step information so that users can quickly take advantage of the best that open source software has to offer today. I...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 115
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvi, 316 p. , ill. ; , 24 cm
    DDC: 006.74
    Keywords: HTML (Document markup language) ; Electronic books ; local
    Abstract: The fastest route to true HTML/CSS mastery! Need to build a web site? Or update one? Or just create some effective new web content? Maybe you just need to update your skills, do the job better. Welcome. This book's for you. We'll leverage what you already know about the web, so you'll go further, faster than you ever expected. You'll master today's best practices: the real nuts and bolts, not theory or hooey. You'll learn through dozens of focused HTML, XHTML, and CSS examples: crafted for simplicity and easy to adapt for your own projects. Need specific solutions? This book's modular, visual, high-efficiency format delivers them instantly . Molly E. Holzschlag draws on her unparalleled experience teaching Web design and development. No other HTML/CSS guide covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with HTML, XHTML, and CSS in real-world projects Learn how to build web pages that'll work in any environment, on virtually any contemporary browser Construct templates that simplify every page you develop Structure and tag text so it's easy to work with and manage Add images, media, and scripts-quickly and reliably Discover the right ways to use HTML tables Build easy-to-use forms and validate your users' input Use CSS to take total control over your site's look and feel Master core CSS techniques: color, images, text styles, link effects, lists, navigation, and more Control margins, borders, padding, positioning, floats, even Z-index Design efficient, compatible, easy-to-manage CSS layouts Includes concise XHTML and CSS annotated references: quick help for every language element Spring Into... is a new series of fast-paced tutorials from Addison-Wesley. Each book in the series is designed to bring you up to speed quickly. Complex topics and technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working...now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 116
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Wharton School Pub. | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 282 p. , ill., maps ; , 24 cm
    Keywords: Economic forecasting ; Globalization ; Economic aspects ; Industrial management ; International business enterprises ; International economic integration ; Electronic books ; local
    Abstract: Globalization is a fact. You can't stop it; it has already happened; it is here to stay. And we are moving into a new global stage. A radically new world is taking shape from the ashes of yesterday's nation-based economic world. To succeed, you must act on the global stage, leveraging radically new drivers of economic power and growth. Legendary business strategist Kenichi Ohmae-who in The Borderless World , published in 1990, predicted the rise and success of globalization, coining the very word-synthesizes today's emerging trends into the first coherent view of tomorrow's global economy-and its implications for politics, business, and personal success. Ohmae explores the dynamics of the new "region state," tomorrow's most potent economic institution, and demonstrates how China is rapidly becoming the exemplar of this new economic paradigm. The Next Global Stage offers a practical blueprint for businesses, governments, and individuals who intend to thrive in this new environment. Ohmae concludes with a detailed look at strategy in an era where it's tougher to define competitors, companies, and customers than ever before. As important as Huntington's The Clash of Civilizations , as fascinating as Friedman's The Lexus and the Olive Tree , this book doesn't just explain what's already happened: It offers a roadmap for action in the world that's beginning to emerge. Why Keynes' and Milton Friedman's economics are -and what might replace them New economics for a borderless world history From Windows to English to your global brand Leveraging today's most powerful platforms for growth Anticipating technological obsolescence-and jumping ahead of it Technology: driving business death-and rebirth What government can do when nation-states don't matter Government in the post-national era Honing your global vision and global leadership skills Leadership and strategy on the global stage
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 117
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: "This book is the best way for beginning developers to learn wxWidgets programming in C++. It is a must-have for programmers thinking of using wxWidgets and those already using it." -Mitch Kapor, founder of Lotus Software and the Open Source Applications Foundation Build advanced cross-platform applications that support native look-and-feel on Windows, Linux, Unix, Mac OS X, and even Pocket PC Master wxWidgets from start to finish-even if you've never built GUI applications before Leverage advanced wxWidgets capabilities: networking, multithreading, streaming, and more CD-ROM: library of development tools, source code, and sample applications Foreword by Mitch Kapor, founder, Lotus Development and Open Source Application Foundation wxWidgets is an easy-to-use, open source C++ API for writing GUI applications that run on Windows, Linux, Unix, Mac OS X, and even Pocket PC-supporting each platform's native look and feel with virtually no additional coding. Now, its creator and two leading developers teach you all you need to know to write robust cross-platform software with wxWidgets. This book covers everything from dialog boxes to drag-and-drop, from networking to multithreading. It includes all the tools and code you need to get great results, fast. From AMD to AOL, Lockheed Martin to Xerox, world-class developers are using wxWidgets to save money, increase efficiency, and reach new markets. With this book, you can, too. wxWidgets quickstart: event/input handling, window layouts, drawing, printing, dialogs, and more Working with window classes, from simple to advanced Memory management, debugging, error checking, internationalization, and other advanced topics Includes extensive code samples for Windows, Linux (GTK+), and Mac OS X About the CD-ROM The CD-ROM contains all of the source code from the book; wxWidgets distributions for Windows, Linux, Unix, Mac OS X, and other platforms; the wxWidgets reference guide; and development tools including the OpenWatcom C++ compiler, the poEdit translation helper, and the DialogBlocks user interface builder. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 118
    Language: English
    Pages: xxii, 232 p. , ill. ; , 23 cm
    DDC: 364.16/3
    Keywords: Consumer credit ; United States ; Handbooks, manuals, etc ; Credit ratings ; United States ; Handbooks, manuals, etc ; Identity theft ; United States ; Prevention ; Handbooks, manuals, etc ; Privacy, Right of ; United States ; Handbooks, manuals, etc ; Records ; Access control ; United States ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Everything You Need to Know About Identity Theft, Credit Cards, Credit Repair, and Credit Reports "The author substitutes straight talk for legal mumbo-jumbo in 50 Ways to Protect Your Identity and Your Credit. Reading this book is like getting a black belt in consumer self-defense." -Jim Bohannon, host of The Jim Bohannon Show "Identity theft is among the fastest-growing problems facing Americans today. This book will help you learn all you need to know to protect your lives, money, and security. Consider it your first stop in your quest for knowledge and guidance to prevent ID theft." -Robert Powell, Editor of CBS MarketWatch "As one who has lived through some of the nightmare scenarios discussed by the author, I believe "Steve's Rules" (Chapter 14) need to be placed in a prominent place so you can see them any time you think you are safe. They may be the new practical commandments for financial survival." -Doug Stephan, host of the Good Day nationally syndicated radio show "Detecting and stopping identity thieves is imperative to protecting your finances and financial reputation. Steve Weisman shows you how to protect yourself and what steps to take if you are victimized. This is a must-read for anyone with a bank account and a credit card!" -Bonnie Bleidt, Boston Stock Exchange Reporter, CBS4 Boston, Host of Early Exchange , WBIX Don't be a victim! Save your identity, save your credit-and save a fortune! 10,000,000 Americans had their identities stolen last year-don't be the next! Discover easy steps you can take now to reduce your vulnerability. Recognize "phishing" and other identity scams-online and off. Learn what you must do immediately if you've been attacked. Defend yourself against credit rip-offs, and stop paying more than you have to! It's all here: simple rules, handy checklists, even easy-to-use form letters! © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 119
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit | Boston, MA :Safari,
    Language: English
    Pages: 290 p. ; , 23 cm
    Keywords: Flash (Computer file) ; Computer animation ; Electronic books ; local
    Abstract: This guide allows you to learn specific Flash skills step-by-step at your own pace. Choose from among several tutorials to develop the skills that are most appropriate to the Flash projects you are working on at any given time. Each lesson leads you through the workflow for implementing a specific real-world feature or effect in your Flash applications. In Macromedia Flash 8: A Tutorial Guide, learn how to: • Navigate the Flash workspace and use common document types • Use the Flash drawing tools and create engaging graphic effects • Use ActionScript to add interactivity and custom functionality to your documents • Connect your Flash projects to external data sources to create data-driven applications Powerful development and design tools require thorough and authoritative technical advice and documentation. When it comes to Macromedia Flash, no one is more authoritative than Macromedia's own development and writing teams. Now their official documentation is available to you in printed book form. As you work, keep this guide by your side for ready access to valuable information on using Flash. We've designed it so that it's easy to annotate as you progress.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 120
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 670 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.7585
    Keywords: Microsoft Windows server ; Client/server computing ; Operating systems (Computers) ; Electronic books ; local
    Abstract: This practical reference guide offers hundreds of useful tasks for managing Windows 2000 and Windows Server 2003, Microsoft's latest and greatest server. Through concise, on-the-job solutions to common problems, Windows Server Cookbook for Windows Server 2003 & Windows 2000 is certain to save you hours of time searching for answers.Now, instead of dredging reams of Microsoft documentation or browsing its unstructured knowledge base to figure out a particular issue--such as how to compare registry values between two hosts--you can simply reference the index of Windows Server Cookbook for Windows Server 2003 & Windows 2000 . From there, you'll be directed to the exact trouble-shooting recipe they need.As the newest title in O'Reilly's popular Cookbook series, this book covers a wide range of issues that you are likely to face in your daily management of the Windows Server operating system. This includes how to deal with: files event logs DNS DHCP security the registry backup/restore One of the book's key benefits is the presentation of solutions in three different recipe formats. Depending on preference, you can solve most problems with the graphical user interface, the command line, or by using scripts. Where appropriate, all three solutions are presented for each recipe in this book. Each recipe also includes a detailed discussion that explains how and why it works. Windows Server Cookbook for Windows Server 2003 & Windows 2000 is written for all levels of system administrators on Windows servers. If you're a relatively new user with only a rudimentary understanding of the job, the book can open your eyes to the many possibilities that await. And if you're an advanced user, it can serve as a useful reference and memory-jogger.Download the code examples from this book. The complete set of examples isavailable at: http://www.rallenhome.com/books/​winsckbk/code.html .
    Note: "Step-by-step procedures and scripts for every occasion"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 121
    Online Resource
    Online Resource
    San Jose, Calif. : Adobe ; | Boston, MA :Safari,
    Language: English
    Pages: 600 p. ; , 24 cm
    DDC: 005.72
    Keywords: Adobe Acrobat (Computer file) ; Electronic books ; local
    Abstract: Ready to learn the visual effects secrets used at such leading-edge studios as Industrial Light + Magic and The Orphanage? Adobe After Effects 6.5 Studio Techniques inspires you to take your work to the next level with realworld examples and insider techniques. Get blockbuster results without the big budget as you delve deep into the essence of visual effects. This book goes beyond conventional step-by-step instruction, teaching you bread-and-butter effects that you can adapt and combine for countless projects. • Real solutions from real professionals: Nobody does it better, and now they'll show you how. Discover the keys to analyzing your shots from Stu Maschwitz, Visual Effects Supervisor for Star Wars, Episode One and Sin City . Unlock the mysteries of linear color space with Brendan Bolles, co-creator of the eLin plug-ins. Master fundamental effects techniques with Mark Christiansen, After Effects specialist for The Orphanage on The Day After Tomorrow . • Compositing essentials: No matter how sophisticated the effect, they all start from the same building blocks. Find out what you've been missing about color and light matching, keying, motion tracking, rotoscoping, working with film, and more. • Advanced techniques: Your goal should be effects so good that no one notices them. From sky replacement to explosions, from smoke to fire, learn to bring your shots to life and enhance scenes without anyone ever knowing what they're seeing isn't 100% real. • Companion CD-ROM: Professional tools produce professional results. Demo versions of plug-ins from Andersson Technologies, Red Giant Software, Frischluft, and Trapcode will enhance your work. Stop relying on ready-made solutions and pre-built effects. Learn how to build up and customize your own effects with the tools at hand-you'll be amazed at how much better the results look!
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 122
    Online Resource
    Online Resource
    Indianapolis, IN : Addison Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: "I have had the good fortune to be involved with mobile Java from the very beginning, and I know what it takes to be successful in this marketplace. This book will help you be successful with mobile Java application design and development. If you take the information inside and sprinkle it with some imaginative application ideas, you will have a winning combination." - Jon Bostrom, Senior Director, CTO Java Technology Platforms, Nokia The First Official End-To-End Solutions Guide for Every Nokia Series 40 Developer Nokia's Series 40 Developer Platform gives Java developers access to the world's highest-volume, fastest-growing, and most exciting mobile markets. Nokia sells close to 100 million units within their Developer Platform families every year, and the Series 40 Developer Platform is the highest-volume platform in the family. Success on this platform is crucial for the commercial success of any mobile application. Knowledge of the Series 40 Developer Platform can be applied to the Java environment on all Nokia Developer Platform devices, including Series 60 devices. Fully reviewed by Nokia's subject matter experts, this book covers the entire development process-from design and coding through testing and deployment. The authors walk you through eleven complete example applications, presenting downloadable client and server source code that you can use to jump-start virtually any project. Along the way, the authors illuminate the technical underpinnings of Series 40, review crucial architectural issues, introduce key mobile design patterns, discuss scalability and device optimization strategies, and offer dozens of best practices and tips-many of which have never before been published. Coverage includes Identifying your best opportunities and killer applications for mobile development Building effective MIDP 2.0 user interfaces for devices built on the Series 40 Developer Platform Building animated mobile games Handling persistent and networking data Proven techniques for scaling and optimizing applications across devices © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 123
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 342 p. , ill. ; , 24 cm
    DDC: 005.74/068
    Keywords: Business ; Data processing ; Data warehousing ; Database management ; Electronic books ; local
    Abstract: The definitive best-practices guide to enterprise data-management strategy. You can no longer manage enterprise data "piecemeal." To maximize the business value of your data assets, you must define a coherent, enterprise-wide data strategy that reflects all the ways you capture, store, manage, and use information. In this book, three renowned data management experts walk you through creating the optimal data strategy for your organization. Using their proven techniques, you can reduce hardware and maintenance costs, and rein in out-of-control data spending. You can build new systems with less risk, higher quality, and improve data access. Best of all, you can learn how to integrate new applications that support your key business objectives. Drawing on real enterprise case studies and proven best practices, the author team covers everything from goal-setting through managing security and performance. You'll learn how to: Identify the real risks and bottlenecks you face in delivering data-and the right solutions Integrate enterprise data and improve its quality, so it can be used more widely and effectively Systematically secure enterprise data and protect customer privacy Model data more effectively and take full advantage of metadata Choose the DBMS and data storage products that fit best into your overall plan Smoothly accommodate new Business Intelligence (BI) and unstructured data applications Improve the performance of your enterprise database applications Revamp your organization to streamline day-to-day data management and reduce cost Data Strategy is indispensable for everyone who needs to manage enterprise data more efficiently-from database architects to DBAs, technical staff to senior IT decision-makers. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. [317]-321) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 124
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison Wesley | Boston, MA :Safari,
    Language: English
    Pages: xx, 392 p. , ill. (some col.) ; , 23 cm
    Edition: 3rd ed.
    DDC: 005.7/2
    Keywords: Cascading style sheets ; Computer graphics ; Web publishing ; Web sites ; Design ; Electronic books ; local
    Abstract: In this updated edition to their original best-selling classic, the co-creators of CSS clearly, logically, and painlessly explain the hows and whys and ins and outs of the visual formatting language that is their gift to us. The Web would be a poorer place without Messieurs Bos and Lie. Your shelf will be richer for the addition of this book. Rely on it. Study it. Savor it. The Indispensible CSS Tutorial and Reference-Straight from the Creators of CSS Direct from the creators of CSS, this is the definitive guide to CSS, today's indispensable standard for controlling the appearance of any Web or XML document. This book doesn't just show how to use every significant CSS 1 and 2.x feature; it carefully explains the "why" behind today's most valuable CSS design techniques. You'll find practical, downloadable examples throughout-along with essential browser support information and best practices for building high-impact pages and applications. Cascading Style Sheets: Designing for the Web, Third Edition covers every CSS 2.1 improvement and fix, from new height/width definitions in absolutely positioned elements to new clip property calculations. Clear, readable, and thorough, it's the one must-have CSS resource for every Web developer, designer, and content provider. Coverage includes Mastering essential CSS concepts: Rules, declarations, selectors, properties, and more Working with type: From absolute/relative units to font size and weight Understanding CSS objects: Box model, display properties, list styles, and more Exercising total control over spacing and positioning Specifying colors for borders and backgrounds Managing printing: Margins, page breaks, and more Implementing media-specific style sheets for audio rendering, handhelds, and other forms of presentation Moving from HTML extensions to CSS: Five practical case studies Making the most of cascading and inheritance Using external style sheets and import Integrating CSS with XML documents Optimizing the performance of CSS pages Includes a handy CSS Quick Reference printed on the inside covers © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 125
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 4th ed.
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Electronic books ; local
    Abstract: " C++ Primer is well known as one of the best books for learning C++ and is useful for C++ programmers of all skill levels. This Fourth Edition not only keeps this tradition alive, it actually improves on it." --Steve Vinoski, Chief Engineer, Product Innovation, IONA Technologies " The Primer really brings this large and complex language down to size." --Justin Shaw, Senior Member of Technical Staff, Electronic Programs Division, The Aerospace Corporation "It not only gets novices up and running early, but gets them to do so using good programming practices." --Nevin ":-)" Liber, Senior Principal Engineer (C++ developer since 1988) This popular tutorial introduction to standard C++ has been completely updated, reorganized, and rewritten to help programmers learn the language faster and use it in a more modern, effective way. Just as C++ has evolved since the last edition, so has the authors' approach to teaching it. They now introduce the C++ standard library from the beginning, giving readers the means to write useful programs without first having to master every language detail. Highlighting today's best practices, they show how to write programs that are safe, can be built quickly, and yet offer outstanding performance. Examples that take advantage of the library, and explain the features of C++, also show how to make the best use of the language. As in its previous editions, the book's authoritative discussion of fundamental C++ concepts and techniques makes it a valuable resource even for more experienced programmers. Program Faster and More Effectively with This Rewritten Classic Restructured for quicker learning, using the C++ standard library Updated to teach the most current programming styles and program design techniques Filled with new learning aids that emphasize important points, warn about common pitfalls, suggest good programming practices, and provide general usage tips Complete with exercises that reinforce skills learned Authoritative and comprehensive in its coverage The source code for the book's extended examples is available on the Web at the address below. www.awprofessional.com/cpp_primer
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 126
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxi, 384 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Software engineering ; Electronic books ; local
    Abstract: Extend RUP to Drive Improvements Across the Entire IT Lifecycle The Rational Unified Process is a powerful tool for improving software development -- but it doesn't go nearly far enough. Today's development organizations need to extend RUP to cover the entire IT lifecycle, including the cross-project and enterprise issues it largely ignores. The Enterprise Unified Process (EUP) does precisely that, enabling you to deliver systems that meet all the needs of today's businesses. Now, EUP's creator and architects present the definitive introduction to EUP, and demonstrate how to use it in your environment. The Enterprise Unified Process systematically identifies the business and technical problems that RUP fails to address, and shows how EUP fills those gaps. Using actual examples and case studies, the authors introduce processes and disciplines for producing new software, implementing strategic reuse, "sunsetting" obsolete code and systems, managing software portfolios, and much more. Their independent, "tool agnostic" coverage will be indispensable no matter which RUP products or platforms you've invested in. Coverage includes Practical, step-by-step guidance for adopting EUP in midsized-to-large organizations Proven processes for optimizing ongoing IT operations and support Enterprise business modeling and architecture with EUP EUP disciplines for enterprise administration, people management, and software process improvement Using the new EUP plug-in for IBM's RUP platform Workflow diagrams fully consistent with RUP for easy understanding Detailed appendices covering EUP roles, artifacts, and terminology EUP is the missing link that can help IT professionals achieve the full benefits of RUP in the enterprise. This book will help you discover it, master it, implement it, and succeed with it. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 361-369) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 127
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive book on Security Patterns, which are critical for secure programming. --Li Gong, former Chief Java Security Architect, Sun Microsystems, and coauthor of Inside Java 2 Platform Security As developers of existing applications, or future innovators that will drive the next generation of highly distributed applications, the patterns and best practices outlined in this book will be an important asset to your development efforts. --Joe Uniejewski, Chief Technology Officer and Senior Vice President, RSA Security, Inc. This book makes an important case for taking a proactive approach to security rather than relying on the reactive security approach common in the software industry. --Judy Lin, Executive Vice President, VeriSign, Inc. Core Security Patterns provides a comprehensive patterns-driven approach and methodology for effectively incorporating security into your applications. I recommend that every application developer keep a copy of this indispensable security reference by their side. --Bill Hamilton, author of ADO.NET Cookbook , ADO.NET in a Nutshell , and NUnit Pocket Reference As a trusted advisor, this book will serve as a Java developers security handbook, providing applied patterns and design strategies for securing Java applications. --Shaheen Nasirudheen, CISSP,Senior Technology Officer, JPMorgan Chase Like Core J2EE Patterns , this book delivers a proactive and patterns-driven approach for designing end-to-end security in your applications. Leveraging the authors strong security experience, they created a must-have book for any designer/developer looking to create secure applications. --John Crupi, Distinguished Engineer, Sun Microsystems, coauthor of Core J2EE Patterns Core Security Patterns is the hands-on practitioners guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisionin...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 128
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 624 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    Keywords: Internet programming ; Microsoft .NET ; Electronic books ; local
    Abstract: Brilliantly compiled by author Juval Lowy, Programming .NET Components , Second Edition is the consummate introduction to the Microsoft .NET Framework--the technology of choice for building components on Windows platforms. From its many lessons, tips, and guidelines, readers will learn how to use the .NET Framework to program reusable, maintainable, and robust components.Following in the footsteps of its best-selling predecessor, Programming .NET Components , Second Edition has been updated to cover .NET 2.0. It remains one of the few practical books available on this topic. This invaluable resource is targeted at anyone who develops complex or enterprise-level applications with the .NET platform--an ever-widening market. In fact, nearly two million Microsoft developers worldwide now work on such systems. Programming .NET Components , Second Edition begins with a look at the fundamentals of component-oriented programming and then progresses from there. It takes the time to carefully examine how components can simplify and add flexibility to complex applications by allowing users to extend their capabilities. Next, the book introduces a variety of .NET essentials, as well as .NET development techniques. Within this discussion on component development, a separate chapter is devoted to each critical development feature, including asynchronous calls, serialization, remoting, security, and more. All the while, hazardous programming pitfalls are pointed out, saving the reader from experiencing them the hard way.A .NET expert and noted authority on component-oriented programming, Lowy uses his unique access to Microsoft technical teams to the best possible advantage, conveying detailed, insider information in easy-to-grasp, activity-filled language. This hands-on approach is designed to allow individuals to learn by doing rather than just reading. Indeed, after digesting Programming .NET Components , Second Edition, readers should be able to start developing .NET components immediately. Programming .NET Components , Second Edition is the consummate introduction to the Microsoft .NET Framework--the technology of choice for building components on Windows platforms. From its many lessons, tips, and guidelines, readers will learn how to use the .NET Framework to program reusable, maintainable, and robust components.Following in the footsteps of its best-selling predecessor, Programming .NET Components , Second Edition has been updated to cover...
    Note: "Covers .NET 2.0 & Visual Studio 2005"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 129
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Direct from the creators of the Java™ programming language, the completely revised fourth edition of The Java™ Programming Language is an indispensable resource for novice and advanced programmers alike. Developers around the world have used previous editions to quickly gain a deep understanding of the Java programming language, its design goals, and how to use it most effectively in real-world development. Now, Ken Arnold, James Gosling, and David Holmes have updated this classic to reflect the major enhancements in Java™ 2 Standard Edition 5.0 (J2SE™ 5.0). The authors systematically cover most classes in Java's main packages, java.lang.* , java.util, and java.io, presenting in-depth explanations of why these classes work as they do, with informative examples. Several new chapters and major sections have been added, and every chapter has been updated to reflect today's best practices for building robust, efficient, and maintainable Java software. Key changes in this edition include New chapters on generics, enums, and annotations, the most powerful new language features introduced in J2SE 5.0 Changes to classes and methods throughout to reflect the addition of generics Major new sections on assertions and regular expressions Coverage of all the new language features, from autoboxing and variable argument methods to the enhanced for-loop and covariant return types Coverage of key new classes, such as Formatter and Scanner The Java™ Programming Language, Fourth Edition, is the definitive tutorial introduction to the Java language and essential libraries and an indispensable reference for all programmers, including those with extensive experience. It brings together insights you can only get from the creators of Java: insights that will help you write software of exceptional quality.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 130
    Online Resource
    Online Resource
    Indianapolis, IN : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 248 p. , ill. ; , 24 cm
    Keywords: UML (Computer science) ; Electronic books ; local
    Abstract: "There are many books that shine light on the darkest corners of the UML, but Eric and Bob present just the essentials needed to make you effective in modeling all the important aspects of a software-intensive system." -Grady Booch "Bob and Eric have managed to capture key system and software design techniques in a style that is refreshingly straightforward to understand and apply, and to distill their ideas and insight from more than a decade of practical use of UML into a book that will increase your appreciation for UML and make you more effective." -Dr. Alan W. Brown, Distinguished Engineer, IBM Rational "A practical introduction to designing real-world business systems using UML, explained from first principles. A great book for anyone who wants to start learning the industry's standard modeling language." -Andrew Watson, Vice President and Technical Director, Object Management Group Need to get results with UML...without unnecessary complexity or mind-numbing jargon? You need UML for Mere Mortals®. This easy-to-read introduction is perfect for technical professionals and business stakeholders alike: anyone who needs to create, understand, or review UML models, without becoming a hard-core modeler. There's nothing theoretical about this book. It explains UML in the context of your real-world challenges. It's organized around the activities you'll need to perform. It focuses on the UML elements you'll find most useful. And it offers specific answers for the problems you're most likely to face. Drawing on extensive experience, the authors offer pragmatic explanations and guidance on core techniques ranging from use cases to component diagrams, architectural patterns to application and database modeling. You'll find practical coverage for using UML to support testing, as well as discussion of UML 2.0 and its implications. Whether you're a manager, programmer, architect, database designer, or documentation specialist, UML for Mere Mortals is the handy resource you need to help you achieve your goals with UML...simply, quickly, painlessly. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 131
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Community Press | Boston, MA :Safari,
    Language: English
    Pages: xv, 219 p. , ill. ; , 23 cóm
    Edition: 1st ed.
    Keywords: Computer-assisted instruction ; Computer programs ; Handbooks, manuals, etc ; Instruction systems ; Design ; Handbooks, manuals, etc ; Open source software ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Developed by an extremely active open source community, Moodle is a sophisticated course management system that's ideal for creating dynamic online learning communities and for supplementing face-to-face learning. Used in more than 115 countries and supporting over 60 languages, Moodle can scale from a single-teacher site to a 40,000- student university. Teachers who use Moodle have access to an array of powerful tools such as assignments, forums, journals, quizzes, surveys, chat rooms, and workshops. Using Moodle is a comprehensive, hands-on guide that explains how the system works, with plenty of examples and best practices for its many features and plug-in modules. Authored by a member of the Moodle community, this authoritative book also exposes little-known but powerful hacks for more technically savvy users. For anyone who is using-or thinking of using-this CMS, Using Moodle is required reading.
    Note: "Moodle is a sophisticated course management system that's ideal for creating dynamic online learning communities and for supplementing face-to-face learning"--P. [4] of cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 132
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xx, 268 p. , ill. ; , 24 cm
    DDC: 686.2/2544536
    Keywords: Adobe InDesign ; Desktop publishing ; Electronic books ; local
    Abstract: Costs less. Does more. Is easier to use: If this is the conclusion you've reached when comparing InDesign CS with its two long-time rivals (QuarkXPress and PageMaker), you're ready to make the switch. This guide shows you how! Throughout this compact guide, the focus is on leveraging your skill in the other leading desktop publishing packages to get up to speed fast in the new leading publishing package! As the perfect companion to the more comprehensive Real World InDesign CS , this tightly focused guide details the most common tasks and techniques you need to know to get your job done in InDesign CS. Clear, concise instructions enhanced by plenty of screen shots and sample layouts show you how to create and navigate documents, import and style text and objects, manage long projects, work with color, and more. You¿ll also find good coverage of all of InDesign's newest and most unique features: the Story Editor, a Separation Preview palette, nested styles, the Package for GoLive command, and more.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 133
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/46
    Keywords: Mac OS ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The Most Useful UNIX Guide for Mac OS X Users Ever, with Hundreds of High-Quality Examples! Beneath Mac OS ® X's stunning graphical user interface (GUI) is the most powerful operating system ever created: UNIX ® . With unmatched clarity and insight, this book explains UNIX for the Mac OS X user-giving you total control over your system, so you can get more done, faster. Building on Mark Sobell's highly praised A Practical Guide to the UNIX System, it delivers comprehensive guidance on the UNIX command line tools every user, administrator, and developer needs to master-together with the world's best day-to-day UNIX reference. This book is packed with hundreds of high-quality examples. From networking and system utilities to shells and programming, this is UNIX from the ground up-both the "whys" and the "hows"-for every Mac user. You'll understand the relationships between GUI tools and their command line counterparts. Need instant answers? Don't bother with confusing online "manual pages": rely on this book's example-rich, quick-access, 236-page command reference! Don't settle for just any UNIX guidebook. Get one focused on your specific needs as a Mac user! A Practical Guide to UNIX ® for Mac OS ® X Users is the most useful, comprehensive UNIX tutorial and reference for Mac OS X and is the only book that delivers Better, more realistic examples covering tasks you'll actually need to perform Deeper insight, based on the authors' immense knowledge of every UNIX and OS X nook and cranny Practical guidance for experienced UNIX users moving to Mac OS X Exclusive discussions of Mac-only utilities, including plutil , ditto , nidump , otool , launchctl , diskutil , GetFileInfo , and SetFile Techniques for implementing secure communications with ssh and scp -plus dozens of tips for making your OS X system more secure Expert guidance on basic and advanced shell programming with bash and tcsh Tips and tricks for using the shell interactively from the command line Thorough guides to vi and emacs designed to help you get productive fast, and maximize your editing efficiency In-depth coverage of the Mac OS X filesystem and access permissions, including extended attributes and Access Control Lists (ACLs) A comprehensive UNIX glossary Dozens of exercises to help you practice and gain confidence And much more, including a superior introduction to UNIX programming tools such as awk , sed , otool , make , gcc , gdb , and CVS
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 134
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 658.4/038
    Keywords: Chief information officers ; Information resources management ; Information technology ; Management ; Management ; Electronic books ; local
    Abstract: World-class IT leadership solutions from working CIOs: detailed, realistic, proven Every year, IT leadership becomes more challenging. Don't go it alone. Get practical help from the people who know what you're up against, and know what works: your most successful peers . In CIO Wisdom II, more than a dozen of today's leading CIOs share specific, realistic, up-to-the-minute techniques for maximizing agility, cost-effectiveness, and business value . You'll find solutions for managing both the internal and external forces impacting IT, and for dealing with more than 20 of your toughest issues -- business, technical, and human . You'll find specific, realistic approaches to everything from architecture to outsourcing, new technology selection to governance. CIO Wisdom II: it's more valuable than your last consultant -- and a whole lot more cost-effective. Anticipating the next transformation in your role as CIO -- and getting ahead of the curve Delivering real-time, mission-critical business intelligence: lessons from the military Integrating the enterprise: New best practices and cost-effective technical options Quantifying and maximizing software return on investment Mastering five crucial lessons for successful IT outsourcing Managing outsourced environments for maximum responsiveness, flexibility, and efficiency Leveraging the value of open source -- and minimizing its risks Using IT to improve business processes -- and improving your own internal processes, including procurement Systematically securing your IT facilities Achieving compliance -- and leveraging those investments for competitive advantage Previewing tomorrow's key trends in information management © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 135
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 3rd ed.
    Keywords: Electronic books ; local
    Abstract: Official self-study test preparation guide for the Cisco IPS exam 642-532 The official study guide helps you master all the topics on the IPS exam, including: IPS concepts Command-line interface (CLI) and IPS Device Manager (IDM) configuration modes Basic sensor and IPS signature configuration IPS signature engines Sensor tuning IPS event monitoring Sensor maintenance Verifying system configuration Using the Cisco IDS Module (IDSM) and Cisco IDS Network Module Capturing network traffic CCSP IPS Exam Certification Guide is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the IPS exam. Cisco Security Test Engineer Earl Carter shares preparation hints and test-taking tips, helping you identify areas of weakness and improve your Intrusion Prevention System (IPS) knowledge. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. CCSP IPS Exam Certification Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. "Do I Know This Already" quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists and Foundation Summary materials make referencing easy and give you a quick refresher whenever you need it. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts. The companion CD-ROM contains a powerful testing engine that allows you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, presenting question-by-question remediation to the text. Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time. CCSP IPS Exam Certification Guide is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. Companion CD-ROM The CD-ROM contains an electronic copy of the book and more than 200 practice questions for the IPS ex...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 136
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 1st ed.
    Keywords: Electronic books ; local
    Abstract: The all-in-one guide to modern routed and switched campus network design Understand the network design process and network design models Learn how switches are used in network design Design an IP addressing plan and select appropriate IP routing protocols Apply network security design principles to boost network security Enable WLANs to improve workforce mobility Examine QoS design requirements and tools Unleash the power of voice transport over data networks, including VoIP and IP telephony Use content networking to provide content to users quickly and efficiently Learn how to integrate network management protocols and tools into network designs Understand how to effectively integrate IP multicast, high availability, storage networking, and IPv6 into your network designs Over the past decade, campus network design has evolved many times as new technologies have emerged and business needs have changed. For enterprises to take advantage of cost-saving, productivity-enhancing solutions, such as IP telephony and content networking, their core infrastructures must include the key enabling technologies required by these solutions and provide a resilient, secure foundation that can scale to business needs. As with any architecture, designing a solid foundation is the first step. Campus Network Design Fundamentals is an all-in-one guide to key technologies that can be integrated into network design. The book provides insight into why each technology is important and how to apply this knowledge to create a campus network that includes as many or as few of today's productivity-enhancing applications as are needed in your environment. Topics covered throughout the book include network design process and models, switching, IP routing, quality of service (QoS), security, wireless LANs (WLANs), voice transport, content networking, network management, IPv6, IP multicast, increasing network availability, and storage networking. Sample network designs are included through-out, and the book concludes with a comprehensive case study that illustrates the design process and solutions for headquarters, branch offices, and home office/remote users. Whether you need an overview of modern campus technologies or seek advice on how to design switched and routed networks that securely support these technologies, this book is your comprehensive resource to the foundations upon which all modern-day campus networks are based. This book is part of the Cisco Press® Fundament...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 137
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Identify, mitigate, and respond to network attacks Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS Evaluate Intrusion Prevention System (IPS) solutions including IPS integration and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) configuration Deploy VPN solutions including site-to-site IPsec VPNs, remote- access VPNs, and Public Key Infrastructure (PKI) Learn to manage firewall, IPS, and VPN solutions with Adaptive Security Device Manager (ASDM) Achieving maximum network security is a challenge for most organizations. Cisco® ASA, a new unified security device that combines firewall, network antivirus, intrusion prevention, and virtual private network (VPN) capabilities, provides proactive threat defense that stops attacks before they spread through the network. This new family of adaptive security appliances also controls network activity and application traffic and delivers flexible VPN connectivity. The result is a powerful multifunction network security device that provides the security breadth and depth for protecting your entire network, while reducing the high deployment and operations costs and complexities associated with managing multiple point products. Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance is a practitioner's guide to planning, deploying, and troubleshooting a comprehensive security plan with Cisco ASA. The book provides valuable insight and deployment examples and demonstrates how adaptive identification and mitigation services on Cisco ASA provide a sophisticated security solution for both large and small network environments. The book contains many useful sample configurations, proven design scenarios, and discussions of debugs that help you understand how to get the most out of Cisco ASA in your own network. "I have found this book really highlights the practical aspects needed for building real-world security. It offers the insider's guidance needed to plan, implement, configure, and troubleshoot the Cisco ASA in customer environments and demonstrates the potential and power of Self-Defending Networks." -Jayshree Ullal, Sr. Vice President, Security Technologies Group, Cisco Systems® This security book is part of th...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 138
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: p. ; , cm
    Keywords: Electronic books ; local
    Abstract: Identify, analyze, and resolve current and potential network security problems Learn diagnostic commands, common problems and resolutions, best practices, and case studies covering a wide array of Cisco network security troubleshooting scenarios and products Refer to common problems and resolutions in each chapter to identify and solve chronic issues or expedite escalation of problems to the Cisco TAC/HTTS Flip directly to the techniques you need by following the modular chapter organization Isolate the components of a complex network problem in sequence Master the troubleshooting techniques used by TAC/HTTS security support engineers to isolate problems and resolve them on all four security domains: IDS/IPS, AAA, VPNs, and firewalls With the myriad Cisco® security products available today, you need access to a comprehensive source of defensive troubleshooting strategies to protect your enterprise network. Cisco Network Security Troubleshooting Handbook can single-handedly help you analyze current and potential network security problems and identify viable solutions, detailing each step until you reach the best resolution. Through its modular design, the book allows you to move between chapters and sections to find just the information you need. Chapters open with an in-depth architectural look at numerous popular Cisco security products and their packet flows, while also discussing potential third-party compatibility issues. By following the presentation of troubleshooting techniques and tips, you can observe and analyze problems through the eyes of an experienced Cisco TAC or High-Touch Technical Support (HTTS) engineer or determine how to escalate your case to a TAC/HTTS engineer. Part I starts with a solid overview of troubleshooting tools and methodologies. In Part II, the author explains the features of Cisco ASA and Cisco PIX® version 7.0 security platforms, Firewall Services Module (FWSM), and Cisco IOS® firewalls. Part III covers troubleshooting IPsec Virtual Private Networks (IPsec VPN) on Cisco IOS routers, Cisco PIX firewalls with embedded VPN functionalities, and the Cisco 3000 Concentrator. Troubleshooting tools and techniques on the Authentication, Authorization, and Accounting (AAA) framework are discussed thoroughly on routers, Cisco PIX firewalls, and Cisco VPN 3000 concentrators in Part IV. Part IV also covers troubleshooting Cisco Secure ACS on Windows, the server-side component of the AAA framework. IDS/IPS troubleshooting...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 139
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xiv, 282 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: "Every programming language has its quirks. This lively book reveals oddities of the Java programming language through entertaining and thought-provoking programming puzzles." --Guy Steele, Sun Fellow and coauthor of The Java™ Language Specification "I laughed, I cried, I threw up (my hands in admiration)." --Tim Peierls, president, Prior Artisans LLC, and member of the JSR 166 Expert Group How well do you really know Java? Are you a code sleuth? Have you ever spent days chasing a bug caused by a trap or pitfall in Java or its libraries? Do you like brainteasers? Then this is the book for you! In the tradition of Effective Java™ , Bloch and Gafter dive deep into the subtleties of the Java programming language and its core libraries. Illustrated with visually stunning optical illusions, Java™ Puzzlers features 95 diabolical puzzles that educate and entertain. Anyone with a working knowledge of Java will understand the puzzles, but even the most seasoned veteran will find them challenging. Most of the puzzles take the form of a short program whose behavior isn't what it seems. Can you figure out what it does? Puzzles are grouped loosely according to the features they use, and detailed solutions follow each puzzle. The solutions go well beyond a simple explanation of the program's behavior--they show you how to avoid the underlying traps and pitfalls for good. A handy catalog of traps and pitfalls at the back of the book provides a concise taxonomy for future reference. Solve these puzzles and you'll never again fall prey to the counterintuitive or obscure behaviors that can fool even the most experienced programmers.
    Note: Includes bibliographical references (p. 265-269) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 140
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 1664 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: HP-UX ; Hewlett-Packard computers ; Programming ; Examinations ; Study guides ; Operating systems (Computers) ; Electronic books ; local
    Abstract: HP-UX CSE: Official Study Guide and Desk Reference The definitive HP-UX CSE exam preparation guide and reference HP-approved coverage of all three CSE exams: CSE HP-UX Advanced System Administration, CSE High Availability Using HP-UX Serviceguard, and CSE HP-UX Networking and Security Comprehensive study resources: exam objectives, sample questions, and summaries for last-minute review More than a great study guide: an outstanding reference for working system engineers This book delivers comprehensive preparation for all three HP-UX CSE exams, the core exam: CSE HP-UX Advanced System Administration, and specialty exams, CSE High Availability Using HP-UX Serviceguard and CSE HP-UX Networking and Security . Coverage includes: Implementing HP-UX in technology-rich enterprise environments Maximizing the performance and availability of HP-UX systems and applications Partitioning: node and virtual partitions Disks, volumes, file systems: RAID, LVM, VxVM, HFS, VxFS, VFS layer, swap/dump space, and more Monitoring system resources, activities, events, and kernels Processes, threads, and bottlenecks: priorities, run queues, multi-processor environments, memory requirements, bottlenecks, and more Installation, patching, and recovery, including Software Distributor and Ignite-UX Emergency recovery with HP-UX installation media Broad networking coverage: IPv6, ndd, DHCP, DNS, NTP, CIFS/9000, LDAP, sendmail, Automatic Port Aggregation, VPNs, VLANs, and more Planning, implementing, and managing high availability clustering with Serviceguard Other HP-UX cluster solutions: Extended Serviceguard Cluster, Metrocluster, Continentalclusters, and more Infrastructure for remote access to HA clusters: SANs, DWDM, dark fiber HP-UX security administration: Trusted systems, SSH, HIDS, IPSec, IPFilter, and Bastille Operating Systems/HP-UX Sample questions, last-minute review tips, and other study resources This isn't just an outstanding prep guide, it's the definitive day-to-day reference for working professionals in high availability environments. © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 141
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 525 p. , ill. ; , 24 cm
    DDC: 005.2'765
    Keywords: Lotus Notes ; WebSphere ; Software configuration management ; Web servers ; Computer programs ; Electronic books ; local
    Abstract: Straight from IBM, this is the first comprehensive guide to building collaborative solutions that integrate WebSphere and Lotus to drive maximum business value. Writing for experienced Web developers, three leading IBM consultants show how to design and deploy WebSphere and Domino together in any environment, no matter how large or complex. The authors address architecture, security, performance, availability, development, and much more. Using their techniques, you can implement cutting-edge collaboration, drive productivity improvements, streamline business processes, accelerate response times-and build your On Demand enterprise. Coverage includes Architecting WebSphere and Lotus collaboration for maximum effectiveness Establishing a common platform that reduces administrative costs and increases ROI Choosing what to deploy on WebSphere and what to deploy on Domino Optimizing new Lotus collaborative applications for existing WebSphere environments Managing integrated WebSphere and Domino systems Using WebSphere and Domino development tools to extend and customize your system Accessing J2EE from Domino-and vice versa Detailed appendices on WebSphere Application Server, Domino, WebSphere Portal, Lotus Workplace, and much more... © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 501-504) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 142
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 689 p. , ill. ; , 24 cm
    DDC: 005.2'762
    Keywords: PHP (Computer program language) ; Web sites ; Design ; Electronic books ; local
    Abstract: "This book, written by my colleague, Andi Gutmans, and two very prominent PHP developers, Stig Bakken and Derick Rethans, holds the key to unlocking the riches of PHP 5. It thoroughly covers all of the features of this new version, and is a must have for all PHP developers interested in exploring PHP 5's advanced features" -Zeev Suraski, Co-Designer of PHP 5 and Co-Creator of the Zend Engine Expert PHP 5 programming techniques, direct from PHP 5 co-creator and key developers Definitive coverage of the PHP object model, design patterns, XML/SOAP integration, and more Solid introduction and expert insights into performance tuning, PEAR, extensions, and database access The definitive introduction to PHP 5's advanced features! The definitive introduction for today's most powerful PHP 5 techniques In this book, PHP 5's co-creator and two leading PHP developers show you how to make the most of PHP 5's industrial-strength enhancements in any project-no matter how large or complex. Their unique insights and realistic examples illuminate PHP 5's new object model, powerful design patterns, improved XML Web services support, and much more. Whether you're creating web applications, extensions, packages, or shell scripts-or migrating PHP 4 code-here are high-powered solutions you won't find anywhere else. Review PHP's syntax and master its object-oriented capabilities-from properties and methods to polymorphism, interfaces, and reflection Master the four most important design patterns for PHP development Write powerful web applications: handle input, cookies, session extension, and more Integrate with MySQL, SQLite, and other database engines Provide efficient error handling that's transparent to your users Leverage PHP 5's improved XML support-including parsing, XSLT conversions, and more Build XML-based web services with XML-RPC and SOAP Make the most of PEAR: work with the repository, use key packages, and create your own Upgrade PHP 4 code to PHP 5-compatibility issues, techniques, and practical workarounds Improve script performance: tips and tools for PHP optimization Use PHP extensions to handle files/streams, regular expressions, dates/times, and graphics Create original extensions and shell scripts If you're a software developer new to PHP, you'll leap quickly into PHP and its new object-oriented capabilities. If you're an experienced PHP programmer, you already recognize PHP's convenience and simplicity. Now, discover all of its extraordinary pow...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 143
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 381 p. , ill. ; , 23 cm
    Keywords: Computer networks ; Security measures ; Computer security ; Computer security ; United States ; Management ; Data protection ; Data protection ; Management ; Electronic books ; local
    Abstract: Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel with security equipment to effectively lessen security risks Analyze the greater implications of security breaches facing corporations and executives today Understand the governance aspects of network security to help implement a climate of change throughout your organization Learn how to qualify your organization's aversion to risk Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization's risks and objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board. Making technical issues accessible, this book presents an overview of security technologies that uses a holistic and objective model to quantify issues such as ROI, total cost of ownership (TCO), and risk tolerance. This book explores capital expenditures and fixed and variable costs, such as maintenance and upgrades, to determine a realistic TCO figure, which in turn is used as the foundation in calculating ROI. The importance of security policies addressing such issues as Internet usage, remote-access usage, and incident reporting is also discussed, acknowledging that the most comprehensive security equipment will not protect an organization if it is poorly configured, implemented, or used. Quick reference sheets and worksheets, included in the appendixes, provide technology reviews and allow fin...
    Note: "Understand the total cost of ownership and return on investment for network security solutions"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 144
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxvii, 870 p. , ill. ; , 23 cm
    Series Statement: Networking technology series
    Keywords: Electronic books ; local
    Abstract: Harden perimeter routers with Cisco firewall functionality and features to ensure network security Detect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniques Use Network-Based Application Recognition (NBAR) to detect and filter unwanted and malicious traffic Use router authentication to prevent spoofing and routing attacks Activate basic Cisco IOS filtering features like standard, extended, timed, lock-and-key, and reflexive ACLs to block various types of security threats and attacks, such as spoofing, DoS, Trojan horses, and worms Use black hole routing, policy routing, and Reverse Path Forwarding (RPF) to protect against spoofing attacks Apply stateful filtering of traffic with CBAC, including dynamic port mapping Use Authentication Proxy (AP) for user authentication Perform address translation with NAT, PAT, load distribution, and other methods Implement stateful NAT (SNAT) for redundancy Use Intrusion Detection System (IDS) to protect against basic types of attacks Obtain how-to instructions on basic logging and learn to easily interpret results Apply IPSec to provide secure connectivity for site-to-site and remote access connections Read about many, many more features of the IOS firewall for mastery of router security The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. Cisco Router Firewall Security teaches you how to use the Cisco IOS firewall to enhance the security of your perimeter routers and, along the way, take advantage of the flexibility and scalability that is part of the Cisco IOS Software package. Each chapter in Cisco Router Firewall Security addresses an important component of perimeter router security. Author Richard Deal explains the advantages and disadvantages of all key security features to help you understand when they should be used and includes examples from his personal consulting experience to illustrate critical issues and security pitfalls. A detailed case study is included at the end of the book, which illustrates best practices and specific information on how to implement Cisco router security features. Whether you are looking to learn about firewall security or seeking how-to techniques to enhance security in your Cisco routers, Cisco R...
    Note: "Harden perimeter routers with Cisco firewall functionality and features to ensure network security"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 145
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: There's a new browser in town: Firefox is quickly becoming a leading alternative to Microsoft Internet Explorer. If you are new to Firefox and want to see what all the buzz is about, Firefox and Thunderbird: Beyond Browsing and Email is the guide that you need. By focusing on how to configure and customize Firefox and Thunderbird, this book will show you how to quickly get a hold of the less intuitive features that most new users struggle to figure out. You will discover which of Firefox's many options should be adjusted, which shouldn't, and how to locate many hidden preferences that will ultimately create a better browsing experience. The author's tips and tricks will teach you how to adjust the browser's appearance and behavior, and how to install the most popular extensions to maximize the browser's performance. You'll also be introduced to Firefox's e-mail client companion, Thunderbird. You'll cover Thunderbird's built-in spam filters, calendar, and customizeable layout and toolbars. Personalize your e-mail with tips and tricks dedicated to getting the most out of Thunderbird, and learn how to make it work together with Firefox for a seamless online experience. You can even find out how to contribute to the development of Firefox and Thunderbird. A special section on Web development will show you how you can add new extensions, themes, and customizations to each one and make an impact on the future of Firefox and Thunderbird.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 146
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que ; | Boston, MA :Safari,
    Language: English
    Pages: 256 p. , ill. ; , 26 cm
    DDC: 004.16
    Keywords: Microcomputers ; Electronic books ; local
    Abstract: Your new PC just arrived. You open the box, excited to hook it up, start surfing the web, send e-mails...and then you see all of the cords, CD-ROMs and parts that need to be connected and installed, and suddenly it doesn't seem like so much fun anymore. The instructions look even more intimidating. Don't panic! Easy Computer Basics can help. This up-to-date, full-color, highly visual guide will walk you through the entire set-up process and then show you how to use the different programs to accomplish common tasks. You'll learn how to: Use Microsoft Windows, Works and Word Connect to the Internet Surf the web Read and write e-mail View and edit digital pictures Download and listen to digital music Add new devices, such as printers and hard drives Perform basic maintenance and security tasks Having a computer is supposed to be fun, so don't let its size or complexity take the fun out of your experience. Make your PC work for you with Easy Computer Basics .
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 147
    Online Resource
    Online Resource
    Indianapolis, IN : Que Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: We all have those "go-to" people in our lives. The one you go-to for advice, the one you go-to for comfort, the one you go-to with technical questions...now you can be the one that others go-to for help with Microsoft Office 2003. Tricks of the Microsoft Office Gurus is full of exclusive tricks from Paul McFedries , an Office "insider," that will help you learn the Office applications inside and out. Designed to bridge the gap between your expectation and reality, you will go beyond the basics and learn newly discovered techniques, shortcuts and best practices, including: Using Excel's "Camera Tool" for what-if analysis Embedding fonts in shared documents Adding a live stock price quote to a worksheet Using dummy text to layout and format a document Publishing Outlook Calendar to the web Using Word to customize Power Point handouts Through real-world examples that showcase how the tips and tricks can be used in everyday business tasks, Tricks of the Microsoft Office Gurus will help you get the most out of Office 2003.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 148
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que ; | Boston, MA :Safari,
    ISBN: 9780789732729 , 0789732726 , 0789732726
    Language: English
    Pages: 480 p. ; , 23 cm
    Series Statement: Exam cram 2
    Parallel Title: Erscheint auch als
    DDC: 658.4038011
    Keywords: Management information systems Study guides Auditing ; Examinations ; Management information systems ; Auditing ; Examinations ; Study guides ; Electronic books ; local ; Electronic books ; Study guides ; Electronic book
    Abstract: Want an affordable yet innovative approach to studying for the Certified Information Systems Auditor (CISA) 2005 exam? CISA 2005 Exam Cram 2 is your solution. You will have the essential material for passing the CISA 2005 exam right at your fingertips. All exam objectives are covered and you'll find practice exams, exam alerts, notes, tips and cautions to help guide you through your exam preparation. A CD also provides you with a video introduction to the exam and complete explanations of answers to the practice questions from Certified Tech Trainers (CTT). As a special bonus, you will receive $75 in discounts on CTT products and services. For your smartest, most efficient way to get certified, choose CISA 2005 Exam Cram 2 .
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 149
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: xvii, 413 p. , ill. ; , 24 cm
    DDC: 005.52
    Keywords: Word processing ; WordPerfect (Computer file) ; Electronic books ; local
    Abstract: Maybe you just bought a brand new Dell, Sony or HP computer and are curious about the WordPerfect software that came with it. Or maybe you just took a new job in an office where they use WordPerfect 12 for word processing. Whatever the case may be, if you are new to Word Perfect 12, the Absolute Beginner's Guide to WordPerfect 12 can help you figure it all out. Endorsed by Corel, the makers of WordPerfect, this is the best beginning level guide on the market. Organized in an easy-to-follow, progressive format, you will learn how to navigate the program and build complex documents. By the time you're done, you will know how to use WordPerfect 12 from beginning to end!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 150
    Online Resource
    Online Resource
    Indianapolis, Ind. : Que | Boston, MA :Safari,
    Language: English
    Pages: ix, 163 p. , ill. ; , 23 cm
    Keywords: Filing systems ; Finance, Personal ; Paperwork (Office practice) ; Management ; Records ; Management ; Electronic books ; local
    Abstract: Drowning in a pile of bills, receipts and bank statements and don't know how to swim to the top? Organize Your Personal Finances In No Time will be your lifesaver. Written by a professional organizer and coach for the chronically disorganized, this do-it-yourself guide will show you how to create a fool-proof, easy-to-maintain financial system in a single day. Written in a unique step-by-step, to-do list approach, you will master skills such as tracking income and expenses, bill paying, creating a file system and shopping with efficiency. Then, learn to take all of your new skills and apply them to creating a savings plan, a budget and graphs to illustrate spending habits and debt details. When it comes to your finances, if the choice becomes sink or swim, let Organize Your Personal Finances In No Time help you swim.
    Note: Includes bibliographical references (p. [143]-148) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 151
    Online Resource
    Online Resource
    Berkeley, CA : New Riders Games | Boston, MA :Safari,
    Language: English
    Pages: xiv, 218 p. , ill. ; , 24 cm
    DDC: 794.8/165
    Keywords: Computer games ; Computer sound processing ; Electronic books ; local
    Abstract: Tired of video games in which the sound lags far behind the rest of the user's experience? If so, and if you're ready to do better, you need this forward-looking volume! In these pages, sound artist extraordinaire Alexander Brandon provides a broad-ranging exploration of how game audio is created today and how it should be done in the future in order to create groundbreaking audio. After providing a map of the audio development process in Chapter 1, Alexander discusses the basic preproduction, workflow, production, post-production, and technology issues audio designers must address today. Then, after a post-mortem analysis of the audio development process for a game that's currently on the market, Alexander takes a good, hard look at the heights to which video-game audio can be taken in chapters on ideal workflow, technology, and production. Throughout, the focus is on the practical advice you need to create better (and better!) sound!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 152
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xiii, 333 p. , col. ill. ; , 19 x 23 cm
    Edition: 2nd ed.
    DDC: 005.4/46
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Get the fast facts that make learning Windows XP plain and simple! Fully updated for the latest service packs, technologies, and security updates, this colorful, no-nonsense guide shows the most expedient way to learn a skill or solve a problem.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 153
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 887 p. , ill. ; , 23 cm. +
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: In-depth technical information and tools to help IT professionals deploy Microsoft Windows desktop operating systems and applications-straight from the source. Get definitive guidance, plus must-have tools, templates, and scripts on CD.
    Note: Accompanying CD-ROM includes scripts, worksheets, white papers, and an eBook. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 154
    Online Resource
    Online Resource
    Indianapolis, IN : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: As businesses attempt to maximize every employee hour, knowledge management and collaboration tools like SharePoint 2003 have become more popular. Now businesses turn their attention to maximize this tool. Microsoft SharePoint 2003 Unleashed, Second Edition can show you how to do this. Revised based on reader feedback, this new edition delves into the power of SharePoint 2003 by going deep inside topics that include: Migrating to SharePoint 2003 Planning and Implementing a SharePoint 2003 Environment Managing a SharePoint 2003 Environment Extending the SharePoint 2003 Environment SharePoint 2003 technologies are designed to make it easier for everyone on a network to find and manage information. Microsoft SharePoint 2003 Unleashed, Second Edition makes it easier to get there.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 155
    Online Resource
    Online Resource
    Indianapolis, Ind. : MySQL Press | Boston, MA :Safari,
    Language: English
    Pages: xvii, 414 p. , ill. ; , 23 cm
    DDC: 005.7585
    Keywords: MySQL (Electronic resource) ; SQL (Computer program language) ; Electronic books ; local
    Abstract: The authoritative, hands-on guide to advanced MySQL programming and administration techniques for high performance is here. MySQL Database Design and Tuning is the only guide with coverage of both the basics and advanced topics, including reliability, performance, optimization and tuning for MySQL. This clear, concise and unique source for the most reliable MySQL performance information will show you how to: Deploy the right MySQL product for your performance needs. Set up a performance management and monitoring environment using tools from MySQL. Implement the right indexing strategy Apply good performance strategy when developing software to work with the MySQL database. Configure dozens of variable to correctly tune the MySQL engine. If you deal with the intricacies and challenges of advanced MySQL functionality on a daily basis, you will be able to build on your knowledge with author Robert Schneider's real-world experiences in MySQL Database Design and Tuning .
    Note: "The official guide to designing and tuning MySQL databases for optimal performance" --Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 156
    Online Resource
    Online Resource
    Indianapolis, Ind. : SAMS | Boston, MA :Safari,
    Language: English
    Pages: 514 p. ; , 23 cm
    Keywords: Electronic books ; local
    Abstract: Create works of art using your computer, Adobe Photoshop CS 2 and Sams Teach Yourself Photoshop CS 2 in 24 Hours . Learn the basics of Photoshop with a minimum of jargon from market-leading author, Carla Rose . Her conversational, friendly approach will make Photoshop seem less intimidating and more manageable to learn. With Carla's help, you will learn to: Select color modes Use paintbrushes and art tools Use layers, masks and paths Use artistic filters Apply special effects to pictures Enhance and repair photos Master the world's leading image editing and manipulation tool with this accessible yet detailed, step-by-step tutorial.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 157
    Online Resource
    Online Resource
    Indianapolis : Sams | Boston, MA :Safari,
    Language: English
    Pages: vii, 213 p. , ill. ; , 21 cm
    Keywords: Intranets (Computer networks) ; Web servers ; Electronic books ; local
    Abstract: Sams Teach Yourself SharePoint 2003 in 10 Minutes is the first quick reference book for users of SharePoint 2003. Easy-to-follow instructions for the most common tasks in SharePoint 2003 are the basis of this book, which also provides answers to the most commonly asked questions about using SharePoint 2003. As an end-user, you will learn the basic skills needed to work successfully with a SharePoint Services website, as well as contribute to document libraries and discussion groups. As a site administrator, you will learn fundamental skills needed to effectively manage SharePoint Services site collections. Best of all, it will only take about 10 minutes of your time to do so. Sams Teach Yourself SharePoint 2003 in 10 Minutes will prove to be a worthy investment of your two most valuable commodities: time and money.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 158
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xvii, 555 p. , ill. ; , 24 cm
    DDC: 006.76
    Keywords: Web site development ; Web sites ; Authoring programs ; Electronic books ; local
    Abstract: PostNuke Content Management is a practical, application-oriented guide to building content-driven websites and portals with the PostNuke package. Website developers will find that this guide will help you get your website up and running quickly. You'll learn how to install and setup PostNuke and use it to build fully-customizeable content-focused websites. Each section will take you to a new level of site development and will teach you tips, tricks and hacks to customize the function and interface exactly for your specific needs. Author Kevin Hatch maintains a popular PHP and PostNuke online tutorial and is an experienced PostNuke user, so you are sure to get thorough PostNuke information through this book.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 159
    Online Resource
    Online Resource
    Indianapolis, Ind. : MySQL Press | Boston, MA :Safari,
    Language: English
    Pages: xvii, 672 p. ; , 23 cm
    DDC: 005.75/65
    Keywords: Database management ; SQL (Computer program language) ; Electronic books ; local
    Abstract: If you are not already one of the 4 million plus users of the MySQL database, you will want to become one after reading this book. MySQL Administrator's Guide is the official guide to installing, administering and working with MySQL 5.0 and MySQL databases. Starting with the basics, you will learn to store, manage and retrieve data in a MySQL database and to eventually manipulate the code behind MySQL 5.0 to customize your database. With the clear examples and tips provided in this comprehensive learning guide, you can become a MySQL expert in no time.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 160
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: ix, 117 p. , ill. ; , 18 cm
    Edition: 1st ed.
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Eclipse is the world's most popular IDE for Java development. And although there are plenty of large tomes that cover all the nooks and crannies of Eclipse, what you really need is a quick, handy guide to the features that are used over and over again in Java programming. You need answers to basic questions such as: Where was that menu? What does that command do again? And how can I set my classpath on a per-project basis? This practical pocket guide gets you up to speed quickly with Eclipse. It covers basic concepts, including Views and editors, as well as features that are not commonly understood, such as Perspectives and Launch Configurations. You'll learn how to write and debug your Java code--and how to integrate that code with tools such as Ant and JUnit. You'll also get a toolbox full of tips and tricks to handle common--and sometimes unexpected--tasks that you'll run across in your Java development cycle. Additionally, the Eclipse IDE Pocket Guide has a thorough appendix detailing all of Eclipse's important views, menus, and commands. The Eclipse IDE Pocket Guide is just the resource you need for using Eclipse, whether it's on a daily, weekly, or monthly basis. Put it in your back pocket, or just throw it in your backpack. With this guide in hand, you're ready to tackle the Eclipse programming environment.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 161
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media Inc. | Boston, MA :Safari,
    Language: English
    Pages: xii, 388 p. , ill. (some col.) ; , 24 cm
    Edition: 1st ed.
    Keywords: iPhoto (Computer file) ; Image processing ; Digital techniques ; Macintosh (Computer) ; Photography ; Digital techniques ; Electronic books ; local
    Abstract: Our Missing Manual is hands-down the bestselling book on iPhoto. And now, updated to cover Apple's newest release, iPhoto 5: The Missing Manual comes fully loaded--and in full color--so you can exercise all the power, flexibility, and creativity of the stunning new iPhoto 5. Some of iPhoto 5's fifty new features are tiny nips and tucks, such as menu rewordings, quiet refinements, and secret keystrokes that take most people days to stumble through. Others are big-ticket overhauls aimed at both power users (RAW-file import and editing, color correction sliders, real-time histogram) and everyday shutterbugs (nested file folders, individual-photo control in slideshows, and a completely rewritten book-layout kit). Additional improvements include a robust search feature (similar to that of iTunes) and the addition of "objects" for slideshow and book projects (using objects, you can manipulate images without affecting pictures in your master library). iPhoto 5: The Missing Manual covers them all with the scrupulous objectivity, clever wit, and technical wisdom you count on from David Pogue along with the Mac and digital photography expertise of Derrick Story. Their authoritative guide starts out with a crash course on digital photography, complete with tutorials on buying a digital camera, composing brilliant photos in various situations (including sports photography, portraits, nighttime photography--even kid photography!) and making digital movies. iPhoto 5: The Missing Manual then launches into every detail of iPhoto, from camera-meets-Mac basics to storing, searching, and editing; from sharing your digital photography with the world (via customized slideshows--complete with iTunes soundtrack, if you like--prints, photo books, email, the Web, and even your network) to exporting to QuickTime and iDVD. And don't forget iPhoto "stunts," such as building custom screen savers and desktop backdrops; exporting pictures; making the most of plug-ins, add-ons, and beef-ups; using AppleScript; and managing files with backups, CDs, and photo libraries. iPhoto 5: The Missing Manual gives you everything you need to become the digital photographer extraordinaire you want to be.
    Note: "The brilliance of digital photos on the Macintosh"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 162
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 334 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Database management ; Electronic books ; local
    Abstract: As part of the Microsoft Office suite, Access has become the industry's leading desktop database management program for organizing, accessing, and sharing information. But taking advantage of this product to build increasingly complex Access applications requires something more than your typical how-to book. What it calls for is Access Hacks from O'Reilly.This valuable guide provides direct, hands-on solutions that can help relieve the frustrations felt by users struggling to master the program's various complexities. For experienced users, Access Hacks offers a unique collection of proven techniques and tools that enable them to take their database skills and productivity to the next level. For Access beginners, it helps them acquire a firm grasp of the program's most productive features.A smart collection of insider tips and tricks, Access Hacks covers all of the program's finer points. Among the multitude of topics addressed, it shows users how to: work with Access in multi-user environments utilize SQL queries work with external data and programs integrate Access with third-party products Just imagine: a learning process without the angst. Well, Access Hacks delivers it with ease, thanks to these down-and-dirty techniques not collected together anywhere else.Part of O'Reilly's best-selling Hacks series, Access Hacks is based on author Ken Bluttman's two decades of real-world experience in database programming and business application building. It's because of his vast experiences that the book is able to offer such a deep understanding of the program's expanding possibilities.
    Note: "Tips & tools for wrangling your data" -- Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 163
    Online Resource
    Online Resource
    Sebastopol, Calif. ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xviii, 395 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    DDC: 005.4465
    Keywords: Mac OS ; UNIX (Computer file) ; TIGER System (Information retrieval system) ; UNIX device drivers (Computer programs) ; Electronic books ; local
    Abstract: If you're one of the many Unix developers drawn to Mac OS X for its Unix core, you'll find yourself in surprisingly unfamiliar territory. Unix and Mac OS X are kissing cousins, but there are enough pitfalls and minefields in going from one to another that even a Unix guru can stumble, and most guides to Mac OS X are written for Mac aficionados. For a Unix developer, approaching Tiger from the Mac side is a bit like learning Russian by reading the Russian side of a Russian-English dictionary. Fortunately, O'Reilly has been the Unix authority for over 25 years, and in Mac OS X Tiger for Unix Geeks , that depth of understanding shows.This is the book for Mac command-line fans. Completely revised and updated to cover Mac OS X Tiger, this new edition helps you quickly and painlessly get acclimated with Tiger's familiar-yet foreign-Unix environment. Topics include: Using the Terminal and understanding how it differs from an xterm Using Directory Services, Open Directory (LDAP), and NetInfo Compiling code with GCC 3 Library linking and porting Unix software Creating and installing packages with Fink Using DarwinPorts Search through metadata with Spotlight's command-line utilities Building the Darwin kernel Running X Windows on top of Mac OS X, or better yet, run Mac OS X on a Windows machine with PearPC! Mac OS X Tiger for Unix Geeks is the ideal survival guide for taming the Unix side of Tiger. If you're a Unix geek with an interest in Mac OS X, you'll find this clear, concise book invaluable.
    Note: First ed. published as: Mac OS X for Unix geeks; 2nd ed. published as: Mac OS X Panther for Unix geeks, 2004. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 164
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 519 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Swing (Computer file) ; Java (Computer program language) ; Electronic books ; local
    Abstract: Swing Hacks helps Java developers move beyond the basics of Swing, the graphical user interface (GUI) standard since Java 2. If you're a Java developer looking to build enterprise applications with a first-class look and feel, Swing is definitely one skill you need to master. This latest title from O'Reilly is a reference to the cool stuff in Swing. It's about the interesting things you learn over the years--creative, original, even weird hacks--the things that make you say, "I didn't know you could even do that with Swing!" Swing Hacks will show you how to extend Swing's rich component set in advanced and sometimes non-obvious ways. The book touches upon the entire Swing gamut-tables, trees, sliders, spinners, progress bars, internal frames, and text components. Detail is also provided on JTable/JTree, threaded component models, and translucent windows. You'll learn how to filter lists, power-up trees and tables, and add drag-and-drop support. Swing Hacks will show you how to do fun things that will directly enhance your own applications. Some are visual enhancements to make your software look better. Some are functional improvements to make your software do something it couldn't do before. Some are even just plain silly, in print only to prove it could be done. The book will also give you give you a small glimpse of the applications coming in the future. New technology is streaming into the Java community at a blistering rate, and it gives application developers a whole new set of blocks to play with. With its profusion of tips and tricks, Swing Hacks isn't just for the developer who wants to build a better user interface. It's also ideally suited for client-side Java developers who want to deliver polished applications, enthusiasts who want to push Java client application boundaries, and coders who want to bring powerful techniques to their own applications. Whatever your programming needs, Swing Hacks is packed with programming lessons that increase your competency with interface-building tools.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 165
    Language: English
    Pages: xviii, 645 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    Keywords: UNIX Shells ; Computer networks ; Security measures ; Data encryption (Computer science) ; Electronic books ; local
    Abstract: Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide . This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
    Note: "Covers SSH-2 protocol"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 166
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xvi, 349 p. , ill. (some col.), maps ; , 24 cm
    Edition: 1st ed.
    DDC: 526.0285
    Keywords: Digital mapping ; Geodatabases ; Design and construction ; Web site development ; Electronic books ; local
    Abstract: With the help of the Internet and accompanying tools, creating and publishing online maps has become easier and rich with options. A city guide web site can use maps to show the location of restaurants, museums, and art venues. A business can post a map for reaching its offices. The state government can present a map showing average income by area.Developers who want to publish maps on the web often discover that commercial tools cost too much and hunting down the free tools scattered across Internet can use up too much of your time and resources. Web Mapping Illustrated shows you how to create maps, even interactive maps, with free tools, including MapServer, OpenEV, GDAL/OGR, and PostGIS. It also explains how to find, collect, understand, use, and share mapping data, both over the traditional Web and using OGC-standard services like WFS and WMS.Mapping is a growing field that goes beyond collecting and analyzing GIS data. Web Mapping Illustrated shows how to combine free geographic data, GPS, and data management tools into one resource for your mapping information needs so you don't have to lose your way while searching for it.Remember the fun you had exploring the world with maps? Experience the fun again with Web Mapping Illustrated . This book will take you on a direct route to creating valuable maps.
    Note: "Using open source GIS toolkits"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 167
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 297 p. , ill. ; , 24 cm
    Keywords: Graphical user interfaces (Computer systems) ; Electronic books ; local
    Abstract: The Eclipse platform continues to gain tremendous popularity as both a Java IDE and a Java platform for application programming. One of the core underpinnings of Eclipse is SWT, the Standard Widget Toolkit. This set of components can be used to develop graphical user interfaces in Java,and offer a native-code alternative to Java's Swing and AWT components. Incorporating the look and feel of whatever platform the code is run on, SWT offers a lightning-fast approach to building GUIs, all of which actually look like they belong on the platform on which they are run. But you already know what you want to do--so wading through the basics of user interface design, graphical components, and what a button does is simply a waste of time. Enter SWT: A Developer's Notebook . In typical Developer's Notebook style, you'll learn how to take SWT out for a spin, make it work for you, and turn it upside down, all without wasted words or space. Each lab in this notebook details a specific task; you can read from the first page to the last, look up just what you need to know, and even squeeze this book into your laptop bag as a quick reference when you forget how to create a multi-tabbed view. This book covers: Downloading and configuring Eclipse and SWT Menus, toolbars, and buttons Building tabbed layouts and folders SWT's unique coolbar control Adding listeners and responding to events Building a complete SWT-based application
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 168
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 209 p. , ill. ; , 25 cm
    Edition: 1st ed.
    DDC: 004.6/8
    Keywords: Home automation ; Home computer networks ; Electronic books ; local
    Abstract: The beauty of a home network is that it can make life so easy--what could be better than sharing an Internet connection so that everyone can be online at the same time? With home networking you can move files from one computer to another, share resources, print to a single printer or multiple printers from any computer in the house, and IM the kids when they're holed up in their rooms. And the downside? Anyone who's ever had to troubleshoot a network glitch doesn't need to ask that question. The simple words, "Why can't I print? Why can't I get to the Internet? Why does my computer say 'Access Denied' today, when it worked fine yesterday?" are enough to send the home network administrator running for cover. And the concept of "network security" can keep the soundest sleeper tossing and turning all night.Currently, more than 8 million homes in the US have installed a network of some kind, and within five years, that number is expected to jump to 37 million. This speaks to the availability of easy-to-install home networking products. Unfortunately, there's also a glut of potential headaches that can occur after installation (and during, sometimes) with no warning label on the box saying, "This product sure to cause annoyances."But help is here. Home Networking Annoyances will ease the headaches and annoyances of anyone who runs a home network. This book tackles all the common annoyances associated with running your network--whether it's wired or wireless, or a combination thereof. Its friendly, off-the-cuff approach will put you in a position of power over those home networking glitches, including file sharing, printing, cabling, security, and much more. You'll find dozens of on-target tips, workarounds, and fixes that will help you improve your home networking experience in every way possible.Whether you're a mainstream business user or a home user with newly installed network hardware, you've probably had your patience tested by frustrating network maintenance issues. Take a stand against annoyances now: just as the bestselling PC Annoyances brought peace and happiness to PC users everywhere, Home Networking Annoyances is your ticket to serenity.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 169
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xxxiii, 807 p. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.133
    Keywords: Python (Computer program language) ; Electronic books ; local
    Abstract: Portable, powerful, and a breeze to use, Python is the popular open source object-oriented programming language used for both standalone programs and scripting applications. It is now being used by an increasing number of major organizations, including NASA and Google.Updated for Python 2.4, The Python Cookbook , 2nd Edition offers a wealth of useful code for all Python programmers, not just advanced practitioners. Like its predecessor, the new edition provides solutions to problems that Python programmers face everyday.It now includes over 200 recipes that range from simple tasks, such as working with dictionaries and list comprehensions, to complex tasks, such as monitoring a network and building a templating system. This revised version also includes new chapters on topics such as time, money, and metaprogramming.Here's a list of additional topics covered: Manipulating text Searching and sorting Working with files and the filesystem Object-oriented programming Dealing with threads and processes System administration Interacting with databases Creating user interfaces Network and web programming Processing XML Distributed programming Debugging and testing Another advantage of The Python Cookbook , 2nd Edition is its trio of authors--three well-known Python programming experts, who are highly visible on email lists and in newsgroups, and speak often at Python conferences.With scores of practical examples and pertinent background information, The Python Cookbook , 2nd Edition is the one source you need if you're looking to build efficient, flexible, scalable, and well-integrated systems.
    Note: "Covers Python 2.3 & 2.4"--Cover. - "Recipes from the Python community"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 170
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 341 p. , ill. ; , 23 cm. +
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: For years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. Until recently, there has never been a good alternative to Windows. But now, Windows users can switch to Linux, the reliable, secure, and spyware free operating system. Linux is easy to use, runs on almost any PC, and enables you to perform all the tasks you can do with Windows.Getting to know Linux has never been easier, because now there's a way to test-drive Linux without changing, installing, or configuring a thing on your computer. It's called Test Driving Linux: From Windows to Linux in 60 Seconds .This latest release from O'Reilly comes with a Live CD called Move, that allows Windows users to try all the features of Mandrake Linux, a popular Linux distribution without the hassle of actually installing Linux. Users simply place the Move CD into their CD drive, boot from the disc, then watch an entire Mandrake system run on the fly from the CD-ROM. Test Driving Linux: From Windows to Linux in 60 Seconds is a detailed step-by-step guide to the Linux operating system and several popular open source programs. With this guide you can quickly learn how to use Linux to perform the tasks you do most: surf the web, send and receive email, instant message with friends, write letters, create spreadsheets, and even how to enhance your digital photos. Test Driving Linux: From Windows to Linux in 60 Seconds provides both home and business users with a hassle-free way to investigate this operating system before they purchase and install a complete Linux distribution.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 171
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 735 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.2762
    Keywords: Computer networks ; Programming ; Java (Computer program language) ; Electronic books ; local
    Abstract: The new third edition of this highly regarded introduction to Java networking programming has been thoroughly revised to cover all of the 100+ significant updates to Java Developers Kit (JDK) 1.5. It is a clear, complete introduction to developing network programs (both applets and applications) using Java, covering everything from networking fundamentals to remote method invocation (RMI). Java Network Programming , 3rd Edition includes chapters on TCP and UDP sockets, multicasting protocol and content handlers, servlets, multithreaded network programming, I/O, HTML parsing and display, the Java Mail API, and the Java Secure Sockets Extension. There's also significant information on the New I/O API that was developed in large part because of the needs of network programmers.This invaluable book is a complete, single source guide to writing sophisticated network applications. Packed with useful examples, it is the essential resource for any serious Java developer.
    Note: Includes index. - Previous ed.: Beijing; Sebastopol, Calif.: O'Reilly, 2000
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 172
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 436 p. , ill. ; , 23 cm
    DDC: 794.8 C278g
    Keywords: Computer games ; Programming ; Video games ; Electronic books ; local
    Abstract: It doesn't take long for an avid--or just wickedly clever--gamer to be chafed by the limitations of videogame software or hardware. If you want to go far beyond the obvious--whether you want to modify your console controller to work on other consoles, create your own text adventure, or modify your Game Boy--there's an awful lot of fun you can have for cheap or free, using the creative exploits of the gaming gurus. Gaming Hacks is the indispensable guide to cool things gamers can do to create, modify, and hack videogame hardware and software. Everything from social exploits and tips to be used in MMORPGs (Massive Multiplayer Online Role Playing Games) to soldering-iron heavy hardware hacks is covered in this extreme-cool hack guide written by gamers for gamers. Gaming Hacks offers a stunning variety of hacks, exploits, and other creative acts on both modern and archaic console hardware and today's PC hardware--one hundred detailed, ingenious hacks are included. Gaming Hacks also includes detailed software-based looks at MMO (massively multiplayer) titles, FPS (first-person shooter) games, machinima (real-time movies created using game engines), emulation, save-game hacking, and many other miscellaneous subgenres and topics. Gaming Hacks shows hardcore gamers how to configure the best FPS peripherals, hack the Nuon DVD Player/Gaming System, modify their Game Boy, watch movies and listen to music and their Sega Dreamcast, and much, much more. Gaming Hacks shows you how to do things you didn't know could be done. If you want more than your average gamer--you want to explore and experiment, unearth shortcuts, make your games do what you want them to do Gaming Hacks will show you how. You don't need to be gaming guru to pick up Gaming Hacks ; you'll be one when you put it down.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 173
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xix, 770 p. , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Microsoft Excel (Computer file) ; Business ; Computer programs ; Electronic spreadsheets ; Computer programs ; Electronic books ; local
    Abstract: Whether you are an Excel neophyte, a sophisticate who knows the program inside out, or an intermediate-level plodder eager to hone your skills, Excel: The Missing Manual is sure to become your go-to resource for all things Excel. Covering all the features of Excel 2002 and 2003, the most recent versions for Windows, Excel: The Missing Manual is an easy-to-read, thorough and downright enjoyable guide to one of the world's most popular, (and annoyingly complicated!) computer programs.Never a candidate for "the most user-friendly of Microsoft programs," Excel demands study, practice and dedication to gain even a working knowledge of the basics. Excel 2003 is probably even tougher to use than any previous version of Excel. However, despite its fairly steep learning curve, this marvelously rich program enables users of every stripe to turn data into information using tools to analyze, communicate, and share knowledge. Excel can help you to collaborate effectively, and protect and control access to your work. Power users can take advantage of industry-standard Extensible Markup Language (XML) data to connect to business processes.To unleash the power of the program and mine the full potential of their database talents, users need an authorative and friendly resource. None is more authoritative or friendlier than Excel: The Missing Manual . Not only does the book provide exhaustive coverage of the basics, it provides numerous tips and tricks, as well as advanced data analysis, programming and Web interface knowledge that pros can adopt for their latest project. Neophytes will find everything they need to create professional spreadsheets and become confident users. Excel: The Missing Manual covers: worksheet basics, formulas and functions, organizing worksheets, charts and graphics, advanced data analysis, sharing data with the rest of the world, and programming.If you buy just one book about using Excel, this has GOT to be it. This book has all you need to help you excel at Excel.
    Note: "Covers versions 2002 and 2003"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 174
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 445 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: FreeBSD ; OpenBSD ; Computer security ; Operating systems (Computers) ; Electronic books ; local
    Abstract: FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named as the key concern for today's system administrators, a single chapter on the subject can't provide the depth of information you need to keep your systems secure.FreeBSD and OpenBSD are rife with security "building blocks" that you can put to use, and Mastering FreeBSD and OpenBSD Security shows you how. Both operating systems have kernel options and filesystem features that go well beyond traditional Unix permissions and controls. This power and flexibility is valuable, but the colossal range of possibilities need to be tackled one step at a time. This book walks you through the installation of a hardened operating system, the installation and configuration of critical services, and ongoing maintenance of your FreeBSD and OpenBSD systems.Using an application-specific approach that builds on your existing knowledge, the book provides sound technical information on FreeBSD and Open-BSD security with plenty of real-world examples to help you configure and deploy a secure system. By imparting a solid technical foundation as well as practical know-how, it enables administrators to push their server's security to the next level. Even administrators in other environments--like Linux and Solaris--can find useful paradigms to emulate.Written by security professionals with two decades of operating system experience, Mastering FreeBSD and OpenBSD Security features broad and deep explanations of how how to secure your most critical systems. Where other books on BSD systems help you achieve functionality, this book will help you more thoroughly secure your deployments.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 175
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly. | Boston, MA :Safari,
    Language: English
    Pages: xxii, 534 p. , ill. ; , 24 cm
    DDC: 005.43
    Keywords: Operating systems (Computers) ; Electronic books ; local
    Abstract: Shell scripting skills never go out of style. It's the shell that unlocks the real potential of Unix. Shell scripting is essential for Unix users and system administrators-a way to quickly harness and customize the full power of any Unix system. With shell scripts, you can combine the fundamental Unix text and file processing commands to crunch data and automate repetitive tasks. But beneath this simple promise lies a treacherous ocean of variations in Unix commands and standards. Classic Shell Scripting is written to help you reliably navigate these tricky waters.Writing shell scripts requires more than just a knowledge of the shell language, it also requires familiarity with the individual Unix programs: why each one is there, how to use them by themselves, and in combination with the other programs. The authors are intimately familiar with the tips and tricks that can be used to create excellent scripts, as well as the traps that can make your best effort a bad shell script. With Classic Shell Scripting you'll avoid hours of wasted effort. You'll learn not only write useful shell scripts, but how to do it properly and portably.The ability to program and customize the shell quickly, reliably, and portably to get the best out of any individual system is an important skill for anyone operating and maintaining Unix or Linux systems. Classic Shell Scripting gives you everything you need to master these essential skills.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 176
    Online Resource
    Online Resource
    Sebastopol, Calif. ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: 700 p. ; , 24 cm
    DDC: 005.7565
    Keywords: FileMaker pro (Computer file) ; Electronic books ; local
    Abstract: Used by millions worldwide, FileMaker Pro is an award-winning database program for managing people, projects, images, assets, and other information. It's easy to use and totally customizable--so long as you know what you're doing. But FileMaker Pro doesn't come with a printed manual, so FileMaker Pro: The Missing Manual is the authoritative, jargon-free book that should have been in the box. FileMaker Pro: The Missing Manual approaches FileMaker the way FileMaker approaches you: it's user-friendly and seemingly straightforward enough, but it offers plenty of substance worthy of deeper exploration. Packed with practical information as well as countless expert tips and invaluable guidance, it's an in-depth guide to designing and building useful databases with the powerful and pliable FileMaker Pro. Covering FileMaker for both Windows and Macintosh, FileMaker Pro: The Missing Manual is ideal for small business users, home users, school teachers, developers--anyone who wants to organize information efficiently and effectively. Whether you want to run a business, publish a shopping cart on the Web, plan a wedding, manage a student information system at your school, or program databases for clients, this book delivers. Author Geoff Coffey has many years of experience using FileMaker Pro (he was, in fact, an early beta tester for the product). Author Susan Prosser is a FileMaker Certified Developer who trains other developers. Together, Coffey and Prosser show you how to: Get FileMaker up and running quickly and smoothly Import and organize information with ease Design relational databases that are simple to use, yet powerful Take advantage of FileMaker Pro calculation capabilities Automate processes with scripting Customize FileMaker Pro to your needs and preferences Share information with other people (coworkers, clients, and customers) and other programs Understand and select the best security options What could easily come across as dry and intimidating--things like relational theory, calculations, and scripting--are presented in a way that is interesting and intuitive to mainstream users. In no time, you'll be working more productively and efficiently using FileMaker Pro.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 177
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 517 , ill. ; , 24 cm
    Edition: 1st ed.
    Keywords: Perl (Computer program language) ; Electronic books ; local
    Abstract: Many programmers code by instinct, relying on convenient habits ora "style" they picked up early on. They aren't conscious of all thechoices they make, like how they format their source, the namesthey use for variables, or the kinds of loops they use. They'refocused entirely on problems they're solving, solutions they'recreating, and algorithms they're implementing. So they write codein the way that seems natural, that happens intuitively, and thatfeels good. But if you're serious about your profession, intuition isn'tenough. Perl Best Practices author Damian Conway explainsthat rules, conventions, standards, and practices not only helpprogrammers communicate and coordinate with one another, they alsoprovide a reliable framework for thinking about problems, and acommon language for expressing solutions. This is especiallycritical in Perl, because the language is designed to offer manyways to accomplish the same task, and consequently it supports manyincompatible dialects. With a good dose of Aussie humor, Dr. Conway (familiar to manyin the Perl community) offers 256 guidelines on the art of codingto help you write better Perl code--in fact, the best Perl code youpossibly can. The guidelines cover code layout, naming conventions,choice of data and control structures, program decomposition,interface design and implementation, modularity, objectorientation, error handling, testing, and debugging. They're designed to work together to produce code that is clear,robust, efficient, maintainable, and concise, but Dr. Conwaydoesn't pretend that this is the one true universal and unequivocalset of best practices. Instead, Perl Best Practices offerscoherent and widely applicable suggestions based on real-worldexperience of how code is actually written, rather than onsomeone's ivory-tower theories on how software ought to becreated. Most of all, Perl Best Practices offers guidelines thatactually work, and that many developers around the world arealready using. Much like Perl itself, these guidelines are abouthelping you to get your job done, without getting in the way. Praise for Perl Best Practices from Perl communitymembers: "As a manager of a large Perl project, I'd ensure that everymember of my team has a copy of Perl Best Practices on theirdesk, and use it as the basis for an in-house style guide." --Randal Schwartz "There are no more excuses for writing bad Perl programs. Alllevels of Perl programmer will be more productive after readingthis book." ...
    Note: Includes bibliographical references (p. 493-494) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 178
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit ; | Boston, MA :Safari,
    Language: English
    Pages: 144 p. , ill. ; , 23 cm
    DDC: 006.686
    Keywords: Picasa (Computer file) ; Electronic books ; local
    Abstract: If you're looking for an easy way to find photos on your PC, make a few editing fixes, and then share your images with others, look no further. Picasa, available as a free download from Google.com, makes it easy to instantly find, edit and share all the pictures on your PC. Every time you open Picasa, it automatically locates all your pictures in seconds and sorts them into albums. From there, you can apply basic edits to your photos, burn them to CD, post them on your blog, or email them to friends. In this colorful, compact guide, author Steve Schwartz starts at the beginning, walking readers through the Picasa interface and showing readers how to set preferences. From there, he launches into the heart of this book, offering project-based instruction for organizing, viewing, and editing your photos, and then shows you how to use Picasa's built-in tools to print, email, or order professional prints of your images. In addition, readers will learn how to share their photos instantly with Hello, Picasa's free instant messaging software. Throughout the book, full-page, full-color screen shots and simple, step-by-step instructions lead readers through several projects, such as saving an image to the Windows desktop, creating a screensaver, making movies, generating photo-based Web pages, running a slideshow, and creating posters, collages, and contact sheets.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 179
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xii, 232 p. , ill. ; , 23 cm
    Keywords: Digital video ; Handbooks, manuals, etc ; Video Recording ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Corporations, government offices, and academic institutions have long used video to educate and inform. The only thing that's changed is the people who are producing them: With low-priced equipment and easy-to-use software flooding the market, now you're the person behind the camera, not some high-priced video specialist! This is the guide for you, then-and all of the other nonprofessionals who've been called upon to produce top-quality videos. Long on essentials-like where to place the camera, how to connect microphones, and which font to use in titles-and short on theory, this guide focuses instead on the simple steps and best practices needed to produce great videos. Veteran author Jan Ozer gives you the lowdown on shooting, audio, and lighting before describing the workflow and procedures involved in converting raw DV footage to streaming video and DVDs, and distributing the final product. For software-specific guidance, you can purchase downloadable PDF workbooks that use the book's projects to walk you through the production process.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 180
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit | Boston, MA :Safari,
    Language: English
    Pages: 256 p. ; , 24 cm
    DDC: 621.3916
    Keywords: Microcomputers ; Design and construction ; Amateurs' manuals ; Electronic books ; local
    Abstract: Whether you're frustrated with current PC offerings (and their inflated prices) or are simply looking for a cool project to take on, building a computer from the ground up using off-the-shelf parts can offer significant advantages. In these pages, computer dudes Darrel Wayne Creacy and Carlito Vicencio outline those advantages and then show you how to build the computer of your dreams. The pair begins by explaining what components make up a PC and what you need to think about when selecting those components, before helping you determine your needs and suggesting various configurations to fit those uses. Breaking the process down into its simplest terms, the authors provide component lists for a number of different PC setups: for students, home users, multimedia/home-theater enthusiasts, high-end graphic/video/audio producers, and more. Using plain language and plenty of visual and instructional aids--photos, illustrations, diagrams, step-by-step directions, and more--the authors ensure that even someone (like you!) who knows nothing about technology can build the perfect PC! On a more personal note, the authors are donating a percentage of their income from this book to the Breast Cancer Research Foundation-to thank all the women in their lives who have supported them and battled the disease. For more information about BCRF, please visit http://www.bcrfcure.org/.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 181
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit ; | Boston, MA :Safari,
    Language: English
    Pages: 429 p. ; , 23 cm
    DDC: 780.285536
    Keywords: GarageBand (Computer file) ; Music ; Computer programs ; Electronic books ; local
    Abstract: Now that you can record eight simultaneous tracks with it, GarageBand 2 really does turn your Mac into a full-featured recording studio. To start taking advantage of it immediately, you (and your band-mates) need this Apple-certified guide from composer and master trainer Mary Plummer (who's also an Apple Certified Trainer). Through 20 hours of step-by-step lessons coupled with ample visual aids and loads of real-world tips, this book/DVD combo offers a complete, self-paced course in all aspects of GarageBand 2. You'll learn everything from mastering the interface and basic recording techniques to the secrets of arranging songs, editing and mixing tracks, adding effects, and distributing your GarageBand files. This thoroughly updated guide includes extensive coverage of all the new features of GarageBand 2, including multitrack recording, built-in real-time music notation, and smart recording features.
    Note: Includes DVD
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 182
    Online Resource
    Online Resource
    Berkeley, CA : Adobe Press | Boston, MA :Safari,
    Language: English
    Pages: xx, 404 p. , ill. ; , 24 cm
    Keywords: Adobe Acrobat ; Portable document software ; Text processing (Computer science) ; Electronic books ; local
    Abstract: Offering a raft of Microsoft Office collaboration features (plus the ability to review and comment on Acrobat Pro--created documents using just Reader), Acrobat is no longer just for pre-press and creative professionals. Acrobat can simplify workflows in all kinds of business settings. All you need is this handy guide to delineate those uses and show you how you can put Acrobat to work to make your own life easier! In these pages, veteran author Donna L. Baker uses cases studies and real-world examples to show you how to use Acrobat for everything from sending documents securely to creating forms and building presentations. Each case study details the most efficient ways to convert source documents into PDF documents, and reveals the how's and whys of using Acrobat in specific situations--from creating an annual report to setting up an email ordering system for a take-out restaurant. You'll learn how to create archives of Outlook email threads, manage document feedback, embed fonts, and more on your way to Acrobat proficiency.
    Note: "Covers Acrobat 7 Professional for Windows and Macintosh"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 183
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit | Boston, MA :Safari,
    Language: English
    Pages: xix, 134 p. , ill. ; , 23 cm
    DDC: 778.530285
    Keywords: Adobe Premiere ; Digital cinematography ; Motion pictures ; Production and direction ; Data processing ; Electronic books ; local
    Abstract: So you fancy yourself a filmmaker? Here to ensure that you truly are is a simple, to-the-point guide that leads you through the process of creating your very first digital video project with Adobe's brand-new consumer-level video editing software, Premiere Elements ($99). In these pages veteran author and PC Magazine contributing editor Jan Ozer gets right to the point: Rather than explore every option and feature of Premiere Elements, Jan uses project-based instruction and big, colorful screen shots to demonstrates the quickest, easiest, and smartest route to cinematic success. Each short lesson builds on the last as you learn how to capture and import video; add transitions, titles and effects; take advantage of the program's stunning templates; use the program with Photoshop Elements to edit and incorporate still images; and output your finished video to DVD. The book's small size and even smaller price ($12.99) make it the perfect entry point into the world of digital filmmaking as well as the ideal jumping-off point for further exploration .
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 184
    Online Resource
    Online Resource
    Berkeley, Calif. : Peachpit ; | Boston, MA :Safari,
    Language: English
    Pages: 703 p. ; , 23 cm
    DDC: 005.446
    Keywords: Mac OS ; Macintosh (Computer) ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: So you're finally ready to find out what all the fuss is about. Whether you're switching from Windows or upgrading from an older Mac OS, this task-based guide represents the surest way to go from 0 to 60 in no time flat with Apple's much anticipated Mac OS X Tiger--more mature, powerfully enhanced, and with more than 200 new features that will knock your socks off. In this thoroughly revised bestseller, Maria Langer walks readers through the process of installing and configuring Tiger, then introduces the Mac OS desktop, including the Dock and the Sidebar, before moving on to more advanced Finder techniques, application basics, printing and faxing, connecting to the Internet, account management, configuring your Mac for multiple users, and more. Weighing in at over 700 pages, this new edition also offers plenty of coverage on what's new in Mac OS X Tiger, including Spotlight, the search tool that helps you find anything on your Mac instantly; multi-way video in iChat AV; the enhanced Mail application; Automator, which lets you automate repetitive manual tasks; Tiger's ultra-useful mini-applications (known as "Dashboard Widgets"); and more. Rounded out with plenty of tips, tricks, and sage advice, this book is equally useful for Macintosh novices as well as early adopters looking for a comprehensive reference on what's new in this much-talked-about Mac OS upgrade.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 185
    Online Resource
    Online Resource
    San Jose, CA : Adobe Systems Inc. | Boston, MA :Safari,
    Language: English
    Pages: x, 565 p. , ill. ; , 24 cm. +
    Keywords: Adobe Acrobat ; File conversion (Computer science) ; Portable document software ; Electronic books ; local
    Abstract: If you're like most Acrobat users--creative, business, and engineering pros who work with complex electronic documents--you can ill afford to miss a beat in your production workflow. Then again, you can ill afford being left behind when it comes to mastering the newest version of the important tool on your desktop, Adobe Acrobat 7. Not to worry: Adobe has brought the classroom to you in this handy volume, completely revised to cover all that's new and different in Acrobat 7. Through a series of self-paced lessons (each of which builds on the last and includes hands-on projects that the you can create using the files on the accompanying CD-ROM), this guide acquaints you with all of Acrobat 7's features for creating, reviewing, editing, commenting on, restructuring, and preflighting PDF files, including the newest: a tool for creating 3D objects, improved security, new tools for repairing errors in print preflight, structured bookmarks, the ability to export comments to Word docs, and more. Professional tips and techniques are scattered throughout!
    Note: "Covers standard and professional"--Cover. - "The official training workbook from Adobe systems"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 186
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: "It's imperative that everybody working in the field of cyber-security read this book to understand the growing threat of rootkits." --Mark Russinovich, editor, Windows IT Pro / Windows & .NET Magazine "This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding." --Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible." --Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight. "Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine. "Understanding the ultimate attacker's tool provides ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 187
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 242 p. ; , 24 cm
    DDC: 005.36
    Keywords: Open source software ; Shareware (Computer software) ; Electronic books ; local
    Abstract: "Open source requires a fundamentally different operating model in order for IT organizations to succeed. Succeeding with Open Source is the first how-to book about selecting open source software based on a product's characteristics such as quality, support, and longevity. Open source software is here to stay. Golden provides an essential tool for evaluating its usefulness/readiness for the corporation." - Martin Fink , Vice-President-Linux, Hewlett-Packard, and author of The Business and Economics of Linux and Open Source "Open source software is transforming the way companies acquire and manage software at every level, from operating systems to applications. Today, IT managers who don't evaluate open source alternatives to proprietary software are doing their companies a profound disservice. If you are involved in any aspect of software acquisition and you aren't intimately familiar with how open source systems are created, documented, and supported, you need this book. It provides you with a new framework for assessing the maturity of open source solutions, walks you through every step of the evaluation process, and provides vital insights into the risks and benefits of making the open source decision." - David A. Taylor, Ph.D., author of Object Technology: A Manager's Guide and Supply Chains: A Manager's Guide "Novell, its customers, and its partners have been waiting for something like this: a quantitative and qualitative way to assess the strength of open source projects we hope to support or build into our products. Golden provides a clear, concise methodology for determining whether an open source project is enterprise-ready and what it would take to make it so." - Chris Stone, Vice Chairman, Novell "Open source software addresses many of the needs of IT organizations. While more and more organizations are using open source software, few understand how to evaluate it in the absence of a parent organization. Golden provides an effective mechanism to quickly evaluate open source software based on standard software measures-such as quality, support, and documentation-and to share those evaluations with other organizations. Using Golden's model, IT organizations can efficiently compare proprietary solutions to open source software solutions." - Stormy Peters, Open Source Program Office, Hewlett-Packard Company "This book contains some of the most valuable, practical advice I have seen on how to transform the use of open source software f...
    Note: Includes bibliographical references (p. 233-234) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 188
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 798 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: "The book you are about to read will arm you with the knowledge you need to defend your network from attackers-both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking 'What's next?' If so, this book is for you." -Ron Gula, founder and CTO, Tenable Network Security, from the Foreword "Richard Bejtlich has a good perspective on Internet security-one that is orderly and practical at the same time. He keeps readers grounded and addresses the fundamentals in an accessible way." -Marcus Ranum, TruSecure "This book is not about security or network monitoring: It's about both, and in reality these are two aspects of the same problem. You can easily find people who are security experts or network monitors, but this book explains how to master both topics." -Luca Deri, ntop.org "This book will enable security professionals of all skill sets to improve their understanding of what it takes to set up, maintain, and utilize a successful network intrusion detection strategy." -Kirby Kuehl, Cisco Systems Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen? Network security monitoring (NSM) equips security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes-resulting in decreased impact from unauthorized activities. In The Tao of Network Security Monitoring , Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. Inside, you will find in-depth information on the following areas. The NSM operational framework and deployment considerations. How to use a variety of open-source tools-including Sguil, Argus, and Ethereal-to mine network traffic for full content, session, statistical, and ale...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 189
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 582 p. , ill. ; , 24 cm. +
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Open source software ; Electronic books ; local
    Abstract: "If you're a Java developer interested in leveraging open source tools to build multitier applications, Larne Pekowsky can help--this book will walk you all the way through development, build, testing, and deployment. This soup-to-nuts coverage is a rare find." --Angela Yochem, author of J2EE Applications and BEA WebLogic Server, Second Edition (Prentice Hall, 2004) The Jakarta project consists of many powerful open source tools for the Java platform, but most lack tutorials or clear online help documentation. Apache Jakarta and Beyond is the definitive guide to using Jakarta and other Java open source tools to develop Web applications more efficiently and effectively. In this example-packed book, readers will find An introduction to the philosophy behind the Jakarta project Details on many ready-to-use Java toolkits, including Ant, JUnit, Cactus, Log4J, POI, Tomcat, James, Struts, and more In-depth guidelines on how to develop with multiple toolkits A guide to splitting work along lines of "what is available" and "what must be written" Best practices for development, such as the model/view/controller paradigm Numerous examples that can serve as templates for readers' own projects The accompanying CD-ROM contains templates and complete code examples from the book. Whether you are developing client applications, Web applications, or Web services, Apache Jakarta and Beyond will help you use existing code to simplify the task at hand.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 190
    Online Resource
    Online Resource
    Harlow : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 347 p. , ill. ; , 24 cm. +
    DDC: 005.8
    Keywords: Business enterprises ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Praise for J.C. Cannon's Privacy "A wonderful exploration of the multifaceted work being done to protect the privacy of users, clients, companies, customers, and everyone in between." -Peter Wayner, author of Translucent Databases "Cannon provides an invaluable map to guide developers through the dark forest created by the collision of cutting-edge software development and personal privacy." -Eric Fredericksen, Sr. Software Engineer, PhD., Foundstone, Inc. "Cannon's book is the most comprehensive work today on privacy for managers and developers. I cannot name any technical areas not covered. No practitioners should miss it." -Ray Lai, Principal Engineer, Sun Microsystems, Inc., co-author of Core Security Patterns and author of J2EE Platform Web Services "Every developer should care deeply about privacy and this is the best book I've read on the subject. Get it, read it, and live it." -Keith Ballinger, Program Manager, Advanced Web Services, Microsoft "J.C. Cannon's book demonstrates that information and communication technology can contribute in a significant way to restoring individual privacy and raises more awareness of the complexity and importance of this societal problem." -Dr. John J. Borking, Former Commissioner and Vice-President of the Dutch Data Protection Authority "If you are planning, implementing, coding, or managing a Privacy campaign in your company or your personal computing, there is no more relevant reference. J.C. Cannon nails the issues." -Rick Kingslan, CISSP, Microsoft MVP-Windows Server: Directory Services and Right Management, West Corporation "It's often been said that security is a process, not a product. Privacy is no different! Unlike other privacy books, J.C. Cannon's book has something valuable to convey to everyone involved in the privacy process, from executives to designers and developers, many of whom aren't thinking about privacy but should be." -Keith Brown, Co-founder of Pluralsight and author of The .NET Developer's Guide to Windows Security and Programming Windows Security "J.C. Cannon's new book on electronic privacy is an important addition to the available works in this emerging field of study and practice. Through many humorous (and occasionally frightening) examples of privacy gone wrong, J.C. helps you better understand how to protect your privacy and how to build privacy awareness into your organization and its development process. Keenly illustrating both the pros and cons of various privacy-e...
    Note: Includes bibliographical references (p. 319-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 191
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 702 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    DDC: 005.1
    Keywords: Linux ; Application software ; Development ; Electronic books ; local
    Abstract: "The first edition of this book has always been kept within arm's reach of my desk due to the wonderful explanations of all areas of the Linux userspace API. This second edition greatly overshadows the first one, and will replace it." --Greg Kroah-Hartman, Linux kernel programmer Develop Software that Leverages the Full Power of Today's Linux Linux Application Development, Second Edition, is the definitive reference for Linux programmers at all levels of experience, including C programmers moving from other operating systems. Building on their widely praised first edition, leading Linux programmers Michael Johnson and Erik Troan systematically present the key APIs and techniques you need to create robust, secure, efficient software or to port existing code to Linux. This book has been fully updated for the Linux 2.6 kernel, GNU C library version 2.3, the latest POSIX standards, and the Single Unix Specification, Issue 6. Its deep coverage of Linux-specific extensions and features helps you take advantage of the full power of contemporary Linux. Along the way, the authors share insights, tips, and tricks for developers working with any recent Linux distribution, and virtually any version of Unix. Topics include Developing in Linux: understanding the operating system, licensing, and documentation The development environment: compilers, linker and loader, and unique debugging tools System programming: process models, file handling, signal processing, directory operations, and job control Terminals, sockets, timers, virtual consoles, and the Linux console Development libraries: string matching, terminal handling, command-line parsing, authentication, and more Hundreds of downloadable code samples New to this edition The GNU C library (glibc), underlying standards, and test macros Writing secure Linux programs, system daemons, and utilities Significantly expanded coverage of memory debugging, including Valgrind and mpr Greatly improved coverage of regular expressions IPv6 networking coverage, including new system library interfaces for using IPv6 and IPv4 interchangeably Coverage of strace, ltrace, real-time signals, poll and epoll system calls, popt library improvements, Pluggable Authentication Modules (PAM), qdbm, and much more Improved index and glossary, plus line-numbered code examples
    Note: Includes bibliographical references (p. 679-682) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 192
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 470 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: "With this book, Ted Neward helps you make the leap from being a good Java enterprise developer to a great developer!" -John Crupi, Sun Distinguished Engineer coauthor, Core J2EE Patterns If you want to build better Java enterprise applications and work more efficiently, look no further. Inside, you will find an accessible guide to the nuances of Java 2 Platform, Enterprise Edition (J2EE) development. Learn how to: Use in-process or local storage to avoid the network, see item 44 Set lower isolation levels for better transactional throughput, see item 35 Use Web services for open integration, see item 22 Consider your lookup carefully, see item 16 Pre-generate content to minimize processing, see item 55 Utilize role-based authorization, see item 63 Be robust in the face of failure, see item 7 Employ independent JREs for side-by-side versioning, see item 69 Ted Neward provides you with 75 easily digestible tips that will help you master J2EE development on a systemic and architectural level. His panoramic look at the good, the bad, and the ugly aspects of J2EE development will address your most pressing concerns. Learn how to design your enterprise systems so they adapt to future demands. Improve the efficiency of your code without compromising its correctness. Discover how to implement sophisticated functionality that is not directly supported by the language or platform. After reading Effective Enterprise Java , you will know how to design and implement better, more scalable enterprise-scope Java software systems.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 193
    Language: English
    Pages: xxviii, 683 p. , ill. ; , 25 cm
    DDC: 005.3
    Keywords: FreeBSD ; Free computer software ; Operating systems (Computers) ; Electronic books ; local
    Abstract: As in earlier Addison-Wesley books on the UNIX-based BSD operating system, Kirk McKusick and George Neville-Neil deliver here the most comprehensive, up-to-date, and authoritative technical information on the internal structure of open source FreeBSD. Readers involved in technical and sales support can learn the capabilities and limitations of the system; applications developers can learn effectively and efficiently how to interface to the system; system administrators can learn how to maintain, tune, and configure the system; and systems programmers can learn how to extend, enhance, and interface to the system. The authors provide a concise overview of FreeBSD's design and implementation. Then, while explaining key design decisions, they detail the concepts, data structures, and algorithms used in implementing the systems facilities. As a result, readers can use this book as both a practical reference and an in-depth study of a contemporary, portable, open source operating system. This book: Details the many performance improvements in the virtual memory system Describes the new symmetric multiprocessor support Includes new sections on threads and their scheduling Introduces the new jail facility to ease the hosting of multiple domains Updates information on networking and interprocess communication Already widely used for Internet services and firewalls, high-availability servers, and general timesharing systems, the lean quality of FreeBSD also suits the growing area of embedded systems. Unlike Linux, FreeBSD does not require users to publicize any changes they make to the source code.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 194
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Wharton School Pub. | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 309 p. , ill. ; , 24 cm
    DDC: 658.4/056
    Keywords: Crisis management ; Errors ; Prevention ; Organizational effectiveness ; Electronic books ; local
    Abstract: What catastrophes have in common -- and how to keep them from happening to you! Introducing M3: the first systematic approach to Managing mistakes so they don't lead to disaster Building systems that prevent 'failure chains' from spiraling out of control Avoiding failures in preparation, strategy, execution, and culture Reducing the impact and cost of the mistakes you do make Also includes coverage of the unique 'mistake chains' facing entrepreneurs and small businesses. Every business disaster has one thing in common: the people in charge never saw it coming. The warnings were there. They didn't have to wreck their companies and their careers. But they let it happen. This book can keep it from happening to you. You will make mistakes. If you don't, you're not taking enough risk. But you can make fewer of them. You can catch them early. Keep them cheap. Learn from them. Whether you're in a global enterprise or a garage startup, Robert Mittelstaedt shows how. His techniques apply to everything from culture to strategy, customer safety to market share. They won't just help you avoid catastrophe: they'll help you improve profitability and business value, too. Stay on track. Stay off the front page of The Wall Street Journal . Read this book.
    Note: Includes bibliographical references (p. 299-304) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 195
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: " Samba-3 by Example provides useful, thoroughly documented explanations for all aspects of a Samba deployment. They're the same kind of patient answers I got when my dad taught me how to ride a bike without training wheels. Now, if only dad knew active Directory...." -Will Enestvedt, UNIX System Administrator, Johnson & Wales University "When my colleague and I were first reading John Terpstra's Samba-3 by Example , we were impressed by how easy it was to find the chapter we wanted to implement, and the ease of following his step-by-step approach. We always felt Terpstra was there with us, for every configuration line. It was like having our own personal tutor. I always take his book to every client that uses Samba. Additionally, Terpstra does something most authors don't, he keeps his documentation up to date. When we were doing our first implementation, he just released the update that morning; we downloaded it, printed it, and implemented it. Now, to me, that is cutting-edge technology at its best." -Steven C. Henry "A cook learns to follow a recipe until he has mastered the art. This is your cookbook to successful Windows networks. I followed this recipe to migrate our NT4 domain to Samba-3, and the recipe just worked great. I could not have completed this project without the Samba-3 by Example book-it brings dry, lifeless man-pages down to the reality IT support people face." -Geoff Scott, IT Systems Administrator, Guests Furniture Hire Pty Ltd "I used the book Samba-3 by Example to get started at 8:30 last night. I finished my complete PDC and it was up and running in six hours with Windows 2000 and XP Pro clients ready for work in the morning. That's from someone who is brand new to Linux. This book is awesome!" -Jesse Knudsen, Windows Systems Administrator The Practical, Tested, Step-by-Step Samba-3 Guidebook Has Now Been Fully Updated! The definitive Samba-3 guidebook has been completely updated to reflect the latest Samba releases and migration techniques. This book's complete configuration files, step-by-step implementation instructions, network diagrams, and automated scripts make deployment a breeze-even if you've never worked with Samba before. From small office networks to enterprise environments, here are proven configurations, backed by guidance from one of the world's most respected Samba experts, Samba Team contibutor John H. Terpstra. This edition has added comprehensive diagnostic techniques and validation steps, as w...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 196
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: Women now drive some 80% of all buying decisions. By 2010, they'll account for half of America's private wealth: $13 trillion dollars. A few remarkable companies have learned how to refocus on women -- and, in so doing, have achieved truly stunning results. In The Power of the Purse, top journalist Fara Warner takes you behind the scenes at those companies, revealing how they did it -- and how you can, too. Unlike previous books on marketing to women, this one doesn't settle for generalities: it offers in-depth, start-to-finish case studies. Discover how McDonald's turned around its business by recognizing women as full-fledged consumers, not just 'Moms.' Learn how Kodak's digital camera business soared from fourth to first by recognizing women's importance as family 'memory makers'. See how P G built Swiffer into a cultural revolution, and how the diamond industry did the same for right-hand rings. Watch Bratz topple Barbie, Torrid create its enormously successful plus-size stores for teenagers, and Avon connect with a radically new generation of women. From Nike to Home Depot, each story is unique -- but in every case, these companies put women at the center of their strategies, and listened intently to what real women consumers were telling them. It's not about 'painting your products pink': it's about transforming the way you think about women. Do that, and you'll create products that sell better to everyone.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 197
    Online Resource
    Online Resource
    Indianapolis, IN : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Keywords: Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 0136068685 ISBN-13: 9780136068686
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 198
    Language: English
    Pages: xxi, 266 p. ; , 24 cm
    DDC: 658.4/092
    Keywords: Businesspeople ; Industrial management ; Leadership ; Electronic books ; local
    Abstract: Paths to greatness: Actionable lessons from today's most remarkable business leaders Incisive profiles from KnowledgeWharton and Nightly Business Report Andy Grove, Mary Kay Ash, Lou Gerstner, Richard Branson, Herb Kelleher, Charles Schwab... and 19 more In this book, two of the world's most respected sources of business insight come together to select and profile the 25 most influential businesspeople of the past quarter century. These incisive profiles teach specific lessons you can use to discover, refine, and nurture your own leadership style... achieve breakthrough results... and accelerate your career progress . The team: Nightly Business Report , the United States' #1 daily TV business news program, and Knowledge@Wharton , The Wharton School's online journal of research and business analysis. Together, they offer powerful new insights into familiar faces--and reveal the passion and brilliance that allowed less-well-known leaders to achieve the extraordinary. From corporate culture to brand management, risk-taking to pricing, this book's insights won't just help you: they'll inspire you. What outstanding leaders do, and how they do it Actionable insights for achieving your own form of greatness Building corporate culture that can withstand anything What you can learn from Southwest's Herb Kelleher and J&J's James Burke Key attributes of lasting leadership Giving voice to customers , giving voice to truth Getting smarter, faster Case studies in building organizations that learn-- and act Reinventing your business: when it's time, how to do it Lessons from the master: Steve Jobs Discovering underserved markets--and serving them profitably Mohammed Yunus: Profiting from entrepreneurship in the world's poorest communities The greatest business leaders of our generation How they achieved the impossible What you can learn from them How to use those lessons to supercharge your career 25 compelling profiles from two of the world's leading sources of business insight: Nightly Business Report and The Wharton School's Knowledge@Wharton 25 extraordinary leaders, 25 incisive profiles: Andy Grove, Intel Bill Gates, Microsoft John Bogle, The Vanguard Group Steve Jobs, Apple & Pixar Warren Buffett, Berkshire Hathaway Herb Kelleher, Southwest Airlines Sam Walton, Wal-Mart Jack Welch, GE Jeff Bezos, Amazon Mary Kay Ash, Mary Kay Michael Dell, Dell Peter F. Drucker Alan Greenspan Oprah Winfrey, Harpo, Inc. George Soros, Soros Fund Management James Burke, ...
    Note: "With the help in reporting and writing from Susan Warner, Sandeep Junnarkar, and Jeff Brown.". - Includes bibliographical references (p. 243-260) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 199
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 416 p. , ill. ; , 23 cm
    DDC: 006.7/6
    Keywords: Web services ; Electronic books ; local
    Abstract: "Other books claim to present the complete Web services platform architecture, but this is the first one I've seen that really does. The authors have been intimately involved in the creation of the architecture. Who better to write this book?" -Anne Thomas Manes, Vice President and Research Director, Burton Group "This is a very important book, providing a lot of technical detail and background that very few (if any) other books will be able to provide. The list of authors includes some of the top experts in the various specifications covered, and they have done an excellent job explaining the background motivation for and pertinent details of each specification. The benefit of their perspectives and collective expertise alone make the book worth reading." -Eric Newcomer, CTO, IONA Technologies "Most Web services books barely cover the basics, but this book informs practitioners of the "real-world" Web services aspects that they need to know to build real applications. The authors are well-known technical leaders in the Web services community and they helped write the Web services specifications covered in this book. Anyone who wants to do serious Web services development should read this book." -Steve Vinoski, Chief Engineer, Product Innovation, IONA Technologies "There aren't many books that are as ambitious as this one is. The most notable distinguishing factor of this book is that the authors have tried to pair down the specifications for the user and rather than focusing on competing specifications, they focus on complementary ones. Nearly every chapter provides a business justification and need for each feature discussed in the Web services stack. I would recommend this book to developers, integrators, and architects." -Daniel Edgar, Systems Architect, Portland General Electric "Rarely does a project arrive with such a list of qualified and talented authors. The subject matter is timely and significant to the industry. " -Eric Newcomer, author of Understanding SOA with Web Services and Understanding Web Services and Chief Technology officer, IONA The Insider's Guide to Building Breakthrough Services with Today'sNew Web Services Platform Using today's new Web services platform, you can build services that are secure, reliable, efficient at handling transactions, and well suited to your evolving service-oriented architecture. What's more, you can do all that without compromising the simplicity or interoperability that made Web services so ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 200
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Financial Times/Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xix, 241 p. , ill. ; , 25 cm
    DDC: 332.63/2042
    Keywords: Investment analysis ; United States ; Stock price indexes ; United States ; Stocks ; Prices ; United States ; Charts, diagrams, etc ; Stocks ; United States ; Electronic books ; local
    Abstract: Unlike most technical analysis books, Gerald Appel's Practical Power Tools! offers step-by-step instructions virtually any investor can use to achieve breakthrough success in the market. Appel illuminates a wide range of strategies and timing models, demystifying even advanced technical analysis the first time. Among the models he covers: NASDAQ/NYSE Relative Strength, 3-5 Year Treasury Notes, Triple Momentum, Seasonality, Breadth-Thrust Impulse, and models based on the revolutionary MACD techniques he personally invented. Appel covers momentum and trend of price movement, time and calendar cycles, predictive chart patterns, relative strength, analysis of internal vs. external markets, market breadth, moving averages, trading channels, overbought/oversold indicators, Trin, VIX, major term buy signals, major term sell signals, moving average trading channels, stock market synergy, and much more. He presents techniques for short-, intermediate-, and long-term investors, and even for mutual fund investors.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...