Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2005-2009  (130)
  • 1970-1974
  • Upper Saddle River, N.J. : Addison-Wesley  (130)
  • Electronic books ; local  (130)
  • Konferenzschrift
Datasource
Material
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780768678666 , 0768678668
    Language: English
    Pages: xii, 330 p , ill. , 23 cm
    Edition: 3rd ed.
    Series Statement: Developer's library
    Parallel Title: Erscheint auch als
    Keywords: Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: The Object-Oriented Thought Process Third Edition Matt Weisfeld An introduction to object-oriented concepts for developers looking to master modern application practices. Object-oriented programming (OOP) is the foundation of modern programming languages, including C++, Java, C#, and Visual Basic .NET. By designing with objects rather than treating the code and data as separate entities, OOP allows objects to fully utilize other objects' services as well as inherit their functionality. OOP promotes code portability and reuse, but requires a shift in thinking to be fully understood. Before jumping into the world of object-oriented programming languages, you must first master The Object-Oriented Thought Process . Written by a developer for developers who want to make the leap to object-oriented technologies as well as managers who simply want to understand what they are managing, The Object-Oriented Thought Process provides a solution-oriented approach to object-oriented programming. Readers will learn to understand object-oriented design with inheritance or composition, object aggregation and association, and the difference between interfaces and implementations. Readers will also become more efficient and better thinkers in terms of object-oriented development. This revised edition focuses on interoperability across various technologies, primarily using XML as the communication mechanism. A more detailed focus is placed on how business objects operate over networks, including client/server architectures and web services. "Programmers who aim to create high quality software-as all programmers should-must learn the varied subtleties of the familiar yet not so familiar beasts called objects and classes. Doing so entails careful study of books such as Matt Weisfeld's The Object-Oriented Thought Process ." -Bill McCarty, author of Java Distributed Objects , and Object-Oriented Design in Java Matt Weisfeld is an associate professor in business and technology at Cuyahoga Community College in Cleveland, Ohio. He has more than 20 years of experience as a professional software developer, project manager, and corporate trainer using C++, Smalltalk, .NET, and Java. He holds a BS in systems analysis, an MS in computer science, and an MBA in project management. Weisfeld has published many articles in major computer trade magazines and professional journals.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321637673 , 0321637674
    Language: English
    Pages: xviii, 171 p , ill. , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: Computer software ; Development ; Management ; Software engineering ; Electronic books ; local
    Abstract: Results-Based Software Management: Achieve Better Outcomes with Finite Resources Effective software development is no longer merely an IT concern: today, it is crucial to the entire enterprise. However, most businesspeople are not ready to make informed decisions about software initiatives. The Economics of Iterative Software Development: Steering Toward Better Business Results will prepare them. Drawing on decades of software development and business experience, the authors demonstrate how to utilize practical, economics-based techniques to plan and manage software projects for maximum return on technology investments. The authors begin by dispelling widespread myths about software costs, explaining why traditional, "engineering-based" software management introduces unacceptable inefficiencies in today's development environments. Next, they show business and technical managers how to combine the principles of economics and iterative development to achieve optimal results with limited resources. Using their techniques, readers will learn how to build systems that enable maximum business innovation and process improvement-and implement software processes that allow them to do so consistently. Highlights include How to repeatedly quantify the value a project is delivering and quickly adjust course as needed How to reduce software project size, complexity, and other "project killers" How to identify and eliminate software development processes that don't work How to improve development processes, reduce rework, mitigate risk, and identify inefficiencies How to create more proficient teams by improving individual skills, team interactions, and organizational capability Where to use integrated, automated tools to improve effectiveness What to measure, and when: specific metrics for project inception, elaboration, construction, and transition The Economics of Iterative Software Development: Steering Toward Better Business Results will help both business and technical managers make better decisions throughout the software development process-and it will help team and project leaders keep any project or initiative on track, so they can deliver more value faster.
    Note: Includes bibliographical references (p. 157-159) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321617156 , 0321617150
    Language: English
    Pages: xiv, 348 p , ill. , 23 cm
    Parallel Title: Erscheint auch als
    Keywords: Agile software development ; Scrum (Computer software development) ; Electronic books ; local
    Abstract: Lean Development and Agile Methods for Large-Scale Products: Key Thinking and Organizational Tools for Sustainable Competitive Success Increasingly, large product-development organizations are turning to lean thinking, agile principles and practices, and large-scale Scrum to sustainably and quickly deliver value and innovation. However, many groups have floundered in their practice-oriented adoptions. Why? Because without a deeper understanding of the thinking tools and profound organizational redesign needed, it is as though casting seeds on to an infertile field. Now, drawing on their long experience leading and guiding large-scale lean and agile adoptions for large, multisite, and offshore product development, and drawing on the best research for great team-based agile organizations, internationally recognized consultant and best-selling author Craig Larman and former leader of the agile transformation at Nokia Networks Bas Vodde share the key thinking and organizational tools needed to plant the seeds of product development success in a fertile lean and agile enterprise. Coverage includes Lean thinking and development combined with agile practices and methods Systems thinking Queuing theory and large-scale development processes Moving from single-function and component teams to stable cross-functional cross-component Scrum feature teams with end-to-end responsibility for features Organizational redesign to a lean and agile enterprise that delivers value fast Large-scale Scrum for multi-hundred-person product groups In a competitive environment that demands ever-faster cycle times and greater innovation, applied lean thinking and agile principles are becoming an urgent priority. Scaling Lean & Agile Development will help leaders create the foundation for their lean enterprise-and deliver on the significant benefits of agility. In addition to the foundation tools in this text, see the companion book Practices for Scaling Lean & Agile Development: Large, Multisite, and Offshore Product Development with Large-Scale Scrum for complementary action tools.
    Note: Includes bibliographical references (p. 333-342) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321577856 , 032157785X
    Language: English
    Pages: lxi, 1055 p , ill. , 24 cm
    Series Statement: Microsoft .NET development series
    Parallel Title: Erscheint auch als
    Keywords: Microsoft Visual BASIC ; Microsoft Visual studio ; Microsoft Office ; BASIC (Computer program language) ; Electronic books ; local
    Abstract: Visual Studio Tools for Office 2007: VSTO for Excel, Word, and Outlook is the definitive book on VSTO 2008 programming, written by the inventors of the technology. VSTO is a set of tools that allows professional developers to use the full power of Microsoft Visual Studio 2008 and the .NET Framework to program against Microsoft Office 2007. This book delivers in one place all the information you need to succeed using VSTO to program against Word 2007, Excel 2007, and Outlook 2007, and provides the necessary background to customize Visio 2007, Publisher 2007, and PowerPoint 2007. It introduces the Office 2007 object models, covers the most commonly used objects in those object models, and will help you avoid the pitfalls caused by the COM origins of the Office object models. Developers who wish to program against Office 2003 should consult Carter and Lippert's previous book, Visual Studio Tools for Office. In VSTO 2008, you can build add-ins for all the major Office 2007 applications, build application-level custom task panes, customize the new Office Ribbon, modify Outlook's user interface using Form Regions, and easily deploy everything you build using ClickOnce. Carter and Lippert cover their subject matter with deft insight into the needs of .NET developers learning VSTO, based on the deep knowledge that comes from the authors' unique perspective of living and breathing VSTO for the past six years. This book Explains the architecture of Microsoft Office programming and introduces the object models Covers the main ways Office applications are customized and extended Explores the ways of customizing Excel, Word, and Outlook, and plumbs the depths of programming with their events and object models Introduces the VSTO programming model Teaches how to use Windows Forms and WPF in VSTO and how to work with the Document Actions Pane and application-level task panes Delves into VSTO data programming and server data scenarios Teaches ClickOnce VSTO deployment This is the one book you need to succeed in programming against Office 2007. C# and Visual Basic .NET Code samples for download can be found here: http://www.informit.com/store/product.aspx?isbn=0321533216
    Note: Includes bibliographical references (p. 1017-1018) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321574305 , 0321574303
    Language: English
    Pages: xxiii, 335 p , ill. , 23 cm
    Series Statement: Developer's library
    Parallel Title: Erscheint auch als
    Keywords: Flex (Computer file) ; Ruby on rails (Electronic resource) ; Internet programming ; Application software ; Development ; Web site development ; Computer programs ; Electronic books ; local
    Abstract: "There's no question you're going to be a better Flex and Rails developer when you're done reading this book." -From the Foreword by Matt Chotin, Senior Product Manager, Adobe Systems, Inc. Adobe Flex enables the rapid development of rich and engaging user experiences. Ruby on Rails dramatically simplifies the development of database-driven web applications. Now there's a book that shows how to use the newest versions of both frameworks together to create state-of-the-art Rich Internet Applications (RIAs). Flex on Rails begins with the absolute essentials: setting up your environment for Flex and Rails, passing data with XML, and integrating Flex front-ends with Rails back-ends. Then, using practical, easy-to-understand code examples, the authors take you from the basics to advanced topics only discussed in this book. Techniques covered here include Constructing sophisticated interfaces that can't be created with AJAX alone Using RESTful services to expose applications for access via APIs Testing Flex and Rails together Using Flex Frameworks Getting Flex into your build/deploy process And more... The authors also offer practical introductions to powerful complementary technologies, such as RubyAMF and Juggernaut. Written by developers with extensive experience using both frameworks, this book covers the new Adobe Flex 3 and Ruby on Rails 2 from the ground up. Even if you have minimal experience with Flex or Rails, you'll learn all you need to know to use them to build exceptional production applications.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780137155149 , 013715514X
    Language: English
    Pages: xiv, 525 p , ill. , 23 cm
    Series Statement: Developer's library
    Parallel Title: Erscheint auch als
    Keywords: Python (Computer program language) ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: Python 3 is the best version of the language yet: It is more powerful, convenient, consistent, and expressive than ever before. Now, leading Python programmer Mark Summerfield demonstrates how to write code that takes full advantage of Python 3's features and idioms. The first book written from a completely "Python 3" viewpoint, Programming in Python 3 brings together all the knowledge you need to write any program, use any standard or third-party Python 3 library, and create new library modules of your own. Summerfield draws on his many years of Python experience to share deep insights into Python 3 development you won't find anywhere else. He begins by illuminating Python's "beautiful heart": the eight key elements of Python you need to write robust, high-performance programs. Building on these core elements, he introduces new topics designed to strengthen your practical expertise-one concept and hands-on example at a time. This book's coverage includes Developing in Python using procedural, object-oriented, and functional programming paradigms Creating custom packages and modules Writing and reading binary, text, and XML files, including optional compression, random access, and text and XML parsing Leveraging advanced data types, collections, control structures, and functions Spreading program workloads across multiple processes and threads Programming SQL databases and key-value DBM files Utilizing Python's regular expression mini-language and module Building usable, efficient, GUI-based applications Advanced programming techniques, including generators, function and class decorators, context managers, descriptors, abstract base classes, metaclasses, and more Programming in Python 3 serves as both tutorial and language reference, and it is accompanied by extensive downloadable example code-all of it tested with the final version of Python 3 on Windows, Linux, and Mac OS X.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780768678673 , 0768678676
    Language: English
    Pages: xx, 1197 p , ill. , 23 cm
    Edition: 4th ed.
    Series Statement: Developer's library
    Parallel Title: Erscheint auch als
    Keywords: MySQL (Electronic resource) ; SQL (Computer program language) ; Database management ; Electronic books ; local
    Abstract: The Definitive Guide to Using, Programming, and Administering MySQL 5.0 and 5.1 MySQL is an open source relational database management system that has experienced a phenomenal growth in popularity and use. Known for its speed and ease of use, MySQL has proven itself to be particularly well-suited for developing database-backed websites and applications. In MySQL , Paul DuBois provides a comprehensive guide to using and administering MySQL effectively and productively. He describes everything from the basics of getting information into a database and formulating queries, to using MySQL with PHP or Perl to generate dynamic web pages, to writing your own programs that access MySQL databases, to administering MySQL servers. The fourth edition of this bestselling book has been meticulously revised and updated to thoroughly cover the latest features and capabilities of MySQL 5.0, as well as to add new coverage of features introduced with MySQL 5.1. "One of the best technical books I have read on any subject." -Gregory Haley, C Vu, The Association of C & C++ Users "A top-notch user's guide and reference manual, and in my opinion, the only book you'll need for the daily operation and maintenance of MySQL databases." -Eugene Kim, Web Techniques Introduction 1 Part I: General MySQL Use Chapter 1: Getting Started with MySQL 13 Chapter 2: Using SQL to Manage Data 101 Chapter 3: Data Types 201 Chapter 4: Stored Programs 289 Chapter 5: Query Optimization 303 Part II: Using MySQL Programming Interfaces Chapter 6: Introduction to MySQL Programming 341 Chapter 7: Writing MySQL Programs Using C 359 Chapter 8: Writing MySQL Programs Using Perl DBI 435 Chapter 9: Writing MySQL Programs Using PHP 527 Part III: MySQL Administration Chapter 10: Introduction to MySQL Administration 579 Chapter 11: The MySQL Data Directory 585 Chapter 12: General MySQL Administration 609 Chapter 13: Access Control and Security 699 Chapter 14: Database Maintenance, Backups, and Replication 737 Part IV: Appendixes Appendix A: Obtaining and Installing Software 777 Appendix B: Data Type Reference 797 Appendix C: Operator and Function Reference 813 Appendix D: System, Status, and User Variable Reference 889 Appendix E: SQL Syntax Reference 937 Appendix F: MySQL Program Reference 1037 Note: Appendixes G, H, and I are located online and are accessible either by registering this book at informit.com/register or by visiting www.kitebird.com/mysql-book . Appendix G: C API Reference 1121 Appendi...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321579447 , 0321579445
    Language: English
    Pages: xxxvi, 362 p , ill. , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: Computer software ; Development ; Agile software development ; Management ; Electronic books ; local
    Abstract: Proven Patterns and Techniques for Succeeding with Agile in Your Organization Agile methods promise to help you create software that delivers far more business value-and do it faster, at lower cost, and with less pain. However, many organizations struggle with implementation and leveraging these methods to their full benefit. In this book, Amr Elssamadisy identifies the powerful lessons that have been learned about successfully moving to agile and distills them into 30 proven agile adoption patterns. Elssamadisy walks you through the process of defining your optimal agile adoption strategy with case studies and hands-on exercises that illuminate the key points. He systematically examines the most common obstacles to agile implementation, identifying proven solutions. You'll learn where to start, how to choose the best agile practices for your business and technical environment, and how to adopt agility incrementally, building on steadily growing success. Next, he presents the definitive agile adoption pattern reference: all the information you need to implement the strategy that you've already defined. Utilizing the classic pattern format, he explains each agile solution in its proper context, revealing why it works-and how to make the most of it. The pattern reference prepares you to Understand the core drivers, principles, and values associated with agile success Tightly focus development on delivering business value-and recognize the "smells" of a project headed off track Gain rapid, effective feedback practices: iteration, kickoff and stand-up meetings, demos, retrospectives, and much more Foster team development: co-location, self-organization, cross-functional roles, and how to bring the customer aboard Facilitate technical tasks and processes: testing, refactoring, continuous integration, simple design, collective code ownership, and pair programming Act as an effective coach, learning to engage the community and promote learning Integrate "clusters" of agile practices that work exceptionally well together Agile Adoption Patterns will help you whether you're planning your first agile project, trying to improve your next project, or evangelizing agility throughout your organization. This actionable advice is designed to work with any agile method, from XP and Scrum to Crystal Clear and Lean. The practical insights will make you more effective in any agile project role: as leader, developer, architect, or customer. Foreword xxiii & xxvi P...
    Note: Includes bibliographical references (p. 333-337) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321592064 , 0321592069
    Language: English
    Pages: xii, 359 p , ill. , 23 cm. +
    Series Statement: Developer's library
    Parallel Title: Erscheint auch als
    Keywords: Web services ; Ajax (Web site development technology) ; Service-oriented architecture (Computer science) ; Business ; Computer networks ; Electronic books ; local
    Abstract: Web Development with TIBCO General Interface Building AJAX Clients for Enterprise SOA Anil Gurnani Use TIBCO General Interface to build web applications with state-of-the-art performance and usability TIBCO General Interface provides powerful tools and a framework to craft AJAX-based web applications that rival desktop applications in performance and usability. This is the only book that offers developers thorough guidance for using TIBCO's award-winning open source tools to build interactive, high-performance GUIs and integrate them with leading server-side technologies. Experienced TIBCO General Interface developer Anil Gurnani focuses on applying General Interface in real-world production applications and presents numerous working examples that can easily be adapted for your existing sites and applications. You'll first walk through the fundamental concepts and techniques needed to build powerful General Interface clients. Next, you'll dive into specific back-end technologies, mastering them through start-to-finish case study projects. Finally, drawing on his own experience building enterprise-class General Interface applications for the financial services industry, Gurnani illuminates advanced topics ranging from charting and collaboration to application optimization. Coverage includes Integrating XML and XSL with TIBCO General Interface's XML Mapping utility Extending General Interface widgets with object-oriented JavaScript Integrating with web services, databases, portals, and messaging systems: start-to-finish case study sample applications Integrating General Interface applications into service-oriented enterprises using Enterprise Service Bus (ESB) Using OpenAJAX Hub (TIBCO PageBus) to simplify collaboration among GUI components Anil Gurnani's book greatly augments the available information for developers learning and using TIBCO's General Interface. ...With this book, you will quickly be building General Interface applications, faster and easier than ever before. -Michael Peachey, co-founder of General Interface and Director of User Experience, TIBCO Software Anil Gurnani has written extensively on technical topics for many prestigious magazines. He is an adjunct at SCPS, New York University, where he teaches advanced courses focused on web and enterprise technologies including Core Java, JEE, and .NET. He is also an expert at managing large, global, multifunctional teams to architect and build complex distributed systems with a portf...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321591265 , 0321591267
    Language: English
    Pages: xxi, 332 p , ill., maps , 24 cm
    Keywords: Google (Firm) ; Google ; Computer security ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: What Does Google Know about You? And Who Are They Telling? When you use Google's "free" services, you pay, big time-with personal information about yourself. Google is making a fortune on what it knows about you...and you may be shocked by just how much Google does know. Googling Security is the first book to reveal how Google's vast information stockpiles could be used against you or your business-and what you can do to protect yourself. Unlike other books on Google hacking, this book covers information you disclose when using all of Google's top applications, not just what savvy users can retrieve via Google's search results. West Point computer science professor Greg Conti reveals the privacy implications of Gmail, Google Maps, Google Talk, Google Groups, Google Alerts, Google's new mobile applications, and more. Drawing on his own advanced security research, Conti shows how Google's databases can be used by others with bad intent, even if Google succeeds in its pledge of "don't be evil." Uncover the trail of informational "bread crumbs" you leave when you use Google search How Gmail could be used to track your personal network of friends, family, and acquaintances How Google's map and location tools could disclose the locations of your home, employer, family and friends, travel plans, and intentions How the information stockpiles of Google and other online companies may be spilled, lost, taken, shared, or subpoenaed and later used for identity theft or even blackmail How the Google AdSense and DoubleClick advertising services could track you around the Web How to systematically reduce the personal information you expose or give away This book is a wake-up call and a "how-to" self-defense manual: an indispensable resource for everyone, from private citizens to security professionals, who relies on Google. Preface xiii Acknowledgments xix About the Author xxi Chapter 1: Googling 1 Chapter 2: Information Flows and Leakage 31 Chapter 3: Footprints, Fingerprints, and Connections 59 Chapter 4: Search 97 Chapter 5: Communications 139 Chapter 6: Mapping, Directions, and Imagery 177 Chapter 7: Advertising and Embedded Content 205 Chapter 8: Googlebot 239 Chapter 9: Countermeasures 259 Chapter 10: Conclusions and a Look to the Future 299 Index 317
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321545671 , 0321545672
    Language: English
    Pages: xli, 436 p , 25 cm. +
    Edition: 2nd ed.
    Series Statement: Microsoft .NET development series
    Parallel Title: Erscheint auch als
    Keywords: Microsoft .NET Framework ; Application program interfaces (Computer software) ; Electronic books ; local
    Abstract: Framework Design Guidelines, Second Edition, teaches developers the best practices for designing reusable libraries for the Microsoft .NET Framework. Expanded and updated for .NET 3.5, this new edition focuses on the design issues that directly affect the programmability of a class library, specifically its publicly accessible APIs. This book can improve the work of any .NET developer producing code that other developers will use. It includes copious annotations to the guidelines by thirty-five prominent architects and practitioners of the .NET Framework, providing a lively discussion of the reasons for the guidelines as well as examples of when to break those guidelines. Microsoft architects Krzysztof Cwalina and Brad Abrams teach framework design from the top down. From their significant combined experience and deep insight, you will learn The general philosophy and fundamental principles of framework design Naming guidelines for the various parts of a framework Guidelines for the design and extending of types and members of types Issues affecting-and guidelines for ensuring-extensibility How (and how not ) to design exceptions Guidelines for-and examples of-common framework design patterns Guidelines in this book are presented in four major forms: Do, Consider, Avoid, and Do not. These directives help focus attention on practices that should always be used, those that should generally be used, those that should rarely be used, and those that should never be used. Every guideline includes a discussion of its applicability, and most include a code example to help illuminate the dialogue. Framework Design Guidelines, Second Edition, is the only definitive source of best practices for managed code API development, direct from the architects themselves. A companion DVD includes the Designing .NET Class Libraries video series, instructional presentations by the authors on design guidelines for developing classes and components that extend the .NET Framework. A sample API specification and other useful resources and tools are also included.
    Note: Includes bibliographical references (p. 419-421) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321434821 , 032143482X
    Language: English
    Pages: xxix, 958 p , ill. , 24 cm
    Series Statement: Microsoft .NET development series
    Keywords: Microsoft Windows (Computer file) ; Parallel programming (Computer science) ; Electronic data processing ; Distributed processing ; Multitasking (Computer science) ; Electronic books ; local
    Abstract: "When you begin using multi-threading throughout an application, the importance of clean architecture and design is critical. . . . This places an emphasis on understanding not only the platform's capabilities but also emerging best practices. Joe does a great job interspersing best practices alongside theory throughout his book." - From the Foreword by Craig Mundie, Chief Research and Strategy Officer, Microsoft Corporation Author Joe Duffy has risen to the challenge of explaining how to write software that takes full advantage of concurrency and hardware parallelism. In Concurrent Programming on Windows, he explains how to design, implement, and maintain large-scale concurrent programs, primarily using C# and C++ for Windows. Duffy aims to give application, system, and library developers the tools and techniques needed to write efficient, safe code for multicore processors. This is important not only for the kinds of problems where concurrency is inherent and easily exploitable-such as server applications, compute-intensive image manipulation, financial analysis, simulations, and AI algorithms-but also for problems that can be speeded up using parallelism but require more effort-such as math libraries, sort routines, report generation, XML manipulation, and stream processing algorithms. Concurrent Programming on Windows has four major sections: The first introduces concurrency at a high level, followed by a section that focuses on the fundamental platform features, inner workings, and API details. Next, there is a section that describes common patterns, best practices, algorithms, and data structures that emerge while writing concurrent software. The final section covers many of the common system-wide architectural and process concerns of concurrent programming. This is the only book you'll need in order to learn the best practices and common patterns for programming with concurrency on Windows and .NET.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321563132 , 0321563131
    Language: English
    Pages: xii, 316 p , ill. , 23 cm
    Series Statement: Developer's library
    Parallel Title: Erscheint auch als
    Keywords: Ajax (Web site development technology) ; Java (Computer program language) ; Electronic books ; local
    Abstract: Dojo offers Web developers and designers a powerful JavaScript toolkit for rapidly developing robust Ajax applications. Now, for the first time, there's a complete, example-rich developer's guide to Dojo and its growing library of prepackaged widgets. Reviewed and endorsed by the Dojo Foundation, the creators of Dojo, this book brings together all the hands-on guidance and tested code samples you need to succeed. Expert Web developer James E. Harmon begins by demonstrating how to "Ajax-ify" existing applications and pages with Dojo, adding Ajax features such as client- and server-side validation as quickly and nondisruptively as possible. Next, he presents in-depth coverage of Dojo's user interface, form, layout, and specialized Widgets, showing how they work and how to use them most effectively. Among the Widgets, he covers in detail: Date Pickers, Rich Text Editors, Combo Boxes, Expandable Outlines, and many others. In conclusion, Harmon introduces the Dojo toolkit's powerful capabilities for simplifying Ajax development. He thoroughly explains Dojo's helper functions, shortcuts, and special methods, illuminating each feature with examples of the JavaScript problems it can solve. This section's far-ranging coverage includes strings, JSON support, event handling, Ajax remoting, Dojo and the DOM, testing, debugging, and much more. All source code examples are provided on a companion Web site, including source code for a complete tutorial case study application.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321616944 , 0321616944
    Language: English
    Pages: xli, 533 p , ill. , 24 cm
    Series Statement: The Addison-Wesley signature series
    Parallel Title: Erscheint auch als
    Parallel Title: Erscheint auch als Crispin, Lisa, 1955 - Agile testing
    DDC: 005.1
    Keywords: Computer software ; Testing ; Agile software development ; Electronic books ; local ; Agile Softwareentwicklung ; Softwaretest
    Abstract: Te〉Two of the industry's most experienced agile testing practitioners and consultants, Lisa Crispin and Janet Gregory, have teamed up to bring you the definitive answers to these questions and many others. In Agile Testing, Crispin and Gregory define agile testing and illustrate the tester's role with examples from real agile teams. They teach you how to use the agile testing quadrants to identify what testing is needed, who should do it, and what tools might help. The book chronicles an agile software development iteration from the viewpoint of a tester and explains the seven key success factors of agile testing. Readers will come away from this book understanding How to get testers engaged in agile development Where testers and QA managers fit on an agile team What to look for when hiring an agile tester How to transition from a traditional cycle to agile development How to complete testing activities in short iterations How to use tests to successfully guide development How to overcome barriers to test automation This book is a must for agile testers, agile teams, their managers, and their customers. The eBook edition of Agile Testing also is available as part of a two-eBook collection, The Agile Testing Collection (9780134190624).
    Note: "A Mike Cohn signature book"--Cover. - Includes bibliographical references (p. 501-508) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321603944 , 032160394X
    Language: English
    Pages: xxxii, 382 p , ill. , 24 cm
    Series Statement: Addison-Wesley information technology series
    Parallel Title: Erscheint auch als
    Keywords: Parallel processing (Electronic computers) ; Computer software ; Development ; Service-oriented architecture (Computer science) ; Web services ; Electronic books ; local
    Abstract: Build Breakthrough Performance into Any SOA or Advanced Computing Application To meet unprecedented demand, IT organizations must improve application performance by an order of magnitude. Improving performance is even more crucial in SOA environments, which demand far more computing power than older architectures. Today's multi-core servers can deliver the performance businesses require, but few applications take full advantage of them. Now, software innovator Cory Isaacson introduces an easier, more flexible approach to parallel processing-one that any IT organization can use to attain unprecedented levels of performance. Isaacson shows how Software Pipeline models can help you scale applications to any level required, maximize resources, deliver on challenging objectives, and achieve unprecedented ROI. He illuminates these techniques with real-life business scenarios and proven design patterns-everything architects, analysts, and developers need to start using them immediately. This book's in-depth coverage includes How Software Pipelines work, what they can accomplish, and how you can apply them using the Software Pipelines Optimization Cycle (SPOC) Scaling applications via parallel processing while guaranteeing order of processing in mission-critical applications Solving performance problems in existing applications, and resolving bottlenecks in existing processes A complete, easy-to-adapt Pipelines Reference Framework Detailed code examples reflecting proven Pipelines Patterns Techniques that can be applied in any industry, with any programming language Specific architectural and design solutions for common business and technical challenges The future of Software Pipelines: emerging opportunities for "greenfield" development Tools, sample templates, and source code at www.informit.com/title/0137137974, Download
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321591388 , 0321591380
    Language: English
    Pages: xviii, 308 p , ill., map , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: Service-oriented architecture (Computer science) ; Discrete-time systems ; Business ; Data processing ; Business enterprises ; Computer networks ; Electronic books ; local
    Abstract: Improving Business Agility with EDA Going beyond SOA, enterprises can gain even greater agility by implementing event-driven architectures (EDAs) that automatically detect and react to significant business events. However, EDA planning and deployment is complex, and even experienced SOA architects and developers need expert guidance. In Event-Driven Architecture , four leading IT innovators present both the theory of EDA and practical, step-by-step guidance to implementing it successfully. The authors first establish a thorough and workable definition of EDA and explore how EDA can help solve many of today's most difficult business and IT challenges. You'll learn how EDAs work, what they can do today, and what they might be able to do as they mature. You'll learn how to determine whether an EDA approach makes sense in your environment and how to overcome the difficult interoperability and integration issues associated with successful deployment. Finally, the authors present chapter-length case studies demonstrating how both full and partial EDA implementations can deliver exceptional business value. Coverage includes How SOA and Web services can power event-driven architectures The role of SOA infrastructure, governance, and security in EDA environments EDA core components: event consumers and producers, message backbones, Web service transport, and more EDA patterns, including simple event processing, event stream processing, and complex event processing Designing flexible stateless events that can respond to unpredictable customers, suppliers, and business partners Addressing technical and business challenges such as project management and communication EDA at work: real-world applications across multiple verticals Hugh Taylor is a social software evangelist for IBM Lotus Software. He coauthored Understanding Enterprise SOA and has written extensively on Web services and SOA. He holds an MBA from Harvard Business School. Angela Yochem is an executive in a multinational technology company and is a recognized thought leader in architecture and large-scale technology management. Les Phillips , VP, enterprise architecture, at SunTrust Banks Inc., is responsible for defining the strategic and business IT foundation for many areas of the enterprise. Frank Martinez , EVP, product strategy, at SOA Software, is a recognized expert on distributed, enterprise application, and infrastructure platforms. He has served as senior operating executive for sev...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321574404 , 0321574400
    Language: English
    Pages: xix, 339 p , col. ill. , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: Geographic information systems ; Information visualization ; KML (Document markup language) ; Electronic books ; local
    Abstract: "The way the information is presented appeals to teachers, hobbyists, web designers-anyone looking for a way to enhance their content by using customized maps." -Warren Kelly, Pastor "It could become the de-facto tutorial volume for the subject, as well as the classic reference guide." -Thomas Duff, Lead Developer "This book is written so well and is so easy to follow it's a joy to go through." - Daniel McKinnon, Software Engineer KML began as the file format for Google Earth, but it has evolved into a full-fledged international standard for describing any geographic content-the "HTML of geography." It's already supported by applications ranging from Microsoft Virtual Earth and NASA WorldWind to Photoshop and AutoCAD. You can do amazing things with KML, and this book will show you how, using practical examples drawn from today's best online mapping applications. Drawing on her extensive experience with the creators of KML, Wernecke teaches techniques that can be used by everyone from programmers to real estate agents, scientists, students, architects, virtual explorers, and more. Highlights include Incorporating rich content in Placemark balloons Creating overlays that superimpose your images on standard Earth browsers Generating animations that move through Placemarks, Overlays, and Models Controlling and updating map content across the Web Managing large data sets using regions and custom data types Complete KML language reference: elements, types, syntax, file structure, and conventions
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321533203 , 0321533208
    Language: English
    Pages: xix, 482 p , ill. , 24 cm. +
    Parallel Title: Erscheint auch als
    Keywords: SQL server ; Computer crimes ; Investigation ; Electronic books ; local
    Abstract: "What Kevvie Fowler has done here is truly amazing: He has defined, established, and documented SQL server forensic methods and techniques, exposing readers to an entirely new area of forensics along the way. This fantastic book is a much needed and incredible contribution to the incident response and forensic communities." -Curtis W. Rose, founder of Curtis W. Rose and Associates and coauthor of Real Digital Forensics The Authoritative, Step-by-Step Guide to Investigating SQL Server Database Intrusions Many forensics investigations lead to the discovery that an SQL Server database might have been breached. If investigators cannot assess and qualify the scope of an intrusion, they may be forced to report it publicly-a disclosure that is painful for companies and customers alike. There is only one way to avoid this problem: Master the specific skills needed to fully investigate SQL Server intrusions. In SQL Server Forensic Analysis, author Kevvie Fowler shows how to collect and preserve database artifacts safely and non-disruptively; analyze them to confirm or rule out database intrusions; and retrace the actions of an intruder within a database server. A chapter-length case study reinforces Fowler's techniques as he guides you through a real-world investigation from start to finish. The techniques described in SQL Server Forensic Analysis can be used both to identify unauthorized data access and modifications and to gather the information needed to recover from an intrusion by restoring the pre-incident database state. Coverage includes Determining whether data was actually compromised during a database intrusion and, if so, which data Real-world forensic techniques that can be applied on all SQL Server instances, including those with default logging Identifying, extracting, and analyzing database evidence from both published and unpublished areas of SQL Server Building a complete SQL Server incident response toolkit Detecting and circumventing SQL Server rootkits Identifying and recovering previously deleted database data using native SQL Server commands SQL Server Forensic Analysis is the first book of its kind to focus on the unique area of SQL Server incident response and forensics. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, auditor, or database professional, you'll find this book an indispensable resource.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321592088 , 0321592085
    Language: English
    Pages: xxv, 400 p , ill. , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: Web 2.0 ; Mashups (World Wide Web) ; Business enterprises ; Technological innovations ; Application software ; Development ; Electronic books ; local
    Abstract: Indispensable Patterns and Insights for Putting Mashups to Work in Enterprise Environments Using new mashup tools and technologies, enterprise developers can impose their own APIs on everything from Web sites and RSS feeds to Excel and PDF files-transforming a world of content into their own customized informationsource. In Mashup Patterns, Michael Ogrinz applies the concept of software development patterns to mashups, systematically revealing the right ways to build enterprise mashups and providing useful insights to help organizations avoid the mistakes that cause mashups to fail. Drawing on extensive experience building business-critical mashups, Ogrinz offers patterns and realistic guidance for every stage of the mashup development lifecycle and addresses the key issues developers, architects, and managers will face. Each pattern is documented with a practical description, specific use cases, and crucial insights into the stability of mashups built with it. Ogrinz concludes by presenting twelve start-to-finish case studies demonstrating mashup patterns at work in actual enterprise settings. Coverage includes: Understanding the relationships among mashups, portals, SOA, EAI/EII, and SaaS Exploring core mashup activities such as data management, surveillance, clipping, transformation, enrichment, publication, and promotion Optimizing security, privacy, accessibility, usability, and performance Managing mashup development, from planning and governance through integration, testing, and deployment Enhancing basic mashups with search, language translation, workflow support, and other improvements Performing effective load and regression testing Avoiding "anti-patterns" that cause enterprise mashups to fail Also of interest: The companion book, Mashups: Strategies for the Modern Enterprise by J. Jeffrey Hanson (Addison-Wesley), is an indispensable guide to designing, implementing, and debugging an enterprise mashup, offering sample code to illustrate key concepts.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321591098 , 0321591097
    Language: English
    Pages: xxiv, 399 p , ill. , 23 cm
    Series Statement: Developer's library
    Parallel Title: Erscheint auch als
    Keywords: Flex (Computer file) ; Internet programming ; Application software ; Development ; Web site development ; Computer programs ; Electronic books ; local
    Abstract: Don't settle for Flex's boring, standard user interface. Set your Flex applications apart with the breakthrough skinning and programming techniques found in Creating Visual Experiences with Flex 3.0 . Leading Flex developers Juan Sanchez and Andy McIntosh show how to build stunning Flex and AIR applications. You'll learn how to take a design and translate that design into Flex or AIR without sacrificing fidelity, and how to apply state-of-the-art branding that adds value to all your Flex applications, no matter what they do or who you're building them for. Sanchez and McIntosh illuminate every aspect of creating superior visual experiences with Flex 3.0 and AIR and discuss planning, design, architecture, and proven user-interface principles, with an emphasis on technical implementation. You'll learn how to alter the standard Flex interface using all the tools available to you: skins, styling, transitions, effects, filters, graphics built with Adobe creative tools, CSS, and ActionScript 3.0 programming. The authors reveal the trade-offs associated with each approach to Flex visual experience design and help you choose the right techniques for your applications. They explain each concept and technique in detail, using real-world examples and exercises that solve specific problems and provide samples throughout each chapter. If you want your Flex and AIR applications to be a cut above the rest, this is the book that shows you how.
    Note: Includes bibliographical references (p. [371]-378) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321580702 , 0321580702
    Language: English
    Pages: xxix, 1718 p , ill. , 24 cm
    Series Statement: The Addison-Wesley Microsoft technology series
    Parallel Title: Erscheint auch als
    Keywords: Microsoft Windows server ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "This book is an invaluable one-stop reference for deploying, configuring, and managing Windows Server 2008. It's filled with John's unique and hard-earned nuggets of advice, helpful scripts, and shortcuts that will save you time and money." --Mark Russinovich The Start-to-Finish, Comprehensive Windows Server 2008 Book for Every Working Administrator and Architect To make the most of Windows Server 2008 in production environments, you need a deep understanding of its technical details. However, accurate and reliable information is scarce, and even most skilled Windows professionals don't know Windows Server 2008 as well as they should. The Complete Guide to Windows Server 2008 brings together more than 1,500 pages of practical Windows Server 2008 insight and in-depth knowledge that you can't find anywhere else, all based on final code. John Savill-one of the world's most visible and trusted experts on Windows Server technology-specializes in helping real companies use Windows Server 2008 to run their businesses. His access to Microsoft's product team as a Microsoft MVP and one of 50 elite "Windows Server 2008 Delta Force Rangers" benefited this book's accuracy and value. Coverage includes Deployment planning, implementing, and managing new features, including Windows Server Core and Hyper-V virtualization Choosing the right installation and upgrade options for your environment Securing Windows Server 2008: authentication, authorization, BitLocker, certification services, and more Implementing TCP/IP, advanced network services, remote access, and thin-client Terminal Services Active Directory in depth, including Federated Services, Lightweight Directory Services, and Rights Management Providing high availability through Network Load Balancing and failover clustering Using Windows Deployment Services to quickly deploy multiple servers Supporting complex distributed environments with the Distributed File System Automating server management with PowerShell and the command prompt Integrating Windows Server 2008 with UNIX, Linux, and legacy NetWare servers Troubleshooting Windows Server 2008 and Vista environments, including an intuitive "how to" index to quickly locate answers to commonly asked questions www.savilltech.com/completeguidetowindows2008
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321574435 , 0321574435
    Language: English
    Pages: xlv, 878 p , ill. , 24 cm
    Edition: 3rd ed.
    Series Statement: The eclipse series
    Parallel Title: Erscheint auch als
    Keywords: Eclipse (Electronic resource) ; Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: Producing a commercial-quality plug-in means going above and beyond the minimal requirements needed to integrate with Eclipse. It means attending to all those details that contribute to the "fit and polish" of a commercial offering. This comprehensive guide covers the entire process of plug-in development, including all the extra steps needed to achieve the highest quality results. Building on two internationally best-selling previous editions, Eclipse Plug-ins, Third Edition, has been fully revised to reflect the powerful new capabilities of Eclipse 3.4. Leading Eclipse experts Eric Clayberg and Dan Rubel present detailed, practical coverage of every aspect of plug-in development, as well as specific, proven solutions for the challenges developers are most likely to encounter. All code examples, relevant API listings, diagrams, and screen captures have been thoroughly updated to reflect both the Eclipse 3.4 API and the latest Java syntax. In addition, Clayberg and Rubel have completely revamped their popular Favorites View case study, reworking much of its content and recreating its code from scratch. The authors carefully cover new functionality added to existing Eclipse features, such as views and editors, and fully explain brand-new features such as Commands, GEF, and PDE Build. This extensively revised edition Thoroughly covers Eclipse's new preferences Illuminates the powerful new Eclipse Command Framework, which replaces Eclipse's older Action Framework Presents extensive new discussions of using commands with views and editors Introduces Mylyn, the new task-focused interface that reduces information overload and simplifies multi-tasking Contains an all-new chapter on using the Graphical Editing Framework (GEF) to build dynamic, interactive graphical user interface elements Walks you step by step through the entire PDE Build process Shows how to create update sites with p2, which replaces Eclipse's old Update Manager This book is designed for every experienced developer interested in extending the Eclipse platform, the Rational Software Development Platform, or any other platform that supports Eclipse plug-ins.
    Note: Previous ed.: Eclipse : building commercial-quality plug-ins. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321514448 , 0321514440
    Language: English
    Pages: xxxix, 602 p , ill. , 24 cm
    Series Statement: Microsoft .NET development series
    Keywords: Active server pages ; Internet programming ; Microsoft .NET ; Ajax (Web site development technology) ; Web servers ; Electronic books ; local
    Abstract: Microsoft .NET Development Series "Supported by the leaders and principal authorities of core Microsoft technologies, this series has an author pool that combines some of the most insightful authors in the industry with the lead software architects and developers at Microsoft and the developer community at large." - Don Box Architect, Microsoft "This is a great resource for professional .NET developers. It covers all bases, from expert perspective to reference and how-to. Books in this series are essential reading for those who want to judiciously expand their knowledge base and expertise." - John Montgomery Principal Group Program Manager, Developer Division, Microsoft "This foremost series on .NET contains vital information for developers who need to get the most out of the .NET Framework. Our authors are selected from the key innovators who create the technology and are the most respected practitioners of it." - Brad Abrams Group Program Manager, Microsoft ASP.NET AJAX server controls can encapsulate even the most powerful AJAX functionality, helping you build more elegant, maintainable, and scalable applications. This is the first comprehensive, code-rich guide to custom ASP.NET AJAX server controls for experienced ASP.NET developers. Unlike other books on ASP.NET AJAX, this book focuses solely on server control development and reflects the significant improvements in ASP.NET 3.5 AJAX and the latest Visual Studio 2008 features for streamlining AJAX development Adam Calderon and Joel Rumerman first review the core Microsoft AJAX Library and JavaScript techniques needed to support a rich client-side experience. Next, they build upon these techniques showing how to create distributable AJAX-enabled controls that include rich browser-independent JavaScript client-side functionality. The authors thoroughly explain both the JavaScript and .NET aspects of control development and how these two distinct environments come together to provide a foundation for building a rich user experience using ASP.NET AJAX. Create object-oriented cross-browser JavaScript that supports .NET style classes, interfaces, inheritance, and method overloading Work with components, behaviors, and controls, and learn how they relate to DOM elements Learn Sys.Application and the part it plays in object creation, initialization, and events in the Microsoft AJAX Library Build Extender and Script controls that provide integrated script generation for their corresponding client-...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321574312 , 0321574311
    Language: English
    Pages: xv, 308 p , ill. , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: PHP (Computer program language) ; Web services ; Security measures ; Internet ; Computer programs ; Security measures ; Application software ; Development ; Electronic books ; local
    Abstract: Easy, Powerful Code Security Techniques for Every PHP Developer Hackers specifically target PHP Web applications. Why? Because they know many of these apps are written by programmers with little or no experience or training in software security. Don't be victimized. Securing PHP Web Applications will help you master the specific techniques, skills, and best practices you need to write rock-solid PHP code and harden the PHP software you're already using. Drawing on more than fifteen years of experience in Web development, security, and training, Tricia and William Ballad show how security flaws can find their way into PHP code, and they identify the most common security mistakes made by PHP developers. The authors present practical, specific solutions-techniques that are surprisingly easy to understand and use, no matter what level of PHP programming expertise you have. Securing PHP Web Applications covers the most important aspects of PHP code security, from error handling and buffer overflows to input validation and filesystem access. The authors explode the myths that discourage PHP programmers from attempting to secure their code and teach you how to instinctively write more secure code without compromising your software's performance or your own productivity. Coverage includes Designing secure applications from the very beginning-and plugging holes in applications you can't rewrite from scratch Defending against session hijacking, fixation, and poisoning attacks that PHP can't resist on its own Securing the servers your PHP code runs on, including specific guidance for Apache, MySQL, IIS/SQL Server, and more Enforcing strict authentication and making the most of encryption Preventing dangerous cross-site scripting (XSS) attacks Systematically testing yourapplications for security, including detailed discussions of exploit testing and PHP test automation Addressing known vulnerabilities in the third-party applications you're already running Tricia and William Ballad demystify PHP security by presenting realistic scenarios and code examples, practical checklists, detailed visuals, and more. Whether you write Web applications professionally or casually, or simply use someone else's PHP scripts, you need this book-and you need it now, before the hackers find you!
    Note: Includes bibliographical references (p. 285-288) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321669247 , 032166924X
    Language: English
    Pages: xliii, 743 p., [16] p. of plates , ill. (some col.) , 23 cm
    Edition: 3rd ed.
    Series Statement: OpenGL series
    Parallel Title: Erscheint auch als
    Keywords: OpenGL ; Computer graphics ; Electronic books ; local
    Abstract: OpenGL ® Shading Language, Third Edition, extensively updated for OpenGL 3.1, is the experienced application programmer's guide to writing shaders. Part reference, part tutorial, this book thoroughly explains the shift from fixed-functionality graphics hardware to the new era of programmable graphics hardware and the additions to the OpenGL API that support this programmability. With OpenGL and shaders written in the OpenGL Shading Language, applications can perform better, achieving stunning graphics effects by using the capabilities of both the visual processing unit and the central processing unit. In this book, you will find a detailed introduction to the OpenGL Shading Language (GLSL) and the new OpenGL function calls that support it. The text begins by describing the syntax and semantics of this high-level programming language. Once this foundation has been established, the book explores the creation and manipulation of shaders using new OpenGL function calls. OpenGL ® Shading Language, Third Edition, includes updated descriptions for the language and all the GLSL entry points added though OpenGL 3.1, as well as updated chapters that discuss transformations, lighting, shadows, and surface characteristics. The third edition also features shaders that have been updated to OpenGL Shading Language Version 1.40 and their underlying algorithms, including Traditional OpenGL fixed functionality Stored textures and procedural textures Image-based lighting Lighting with spherical harmonics Ambient occlusion and shadow mapping Volume shadows using deferred lighting Ward's BRDF model The color plate section illustrates the power and sophistication of the OpenGL Shading Language. The API Function Reference at the end of the book is an excellent guide to the API entry points that support the OpenGL Shading Language.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321620637 , 0321620631
    Language: English
    Pages: xix, 279 p , ill. , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: Computer security ; Computer networks ; Security measures ; Computer hackers ; Electronic books ; local
    Abstract: The complete guide to today's hard-to-defend chained attacks: performing them and preventing them Nowadays, it's rare for malicious hackers to rely on just one exploit or tool; instead, they use "chained" exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don't cover them at all. Now there's a book that brings together start-to-finish information about today's most widespread chained exploits-both how to perform them and how to prevent them. Chained Exploits demonstrates this advanced hacking attack technique through detailed examples that reflect real-world attack strategies, use today's most common attack tools, and focus on actual high-value targets, including credit card and healthcare data. Relentlessly thorough and realistic, this book covers the full spectrum of attack avenues, from wireless networks to physical access and social engineering. Writing for security, network, and other IT professionals, the authors take you through each attack, one step at a time, and then introduce today's most effective countermeasures- both technical and human. Coverage includes: Constructing convincing new phishing attacks Discovering which sites other Web users are visiting Wreaking havoc on IT security via wireless networks Disrupting competitors' Web sites Performing-and preventing-corporate espionage Destroying secure files Gaining access to private healthcare records Attacking the viewers of social networking pages Creating entirely new exploits and more Andrew Whitaker, Director of Enterprise InfoSec and Networking for Training Camp, has been featured in The Wall Street Journal and BusinessWeek. He coauthored Penetration Testing and Network Defense. Andrew was a winner of EC Council's Instructor of Excellence Award. Keatron Evans is President and Chief Security Consultant of Blink Digital Security, LLC, a trainer for Training Camp, and winner of EC Council's Instructor of Excellence Award. Jack B. Voth specializes in penetration testing, vulnerability assessment, and perimeter security. He co-owns The Client Server, Inc., and teaches for Training Camp throughout the United States and abroad. informit.com/aw Cover photograph © Corbis / Jupiter Images $49.99 US $59.99 CANADA
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321606518 , 0321606515
    Language: English
    Pages: xi, 190 p , 23 cm
    Parallel Title: Erscheint auch als
    Keywords: Programming languages (Electronic computers) ; Electronic books ; local
    Abstract: The "Oslo" Modeling Language (commonly referred to as "M") is a language for defining domain models and languages (the latter are often referred to as textual DSLs ). "M" was created to allow developers to efficiently capture their intention in a form that is natural to author but also efficient to store and query using off-the-shelf database technology. This book comes from the original creators of "M"--David Langworthy, Brad Lovering, and Don Box--and is the definitive reference to the language. If you are looking for a compact textual notation for writing down information or schematizing structured and unstructured data, this book is for you. This book is the authoritative specification of the "M" language (draft) and describes the syntax and underlying model of the language. Highlights of this book include: • An Introduction to domain modeling constructs • An Introduction to constructs for building textual DSLs • Complete syntax for the language • Definition of the "M" type system and data model • Glossary of terms
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321592279 , 0321592271
    Language: English
    Pages: xviii, 754 p , 25 cm
    Edition: 3rd ed., Special annotated ed.
    Series Statement: Microsoft .NET development series
    Parallel Title: Erscheint auch als
    Keywords: C♯ (Computer program language) ; Electronic books ; local
    Abstract: "Based on my own experience, I can safely say that every .NET developer who reads this will have at least one 'aha' moment and will be a better developer for it." -From the Foreword by Don Box The popular C# programming language combines the high productivity of rapid application development languages with the raw power of C and C++. Now, C# 3.0 adds functional programming techniques and LINQ, Language INtegrated Query. The C# Programming Language, Third Edition, is the authoritative and annotated technical reference for C# 3.0. Written by Anders Hejlsberg, the language's architect, and his colleagues, Mads Torgersen, Scott Wiltamuth, and Peter Golde, this volume has been completely updated and reorganized for C# 3.0. The book provides the complete specification of the language, along with descriptions, reference materials, code samples, and annotations from nine prominent C# gurus. The many annotations-a new feature in this edition-bring a depth and breadth of understanding rarely found in any programming book. As the main text of the book introduces the concepts of the C# language, cogent annotations explain why they are important, how they are used, how they relate to other languages, and even how they evolved. This book is the definitive, must-have reference for any developer who wants to understand C#.
    Note: Rev. ed of: The C♯ programming language / Anders Hejlsberg, Scott Wiltamuth, Peter Golde, 2nd ed. 2006. - Includes bibliographical references (p. 725) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321564177 , 0321564170
    Language: English
    Pages: 377 p , ill. , 23 cm
    Series Statement: Developer's library
    Parallel Title: Erscheint auch als
    Keywords: Django (Electronic resource) ; Web site development ; Python (Computer program language) ; Web sites ; Authoring programs ; Electronic books ; local
    Abstract: Using the simple, robust, Python-based Django framework, you can build powerful Web solutions with remarkably few lines of code. In Python Web Development with Django® , three experienced Django and Python developers cover all the techniques, tools, and concepts you need to make the most of Django 1.0, including all the major features of the new release. The authors teach Django through in-depth explanations, plus provide extensive sample code supported with images and line-by-line explanations. You'll discover how Django leverages Python's development speed and flexibility to help you solve a wide spectrum of Web development problems and learn Django best practices covered nowhere else. You'll build your first Django application in just minutes and deepen your real-world skills through start-to-finish application projects including Simple Web log (blog) Online photo gallery Simple content management system Ajax-powered live blogger Online source code sharing/syntax highlighting tool How to run your Django applications on the Google App Engine This complete guide starts by introducing Python, Django, and Web development concepts, then dives into the Django framework, providing a deep understanding of its major components (models, views, templates), and how they come together to form complete Web applications. After a discussion of four independent working Django applications, coverage turns to advanced topics, such as caching, extending the template system, syndication, admin customization, and testing. Valuable reference appendices cover using the command-line, installing and configuring Django, development tools, exploring existing Django applications, the Google App Engine, and how to get more involved with the Django community. Introduction 1 Part I: Getting Started Chapter 1: Practical Python for Django 7 Chapter 2: Django for the Impatient: Building a Blog 57 Chapter 3: Starting Out 77 Part II: Django in Depth Chapter 4: Defining and Using Models 89 Chapter 5: URLs, HTTP Mechanisms, and Views 117 Chapter 6: Templates and Form Processing 135 Part III: Django Applications by Example Chapter 7: Photo Gallery 159 Chapter 8: Content Management System 181 Chapter 9: Liveblog 205 Chapter 10: Pastebin 221 Part IV: Advanced Django Techniques and Features Chapter 11: Advanced Django Programming 235 Chapter 12: Advanced Django Deployment 261 Part V: Appendices Appendix A: Command Line Basics 285 Appendix B: Installing and Running Django 295 Appendi...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321580559 , 0321580559
    Language: English
    Pages: xlv, 826 p , ill. , 24 cm
    Edition: 2nd ed.
    Series Statement: Microsoft .NET development series
    Parallel Title: Erscheint auch als
    Keywords: C♯ (Computer program language) ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: Essential C# 3.0 is an extremely well-written and well-organized "no-fluff" guide to C# 3.0, which will appeal to programmers at all levels of experience with C#. This fully updated edition dives deep into the new features that are revolutionizing programming, with brand new chapters covering query expressions, lambda expressions, extension methods, collection interface extensions, standard query operators, and LINQ as a whole. Author Mark Michaelis covers the C# language in depth, and each importantconstruct is illustrated with succinct, relevant code examples. (Complete code examples are available online.) Graphical "mind maps" at the beginning of each chapter show what material is covered and how each topic relates to the whole. Topics intended for beginners and advanced readers are clearly marked. Following an introduction to C#, readers learn about C# primitive data types, value types, reference types, type conversions, and arrays Operators and control flow, loops, conditional logic, and sequential programming Methods, parameters, exception handling, and structured programming Classes, inheritance, structures, interfaces, and object-oriented programming Well-formed types, operator overloading, namespaces, and garbage collection Generics, collections, custom collections, and iterators Delegates and lambda expressions Standard query operators and query expressions LINQ: language integrated query Reflection, attributes, and declarative programming Threading, synchronization, and multithreaded patterns Interoperability and unsafe code The Common Language Infrastructure that underlies C# Whether you are just starting out as a programmer, are an experienced developer looking to learn C#, or are a seasoned C# programmer interested in learning the new features of C# 3.0, Essential C# 3.0 gives you just what you need to quickly get up and running writing C# applications.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321580481 , 0321580486
    Language: English
    Pages: xvii, 297 p , ill. , 24 cm
    Series Statement: Effective software development series
    Parallel Title: Erscheint auch als
    Keywords: C♯ (Computer program language) ; Database management ; Microsoft .NET ; Electronic books ; local
    Abstract: "Shining a bright light into many of the dark corners of C# 3.0, this book not only covers the 'how,' but also the 'why,' arming the reader with many field-tested methods for wringing the most from the new language features, such as LINQ, generics, and multithreading. If you are serious about developing with the C# language, you need this book." -Bill Craun, Principal Consultant, Ambassador Solutions, Inc. " More Effective C# is an opportunity to work beside Bill Wagner. Bill leverages his knowledge of C# and distills his expertise down to some very real advice about programming and designing applications that every serious Visual C# user should know. More Effective C# is one of those rare books that doesn't just regurgitate syntax, but teaches you how to use the C# language." -Peter Ritchie, Microsoft MVP: Visual C# " More Effective C# is a great follow-up to Bill Wagner's previous book. The extensive C# 3.0 and LINQ coverage is extremely timely!" -Tomas Restrepo, Microsoft MVP: Visual C++, .NET, and Biztalk Server "As one of the current designers of C#, it is rare that I learn something new about the language by reading a book. More Effective C# is a notable exception. Gently blending concrete code and deep insights, Bill Wagner frequently makes me look at C# in a fresh light-one that really makes it shine. More Effective C# is at the surface a collection of very useful guidelines. Look again. As you read through it, you'll find that you acquire more than just the individual pieces of advice; gradually you'll pick up on an approach to programming in C# that is thoughtful, beautiful, and deeply pleasant. While you can make your way willy-nilly through the individual guidelines, I do recommend reading the whole book-or at least not skipping over the chapter introductions before you dive into specific nuggets of advice. There's perspective and insight to be found there that in itself can be an important guide and inspiration for your future adventures in C#." -Mads Torgersen, Program Manager, Visual C#, Microsoft "Bill Wagner has written an excellent book outlining the best practices for developers who work with the C# language. By authoring More Effective C# , he has again established himself as one of the most important voices in the C# community. Many of us already know how to use C#. What we need is advice on how to hone our skills so that we can become wiser programmers. There is no more sophisticated source of information on how to become...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321659804 , 0321659805
    Language: English
    Pages: xix, 674 p , ill. , 25 cm
    Edition: 2nd ed.
    Series Statement: The SEI series in software engineering
    Series Statement: SEI series. Management of human resources
    Parallel Title: Erscheint auch als
    Keywords: Personnel management ; Data processing ; Human capital ; Management ; Personnel management ; Computer programs ; Capability maturity model (Computer software) ; Personnel management ; Case studies ; Electronic books ; local
    Abstract: Organizations are now competing in two markets, one for their products and services and one for the talent required to produce or perform them. Success in the former is determined by success in the latter. The ability to compete is directly related to the ability to attract, develop, motivate, organize, and retain the talented people needed to accomplish strategic business objectives. The People CMM, as documented in this authoritative book, is a framework for human capital management. Broadly adopted by small and large organizations worldwide, it provides proven tools for addressing strategic workforce and critical people issues. It helps organizations: Establish workforce practices aligned with current and future business objectives Characterize the maturity of workforce practices Guide a program of continuous workforce development Integrate workforce development with continual process improvement People CMM®, Second Edition, documents Version 2 of the People CMM and Describes practices for each maturity level, with guidance on how to interpret and apply them Explains capabilities for workforce development at each maturity level Shows how to apply the framework as a workforce assessment standard and a guide in planning and implementing improvement Presents case studies to illustrate how the People CMM has lead organizations to effective, repeatable, and lasting success in workforce development The book is aimed at people responsible for developing and implementing human capital strategies and plans in their organizations, managing or developing the workforce, implementing advanced workforce practices, nurturing teams, and transforming organizational culture. It is especially useful for businesses undergoing critical organizational changes.
    Note: Rev. ed. of: The People Capability Maturity Model. c2002. - Includes bibliographical references (p. 559-569) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321669292 , 0321669290
    Language: English
    Pages: l, 885 p., [16] p. of plates , ill. , 23 cm
    Edition: 7th ed.
    Parallel Title: Erscheint auch als
    Keywords: OpenGL ; Computer graphics ; Electronic books ; local
    Abstract: OpenGL is a powerful software interface used to produce high-quality, computer-generated images and interactive applications using 2D and 3D objects, bitmaps, and color images. The OpenGL ® Programming Guide, Seventh Edition , provides definitive and comprehensive information on OpenGL and the OpenGL Utility Library. The previous edition covered OpenGL through Version 2.1. This seventh edition of the best-selling "red book" describes the latest features of OpenGL Versions 3.0 and 3.1. You will find clear explanations of OpenGL functionality and many basic computer graphics techniques, such as building and rendering 3D models; interactively viewing objects from different perspective points; and using shading, lighting, and texturing effects for greater realism. In addition, this book provides in-depth coverage of advanced techniques, including texture mapping, antialiasing, fog and atmospheric effects, NURBS, image processing, and more. The text also explores other key topics such as enhancing performance, OpenGL extensions, and cross-platform techniques. This seventh edition has been updated to include the newest features of OpenGL Versions 3.0 and 3.1, including Using framebuffer objects for off-screen rendering and texture updates Examples of the various new buffer object types, including uniform-buffer objects, transform feedback buffers, and vertex array objects Using texture arrays to increase performance when using numerous textures Efficient rendering using primitive restart and conditional rendering Discussion of OpenGL's deprecation mechanism and how to verify your programs for future versions of OpenGL This edition continues the discussion of the OpenGL Shading Language (GLSL) and explains the mechanics of using this language to create complex graphics effects and boost the computational power of OpenGL. The OpenGL Technical Library provides tutorial and reference books for OpenGL. The Library enables programmers to gain a practical understanding of OpenGL and shows them how to unlock its full potential. Originally developed by SGI, the Library continues to evolve under the auspices of the Khronos OpenGL ARB Working Group, an industry consortium responsible for guiding the evolution of OpenGL and related technologies.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley
    ISBN: 9780321659538 , 0321659538
    Language: English
    Pages: 1 online resource , ill.
    Parallel Title: Erscheint auch als
    Keywords: D (Computer program language) ; Electronic books ; local
    Abstract: "To the best of my knowledge, D offers an unprecedentedly adroit integration of several powerful programming paradigms: imperative, object-oriented, functional, and meta." -From the Foreword by Walter Bright "This is a book by a skilled author describing an interesting programming language. I'm sure you'll find the read rewarding." -From the Foreword by Scott Meyers D is a programming language built to help programmers address the challenges of modern software development. It does so by fostering modules interconnected through precise interfaces, a federation of tightly integrated programming paradigms, language-enforced thread isolation, modular type safety, an efficient memory model, and more. The D Programming Language is an authoritative and comprehensive introduction to D. Reflecting the author's signature style, the writing is casual and conversational, but never at the expense of focus and pre¿cision. It covers all aspects of the language (such as expressions, statements, types, functions, contracts, and modules), but it is much more than an enumeration of features. Inside the book you will find In-depth explanations, with idiomatic examples, for all language features How feature groups support major programming paradigms Rationale and best-use advice for each major feature Discussion of cross-cutting issues, such as error handling, contract programming, and concurrency Tables, figures, and "cheat sheets" that serve as a handy quick reference for day-to-day problem solving with D Written for the working programmer, The D Programming Language not only introduces the D language-it presents a compendium of good practices and idioms to help both your coding with D and your coding in general.
    Note: Description based on print version record. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321604750 , 032160475X
    Language: English
    Pages: xxix, 564 p , ill. , 24 cm
    Series Statement: Microsoft .NET development series
    Parallel Title: Erscheint auch als
    Keywords: Microsoft LINQ ; C♯ (Computer program language) ; Query languages (Computer science) ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: "Charlie and Dinesh bring important skills to this project that enable them to show how LINQ works and the practical ways you can use it in your daily development process." From the Foreword by Anders Hejlsberg LINQ is one of Microsoft's most exciting, powerful new development technologies. Essential LINQ is the first LINQ book written by leading members of Microsoft's LINQ and C# teams. Writing for architects, developers, and development managers, these Microsoft insiders share their intimate understanding of LINQ, revealing new patterns and best practices for getting the most out of it. Calvert and Kulkarni begin by clearly explaining how LINQ resolves the long-time "impedance mismatch" between object-oriented code and relational databases. Next, they show how LINQ integrates querying into C# as a "first-class citizen." Using realistic code examples, they show how LINQ provides a strongly typed, IntelliSense-aware technology for working with data from any source, including SQL databases, XML files, and generic data structures. Calvert and Kulkarni carefully explain LINQ's transformative, composable, and declarative capabilities. By fully illuminating these three concepts, the authors allow developers to discover LINQ's full power. In addition to covering core concepts and hands-on LINQ development in C# with LINQ to Objects, LINQ to XML, LINQ to SQL, and LINQ to Entities, they also present advanced topics and new LINQ implementations developed by the LINQ community. This book • Explains the entire lifecycle of a LINQ project: design, development, debugging, and much more • Teaches LINQ from both a practical and theoretical perspective • Leverages C# language features that simplify LINQ development • Offers developers powerful LINQ query expressions to perform virtually any data-related task • Teaches how to query SQL databases for objects and how to modify those objects • Demonstrates effective use stored procedures and database functions with LINQ • Shows how to add business logic that reflects the specific requirements of your organization • Teaches developers to create, query, and transform XML data with LINQ • Shows how to transform object, relational, and XML data between each other • Offers best patterns and practices for writing robust, easy-to-maintain LINQ code
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321585738 , 0321585739
    Language: English
    Pages: xlvi, 1039 p , ill. , 24 cm
    Edition: 3rd ed.
    Parallel Title: Erscheint auch als
    Keywords: Electronic data processing personnel ; Certification ; Operating systems (Computers) ; Examinations ; Study guides ; Java (Computer program language) ; Examinations ; Study guides ; Electronic books ; local
    Abstract: This book will help you prepare for and pass the Sun Certified Programmer for the Java Platform SE 6 (CX-310-065) Exam. It is written for any experienced programmer (with or without previous knowledge of Java) interested in mastering the Java programming language and passing the SCJP 1.6 Exam. A Programmer's Guide to Java™ SCJP Certification, Third Edition, provides detailed coverage of all exam topics and objectives, readily runnable code examples, programming exercises, extensive review questions, and a new mock exam. In addition, as a comprehensive primer to the Java programming language, this book is an invaluable reference tool. This new edition has been thoroughly updated to focus on the latest version of the exam (CX-310-065). In particular, it contains in-depth explanations of the language features. Their usage is illustrated by way of code scenarios, as required by the exam. The companion Web site (www.ii.uib.no/~khalid/pgjc3e/) contains a version of the SCJP 1.6 Exam Simulator developed by the authors. The site also contains the complete source code for all the book's examples, as well as solutions to the programming exercises. What you will find in this book: Extensive coverage of all the objectives defined for the Sun Certified Programmer for the Java Platform, Standard Edition 6 (CX-310-065) Exam An easy-to-follow structure with chapters organized according to the exam objectives, as laid out by Sun Microsystems Summaries that clearly state and differentiate the exam objectives and the supplementary objectives to be covered in each chapter A list of Sun's objectives for the SCJP 1.6 Exam and a guide to taking the exam A complete mock exam with new questions (not repeats of review questions) Numerous exam-relevant review questions to test your understanding of each major topic, with annotated answers Programming exercises and solutions at the end of each chapter Copious code examples illustrating concepts, where the code has been compiled and thoroughly tested on multiple platforms Program output demonstrating expected results from running the examples Extensive use of UML (Unified Modeling Language) for illustration purposes An introduction to basic terminology and concepts in object-oriented programming Advice on how to avoid common pitfalls in mastering the language and taking the exam Platform- and tool-independent coverage Information about the SCJP 1.6 Upgrade (CX-310-066) Exam
    Note: Previously published under title: A programmer's guide to Java certification. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321634757 , 0321634756
    Language: English
    Pages: xix, 261 p , ill. , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: Internet telephony ; Computer programs ; Multimedia communications ; Computer programs ; Microsoft software ; Electronic books ; local
    Abstract: " Microsoft Voice and Unified Communications is essential reading for anyone using-or considering-Microsoft's range of VoIP options, from consumers to small business owners to enterprise customers." -- Xuedong Huang , General Manager, Microsoft Research Communications, Innovation Center "Joe Schurman has captured the essence of Microsoft's vision and implementation in the areas of Voice and Unified Communications. This is an important book for those interested in connecting the dots between the present and the future in human communications and understanding why things are evolving in that way." -- Gurdeep Singh Pall , Microsoft Corporate Vice President, Unified Communications Group Microsoft ® Voice and Unified Communications is a book that provides insight into Microsoft's Voice and Unified Communications portfolio of products and services related to Microsoft Windows Live, Microsoft Response Point, and the Microsoft Unified Communications platform. Here's What You'll Find Inside. . . · Microsoft's vision of voice products and services for consumer, small/medium businesses, and enterprise organizations including a foreword by Gurdeep Singh Pall, Microsoft Corporate Vice President, Unified Communications Group, and commentary by Xuedong Huang, General Manager of the Microsoft Research Communications Innovation Center. · Technical guidance and information related to Microsoft Windows Live, Microsoft Response Point, and the Microsoft Unified Communications platform, including the newly released Microsoft Office Communications Server 2007 R2. · Sales guidance for selling Microsoft voice solutions in the SMB and Enterprise markets. · Examples of customized Microsoft voice and unified communications applications. · Overview of Microsoft voice and unified communications security. · Latest Microsoft voice and unified communications research and development. · Understanding of voice, unified communications, and telephony concepts and terms as well as the history and evolution of communications technology.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321563835 , 0321563832
    Language: English
    Pages: xxxi, 417 p., [4] p. of plates , ill. (some col.) , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: OpenGL ; Computer graphics ; Specifications ; Application program interfaces (Computer software) ; Computer programming ; Electronic books ; local
    Abstract: OpenGL ES 2.0 is the industry's leading software interface and graphics library for rendering sophisticated 3D graphics on handheld and embedded devices. With OpenGL ES 2.0, the full programmability of shaders is now available on small and portable devices-including cell phones, PDAs, consoles, appliances, and vehicles. However, OpenGL ES differs significantly from OpenGL. Graphics programmers and mobile developers have had very little information about it-until now. In the OpenGL® ES 2.0 Programming Guide , three leading authorities on the Open GL ES 2.0 interface-including the specification's editor-provide start-to-finish guidance for maximizing the interface's value in a wide range of high-performance applications. The authors cover the entire API, including Khronos-ratified extensions. Using detailed C-based code examples, they demonstrate how to set up and program every aspect of the graphics pipeline. You'll move from introductory techniques all the way to advanced per-pixel lighting, particle systems, and performance optimization. Coverage includes: Shaders in depth: creating shader objects, compiling shaders, checking for compile errors, attaching shader objects to program objects, and linking final program objects The OpenGL ES Shading Language: variables, types, constructors, structures, arrays, attributes, uniforms, varyings, precision qualifiers, and invariance Inputting geometry into the graphics pipeline, and assembling geometry into primitives Vertex shaders, their special variables, and their use in per-vertex lighting, skinning, and other applications Using fragment shaders-including examples of multitexturing, fog, alpha test, and user clip planes Fragment operations: scissor test, stencil test, depth test, multisampling, blending, and dithering Advanced rendering: per-pixel lighting with normal maps, environment mapping, particle systems, image post-processing, and projective texturing Real-world programming challenges: platform diversity, C++ portability, OpenKODE, and platform-specific shader binaries
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    ISBN: 9780137013524 , 0137013523
    Language: English
    Pages: 1 online resource (xxiii, 359 p.) , ill.
    Series Statement: The Java series
    Keywords: JavaFX (Electronic resource) ; Java (Computer program language) ; Graphical user interfaces (Computer systems) ; Application software ; Development ; Internet programming ; Electronic books ; local
    Abstract: Build Rich Applications that Run on the Desktop, the Web, Mobile Devices...Anywhere! Using JavaFX, developers and graphic designers can work together to build robust, immersive applications and deploy them anywhere: on the desktop, on the Web, and on millions of Java-enabled mobile devices. JavaFX lets you maintain your existing graphics and seamlessly integrate them into Java applications. Plus, JavaFX Script is a declarative language that allows you to preserve your investment in the Java platform while allowing more creativity with JavaFX's Rich Internet Application environment. JavaFX™: Developing Rich Internet Applications brings together all the knowledge, techniques, and reusable code you need to quickly deliver production-quality solutions. Writing for both developers and designers, the authors explain how JavaFX simplifies and improves the RIA development process, and they show how to make the most of its ready-built components and frameworks. JavaFX™ covers everything from data integration to multimedia, special effects to REST. The authors present a full chapter of code recipes and a complete case study application. This book's wide-ranging content includes Building and running JavaFX programs Understanding the role of graphics designers in creating JavaFX Graphical Assets Writing fast, efficient JavaFX Script programs Using data binding to simplify Model-View-Controller application design Creating rich user experiences with JavaFX visual components Bringing user interfaces to life with lighting, reflection, and other special effects Adding motion with the JavaFX animation framework Incorporating pictures, sound, and videos in your applications Creating RESTful applications with JSON and XML Writing JavaFX applications that make the most of the underlying Java platform The Java™ Series is supported, endorsed, and authored by the creators of the Java technology at Sun Microsystems, Inc. It is the official place to go for complete, expert, and definitive information on Java technology. The books in this Series provide the inside information you need to build effective, robust, and portable applications and applets. The Series is an indispensable resource for anyone targeting the Java platform.
    Note: Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321591258 , 0321591259
    Language: English
    Pages: xxvii, 748 p , ill. , 23 cm
    Series Statement: Addison-Wesley software security series
    Keywords: Computer security ; Cryptography ; Data protection ; Copyright and electronic data processing ; United States ; Electronic books ; local
    Abstract: "This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a 'must have' for every researcher, student, and practicing professional in software protection." -Mikhail Atallah, Distinguished Professor of Computer Science at Purdue University Theory, Techniques, and Tools for Fighting Software Piracy, Tampering, and Malicious Reverse Engineering The last decade has seen significant progress in the development of techniques for resisting software piracy and tampering. These techniques are indispensable for software developers seeking to protect vital intellectual property. Surreptitious Software is the first authoritative, comprehensive resource for researchers, developers, and students who want to understand these approaches, the level of security they afford, and the performance penalty they incur. Christian Collberg and Jasvir Nagra bring together techniques drawn from related areas of computer science, including cryptography, steganography, watermarking, software metrics, reverse engineering, and compiler optimization. Using extensive sample code, they show readers how to implement protection schemes ranging from code obfuscation and software fingerprinting to tamperproofing and birthmarking, and discuss the theoretical and practical limitations of these techniques. Coverage includes Mastering techniques that both attackers and defenders use to analyze programs Using code obfuscation to make software harder to analyze and understand Fingerprinting software to identify its author and to trace software pirates Tamperproofing software using guards that detect and respond to illegal modifications of code and data Strengthening content protection through dynamic watermarking and dynamic obfuscation Detecting code theft via software similarity analysis and birthmarking algorithms Using hardware techniques to defend software and media against piracy and tampering Detecting software tampering in distributed system Understanding the theoretical limits of code obfuscation
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321643926 , 0321643925
    Language: English
    Pages: xiii, 262 p , ill. , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: Computer programming ; Computer algorithms ; Electronic books ; local
    Abstract: "Ask a mechanical, structural, or electrical engineer how far they would get without a heavy reliance on a firm mathematical foundation, and they will tell you, 'not far.' Yet so-called software engineers often practice their art with little or no idea of the mathematical underpinnings of what they are doing. And then we wonder why software is notorious for being delivered late and full of bugs, while other engineers routinely deliver finished bridges, automobiles, electrical appliances, etc., on time and with only minor defects. This book sets out to redress this imbalance. Members of my advanced development team at Adobe who took the course based on the same material all benefited greatly from the time invested. It may appear as a highly technical text intended only for computer scientists, but it should be required reading for all practicing software engineers." -Martin Newell, Adobe Fellow "The book contains some of the most beautiful code I have ever seen." -Bjarne Stroustrup, Designer of C++ "I am happy to see the content of Alex's course, the development and teaching of which I strongly supported as the CTO of Silicon Graphics, now available to all programmers in this elegant little book." -Forest Baskett, General Partner, New Enterprise Associates "Paul's patience and architectural experience helped to organize Alex's mathematical approach into a tightly-structured edifice-an impressive feat!" -Robert W. Taylor, Founder of Xerox PARC CSL and DEC Systems Research Center Elements of Programming provides a different understanding of programming than is presented elsewhere. Its major premise is that practical programming, like other areas of science and engineering,must be based on a solid mathematical foundation. The book shows that algorithms implemented in a real programming language, such as C++, can operate in the most general mathematical setting. For example, the fast exponentiation algorithm is defined to work with any associative operation. Using abstract algorithms leads to efficient, reliable, secure, and economical software. This is not an easy book. Nor is it a compilation of tips and tricks for incremental improvements in your programming skills. The book's value is more fundamental and, ultimately, more critical for insight into programming. To benefit fully, you will need to work through it from beginning to end, reading the code, proving the lemmas, and doing the exercises. When finished, you will see how the application...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321619600 , 0321619609
    Language: English
    Pages: xxvi, 331 p , ill.
    Parallel Title: Erscheint auch als
    Keywords: Computer software ; Testing ; Automation ; Computer software ; Testing ; Cost effectiveness ; Computer software ; Testing ; Management ; Electronic books ; local
    Abstract: "This book fills a huge gap in our knowledge of software testing. It does an excellent job describing how test automation differs from other test activities, and clearly lays out what kind of skills and knowledge are needed to automate tests. The book is essential reading for students of testing and a bible for practitioners." -Jeff Offutt, Professor of Software Engineering, George Mason University "This new book naturally expands upon its predecessor, Automated Software Testing, and is the perfect reference for software practitioners applying automated software testing to their development efforts. Mandatory reading for software testing professionals!" -Jeff Rashka, PMP, Coauthor of Automated Software Testing and Quality Web Systems Testing accounts for an increasingly large percentage of the time and cost of new software development. Using automated software testing (AST), developers and software testers can optimize the software testing lifecycle and thus reduce cost. As technologies and development grow increasingly complex, AST becomes even more indispensable. This book builds on some of the proven practices and the automated testing lifecycle methodology (ATLM) described in Automated Software Testing and provides a renewed practical, start-to-finish guide to implementing AST successfully. In Implementing Automated Software Testing, three leading experts explain AST in detail, systematically reviewing its components, capabilities, and limitations. Drawing on their experience deploying AST in both defense and commercial industry, they walk you through the entire implementation process-identifying best practices, crucial success factors, and key pitfalls along with solutions for avoiding them. You will learn how to: Make a realistic business case for AST, and use it to drive your initiative Clarify your testing requirements and develop an automation strategy that reflects them Build efficient test environments and choose the right automation tools and techniques for your environment Use proven metrics to continuously track your progress and adjust accordingly Whether you're a test professional, QA specialist, project manager, or developer, this book can help you bring unprecedented efficiency to testing-and then use AST to improve your entire development lifecycle.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321603197 , 0321603192
    Language: English
    Pages: xxxiii, 682 p , ill. , 24 cm
    Series Statement: SEI series in software engineering
    Parallel Title: Erscheint auch als
    Keywords: C (Computer program language) ; Computer security ; Electronic books ; local
    Abstract: "I'm an enthusiastic supporter of the CERT Secure Coding Initiative. Programmers have lots of sources of advice on correctness, clarity, maintainability, performance, and even safety. Advice on how specific language features affect security has been missing. The CERT ® C Secure Coding Standard fills this need." -Randy Meyers, Chairman of ANSI C "For years we have relied upon the CERT/CC to publish advisories documenting an endless stream of security problems. Now CERT has embodied the advice of leading technical experts to give programmers and managers the practical guidance needed to avoid those problems in new applications and to help secure legacy systems. Well done!" -Dr. Thomas Plum, founder of Plum Hall, Inc. "Connectivity has sharply increased the need for secure, hacker-safe applications. By combining this CERT standard with other safety guidelines, customers gain all-round protection and approach the goal of zero-defect software." -Chris Tapp, Field Applications Engineer, LDRA Ltd. "I've found this standard to be an indispensable collection of expert information on exactly how modern software systems fail in practice. It is the perfect place to start for establishing internal secure coding guidelines. You won't find this information elsewhere, and, when it comes to software security, what you don't know is often exactly what hurts you." -John McDonald, coauthor of The Art of Software Security Assessment Software security has major implications for the operations and assets of organizations, as well as for the welfare of individuals. To create secure software, developers must know where the dangers lie. Secure programming in C can be more difficult than even many experienced programmers believe. This book is an essential desktop reference documenting the first official release of The CERT ® C Secure Coding Standard . The standard itemizes those coding errors that are the root causes of software vulnerabilities in C and prioritizes them by severity, likelihood of exploitation, and remediation costs. Each guideline provides examples of insecure code as well as secure, alternative implementations. If uniformly applied, these guidelines will eliminate the critical coding errors that lead to buffer overflows, format string vulnerabilities, integer overflow, and other common software vulnerabilities.
    Note: Includes bibliographical references (p. 647-658) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321606433 , 0321606434
    Language: English
    Pages: xxxiii, 361 p , ill. , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: Technology consultants ; Computer industry ; Vocational guidance ; Computer science ; Vocational guidance ; Electronic books ; local
    Abstract: Learn the Real Secrets of Succeeding as a Software or IT Consultant in Any Economic Climate! Despite economic cycles, the idea of using technology to make a company more efficient and competitive-or perhaps even reach a new market- is appealing to all but the most desperate and cash-starved companies. More and more often, those companies look to technology consultants to fulfill their needs. There are real advantages to being a consultant. You make contacts with a lot of different people; you get exposure to many industries; and most important, unlike a software developer in the IT department for a brick-and-mortar company, as a technology consultant, you are the profit center...so long as you are billing. Consulting can be hugely rewarding-but it's easy to fail if you are unprepared. To succeed, you need a mentor who knows the lay of the land. Aaron Erickson is your mentor, and this is your guidebook. Erickson has done it all-from Practice Leadership to the lowest level project work. In The Nomadic Developer , he brings together his hardwon insights on becoming successful and achieving success through tough times and relentless change. You'll find 100% practical advice and real experiences-his own and annotations from those in the trenches. In addition, renowned consultants-such as David Chappell, Bruce Eckel, Deborah Kurata, and Ted Neward-share some of their hard-earned lessons. With this useful guidebook, you can Objectively assess whether the consultant's life makes sense for you Break into the business and build a career path that works Avoid the Seven Deadly Firms by identifying unscrupulous technology consultancies and avoiding their traps and pitfalls Understand the business models and mechanics that virtually all consulting firms use Master secret consulting success tips that are typically left unstated or overlooked Gain a competitive advantage by adding more value than your competitors Continue your professional development so you stay billable even during bad times Profit from both fixed-bid and time-and-materials projects Build a personal brand that improves your resiliency no matter what happens About the Author xiii About the Annotators xv Acknowledgments xix Foreword xxi Preface xxv Chapter 1: Why Consulting? 1 Chapter 2: The Seven Deadly Firms 27 Chapter 3: How Technology Consulting Firms Work 59 Chapter 4: Getting In: Ten Unstated Traits That Technology Consulting Firms Look For 97 Chapter 5...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321606471 , 0321606477
    Language: English
    Pages: xxxi, 207 p , ill. , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: Programming languages (Electronic computers) ; Software engineering ; Computer software ; Development ; Electronic books ; local
    Abstract: Software practitioners are rapidly discovering the immense value of Domain-Specific Languages (DSLs) in solving problems within clearly definable problem domains. Developers are applying DSLs to improve productivity and quality in a wide range of areas, such as finance, combat simulation, macro scripting, image generation, and more. But until now, there have been few practical resources that explain how DSLs work and how to construct them for optimal use. Software Language Engineering fills that need. Written by expert DSL consultant Anneke Kleppe, this is the first comprehensive guide to successful DSL design. Kleppe systematically introduces and explains every ingredient of an effective language specification, including its description of concepts, how those concepts are denoted, and what those concepts mean in relation to the problem domain. Kleppe carefully illuminates good design strategy, showing how to maximize the flexibility of the languages you create. She also demonstrates powerful techniques for creating new DSLs that cooperate well with general-purpose languages and leverage their power. Completely tool-independent, this book can serve as the primary resource for readers using Microsoft DSL tools, the Eclipse Modeling Framework, openArchitectureWare, or any other DSL toolset. It contains multiple examples, an illustrative running case study, and insights and background information drawn from Kleppe's leading-edge work as a DSL researcher. Specific topics covered include Discovering the types of problems that DSLs can solve, and when to use them Comparing DSLs with general-purpose languages, frameworks, APIs, and other approaches Understanding the roles and tools available to language users and engineers Creating each component of a DSL specification Modeling both concrete and abstract syntax Understanding and describing language semantics Defining textual and visual languages based on object-oriented metamodeling and graph transformations Using metamodels and associated tools to generate grammars Integrating object-oriented modeling with graph theory Building code generators for new languages Supporting multilanguage models and programs This book provides software engineers with all the guidance they need to create DSLs that solve real problems more rapidly, and with higher-quality code.
    Note: Includes bibliographical references (p. 189-196) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321591364 , 0321591364
    Language: English
    Pages: xxv, 706 p , ill. , 24 cm
    Series Statement: The Eclipse series
    Parallel Title: Erscheint auch als
    Keywords: Eclipse (Electronic resource) ; Computer software ; Development ; Programming languages (Electronic computers) ; Electronic books ; local
    Abstract: Achieve Breakthrough Productivity and Quality with MDD and Eclipse-Based DSLs Domain-specific languages (DSLs) and model-driven development (MDD) offer software engineers powerful new ways to improve productivity, enhance quality, and insulate systems from rapid technological change. Now, there's a pragmatic, start-to-finish guide to creating DSLs and using MDD techniques with the powerful open source Eclipse platform. In Eclipse Modeling Project , Richard C. Gronback illuminates both the principles and techniques software professionals need to master, offering insights that will be invaluable to developers working with any tool or platform. As coleader of the Eclipse Modeling Project, Gronback is singularly well-positioned to demonstrate DSLs and MDD at work in Eclipse. Gronback systematically introduces each of the Eclipse technologies that can be used in DSL and MDD development. Throughout, he introduces key concepts and technologies in the context of a complete worked example and presents new best practices and never-before published techniques. He also covers Eclipse projects discussed in no other book, including Query/View/Transformation (QVT) and the Graphical Modeling Framework (GMF)-a project the author personally leads. Eclipse Modeling Project gives software practitioners all the knowledge they need to explore the remarkable potential of DSLs and MDD-and includes coverage of Why a model-based approach enables the rapid customization of high-quality solutions within the product line paradigm How the Eclipse Modeling Project's capabilities can be used to efficiently create new DSLs Powerful techniques for developing DSL abstract syntax, graphical notation, and textual syntax How to build Model-to-Model (M2M) and Model-to-Text (M2T) transformations-including a powerful new M2M implementation of the Object Management Group's QVT Operational Mapping Language (OML) Efficiently packaging and deploying DSLs with Eclipse Complete reference sections for the Graphical Editing Framework (GEF), GMF runtime and tooling, QVT OML, Xpand, and more Foreword xix Preface xxi Acknowledgments xxiii About the Author xxv Part I: Introduction 1 Chapter 1: Introduction 3 Chapter 2: Modeling Project as a DSL Toolkit 17 Part II: Developing Domain-Specific Languages 27 Chapter 3: Developing a DSL Abstract Syntax 29 Chapter 4: Developing a DSL Graphical Notation 55 Chapter 5: Developing a DSL Textual Syntax 227 Chapter 6: Deve...
    Note: Includes bibliographical references (p. 671-674) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321585530 , 0321585534
    Language: English
    Pages: xxiii, 523 p., [16] p. of plates , ill. (some col.), maps (some col.) , 24 cm. +
    Parallel Title: Erscheint auch als
    Keywords: Computer networks ; Security measures ; Information visualization ; Computer security ; Electronic books ; local
    Abstract: APPLIED SECURITY VISUALIZATION "Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a straight forward way, and with hands-on examples, how such a challenge can be mastered. Let's get inspired." -Andreas Wuchner, Head of Global IT Security, Novartis Use Visualization to Secure Your Network Against the Toughest, Best-Hidden Threats As networks become ever more complex, securing them becomes more and more difficult. The solution is visualization. Using today's state-of-the-art data visualization techniques, you can gain a far deeper understanding of what's happening on your network right now. You can uncover hidden patterns of data, identify emerging vulnerabilities and attacks, and respond decisively with countermeasures that are far more likely to succeed than conventional methods. In Applied Security Visualization , leading network security visualization expert Raffael Marty introduces all the concepts, techniques, and tools you need to use visualization on your network. You'll learn how to identify and utilize the right data sources, then transform your data into visuals that reveal what you really need to know. Next, Marty shows how to use visualization to perform broad network security analyses, assess specific threats, and even improve business compliance. He concludes with an introduction to a broad set of visualization tools. The book's CD also includes DAVIX, a compilation of freely available tools for security visualization. You'll learn how to: • Intimately understand the data sources that are essential for effective visualization • Choose the most appropriate graphs and techniques for your IT data • Transform complex data into crystal-clear visual representations • Iterate your graphs to deliver even better insight for taking action • Assess threats to your network perimeter, as well as threats imposed by insiders • Use visualization to manage risks and compliance mandates more successfully • Visually audit both the technical and organizational aspects of information and network security • Compare and master today's most useful tools for security visualization Contains the live CD Data Analysis and Visualization Linux (DAVIX). DAVIX is a compilation of powerful tools for visualizing networks and assessing their security. DAVIX runs directly from the CD-ROM, without installation. ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321553720 , 0321553721
    Language: English
    Pages: xxxi, 411 p , ill. , 25 cm
    Series Statement: Net Objectives product development series
    Parallel Title: Erscheint auch als
    Keywords: Computer software ; Development ; Computer software ; Development ; Vocational guidance ; Electronic books ; local
    Abstract: For software to consistently deliver promised results, software development must mature into a true profession. Emergent Design points the way. As software continues to evolve and mature, software development processes become more complicated, relying on a variety of methodologies and approaches. This book illuminates the path to building the next generation of software. Author Scott L. Bain integrates the best of today's most important development disciplines into a unified, streamlined, realistic, and fully actionable approach to developing software. Drawing on patterns, refactoring, and test-driven development, Bain offers a blueprint for moving efficiently through the entire software lifecycle, smoothly managing change, and consistently delivering systems that are robust, reliable, and cost-effective. Reflecting a deep understanding of the natural flow of system development, Emergent Design helps developers work with the flow, instead of against it. Bain introduces the principles and practices of emergent design one step at a time, showing how to promote the natural evolution of software systems over time, making systems work better and provide greater value. To illuminate his approach, Bain presents code examples wherever necessary and concludes with a complete project case study. This book provides developers, project leads, and testers powerful new ways to collaborate, achieve immediate goals, and build systems that improve in quality with each iteration. Coverage includes How to design software in a more natural, evolutionary, and professional way How to use the "open-closed" principle to mitigate risks and eliminate waste How and when to test your design throughout the development process How to translate design principles into practices that actually lead to better code How to determine how much design is enough How refactoring can help you reduce over-design and manage change more effectively The book's companion Web site, www.netobjectives.com/resources, provides updates, links to related materials, and support for discussions of the book's content.
    Note: Includes bibliographical references (p. 393-394) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    ISBN: 9780321496843 , 0321496841
    Language: English
    Pages: xxviii, 354 p , ill. , 24 cm
    Keywords: Windows CardSpace ; Computer security ; Computer networks ; Access control ; Identity theft ; Prevention ; Web services ; Electronic books ; local
    Abstract: Windows CardSpace empowers organizations to prevent identity theft and systematically address a broad spectrum of security and privacy challenges. Understanding Windows CardSpace is the first insider's guide to Windows CardSpace and the broader topic of identity management for technical and business professionals. Drawing on the authors' unparalleled experience earned by working with the CardSpace product team and by implementing state-of-the-art CardSpace-based systems at leading enterprises, it offers unprecedented insight into the realities of identity management: from planning and design through deployment. Part I introduces the fundamental concepts of user-centered identity management, explains the context in which Windows CardSpace operates, and reviews the problems CardSpace aims to solve. Next, the authors walk through CardSpace from a technical standpoint, describing its technologies, elements, artifacts, operations and development practices, and usage scenarios. Finally, they carefully review the design and business considerations associated with architecting solutions based on CardSpace or any other user-centered identity management system. Coverage includes The limitations of current approaches to authentication and identity management Detailed information on advanced Web services The Identity Metasystem, the laws of identity, and the ideal authentication system Windows CardSpace: What it is, how it works, and how developers and managers can use it in their organizations CardSpace technology: user experience, Information Cards, private desktops, and integration with .NET 3.5 and Windows Vista CardSpace implementation: from HTML integration through federation, Web services integration, and beyond Adding personal card support to a website: a detailed, scenario-based explanation Choosing or becoming an identity provider: opportunities, business impacts, operational issues, and pitfalls to avoid Using CardSpace to leverage trust relationships and overcome phishing Whether you're a developer, security specialist, or business decision-maker, this book will answer your most crucial questions about identity management, so you can protect everything that matters: your people, your assets, your partners, and your customers. Foreword xv Preface xviii Part I Setting the Context Chapter 1: The Problem 3 The Advent of Profitable Digital Crime 4 Passwords: Ascent and Decline 29 The Babel of Cryptography 36 The Babel of Web User Interfaces 79 Summ...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780768684391 , 0768684390
    Language: English
    Pages: xxi, 478 p , ill. , 24 cm
    Series Statement: Addison-Wesley Microsoft technology series
    Parallel Title: Erscheint auch als
    Keywords: Microsoft Windows (Computer file) ; Windows PowerShell (Computer program language) ; Command languages (Computer science) ; Scripting languages (Computer science) ; Systems programming (Computer science) ; Electronic books ; local
    Abstract: Use PowerShell to Streamline and Automate Your Most Time-Consuming Windows Administration Tasks With Windows PowerShell, Microsoft brings innovative console-based system administration and scripting to Windows clients and servers. PowerShell combines the best features of traditional UNIX shells with the immense power of the .NET Framework, offering a consistent and easy-to-use replacement for both the Windows command line and the Windows Script Host. In Essential PowerShell , noted expert Holger Schwichtenberg gives Windows sysadmins all the knowledge and sample scripts they need to successfully administer production systems with PowerShell. Schwichtenberg begins by introducing the innovative PowerShell architecture, along with crucial PowerShell concepts such as pipelining and navigation. Next, he introduces the PowerShell Script Language, shows the secure execution of command sequences as scripts, and demonstrates how to use PowerShell to access essential operating system interfaces such as COM, WMI, ADSI, and ADO.NET. After you've mastered the fundamentals, Schwichtenberg presents an extensive collection of PowerShell solutions for virtually every area of day-to-day administration. For each topic, he presents dozens of self-contained examples, all downloadable from a companion Web site. He covers both Microsoft's standard PowerShell commandlets and the free commandlets available as PowerShell Community Extensions. He also presents a full chapter of tips, tricks, and troubleshooting solutions. Coverage includes Understanding PowerShell's components and features Setting up your PowerShell scripting environment Creating and using commandlets Using object-oriented pipelining for filtering, sorting, grouping, comparisons, calculations, and more Mastering PowerShell's uniform navigation model and using it with all types of data Programming command sequences with the PowerShell Script Language Making the most of the PowerShell console and third-party tools Managing processes, event logs, and registry entries Controlling networking, printing, and software installation Manipulating Active Directory and other enterprise services with PowerShell Using PowerShell to enforce stronger system and network security Storing data in files, documents, and databases
    Note: Includes bibliographical references (p. 449-451) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321553744 , 0321553748
    Language: English
    Pages: xxi, 582 p , ill. , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: Computer security ; Internet ; Security measures ; Computer crimes ; Electronic books ; local
    Abstract: "This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference." -Garth Bruen, Project KnujOn Designer There's a new breed of online predators-serious criminals intent on stealing big bucks and top-secret information-and their weapons of choice are a dangerous array of tools called "crimeware." With an ever-growing number of companies, organizations, and individuals turning to the Internet to get things done, there's an urgent need to understand and prevent these online threats. Crimeware: Understanding New Attacks and Defenses will help security professionals, technical managers, students, and researchers understand and prevent specific crimeware threats. This book guides you through the essential security principles, techniques, and countermeasures to keep you one step ahead of the criminals, regardless of evolving technology and tactics. Security experts Markus Jakobsson and Zulfikar Ramzan have brought together chapter contributors who are among the best and the brightest in the security industry. Together, they will help you understand how crimeware works, how to identify it, and how to prevent future attacks before your company's valuable information falls into the wrong hands. In self-contained chapters that go into varying degrees of depth, the book provides a thorough overview of crimeware, including not only concepts prevalent in the wild, but also ideas that so far have only been seen inside the laboratory. With this book, you will Understand current and emerging security threats including rootkits, bot networks, spyware, adware, and click fraud Recognize the interaction between various crimeware threats Gain awareness of the social, political, and legal implications of these threats Learn valuable countermeasures to stop crimeware in its tracks, now and in the future Acquire insight into future security trends and threats, and create an effective defense plan With contributions by Gary McGraw, Andrew Tanenbaum, Dave Cole, Oliver Friedrichs, Peter Ferrie, and others.
    Note: Includes bibliographical references (p. 525-556) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321488909 , 0321488903
    Language: English
    Pages: xxiii, 397 p , ill. , 24 cm
    Keywords: Computer software ; Development ; Management ; Electronic books ; local
    Abstract: "If your desire is to effect change or have more influence on a software team, you could either stumble around in the dark for a few years, experimenting with different techniques, or you could buy, read, and apply the techniques in this book. This choice, of course, is up to you." -Matthew Heusser "Jim Brosseau's understanding of the true dynamics of the IT workplace shows through in Software Teamwork . For those on the IT solution delivery front lines, and for those who manage them, his insights and wisdom will lead to not only better projects, but a better work life as well." -Bruce A. Stewart, Chief Executive Officer, Accendor Research, Inc. Optimizing the Human Side of Software Development: Real Solutions Based on Real Data and Experience Software Teamwork is a compelling, innovative, intensely practical guide to improving the human dynamics that are crucial to building great software. Drawing on years of work with a wide range of teams, Jim Brosseau shows how to drive powerful improvements through small, focused changes that deliver results. These changes are designed to work for the whole team and respect existing organizational culture. Better yet, Brosseau identifies solutions you can start implementing right now, as an individual, without waiting for executive buy-in. Whatever your methodology, technology, or organization, Software Teamwork demonstrates how to apply solutions to realistic development challenges involving complex sets of stakeholders. Along the way, Brosseau shares important new insights into the attitudes, motives, and personal relationships that project management software just can't track. Software Teamwork is a revelation-and an invaluable working resource for every project team member, leader, and stakeholder. Preface xv Acknowledgments xxi About the Author xxiii Part I: The Problem Space Chapter 1: Why Are We So Challenged? 3 Chapter 2: Do the Right Thing 23 Part II: Individuals Chapter 3: The Right Stuff 39 Chapter 4: A Quality Focus 53 Chapter 5: Facing Challenges 65 Chapter 6: Proactive Effectiveness 81 Chapter 7: Sustainability 95 Part III: Groups Chapter 8: Communication 109 Chapter 9: Motives and Expectations 125 Chapter 10: Playing Well Together 143 Part IV: Teams Chapter 11: Alignment 161 Chapter 12: Organization 177 Chapter 13: Coordination 199 Chapter 14: Guidance 217 Part V: Stakeholders Chapter 15: Customers 235 Chapter 16: Setting Goals 243 Chapter 17: Specification 259 Chapter 18: Prioritization 27...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780136071433 , 0136071430
    Language: English
    Pages: xiv, 366 p , ill. , 24 cm
    Keywords: Computers and civilization ; Information technology ; Technological innovations ; Digital media ; Electronic books ; local
    Abstract: "If you want to understand the future before it happens, you'll love this book. If you want to change the future before it happens to you, this book is required reading." - Reed Hundt , former Chairman of the Federal Communications Commission "There is no simpler or clearer statement of the radical change that digital technologies will bring, nor any book that better prepares one for thinking about the next steps." - Lawrence Lessig , Stanford Law School and Author of Code and Other Laws of Cyberspace " Blown to Bits will blow you away. In highly accessible and always fun prose, it explores all the nooks and crannies of the digital universe, exploring not only how this exploding space works but also what it means." - Debora Spar , President of Barnard College, Author of Ruling the Waves and The Baby Business "This is a wonderful book-probably the best since Hal Varian and Carl Schultz wrote Digital Rules . The authors are engineers, not economists. The result is a long, friendly talk with the genie, out of the lamp, and willing to help you avoid making the traditional mistake with that all-important third wish." - David Warsh , Author of Knowledge and the Wealth of Nations " Blown to Bits is one of the clearest expositions I've seen of the social and political issues arising from the Internet. Its remarkably clear explanations of how the Net actually works lets the hot air out of some seemingly endless debates. You've made explaining this stuff look easy. Congratulations!" - David Weinberger , Coauthor of The Cluetrain Manifesto and Author of Everything Is Miscellaneous: The Power of the New Digital Disorder . " Blown to Bits is a timely, important, and very readable take on how information is produced and consumed today, and more important, on the approaching sea change in the way that we as a society deal with the consequences." - Craig Silverstein , Director of Technology, Google, Inc. "This book gives an overview of the kinds of issues confronting society as we become increasingly dependent on the Internet and the World Wide Web. Every informed citizen should read this book and then form their own opinion on these and related issues. And after reading this book you will rethink how (and even whether) you use the Web to form your opinions..." - James S. Miller , Senior Director for Technology Policy and Strategy, Microsoft Corporation "Most writing about the digital world comes from techies writing about technical matter for other tech...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321490452 , 0321490452
    Language: English
    Pages: xxvii, 352 p , ill. , 25 cm
    Keywords: Ruby on rails (Electronic resource) ; Software patterns ; Electronic books ; local
    Abstract: Praise for Design Patterns in Ruby " Design Patterns in Ruby documents smart ways to resolve many problems that Ruby developers commonly encounter. Russ Olsen has done a great job of selecting classic patterns and augmenting these with newer patterns that have special relevance for Ruby. He clearly explains each idea, making a wealth of experience available to Ruby developers for their own daily work." -Steve Metsker, Managing Consultant with Dominion Digital, Inc. "This book provides a great demonstration of the key 'Gang of Four' design patterns without resorting to overly technical explanations. Written in a precise, yet almost informal style, this book covers enough ground that even those without prior exposure to design patterns will soon feel confident applying them using Ruby. Olsen has done a great job to make a book about a classically 'dry' subject into such an engaging and even occasionally humorous read." -Peter Cooper "This book renewed my interest in understanding patterns after a decade of good intentions. Russ picked the most useful patterns for Ruby and introduced them in a straightforward and logical manner, going beyond the GoF's patterns. This book has improved my use of Ruby, and encouraged me to blow off the dust covering the GoF book." -Mike Stok " Design Patterns in Ruby is a great way for programmers from statically typed objectoriented languages to learn how design patterns appear in a more dynamic, flexible language like Ruby." -Rob Sanheim, Ruby Ninja, Relevance Most design pattern books are based on C++ and Java. But Ruby is different-and the language's unique qualities make design patterns easier to implement and use. In this book, Russ Olsen demonstrates how to combine Ruby's power and elegance with patterns, and write more sophisticated, effective software with far fewer lines of code. After reviewing the history, concepts, and goals of design patterns, Olsen offers a quick tour of the Ruby language-enough to allow any experienced software developer to immediately utilize patterns with Ruby. The book especially calls attention to Ruby features that simplify the use of patterns, including dynamic typing, code closures, and "mixins" for easier code reuse. Fourteen of the classic "Gang of Four" patterns are considered from the Ruby point of view, explaining what problems each pattern solves, discussing whether traditional implementations make sense in the Ruby environment, and introducing Ruby-specific improvements...
    Note: Includes bibliographical references (p. 335-338) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321445612 , 0321445619
    Language: English
    Pages: lix, 851 p , ill. , 24 cm
    Keywords: Ruby on rails (Electronic resource) ; Object-oriented programming (Computer science) ; Ruby (Computer program language) ; Web site development ; Application software ; Development ; Electronic books ; local
    Abstract: The expert guide to building Ruby on Rails applications Ruby on Rails strips complexity from the development process, enabling professional developers to focus on what matters most: delivering business value. Now, for the first time, there's a comprehensive, authoritative guide to building production-quality software with Rails. Pioneering Rails developer Obie Fernandez and a team of experts illuminate the entire Rails API, along with the Ruby idioms, design approaches, libraries, and plug-ins that make Rails so valuable. Drawing on their unsurpassed experience, they address the real challenges development teams face, showing how to use Rails' tools and best practices to maximize productivity and build polished applications users will enjoy. Using detailed code examples, Obie systematically covers Rails' key capabilities and subsystems. He presents advanced programming techniques, introduces open source libraries that facilitate easy Rails adoption, and offers important insights into testing and production deployment. Dive deep into the Rails codebase together, discovering why Rails behaves as it does- and how to make it behave the way you want it to. This book will help you Increase your productivity as a web developer Realize the overall joy of programming with Ruby on Rails Learn what's new in Rails 2.0 Drive design and protect long-term maintainability with TestUnit and RSpec Understand and manage complex program flow in Rails controllers Leverage Rails' support for designing REST-compliant APIs Master sophisticated Rails routing concepts and techniques Examine and troubleshoot Rails routing Make the most of ActiveRecord object-relational mapping Utilize Ajax within your Rails applications Incorporate logins and authentication into your application Extend Rails with the best third-party plug-ins and write your own Integrate email services into your applications with ActionMailer Choose the right Rails production configurations Streamline deployment with Capistrano
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321440068 , 0321440064
    Language: English
    Pages: xxxvi, 566 p , ill. , 24 cm
    Series Statement: Microsoft .NET development series
    Keywords: Microsoft Windows (Computer file) ; Application software ; Development ; Web services ; Microsoft .NET ; Electronic books ; local
    Abstract: "Whether this is the first time or the fifty-first time you're using WCF, you'll learn something new by reading this book." --Nicholas Allen, Program Manager, Web Services, Microsoft Windows Communication Foundation (WCF) is the easiest way to produce and consume Web services on the Microsoft platform. With .NET 3.5, WCF has been extensively revamped--and Visual Studio 2008 gives developers powerful new tools for utilizing it. Essential Windows Communication Foundation shows developers exactly how to make the most of WCF with .NET 3.5 and Visual Studio 2008. Drawing on extensive experience working with early adopters, three Microsoft insiders systematically address the topics developers ask about WCF. The authors approach each subject with practical advice and present best practices, tips, and tricks for solving problems. Throughout, you'll find detailed explanations, solutions for the "pain points" of WCF development, and an extensive collection of reusable code examples. Coverage includes Using WCF contracts to define complex structures and interfaces Understanding WCF's channel stacks and channel model architecture Configuring the WCF communication stack to use only the protocols you need Using standard and custom service behaviors to manage concurrency, instances, transactions, and more Serializing data from .NET types to XML Infosets and representing Infosets "on the wire" Hosting WCF services via IIS, managed .NET applications, and Windows Activation Services WCF security, in depth: authentication; transport and message-level security; and Internet and intranet scenarios Improving reliability: exception handling, diagnostics, and more Workflow services: new integration points between WCF 3.5 and Windows Workflow Foundation Building client-to-client, peer network-based applications Utilizing WCF for non-SOAP Web services: AJAX and JSON examples and .NET 3.5 hosting classes Microsoft's Steve Resnick , Richard Crane , and Chris Bowen are technology experts at the Microsoft Technology Center in Boston. They specialize in helping customers improve their technical agility by applying WCF and related technologies. Resnick has specialized in Internet technologies and distributed computing at Microsoft since 1995. He is a frequent speaker at Microsoft events and is now technology director for the U.S. Microsoft Technology Centers. Crane has more than 15 years of experience in senior software development roles. He specializes in large-scale Web si...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780672329166 , 0672329166
    Language: English
    Pages: xxxiv, 968 p , ill. , 24 cm. +
    Edition: 4th ed.
    Series Statement: Developer's library
    Keywords: MySQL (Electronic resource) ; PHP (Computer program language) ; SQL (Computer program language) ; Web sites ; Design ; Electronic books ; local
    Abstract: PHP and MySQL Web Development, Fourth Edition The definitive guide to building database-drive Web applications with PHP and MySQL PHP and MySQL are popular open-source technologies that are ideal for quickly developing database-driven Web applications. PHP is a powerful scripting language designed to enable developers to create highly featured Web applications quickly, and MySQL is a fast, reliable database that integrates well with PHP and is suited for dynamic Internet-based applications. PHP and MySQL Web Development shows how to use these tools together to produce effective, interactive Web applications. It clearly describes the basics of the PHP language, explains how to set up and work with a MySQL database, and then shows how to use PHP to interact with the database and the server. This practical, hands-on book includes numerous examples that demonstrate common tasks such as authenticating users, constructing a shopping cart, generating PDF documents and images dynamically, sending and managing email, facilitating user discussions, connecting to Web services using XML, and developing Web 2.0 applications with Ajax-based interactivity. The fourth edition of PHP and MySQL Web Development has been thoroughly updated, revised, and expanded to cover developments in PHP 5 through version 5.3, such as namespaces and closures, as well as features introduced in MySQL 5.1. TABLE OF CONTENTS Part I: Using PHP 1 PHP Crash Course 2 Storing and Retrieving Data 3 Using Arrays 4 String Manipulation and Regular Expressions 5 Reusing Code and Writing Functions 6 Object-Oriented PHP 7 Error and Exception Handling Part II: Using MySQL 8 Designing Your Web Database 9 Creating Your Web Database 10 Working with Your MySQL Database 11 Accessing Your MySQL Database from the Web with PHP 12 Advanced MySQL Administration 13 Advanced MySQL Programming Part III: E-Commerce and Security 14 Running an E-Commerce Site 15 E-commerce Security Issues 16 Web Application Security 17 Implementing Authentication with PHP and MySQL 18 Implementing Secure Transactions with PHP and MySQL Part IV: Advanced PHP Techniques 19 Interacting with the File System and the Server 20 Using Network and Protocol Functions 21 Managing the Date and Time 22 Generating Images 23 Using Session Control in PHP 24 Other Useful Features Part V: Building Practical PHP and MySQL Projects 25 Using PHP and MySQL for Large Projects 26 Debugging 27 Building User Authentication and Personalization 28 Build...
    Note: Includes bibliographical references (p. [907]-910) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321562654 , 0321562658
    Language: English
    Pages: xxx, 699 p , ill. , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: Computer architecture ; Computer network architectures ; Business enterprises ; Computer networks ; Management ; Web services ; Electronic books ; local
    Abstract: Putting Service-Oriented Architecture (SOA) into Practice "This book is a must-have for enterprise architects implementing SOA. Through practical examples, it explains the relationship between business requirements, business process design, and service architecture. By tying the SOA implementation directly to business value, it reveals the key to ongoing success and funding." -Maja Tibbling, Lead Enterprise Architect, Con-way, Inc. "While there are other books on architecture and the implementation of ESB, SOA, and related technologies, this new book uniquely captures the knowledge and experience of the real world. It shows how you can transform requirements and vision into solid, repeatable, and value-added architectures. I heartily recommend it." -Mark Wencek, SVP, Consulting Services & Alliances, Ultimo Software Solutions, Inc. In his first book, Succeeding with SOA , Paul Brown explained that if enterprise goals are to be met, business processes and information systems must be designed together as parts of a total architecture. In this second book, Implementing SOA , he guides you through the entire process of designing and developing a successful total architecture at both project and enterprise levels. Drawing on his own extensive experience, he provides best practices for creating services and leveraging them to create robust and flexible SOA solutions. Coverage includes Evolving the enterprise architecture towards an SOA while continuing to deliver business value on a project-by-project basis Understanding the fundamentals of SOA and distributed systems, the dominant architectural issues, and the design patterns for addressing them Understanding the distinct roles of project and enterprise architects and how they must collaborate to create an SOA Understanding the need for a comprehensive total architecture approach that encompasses business processes, people, systems, data, and infrastructure Understanding the strategies and tradeoffs for implementing robust, secure, high-performance, and high-availability solutions Understanding how to incorporate business process management (BPM) and business process monitoring into the enterprise architecture Whether you're defining an enterprise architecture or delivering individual SOA projects, this book will give you the practical advice you need to get the job done.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321559685 , 0321559681
    Language: English
    Pages: xxvi, 315 p , ill.
    Parallel Title: Erscheint auch als
    Keywords: Computer security ; Software engineering ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: "This book's broad overview can help an organization choose a set of processes, policies, and techniques that are appropriate for its security maturity, risk tolerance, and development style. This book will help you understand how to incorporate practical security techniques into all phases of the development lifecycle." -Steve Riley, senior security strategist, Microsoft Corporation "There are books written on some of the topics addressed in this book, and there are other books on secure systems engineering. Few address the entire life cycle with a comprehensive overview and discussion of emerging trends and topics as well as this one." -Ronda Henning, senior scientist-software/security queen, Harris Corporation Software that is developed from the beginning with security in mind will resist, tolerate, and recover from attacks more effectively than would otherwise be possible. While there may be no silver bullet for security, there are practices that project managers will find beneficial. With this management guide, you can select from a number of sound practices likely to increase the security and dependability of your software, both during its development and subsequently in its operation. Software Security Engineering draws extensively on the systematic approach developed for the Build Security In (BSI) Web site. Sponsored by the Department of Homeland Security Software Assurance Program, the BSI site offers a host of tools, guidelines, rules, principles, and other resources to help project managers address security issues in every phase of the software development life cycle (SDLC). The book's expert authors, themselves frequent contributors to the BSI site, represent two well-known resources in the security world: the CERT Program at the Software Engineering Institute (SEI) and Cigital, Inc., a consulting firm specializing in software security. This book will help you understand why Software security is about more than just eliminating vulnerabilities and conducting penetration tests Network security mechanisms and IT infrastructure security services do not sufficiently protect application software from security risks Software security initiatives should follow a risk-management approach to identify priorities and to define what is "good enough"-understanding that software security risks will change throughout the SDLC Project managers and software engineers need to learn to think like an attacker in order to address the range of function...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321497642 , 0321497643
    Language: English
    Pages: xix, 277 p , ill. , 24 cm
    Series Statement: Addison-Wesley Microsoft technology series
    Keywords: SQL server ; Database design ; Data structures (Computer science) ; Electronic books ; local
    Abstract: " A Developer's Guide to Data Modeling for SQL Server explains the concepts and practice of data modeling with a clarity that makes the technology accessible to anyone building databases and data-driven applications. "Eric Johnson and Joshua Jones combine a deep understanding of the science of data modeling with the art that comes with years of experience. If you're new to data modeling, or find the need to brush up on its concepts, this book is for you." - Peter Varhol , Executive Editor, Redmond Magazine Model SQL Server Databases That Work Better, Do More, and Evolve More Smoothly Effective data modeling is essential to ensuring that your databases will perform well, scale well, and evolve to meet changing requirements. However, if you're modeling databases to run on Microsoft SQL Server 2008 or 2005, theoretical or platform-agnostic data modeling knowledge isn't enough: models that don't reflect SQL Server's unique real-world strengths and weaknesses often lead to disastrous performance. A Developer's Guide to Data Modeling for SQL Server is a practical, SQL Server-specific guide to data modeling for every developer, architect, and administrator. This book offers you invaluable start-to-finish guidance for designing new databases, redesigning existing SQL Server data models, and migrating databases from other platforms. You'll begin with a concise, practical overview of the core data modeling techniques. Next, you'll walk through requirements gathering and discover how to convert requirements into effective SQL Server logical models. Finally, you'll systematically transform those logical models into physical models that make the most of SQL Server's extended functionality. All of this book's many examples are available for download from a companion Web site. This book enables you to Understand your data model's physical elements, from storage to referential integrity Provide programmability via stored procedures, user-defined functions, triggers, and .NET CLR integration Normalize data models, one step at a time Gather and interpret requirements more effectively Learn an effective methodology for creating logical models Overcome modeling problems related to entities, attribute, data types, storage overhead, performance, and relationships Create physical models-from establishing naming guidelines through implementing business rules and constraints Use SQL Server's unique indexing capabilities, and overcome their limitations Create abstracti...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321413093 , 0321413091
    Language: English
    Pages: xvi, 157 p , ill. (some col.) , 24 cm
    Keywords: Software patterns ; Computer software ; Development ; Electronic books ; local
    Abstract: "Kent is a master at creating code that communicates well, is easy to understand, and is a pleasure to read. Every chapter of this book contains excellent explanations and insights into the smaller but important decisions we continuously have to make when creating quality code and classes." - Erich Gamma, IBM Distinguished Engineer "Many teams have a master developer who makes a rapid stream of good decisions all day long. Their code is easy to understand, quick to modify, and feels safe and comfortable to work with. If you ask how they thought to write something the way they did, they always have a good reason. This book will help you become the master developer on your team. The breadth and depth of topics will engage veteran programmers, who will pick up new tricks and improve on old habits, while the clarity makes it accessible to even novice developers." - Russ Rufer, Silicon Valley Patterns Group "Many people don't realize how readable code can be and how valuable that readability is. Kent has taught me so much, I'm glad this book gives everyone the chance to learn from him." - Martin Fowler, chief scientist, ThoughtWorks "Code should be worth reading, not just by the compiler, but by humans. Kent Beck distilled his experience into a cohesive collection of implementation patterns. These nuggets of advice will make your code truly worth reading." - Gregor Hohpe, author of Enterprise Integration Patterns "In this book Kent Beck shows how writing clear and readable code follows from the application of simple principles. Implementation Patterns will help developers write intention revealing code that is both easy to understand and flexible towards future extensions. A must read for developers who are serious about their code." - Sven Gorts " Implementation Patterns bridges the gap between design and coding. Beck introduces a new way of thinking about programming by basing his discussion on values and principles." - Diomidis Spinellis, author of Code Reading and Code Quality Software Expert Kent Beck Presents a Catalog of Patterns Infinitely Useful for Everyday Programming Great code doesn't just function: it clearly and consistently communicates your intentions, allowing other programmers to understand your code, rely on it, and modify it with confidence. But great code doesn't just happen. It is the outcome of hundreds of small but critical decisions programmers make every single day. Now, legendary software innovator Kent Beck-known worldw...
    Note: "A Kent Beck signature book"--Cover. - Includes bibliographical references (p. 145-148) and indexes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321564276 , 0321564278
    Language: English
    Pages: xiii, 250 p , ill.
    Edition: 3rd ed.
    Parallel Title: Erscheint auch als
    Keywords: Capability maturity model (Computer software) ; Electronic books ; local
    Abstract: CMMI® (Capability Maturity Model® Integration) is an integrated, extensible framework for improving process capability and quality across an organization. It has become a cornerstone in the implementation of continuous improvement for both industry and governments around the world. Rich in both detail and guidance for a wide set of organizational domains, the CMMI Product Suite continues to evolve and expand. Updated for CMMI Version 1.2, this third edition of CMMI® Distilled again provides a concise and readable introduction to the model, as well as straightforward, no-nonsense information on integrated, continuous process improvement. The book now also includes practical advice on how to use CMMI in tandem with other approaches, including Six Sigma and Lean, as well as new and expanded guidance on preparing for, managing, and using appraisals. Written so that readers unfamiliar with model-based process improvement will understand how to get started with CMMI, the book offers insights for those more experienced as well. It can help battle-scarred process improvement veterans, and experienced suppliers and acquirers of both systems and services, perform more effectively. CMMI® Distilled is especially appropriate for executives and managers who need to understand why continuous improvement is valuable, why CMMI is a tool of choice, and how to maximize the return on their efforts and investments. Engineers of all kinds (systems, hardware, software, and quality, as well as acquisition personnel and service providers) will find ideas on how to perform better. The three authors, all involved with CMMI since its inception, bring a wealth of experience and knowledge to this book. They highlight the pitfalls and shortcuts that are all too often learned by costly experience, and they provide a context for understanding why the use of CMMI continues to grow around the world.
    Note: Includes index. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321545428 , 0321545427
    Language: English
    Pages: l, 942 p , col. ill. , 25 cm. +
    Parallel Title: Erscheint auch als
    Keywords: Computer graphics ; Real-time programming ; Electronic books ; local
    Abstract: "The GPU Gems series features a collection of the most essential algorithms required by Next-Generation 3D Engines." -Martin Mittring, Lead Graphics Programmer, Crytek This third volume of the best-selling GPU Gems series provides a snapshot of today's latest Graphics Processing Unit (GPU) programming techniques. The programmability of modern GPUs allows developers to not only distinguish themselves from one another but also to use this awesome processing power for non-graphics applications, such as physics simulation, financial analysis, and even virus detection-particularly with the CUDA architecture. Graphics remains the leading application for GPUs, and readers will find that the latest algorithms create ultra-realistic characters, better lighting, and post-rendering compositing effects. Major topics include Geometry Light and Shadows Rendering Image Effects Physics Simulation GPU Computing Contributors are from the following corporations and universities: 3Dfacto Adobe Systems Apple Budapest University of Technology and Economics CGGVeritas The Chinese University of Hong Kong Cornell University Crytek Czech Technical University in Prague Dartmouth College Digital Illusions Creative Entertainment Eindhoven University of Technology Electronic Arts Havok Helsinki University of Technology Imperial College London Infinity Ward Juniper Networks LaBRI-INRIA, University of Bordeaux mental images Microsoft Research Move Interactive NCsoft Corporation NVIDIA Corporation Perpetual Entertainment Playlogic Game Factory Polytime Rainbow Studios SEGA Corporation UFRGS (Brazil) Ulm University University of California, Davis University of Central Florida University of Copenhagen University of Girona University of Illinois at Urbana-Champaign University of North Carolina Chapel Hill University of Tokyo University of Waterloo Section Editors include NVIDIA engineers: Cyril Zeller, Evan Hart, Ignacio Castaño, Kevin Bjorke, Kevin Myers, and Nolan Goodnight. The accompanying DVD includes complementary examples and sample programs.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321477897 , 0321477898
    Language: English
    Pages: xx, 362 p , 24 cm
    Keywords: Computer security ; Computer software ; Quality control ; Computer software industry ; United States ; Electronic books ; local
    Abstract: "The clarity of David's argument and the strength of his conviction are truly inspiring. If you don't believe the world of software affects the world in which you live, you owe it to yourself to read this book." -Lenny Zeltzer, SANS Institute faculty member and the New York Security Consulting Manager at Savvis, Inc. " Geekonomics stays with you long after you finish reading the book. You will reconsider every assumption you have had about software costs and benefits." -Slava Frid, Gemini Systems, CTO, Resilience Technology Solutions "Information Security is an issue that concerns governments, companies and, increasingly, citizens. Are the computer systems and software to which we entrust our sensitive and critical information, technologies that are out of control? David Rice has written an important and welcome book that goes to the heart of this issue, and points to solutions that society as a whole needs to debate and embrace." -Nick Bleech, IT Security Director, Rolls-Royce "If you are dependent upon software (and of course, all of us in the modern world are) this book is a fabulous discussion of how and why we should worry." -Becky Bace The Real Cost of Insecure Software • In 1996, software defects in a Boeing 757 caused a crash that killed 70 people... • In 2003, a software vulnerability helped cause the largest U.S. power outage in decades... • In 2004, known software weaknesses let a hacker invade T-Mobile, capturing everything from passwords to Paris Hilton's photos... • In 2005, 23,900 Toyota Priuses were recalled for software errors that could cause the cars to shut down at highway speeds... • In 2006 dubbed "The Year of Cybercrime," 7,000 software vulnerabilities were discovered that hackers could use to access private information... • In 2007, operatives in two nations brazenly exploited software vulnerabilities to cripple the infrastructure and steal trade secrets from other sovereign nations... Software has become crucial to the very survival of civilization. But badly written, insecure software is hurting people-and costing businesses and individuals billions of dollars every year. This must change. In Geekonomics , David Rice shows how we can change it. Rice reveals why the software industry is rewarded for carelessness, and how we can revamp the industry's incentives to get the reliability and security we desperately need and deserve. You'll discover why the software industry still has shockingly little accountability-and...
    Note: Includes bibliographical references (p. 325-339) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321356529 , 0321356527
    Language: English
    Pages: xxxii, 330 p , ill. , 23 cm
    Keywords: OpenGL ; Mac OS ; Computer graphics ; Electronic books ; local
    Abstract: The Mac has fully embraced OpenGL throughout its visual systems. In fact, Apple's highly efficient, modern OpenGL implementation makes Mac OS X one of today's best platforms for OpenGL development. OpenGL ® Programming on Mac OS ® X is the first comprehensive resource for every graphics programmer who wants to create, port, or optimize OpenGL applications for this high-volume platform. Leading OpenGL experts Robert Kuehne and J. D. Sullivan thoroughly explain the Mac's diverse OpenGL APIs, both old and new. They illuminate crucial OpenGL setup, configuration, and performance issues that are unique to the Mac platform. Next, they offer practical, start-to-finish guidance for integrating key Mac-native APIs with OpenGL, and leveraging the full power of the Mac platform in your graphics applications. Coverage includes A thorough review of Mac hardware and software architectures and their performance implications In-depth, expert guidance for accessing OpenGL from each of the Mac's core APIs: CGL, AGL, and Cocoa Interoperating with other Mac APIs: incorporating video with QuickTime, performing image effects with Core Image, and processing CoreVideo data Analyzing Mac OpenGL application performance, resolving bottlenecks, and leveraging optimizations only available on the Mac Detecting, integrating, and using OpenGL extensions An accompanying Web site (www.macopenglbook.com) contains the book's example code, plus additional OpenGL-related resources. OpenGL ® Programming on Mac OS ® X will be valuable to Mac programmers seeking to leverage OpenGL's power, OpenGL developers porting their applications to the Mac platform, and cross-platform graphics developers who want to take advantage of the Mac platform's uniquely intuitive style and efficiency.
    Note: Includes bibliographical references (p. 323-324) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321572783 , 0321572785
    Language: English
    Pages: xxv, 353 p , ill. , 24 cm
    Series Statement: The agile software development series
    Parallel Title: Erscheint auch als
    Keywords: Computer software ; Development ; Management ; Agile software development ; Information technology projects ; Project management ; Methodology ; Electronic books ; local
    Abstract: When software development teams move to agile methods, experienced project managers often struggle-doubtful about the new approach and uncertain about their new roles and responsibilities. In this book, two long-time certified Project Management Professionals (PMP R s) and Scrum trainers have built a bridge to this dynamic new paradigm. They show experienced project managers how to successfully transition to agile by refocusing on facilitation and collaboration, not "command and control." The authors begin by explaining how agile works: how it differs from traditional "plan-driven" methodologies, the benefits it promises, and the real-world results it delivers. Next, they systematically map the Project Management Institute's classic, methodology-independent techniques and terminology to agile practices. They cover both process and project lifecycles and carefully address vital issues ranging from scope and time to cost management and stakeholder communication. Finally, drawing on their own extensive personal experience, they put a human face on your personal transition to agile--covering the emotional challenges, personal values, and key leadership traits you'll need to succeed. Coverage includes Relating the PMBOK R Guide ideals to agile practices: similarities, overlaps, and differences Understanding the role and value of agile techniques such as iteration/release planning and retrospectives Using agile techniques to systematically and continually reduce risk Implementing quality assurance (QA) where it belongs: in analysis, design, defect prevention, and continuous improvement Learning to trust your teams and listen for their discoveries Procuring, purchasing, and contracting for software in agile, collaborative environments Avoiding the common mistakes software teams make in transitioning to agile Coordinating with project management offices and non-agile teams "Selling" agile within your teams and throughout your organization For every project manager who wants to become more agile. Part I An Agile Overview 7 Chapter 1 What is "Agile"? 9 Chapter 2 Mapping from the PMBOK R Guide to Agile 25 Chapter 3 The Agile Project Lifecycle in Detail 37 Part II The Bridge: Relating PMBOK R Guide Practices to Agile Practices 49 Chapter 4 Integration Management 51 Chapter 5 Scope Management 67 Chapter 6 Time Management 83 Chapter 7 Cost Management 111 Chapter 8 Quality Management 129 Chapter 9 Human Resources Management 1...
    Note: Includes bibliographical references (p. 327-331) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321491930 , 0321491939
    Language: English
    Pages: xxvi, 470 p , ill. , 24 cm
    Keywords: Ajax (Web site development technology) ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this transition is being made with reckless disregard for security. If Ajax applications aren't designed and coded properly, they can be susceptible to far more dangerous security vulnerabilities than conventional Web or desktop software. Ajax developers desperately need guidance on securing their applications: knowledge that's been virtually impossible to find, until now . Ajax Security systematically debunks today's most dangerous myths about Ajax security, illustrating key points with detailed case studies of actual exploited Ajax vulnerabilities, ranging from MySpace's Samy worm to MacWorld's conference code validator. Even more important, it delivers specific, up-to-the-minute recommendations for securing Ajax applications in each major Web programming language and environment, including .NET, Java, PHP, and even Ruby on Rails. You'll learn how to: · Mitigate unique risks associated with Ajax, including overly granular Web services, application control flow tampering, and manipulation of program logic · Write new Ajax code more safely-and identify and fix flaws in existing code · Prevent emerging Ajax-specific attacks, including JavaScript hijacking and persistent storage theft · Avoid attacks based on XSS and SQL Injection-including a dangerous SQL Injection variant that can extract an entire backend database with just two requests · Leverage security built into Ajax frameworks like Prototype, Dojo, and ASP.NET AJAX Extensions-and recognize what you still must implement on your own · Create more secure "mashup" applications Ajax Security will be an indispensable resource for developers coding or maintaining Ajax applications; architects and development managers planning or designing new Ajax software, and all software security professionals, from QA specialists to penetration testers.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321605818 , 0321605810
    Language: English
    Pages: xxviii, 517 p
    Parallel Title: Erscheint auch als
    Keywords: Capability maturity model (Computer software) ; Electronic books ; local
    Abstract: CMMI-ACQ ® (Capability Maturity Model ® Integration for Acquisition) describes best practices for the successful acquisition of products and services. Providing a practical framework for improving acquisition processes, CMMI-ACQ addresses the growing trend in business and government for organizations to purchase or outsource required products and services as an alternative to in-house development or resource allocation. Modeled after CMMI ® , Second Edition, which documented CMMI for Development, this book is the definitive reference for the current release of CMMI for Acquisition (version 1.2). In addition to the entire CMMI-ACQ model, the book includes tips, hints, cross-references, and other author notes to help you understand, apply, and find more information about the content of the acquisition process areas. The authors also have added two chapters to illustrate the application of CMMI-ACQ in industry (a case study from General Motors) and government. Whether you are new to CMMI models or are already familiar with one or more of them, you will find this book an essential resource for managing your acquisition processes and improving your overall performance. The book is divided into three parts. Part One introduces CMMI-ACQ in the broad context of CMMI models, including essential concepts and useful background. It then describes and shows the relationships among all the components of the CMMI-ACQ process areas, and explains paths to the adoption and use of the model for process improvement and benchmarking. Finally, two separate chapters describe special acquisition needs in a government environment and real experiences with CMMI-ACQ from industry. Part Two first describes generic goals and generic practices, and then, in twenty-two sections, details each of the CMMI-ACQ process areas, including specific goals, specific practices, and examples. These process areas are organized alphabetically by process area acronym to facilitate quick reference. Part Three provides several useful references, including sources for further information about CMMI and CMMI-ACQ, acronym definitions, a glossary of terms, and an index.
    Note: Includes bibliographical references (p. 471-474)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321552044 , 0321552040
    Language: English
    Pages: xxi, 340 p , ill. , 25 cm
    Series Statement: The Addison-Wesley signature series
    Parallel Title: Erscheint auch als
    Keywords: Web sites ; Design ; Software refactoring ; Web servers ; Computer programs ; Application software ; Development ; HTML editors (Computer programs) ; Electronic books ; local
    Abstract: Like any other software system, Web sites gradually accumulate "cruft" over time. They slow down. Links break. Security and compatibility problems mysteriously appear. New features don't integrate seamlessly. Things just don't work as well. In an ideal world, you'd rebuild from scratch. But you can't: there's no time or money for that. Fortunately, there's a solution: You can refactor your Web code using easy, proven techniques, tools, and recipes adapted from the world of software development. In Refactoring HTML, Elliotte Rusty Harold explains how to use refactoring to improve virtually any Web site or application. Writing for programmers and non-programmers alike, Harold shows how to refactor for better reliability, performance, usability, security, accessibility, compatibility, and even search engine placement. Step by step, he shows how to migrate obsolete code to today's stable Web standards, including XHTML, CSS, and REST-and eliminate chronic problems like presentation-based markup, stateful applications, and "tag soup." The book's extensive catalog of detailed refactorings and practical "recipes for success" are organized to help you find specific solutions fast, and get maximum benefit for minimum effort. Using this book, you can quickly improve site performance now-and make your site far easier to enhance, maintain, and scale for years to come. Topics covered include • Recognizing the "smells" of Web code that should be refactored • Transforming old HTML into well-formed, valid XHTML, one step at a time • Modernizing existing layouts with CSS • Updating old Web applications: replacing POST with GET, replacing old contact forms, and refactoring JavaScript • Systematically refactoring content and links • Restructuring sites without changing the URLs your users rely upon This book will be an indispensable resource for Web designers, developers, project managers, and anyone who maintains or updates existing sites. It will be especially helpful to Web professionals who learned HTML years ago, and want to refresh their knowledge with today's standards-compliant best practices. This book will be an indispensable resource for Web designers, developers, project managers, and anyone who maintains or updates existing sites. It will be especially helpful to Web professionals who learned HTML years ago, and want to refresh their knowledge with today's standards-compliant best practices.
    Note: Includes index. - "A Martin Fowler signature book"--Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321516084 , 0321516087
    Language: English
    Pages: xxvii, 324 p , ill. , 25 cm
    Keywords: Software engineering ; Computer software ; Quality control ; Capability maturity model (Computer software) ; Six sigma (Quality control standard) ; Electronic books ; local
    Abstract: "In this book, I have found answers to key questions and misconceptions about the relationship between Six Sigma and the Capability Maturity Model Integration [CMMI]....Among my key takeaways is that the relationship between Six Sigma and CMMI exemplifies one of the principles of S4/IEE: CMMI provides process infrastructure that is needed to support a successful Six Sigma strategy." -Forrest W. Breyfogle III, CEO, Smarter Solutions, Inc. "Finally, a book that bridges the software and hardware process tool set. To date, there have been hardware and software engineers who for one reason or another have not communicated their process methods. And so, myths formed that convinced the hardware community that CMMI was only for software and likewise convinced the software community that Six Sigma was only for hardware. It is both refreshing and thought provoking to dispel these myths." -Jack Ferguson, Manager, SEI Appraisal Program, Software Engineering Institute CMMI and Six Sigma represent two of the best-known process improvement initiatives. Both are designed to enhance work quality and thereby produce business advantages for an organization. It's a misconception that the two are in competition and cannot be implemented simultaneously. Practitioners originally trained in either CMMI or Six Sigma are now finding that the two initiatives work remarkably well together in the pursuit of their common goal. CMMI® and Six Sigma: Partners in Process Improvement focuses on the synergistic, rather than competitive, implementation of CMMI and Six Sigma-with synergy translating to "faster, better, cheaper" achievement of mission success. Topics range from formation of the value proposition to specific implementation tactics. The authors illustrate how not taking advantage of what both initiatives have to offer puts an organization at risk of sinking time, energy, and money into "inventing" a solution that already exists. Along the way they debunk a few myths about Six Sigma applications in software. While the authors concentrate on the interoperability of Six Sigma and CMMI, they also recognize that organizations rarely implement only these two initiatives. Accordingly, the discussion turns to the emerging realm of "multimodel" process improvement and strategies and tactics that transcend models to help organizations effectively knit together a single unified internal process standard. Whether you work in the defense industry, for a commercial organization, o...
    Note: Includes bibliographical references (p. 271-297) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321503107 , 0321503104
    Language: English
    Pages: xxiii, 483 p , ill. , 24 cm
    Keywords: Java (Computer program language) ; Computer software ; Testing ; Electronic books ; local
    Abstract: Enterprise Java developers must achieve broader, deeper test coverage, going beyond unit testing to implement functional and integration testing with systematic acceptance. Next Generation Java ™ Testing introduces breakthrough Java testing techniques and TestNG, a powerful open source Java testing platform. Cédric Beust, TestNG's creator, and leading Java developer Hani Suleiman, present powerful, flexible testing patterns that will work with virtually any testing tool, framework, or language. They show how to leverage key Java platform improvements designed to facilitate effective testing, such as dependency injection and mock objects. They also thoroughly introduce TestNG, demonstrating how it overcomes the limitations of older frameworks and enables new techniques, making it far easier to test today's complex software systems. Pragmatic and results-focused, Next Generation Java ™ Testing will help Java developers build more robust code for today's mission-critical environments. This book Illuminates the tradeoffs associated with testing, so you can make better decisions about what and how to test Introduces TestNG, explains its goals and features, and shows how to apply them in real-world environments Shows how to integrate TestNG with your existing code, development frameworks, and software libraries Demonstrates how to test crucial code features, such as encapsulation, state sharing, scopes, and thread safety Shows how to test application elements, including JavaEE APIs, databases, Web pages, and XML files Presents advanced techniques: testing partial failures, factories, dependent testing, remote invocation, cluster-based test farms, and more Walks through installing and using TestNG plug-ins for Eclipse, and IDEA Contains extensive code examples Whether you use TestNG, JUnit, or another testing framework, the testing design patterns presented in this book will show you how to improve your tests by giving you concrete advice on how to make your code and your design more testable.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321562944 , 0321562941
    Language: English
    Pages: xix, 198 p , ill. , 23 cm
    Parallel Title: Erscheint auch als
    Keywords: Software engineering ; Human-computer interaction ; Psychological aspects ; User-centered system design ; Time perception ; Electronic books ; local
    Abstract: Build Applications, Websites, and Software Solutions that Feel Faster, More Efficient, and More Considerate of Users' Time! One hidden factor powerfully influences the way users react to your software, hardware, User Interfaces (UI), or web applications: how those systems utilize users' time . Now, drawing on the nearly 40 years of human computer interaction research-including his own pioneering work-Dr. Steven Seow presents state-of-the-art best practices for reflecting users' subjective perceptions of time in your applications and hardware. Seow begins by introducing a simple model that explains how users perceive and expend time as they interact with technology. He offers specific guidance and recommendations related to several key aspects of time and timing-including user tolerance, system responsiveness, progress indicators, completion time estimates, and more. Finally, he brings together proven techniques for impacting users' perception of time drawn from multiple disciplines and industries, ranging from psychology to retail, animal research to entertainment. • Discover how time and timing powerfully impact user perception, emotions, and behavior • Systematically make your applications more considerate of users' time • Avoid common mistakes that consistently frustrate or infuriate users • Manage user perceptions and tolerance, and build systems that are perceived as faster • Optimize "flow" to make users feel more productive, empowered, and creative • Make reasonable and informed tradeoffs that maximize limited development resources • Learn how to test usability issues related to time-including actual vs. perceived task duration Designing and Engineering Time is for every technology developer, designer, engineer, architect, usability specialist, manager, and marketer. Using its insights and techniques, technical and non-technical professionals can work together to build systems and applications that provide far more value- and create much happier users . Steven C. Seow has a unique combination of experience in both experimental psychology and software usability. He joined Microsoft as a User Researcher after completing his Ph.D. in Experimental Psychology at Brown University with a research focus on human timing and information theory models of human performance. Seow holds Bachelor's and Master's Degrees in Forensic Psychology from John Jay College of Criminal Justice, and wrote his master's thesis on distortions in...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321374462 , 0321374460
    Language: English
    Pages: xxvii, 809 p , ill. , 23 cm
    Keywords: Microsoft Windows (Computer file) ; Operating systems (Computers) ; Management ; Debugging in computer science ; Electronic books ; local
    Abstract: &〉 -- Bob Wilton, Escalation Engineer, Critical Problem Resolution Team, Microsoft "An excellent reference for both intermediate and advanced debuggers: highly practical, and filled with tricks and strategies. This book stands out from all other Win32 debugging literature, thanks to its in-depth examples-including resolving intricate problems like stack and heap corruptions." -- Kinshuman, Development Lead, Windows Core OS Division, Microsoft The First In-Depth, Real-World, Insider's Guide to Powerful Windows Debugging For Windows developers, few tasks are more challenging than debugging--or more crucial. Reliable and realistic information about Windows debugging has always been scarce. Now, with over 15 years of experience two of Microsoft's system-level developers present a thorough and practical guide to Windows debugging ever written. Mario Hewardt and Daniel Pravat cover debugging throughout the entire application lifecycle and show how to make the most of the tools currently available--including Microsoft's powerful native debuggers and third-party solutions. To help you find real solutions fast , this book is organized around real-world debugging scenarios. Hewardt and Pravat use detailed code examples to illuminate the complex debugging challenges professional developers actually face. From core Windows operating system concepts to security, Windows® Vista™ and 64-bit debugging, they address emerging topics head-on-and nothing is ever oversimplified or glossed over! This book enables you to Master today's most powerful Windows debugging tools, including NTSD, CDB, WinDbg, KD, and ADPlus Debug code that wasn't designed or written for easy debugging Understand debuggers "under the hood," and manage symbols and sources efficiently Debug complex memory corruptions related to stacks and heaps Resolve complex security problems Debug across processes: identity tracking, RPC debugger extensions, and tracking IPCs with Ethereal Find and fix resource leaks, such as memory and handle leaks. Debug common thread synchronization problems Learn when and how to write custom debugger extensions Perform "postmortem debugging" using crash dumps and Windows Error Reporting Automate debugging with DebugDiag and the Analyze Debugger command Whether you're a system-level or application developer, Advanced Windows Debugging delivers the deep understanding of debugging that could save you weeks on your very next project. Part I Overview Chapter 1 Introduction...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321552693 , 0321552695
    Language: English
    Pages: xxix, 415 p , ill. , 24 cm
    Parallel Title: Erscheint auch als
    Keywords: Computer crimes ; Computer crimes ; Prevention ; Internet ; Electronic books ; local
    Abstract: Internet crime keeps getting worse...but it doesn't have to be that way. In this book, Internet security pioneer Phillip Hallam-Baker shows how we can make the Internet far friendlier for honest people-and far less friendly to criminals. The dotCrime Manifesto begins with a revealing new look at the challenge of Internet crime-and a surprising look at today's Internet criminals. You'll discover why the Internet's lack of accountability makes it so vulnerable, and how this can be fixed -technically, politically, and culturally. Hallam-Baker introduces tactical, short-term measures for countering phishing, botnets, spam, and other forms of Internet crime. Even more important, he presents a comprehensive plan for implementing accountability-driven security infrastructure: a plan that draws on tools that are already available, and rapidly emerging standards and products. The result: a safer Internet that doesn't sacrifice what people value most: power, ubiquity, simplicity, flexibility, or privacy. Tactics and strategy: protecting Internet infrastructure from top to bottom Building more secure transport, messaging, identities, networks, platforms, and more Gaining safety without sacrificing the Internet's unique power and value Making the Internet safer for honest people without sacrificing ubiquity, simplicity, or privacy Spam: draining the swamp, once and for all Why spam contributes to virtually every form of Internet crime-and what we can do about it Design for deployment: how to really make it happen Defining security objectives, architecture, strategy, and design-and evangelizing them How to Build a Safer, Better Internet You'll find yourself deeply concerned, then fascinated, then hopeful as you read about • Building an Internet that resists online crime • Phishing, botnets, and spam: tactical, workable, immediate countermeasures • Establishing the "Accountable Web": a strategic, long-term solution to Internet crime • Improving security without sacrificing what people love about the Internet The Internet is today's Wild West: too much lawlessness, too little accountability. Now, one of the Internet's leading pioneers shows how we can build a more trustworthy Internet: one that resists crime without frustrating honest people or compromising privacy and civil liberties. Drawing on years at the cutting edge of Internet and security research, Phillip Hallam-Baker offers a complete plan for reinventing the Internet: a plan that addre...
    Note: Includes bibliographical references (p. 387-394) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321331885 , 0321331885
    Language: English
    Pages: xxix, 704 p , ill. , 24 cm
    Edition: 2nd ed.
    Series Statement: The eclipse series
    Keywords: Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: EMF: Eclipse Modeling Framework Dave Steinberg Frank Budinsky Marcelo Paternostro Ed Merks Series Editors: Erich Gamma • Lee Nackman • John Wiegand The Authoritative Guide to EMF Modeling and Code Generation The Eclipse Modeling Framework enables developers to rapidly construct robust applications based on surprisingly simple models. Now, in this thoroughly revised Second Edition, the project's developers offer expert guidance, insight, and examples for solving real-world problems with EMF, accelerating development processes, and improving software quality. This edition contains more than 40% new material, plus updates throughout to make it even more useful and practical. The authors illuminate the key concepts and techniques of EMF modeling, analyze EMF's most important framework classes and generator patterns, guide you through choosing optimal designs, and introduce powerful framework customizations and programming techniques. Coverage includes • Defining models with Java, UML, XML Schema, and Ecore • NEW: Using extended Ecore modeling to fully unify XML with UML and Java • Generating high-quality code to implement models and editors • Understanding and customizing generated code • Complete documentation of model Javadoc tags, generator model properties, and resource save and load options • NEW: Leveraging the latest EMF features, including extended metadata, feature maps, EStore, cross-reference adapters, copiers, and content types • NEW: Chapters on change recording, validation, and utilizing EMF in stand-alone and Eclipse RCP applications • NEW: Modeling generics with Ecore and generating Java 5 code About the Authors Dave Steinberg is a software developer in IBM Software Group. He has worked with Eclipse and modeling technologies since joining the company, and has been a committer on the EMF project since its debut in 2002. Frank Budinsky, a senior architect in IBM Software Group, is an original coinventor of EMF and a founding member of the EMF project at Eclipse. He is currently cochair of the Service Data Objects (SDO) specification technical committee at OASIS and lead SDO architect for IBM. Marcelo Paternostro is a software architect and engineer in IBM Software Group. He is an EMF committer and has been an active contributor to several other Eclipse projects. Before joining IBM, Marcelo managed, designed, and implemented numerous projects using Ration...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780137150021 , 0137150024
    Language: English
    Pages: xxi, 346 p , 24 cm
    Edition: 2nd ed.
    Series Statement: Java series
    Parallel Title: Erscheint auch als
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: Are you looking for a deeper understanding of the Java™ programming language so that you can write code that is clearer, more correct, more robust, and more reusable? Look no further! Effective Java™, Second Edition, brings together seventy-eight indispensable programmer's rules of thumb: working, best-practice solutions for the programming challenges you encounter every day. This highly anticipated new edition of the classic, Jolt Award-winning work has been thoroughly updated to cover Java SE 5 and Java SE 6 features introduced since the first edition. Bloch explores new design patterns and language idioms, showing you how to make the most of features ranging from generics to enums, annotations to autoboxing. Each chapter in the book consists of several "items" presented in the form of a short, standalone essay that provides specific advice, insight into Java platform subtleties, and outstanding code examples. The comprehensive descriptions and explanations for each item illuminate what to do, what not to do, and why. Highlights include: New coverage of generics, enums, annotations, autoboxing, the for-each loop, varargs, concurrency utilities, and much more Updated techniques and best practices on classic topics, including objects, classes, libraries, methods, and serialization How to avoid the traps and pitfalls of commonly misunderstood subtleties of the language Focus on the language and its most fundamental libraries: java.lang, java.util, and, to a lesser extent, java.util.concurrent and java.io Simply put, Effective Java™, Second Edition, presents the most practical, authoritative guidelines available for writing efficient, well-designed programs.
    Note: "Revised and updated for Java SE 6"--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online,
    ISBN: 9780321562739 , 0321562739
    Language: English
    Pages: xix, 433 p , ill. , 24 cm
    Edition: 3rd ed.
    Parallel Title: Erscheint auch als
    Keywords: Mac OS ; Cocoa (Application development environment) ; Operating systems (Computers) ; Macintosh (Computer) ; Programming ; Electronic books ; local
    Abstract: The best-selling introduction to Cocoa, once again updated to cover the latest Mac programming technologies, and still enthusiastically recommended by experienced Mac OS X developers. "Aaron's book is the gold standard for Mac OS X programming books-beautifully written, and thoughtfully sculpted. The best book on Leopard development." -Scott Stevenson, www.theocacao.com "This is the first book I'd recommend for anyone wanting to learn Cocoa from scratch. Aaron's one of the few (perhaps only) full-time professional Cocoa instructors, and his teaching experience shows in the book." -Tim Burks, software developer and creator of the Nu programming language, www.programming.nu "If you're a UNIX or Windows developer who picked up a Mac OS X machine recently in hopes of developing new apps or porting your apps to Mac users, this book should be strongly considered as one of your essential reference and training tomes." -Kevin H. Spencer, Apple Certified Technical Coordinator If you're developing applications for Mac OS X, Cocoa® Programming for Mac® OS X, Third Edition, is the book you've been waiting to get your hands on. If you're new to the Mac environment, it's probably the book you've been told to read first. Covering the bulk of what you need to know to develop full-featured applications for OS X, written in an engaging tutorial style, and thoroughly class-tested to assure clarity and accuracy, it is an invaluable resource for any Mac programmer. Specifically, Aaron Hillegass introduces the three most commonly used Mac developer tools: Xcode, Interface Builder, and Instruments. He also covers the Objective-C language and the major design patterns of Cocoa. Aaron illustrates his explanations with exemplary code, written in the idioms of the Cocoa community, to show you how Mac programs should be written. After reading this book, you will know enough to understand and utilize Apple's online documentation for your own unique needs. And you will know enough to write your own stylish code. Updated for Mac OS X 10.4 and 10.5, this revised edition includes coverage of Xcode 3, Objective-C 2, Core Data, the garbage collector, and CoreAnimation.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780131495050 , 0131495054
    Language: English
    Keywords: Software patterns ; Computer software ; Testing ; Electronic books ; local
    Abstract: Automated testing is a cornerstone of agile development. An effective testing strategy will deliver new functionality more aggressively, accelerate user feedback, and improve quality. However, for many developers, creating effective automated tests is a unique and unfamiliar challenge. xUnit Test Patterns is the definitive guide to writing automated tests using xUnit, the most popular unit testing framework in use today. Agile coach and test automation expert Gerard Meszaros describes 68 proven patterns for making tests easier to write, understand, and maintain. He then shows you how to make them more robust and repeatable--and far more cost-effective. Loaded with information, this book feels like three books in one. The first part is a detailed tutorial on test automation that covers everything from test strategy to in-depth test coding. The second part, a catalog of 18 frequently encountered "test smells," provides trouble-shooting guidelines to help you determine the root cause of problems and the most applicable patterns. The third part contains detailed descriptions of each pattern, including refactoring instructions illustrated by extensive code samples in multiple programming languages. Topics covered include Writing better tests--and writing them faster The four phases of automated tests: fixture setup, exercising the system under test, result verification, and fixture teardown Improving test coverage by isolating software from its environment using Test Stubs and Mock Objects Designing software for greater testability Using test "smells" (including code smells, behavior smells, and project smells) to spot problems and know when and how to eliminate them Refactoring tests for greater simplicity, robustness, and execution speed This book will benefit developers, managers, and testers working with any agile or conventional development process, whether doing test-driven development or writing the tests last. While the patterns and smells are especially applicable to all members of the xUnit family, they also apply to next-generation behavior-driven development frameworks such as RSpec and JBehave and to other kinds of test automation tools, including recorded test tools and data-driven test tools such as Fit and FitNesse. Visual Summary of the Pattern Language Foreword Preface Acknowledgments Introduction Refactoring a Test PART I: The Narratives Chapter 1 A Brief Tour Chapter 2 Test Smells Chapter 3 Goals of Test Automation Chapter 4 Phi...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 0321439104 , 9780321439109
    Language: English
    Keywords: Computer software ; Development ; Computer software ; Development ; Estimates ; Electronic books ; local
    Abstract: "A clearly written book that is a useful primer for a very complicated set of topics." --Capers Jones, Chief Scientist Emeritus, Software Productivity Research LLC Practical Software Estimation brings together today's most valuable tips, techniques, and best practices for accurately estimating software project efforts, costs, and schedules. Written by a leading expert in the field, it addresses the full spectrum of real-world challenges faced by those who must develop reliable estimates. M. A. Parthasarathy draws on the immense experience of Infosys, one of the world's largest and most respected providers of IT-enabled business solutions, to bring you the only book with detailed guidance on estimating insourced and outsourced software projects, as well as projects that blend both approaches. He demonstrates how to successfully utilize Function Point (FP) methods, the industry's leading estimation model. Then, using real case studies, he systematically identifies pitfalls that can lead to inaccurate estimates--and offers proven solutions. Coverage includes How to estimate all types of software projects, including "fresh" development, reengineering, and maintenance How to incorporate the impact of core project elements on estimates: scope, environment, experience, and tools FP analysis from start to finish: data and transaction functions, general system characteristics, and more FP methods for any platform or business function Innovative re-estimation methods to track progress How to quote RFPs and prepare contracts: fixed price, time/material, and project execution lifecycle models Alternatives to FP: Delphi, COCOMO II, and COSMIC-FFP How to choose the right estimation tools Practical Software Estimation is the definitive reference for anyone who must estimate software projects accurately: project and IT managers, individual developers, system designers, architects, executives, consultants, and outsourcers alike. List of Figures List of Tables Foreword Preface Acknowledgments Chapter 1: Introduction Chapter 2: Role of Estimation in Software Projects Chapter 3: A Study of Function Point Analysis Chapter 4: Data Functions Chapter 5: Transactional Functions Chapter 6: General System Characteristics Chapter 7: Size, Effort, and Scheduling of Projects Chapter 8: Estimation Flavors Chapter 9: A Sense of Where You Are Chapter 10: Tips, Tricks, and Traps Chapter 11: Insourcing versus Outsourcing Chapter 12: Key Factors in Software Contracts Chapter 13:...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 0321410599 , 9780321410597
    Language: English
    Keywords: Microsoft InfoPath ; Business ; Forms ; Computer programs ; Electronic books ; local
    Abstract: "Microsoft Office InfoPath represents a revolutionary leap in XML technologies and a new paradigm for gathering business-critical information. I am delighted that Scott Roberts and Hagen Green, two distinguished members of the InfoPath product team, decided to share their experience in this book." --From the Foreword by Jean Paoli, cocreator of XML 1.0 and Microsoft Office InfoPath Microsoft Office InfoPath 2007 offers breakthrough tools for gathering, managing, and integrating business-critical information, and creating efficient forms-driven processes. Two longtime members of Microsoft's InfoPath product team have written the first comprehensive, hands-on guide to building successful XML-based solutions with InfoPath 2007. The book opens with a practical primer on the fundamentals of InfoPath form template design for information workers and application developers at all levels of experience. It then moves into advanced techniques for customizing, integrating, and extending form templates--with all the code examples and detail needed by professional developers. Learn how to: Design form templates: create blank form templates, insert and customize controls, use advanced formatting, and construct and lay out views Work with data: start with XML data or schema, manually edit data sources, and understand design-time visuals Add custom business logic to forms, and integrate them with other applications Retrieve and query data from external data sources, including XML files, databases, SharePoint lists, Web services, and ADO.NET DataSets Submit and receive form data using ADO.NET Save, preview, and publish to e-mail, SharePoint, and more Build reusable components with template parts Create workflows with SharePoint and InfoPath E-Mail Forms Administer Forms Services and Web-enabled form templates Build advanced form templates using C# form code, custom controls, add-ins, and the new InfoPath 2007 managed object model Design form templates using Visual Studio Tools for Office (VSTO) Update, secure, and optimize your form templates List of Figures List of Tables Foreword Preface About the Authors PART I: Designing Forms Chapter 1: Introduction to InfoPath 2007 Chapter 2: Basics of InfoPath Form Design Chapter 3: Working with Data Chapter 4: Advanced Controls and Customization Chapter 5: Adding Logic without Code Chapter 6: Retrieving Data from External Sources Chapter 7: Extended Features of Data Connections Chapter 8: Submitting Form Data Chapter 9...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321480798 , 0321480791
    Language: English
    Keywords: RailsSpace (Electronic resource) ; Web site development ; Ruby (Computer program language) ; Online social networks ; Electronic books ; local
    Abstract: Ruby on Rails is fast displacing PHP, ASP, and J2EE as the development framework of choice for discriminating programmers, thanks to its elegant design and emphasis on practical results. RailsSpace teaches you to build large-scale projects with Rails by developing a real-world application: a social networking website like MySpace, Facebook, or Friendster. Inside, the authors walk you step by step from the creation of the site's virtually static front page, through user registration and authentication, and into a highly dynamic site, complete with user profiles, image upload, email, blogs, full-text and geographical search, and a friendship request system. In the process, you learn how Rails helps you control code complexity with the model-view-controller (MVC) architecture, abstraction layers, automated testing, and code refactoring, allowing you to scale up to a large project even with a small number of developers. This essential introduction to Rails provides A tutorial approach that allows you to experience Rails as it is actually used A solid foundation for creating any login-based website in Rails Coverage of newer and more advanced Rails features, such as form generators, REST, and Ajax (including RJS) A thorough and integrated introduction to automated testing The book's companion website provides the application source code, a blog with follow-up articles, narrated screencasts, and a working version of the RailSpace social network.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321418500 , 0321418506
    Language: English
    Keywords: Microsoft Visual studio ; Computer software ; Development ; eXtreme programming ; Electronic books ; local
    Abstract: Make the Most of Visual Studio Team System in Real-World Agile Development Visual Studio Team System (VSTS) gives Microsoft development teams a powerful, integrated toolset for Agile development. Visual Studio Team System: Better Software Development for Agile Teams is a comprehensive, start-to-finish guide to making the most of VSTS in real-world Agile environments. Using a book-length case study, the authors show how to use VSTS to improve every aspect of software development, step by step-from project planning through design and from coding through testing and deployment. Agile consultant Will Stott and Microsoft development lead James Newkirk carefully integrate theory and practice, offering hands-on exercises, practical insights into core Extreme Programming (XP) techniques, and much more. Coverage includes Using VSTS to support the transition to Agile values and techniques Forming Agile teams and building effective process frameworks Leveraging Team Foundation Version Control to help teams manage change and share their code effectively Implementing incremental builds and integration with Team Foundation Build Making the most of VSTS tools for Test-Driven Development and refactoring Bringing agility into software modeling and using patterns to model solutions more effectively Using the FIT integrated testing framework to make sure customers are getting what they need Estimating, prioritizing, and planning Agile projects Preface Acknowledgments About the Authors Introduction: Broken Process Section 1: Apply Sharp Tools and Values Chapter 1: Introduction to Visual Studio Team System Chapter 2: Agile Values Review of Section 1: Sharp Tools and Values Section 2: Introduce Agile Development Chapter 3: Overview of Agile Development Chapter 4: Forming an Agile Team Chapter 5: Team Foundation Process Frameworks Chapter 6: Improving Your Process Framework Review of Section 2: Introduce Agile Development Section 3: Use Version Control Chapter 7: Managing Change Chapter 8: Setting Up TFS Version Control Chapter 9: Using TFVC in Your Project Chapter 10: Policing Your Project with TFVC Review of Section 3: Use Version Control Section 4: Build and Integrate Often Chapter 11: Building and Integrating Software Chapter 12: Working with Team Foundation Build Review of Section 4: Build and Integrate Often Section 5: Practice Test-Driven Development Chapter 13: Introduction to TDD Chapter 14: Developing Your First Tests Chapter 15: Learning to Refactor Chapt...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780201895513 , 020189551X
    Language: English
    Edition: 3rd ed.
    Keywords: Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: Object-Oriented Design with Applications has long been the essential reference to object-oriented technology, which, in turn, has evolved to join the mainstream of industrial-strength software development. In this third edition--the first revision in 13 years--readers can learn to apply object-oriented methods using new paradigms such as Java, the Unified Modeling Language (UML) 2.0, and .NET. The authors draw upon their rich and varied experience to offer improved methods for object development and numerous examples that tackle the complex problems faced by software engineers, including systems architecture, data acquisition, cryptoanalysis, control systems, and Web development. They illustrate essential concepts, explain the method, and show successful applications in a variety of fields. You'll also find pragmatic advice on a host of issues, including classification, implementation strategies, and cost-effective project management. New to this new edition are An introduction to the new UML 2.0, from the notation's most fundamental and advanced elements with an emphasis on key changes New domains and contexts A greatly enhanced focus on modeling--as eagerly requested by readers--with five chapters that each delve into one phase of the overall development lifecycle. Fresh approaches to reasoning about complex systems An examination of the conceptual foundation of the widely misunderstood fundamental elements of the object model, such as abstraction, encapsulation, modularity, and hierarchy How to allocate the resources of a team of developers and mange the risks associated with developing complex software systems An appendix on object-oriented programming languages This is the seminal text for anyone who wishes to use object-oriented technology to manage the complexity inherent in many kinds of systems. Sidebars Preface Acknowledgments About the Authors Section I: Concepts Chapter 1: Complexity Chapter 2: The Object Model Chapter 3: Classes and Objects Chapter 4: Classification Section II: Method Chapter 5: Notation Chapter 6: Process Chapter 7: Pragmatics Chapter 8: System Architecture: Satellite-Based Navigation Chapter 9: Control System: Traffic Management Chapter 10: Artificial Intelligence: Cryptanalysis Chapter 11: Data Acquisition: Weather Monitoring Station Chapter 12: Web Application: Vacation Tracking System Appendix A: Object-Oriented Programming Languages Appendix B: Further Reading Notes Glossary Classified Bibliography Index
    Note: Includes bibliographical references
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780132271912 , 0132271915
    Language: English
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: "Imagine trying to play defense in football without ever studying offense. You would not know when a run was coming, how to defend pass patterns, nor when to blitz. In computer systems, as in football, a defender must be able to think like an attacker. I say it in my class every semester, you don't want to be the last person to attack your own system--you should be the first. "The world is quickly going online. While I caution against online voting, it is clear that online gaming is taking the Internet by storm. In our new age where virtual items carry real dollar value, and fortunes are won and lost over items that do not really exist, the new threats to the intrepid gamer are all too real. To protect against these hazards, you must understand them, and this groundbreaking book is the only comprehensive source of information on how to exploit computer games. Every White Hat should read it. It's their only hope of staying only one step behind the bad guys." --Aviel D. Rubin, Ph.D. Professor, Computer Science Technical Director, Information Security Institute Johns Hopkins University "Everyone's talking about virtual worlds. But no one's talking about virtual-world security. Greg Hoglund and Gary McGraw are the perfect pair to show just how vulnerable these online games can be." --Cade Metz Senior Editor PC Magazine "If we're going to improve our security practices, frank discussions like the ones in this book are the only way forward. Or as the authors of this book might say, when you're facing off against Heinous Demons of Insecurity, you need experienced companions, not to mention a Vorpal Sword of Security Knowledge." --Edward W. Felten, Ph.D. Professor of Computer Science and Public Affairs Director, Center for Information Technology Policy Princeton University "Historically, games have been used by warfighters to develop new capabilities and to hone existing skills--especially in the Air Force. The authors turn this simple concept on itself, making games themselves the subject and target of the 'hacking game,' and along the way creating a masterly publication that is as meaningful to the gamer as it is to the serious security system professional. "Massively distributed systems will define the software field of play for at least the next quarter century. Understanding how they work is important, but understanding how they can be manipulated is essential for the security professional. This book provides the cornerstone for that knowledge." ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780131497351 , 0131497359
    Language: English
    Keywords: MySQL (Electronic resource) ; SQL (Computer program language) ; Electronic books ; local
    Abstract: The Most Complete and Practical Guide to MySQL Version 5's Powerful SQL Dialect MySQL version 5 offers a SQL dialect with immense power. In SQL for MySQL Developers , Rick F. van der Lans helps you master this version ofSQL and take advantage of its full potential. Using case study examplesand hands-on exercises, van der Lans illuminates every key concept,technique, and statement-including advanced features that make iteasier to create even the most complex statements and programs. Drawing on decades of experience as an SQL standards team member and enterprise consultant, he reveals exactly why MySQL's dialect works as it does-and how to get the most out of it. You'll gain powerful insight into everything from basic queries to stored procedures, transactions to data security. Whether you're a programmer, Web developer, analyst, DBA, or database user, this book can take you from "apprentice" to true SQL expert. If you've used SQL in older versions of MySQL, you'll become dramatically more effective-and if you're migrating from other database platforms, you'll gain practical mastery fast . Coverage includes Writing queries, including joins, functions, and subqueries Updating data Creating tables, views, and other database objects Specifying keys and other integrity constraints Improving efficiency with indexes Enforcing security via passwords and privileges Embedding SQL statements within PHP programs Building stored procedures and triggers Using transactions, locking, rollback, and isolation levels Utilizing MySQL's catalog All of the book's sample programs are available for download from www.r20.nl. About the Author Rick F. van der Lans is author of the classic Introduction to SQL , the definitive SQL guide that database developers have relied on for more than 20 years. He is a consultant, author, and lecturer specializing in database technology, development tools, data warehousing, and XML. As managing director of the Netherlands-based R20/Consultancy, he has advised many large companies on defining their IT architectures. He chairs the European Meta Data Conference, and writes columns for several magazines. Contents About the Author Preface PART I Introduction CHAPTER 1 Introduction to MySQL CHAPTER 2 The Tennis Club Sample Database CHAPTER 3 Installing the Software CHAPTER 4 SQL in a Nutshell PART II Querying and Updating Data CHAPTER 5 SELECT Statement: Common Elements CHAPTER 6 SELECT Statements, Table Expressions, and Subqueries CHAPTER ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 0321458192 , 9780321458193
    Language: English
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: "Companies have been implementing large agile projects for a number of years, but the 'stigma' of 'agile only works for small projects' continues to be a frequent barrier for newcomers and a rallying cry for agile critics. What has been missing from the agile literature is a solid, practical book on the specifics of developing large projects in an agile way. Dean Leffingwell's book Scaling Software Agility fills this gap admirably. It offers a practical guide to large project issues such as architecture, requirements development, multi-level release planning, and team organization. Leffingwell's book is a necessary guide for large projects and large organizations making the transition to agile development." -Jim Highsmith, director, Agile Practice, Cutter Consortium, author of Agile Project Management "There's tension between building software fast and delivering software that lasts, between being ultra-responsive to changes in the market and maintaining a degree of stability. In his latest work, Scaling Software Agility, Dean Leffingwell shows how to achieve a pragmatic balance among these forces. Leffingwell's observations of the problem, his advice on the solution, and his description of the resulting best practices come from experience: he's been there, done that, and has seen what's worked." -Grady Booch, IBM Fellow Agile development practices, while still controversial in some circles, offer undeniable benefits: faster time to market, better responsiveness to changing customer requirements, and higher quality. However, agile practices have been defined and recommended primarily to small teams. In Scaling Software Agility, Dean Leffingwell describes how agile methods can be applied to enterprise-class development. Part I provides an overview of the most common and effective agile methods. Part II describes seven best practices of agility that natively scale to the enterprise level. Part III describes an additional set of seven organizational capabilities that companies can master to achieve the full benefits of software agility on an enterprise scale. This book is invaluable to software developers, testers and QA personnel, managers and team leads, as well as to executives of software organizations whose objective is to increase the quality and productivity of the software development process but who are faced with all the challenges of developing software on an enterprise scale. Foreword Preface Acknowledgments About the Author Part ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321434838 , 0321434838
    Language: English
    Keywords: Computer security ; System design ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: "I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how to improve the security of software systems by improving hardware. Bottom line, this book should be required reading for all who plan to call themselves security practitioners, and an invaluable part of every university's computer science curriculum." --Edward Bonver, CISSP, Senior Software QA Engineer, Product Security, Symantec Corporation "Here's to a fun, exciting read: a unique book chock-full of practical examples of the uses and the misuses of computer security. I expect that it will motivate a good number of college students to want to learn more about the field, at the same time that it will satisfy the more experienced professional." --L. Felipe Perrone, Department of Computer Science, Bucknell University Whether you're a security practitioner, developer, manager, or administrator, this book will give you the deep understanding necessary to meet today's security challenges--and anticipate tomorrow's. Unlike most books, The Craft of System Security doesn't just review the modern security practitioner's toolkit: It explains why each tool exists, and discusses how to use it to solve real problems. After quickly reviewing the history of computer security, the authors move on to discuss the modern landscape, showing how security challenges and responses have evolved, and offering a coherent framework for understanding today's systems and vulnerabilities. Next, they systematically introduce the basic building blocks for securing contemporary systems, apply those building blocks to today's applications, and consider important emerging trends such as hardware-based security. After reading this book, you will be able to Understand the classic Orange Book approach to security, and its limitations Use operating system security tools and structures--with examples from Windows, Linux, BSD, and Solaris Learn how networking, the Web, and wireless technologies affect security Identify software security defects, from buffer overflows to development process flaws Understand cryptographic primitives and their use in secure systems Use best practice techniques for authenticating people and computer systems in diverse settings Use validation, standards, and testing to enhance confidence in a s...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321398208 , 0321398203
    Language: English
    Keywords: Microsoft Visual studio ; Computer software ; Development ; Electronic books ; local
    Abstract: Domain-Specific Languages (DSLs)--languages geared to specific vertical or horizontal areas of interest--are generating growing excitement from software engineers and architects. DSLs bring new agility to the creation and evolution of software, allowing selected design aspects to be expressed in terms much closer to the system requirements than standard program code, significantly reducing development costs in large-scale projects and product lines. In this breakthrough book, four leading experts reveal exactly how DSLs work, and how you can make the most of them in your environment. With Domain-Specific Development with Visual Studio DSL Tools , you'll begin by mastering DSL concepts and techniques that apply to all platforms. Next, you'll discover how to create and use DSLs with the powerful new Microsoft DSL Tools--a toolset designed by this book's authors. Learn how the DSL Tools integrate into Visual Studio--and how to define DSLs and generate Visual Designers using Visual Studio's built-in modeling technology. In-depth coverage includes Determining whether DSLs will work for you Comparing DSLs with other approaches to model-driven development Defining, tuning, and evolving DSLs: models, presentation, creation, updates, serialization, constraints, validation, and more Creating Visual Designers for new DSLs with little or no coding Multiplying productivity by generating application code from your models with easy-to-use text templates Automatically generating configuration files, resources, and other artifacts Deploying Visual Designers across the organization, quickly and easily Customizing Visual Designers for specialized process needs List of Figures List of Tables Foreword Preface About the Authors Chapter 1 Domain-Specific Development Chapter 2 Creating and Using DSLs Chapter 3 Domain Model Definition Chapter 4 Presentation Chapter 5 Creation, Deletion, and Update Behavior Chapter 6 Serialization Chapter 7 Constraints and Validation Chapter 8 Generating Artifacts Chapter 9 Deploying a DSL Chapter 10 Advanced DSL Customization Chapter 11 Designing a DSL Index
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321336323 , 0321336321
    Language: English
    Keywords: Computer security ; Electronic books ; local
    Abstract: Praise for Virtual Honeypots "A power-packed resource of technical, insightful information that unveils the world of honeypots in front of the reader's eyes." -Lenny Zeltser, Information Security Practice Leader at Gemini Systems "This is one of the must-read security books of the year." -Cyrus Peikari, CEO, Airscanner Mobile Security, author, security warrior "This book clearly ranks as one of the most authoritative in the field of honeypots. It is comprehensive and well written. The authors provide us with an insider's look at virtual honeypots and even help us in setting up and understanding an otherwise very complex technology." -Stefan Kelm, Secorvo Security Consulting "Virtual Honeypots is the best reference for honeypots today. Security experts Niels Provos and Thorsten Holz cover a large breadth of cutting-edge topics, from low-interaction honeypots to botnets and malware. If you want to learn about the latest types of honeypots, how they work, and what they can do for you, this is the resource you need." -Lance Spitzner, Founder, Honeynet Project "Whether gathering intelligence for research and defense, quarantining malware outbreaks within the enterprise, or tending hacker ant farms at home for fun, you'll find many practical techniques in the black art of deception detailed in this book. Honeypot magic revealed!" -Doug Song, Chief Security Architect, Arbor Networks "Seeking the safest paths through the unknown sunny islands called honeypots? Trying to avoid greedy pirates catching treasures deeper and deeper beyond your ports? With this book, any reader will definitely get the right map to handle current cyber-threats. Designed by two famous white hats, Niels Provos and Thorsten Holz, it carefully teaches everything from the concepts to practical real-life examples with virtual honeypots. The main strength of this book relies in how it covers so many uses of honeypots: improving intrusion detection systems, slowing down and following incoming attackers, catching and analyzing 0-days or malwares or botnets, and so on. Sailing the high seas of our cyber-society or surfing the Net, from students to experts, it's a must-read for people really aware of computer security, who would like to fight against black-hats flags with advanced modern tools like honeypots." -Laurent Oudot, Computer Security Expert, CEA "Provos and Holz have written the book that the bad guys don't want you to read. This detailed and comprehensive look at honeypots p...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 0321396855 , 9780321396853
    Language: English
    Keywords: Web site development ; Java (Computer program language) ; Internet programming ; Electronic books ; local
    Abstract: Discover WTP, the New End-to-End Toolset for Java-Based Web Development The Eclipse Web Tools Platform (WTP) seamlessly integrates all the tools today's Java Web developer needs. WTP is both an unprecedented Open Source resource for working developers and a powerful foundation for state-of-the-art commercial products. Eclipse Web Tools Platform offers in-depth descriptions of every tool included in WTP, introducing powerful capabilities never before available in Eclipse. The authors cover the entire Web development process-from defining Web application architectures and development processes through testing and beyond. And if you're seeking to extend WTP, this book provides an introduction to the platform's rich APIs. The book also Presents step-by-step coverage of developing persistence, business logic, and presentation tiers with WTP and Java Introduces best practices for multiple styles of Web and Java EE development Demonstrates JDBC database access and configuration Shows how to configure application servers for use with WTP Walks through creating Web service application interfaces Covers automated testing with JUnit and Cactus, and automated builds utilizing Ant, Maven, and CruiseControl Introduces testing and profiling Web applications with the Eclipse Test and Performance Tools Platform (TPTP) project Describes how to extend WTP with new servers, file types, and WSDL extensions Foreword Preface Acknowledgments About the Authors Part I: Getting Started Chapter 1: Introduction Chapter 2: About the Eclipse Web Tools Platform Project Chapter 3: Quick Tour Chapter 4: Setting Up Your Workspace Part II: Java Web Application Development Chapter 5: Web Application Architecture and Design Chapter 6: Organizing Your Development Project Chapter 7: The Presentation Tier Chapter 8: The Business Logic Tier Chapter 9: The Persistence Tier Chapter 10: Web Services Chapter 11: Testing Part III: Extending WTP Chapter 12: Adding New Servers Chapter 13: Supporting New File Types Chapter 14: Creating WSDL Extensions Chapter 15: Customizing Resource Resolution Part IV: Products and Plans Chapter 16: Other Web Tools Based on Eclipse Chapter 17: The Road Ahead Glossary References Index This book is an invaluable resource for every Eclipse and enterprise Java Web developer: both those who use Eclipse to build other Web applications, and those who build Eclipse technologies into their own products. Complete source code examples are available at www.eclipsewt...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321508911 , 0321508912
    Language: English
    Keywords: Computer architecture ; Computer network architectures ; Business enterprises ; Computer networks ; Management ; Electronic books ; local
    Abstract: "Like so many acronyms in public currency, SOA means many different things to different people. Paul Brown deftly avoids getting caught in the trap of overstating the case for SOA. Instead, he brings the topic skillfully into focus, zeroing in on the concepts that must be understood in order to be effective. Paul's purpose, as I've found so often in his presentations and conversations, is to get to the core of real-world architectural issues that make the difference between success and failure. Paul doesn't sit in an ivory tower pontificating; he gets right down to the critical issues in order to develop effective real-life strategies." --From the Foreword by Jonathan Mack, Senior Technical Architect, Guardian Life Insurance Company "As Paul Brown explains in this fine book, there is more to software development than just writing code. Successful software requires deep thought and strategy. It requires the coordination and marshalling of the resources and intellect of the entire company, both business and IT. I learned much from reading his manuscript and heartily endorse the finished book." --Dr. Michael Blaha, author and industrial consultant "Paul Brown has provided a practical and actionable guide that will illuminate the way for Business and IT Leaders involved in IT strategy, planning, architecture, and project management. A successful adoption of SOA will touch every aspect of the business and change the way IT does business. This book does a good job of describing the organizational challenges and risks and providing suggestions to manage them. It also dives deeply into the architectural techniques that can be employed in order to align the service architecture with the business, thus providing maximum benefit and continued funding for your SOA transformation." --Maja Tibbling, Lead Enterprise Architect, Con-way Enterprise Services " Succeeding with SOA achieves where most books on service-oriented architectures fail. It accurately describes what practitioners are seeing, as well as why, and gives them practical examples through case studies and instruction. Most useful both for those about to take the plunge and those who are already soaking." --Charly Paelinck, Vice President, Development and Architecture, Harrah's Entertainment "This book is a must-read for architects and SOA practitioners. It provides an important foundation for a SOA strategy. Brown emphasizes the importance of aligning services with their business processes, buil...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321444431 , 0321444434
    Language: English
    Edition: 2nd ed.
    Keywords: SQL (Computer program language) ; Database searching ; Electronic books ; local
    Abstract: Unless you are working at a very advanced level, this is the only SQL book you will ever need. The authors have taken the mystery out of complex queries and explained principles and techniques with such clarity that a "Mere Mortal" will indeed be empowered to perform the superhuman. Do not walk past this book! --Graham Mandeno, Database Consultant SQL Queries for Mere Mortals provides a step-by-step, easy-to-read introduction to writing SQL queries. It includes hundreds of examples with detailed explanations. This book provides the tools you need to understand, modify, and create SQL queries --Keith W. Hare, Convenor, ISO/IEC JTC1 SC32 WG3--the International SQL Standards Committee I learned SQL primarily from the first edition of this book, and I am pleased to see a second edition of this book so that others can continue to benefit from its organized presentation of the language. Starting from how to design your tables so that SQL can be effective (a common problem for database beginners), and then continuing through the various aspects of SQL construction and capabilities, the reader can become a moderate expert upon completing the book and its samples. Learning how to convert a question in English into a meaningful SQL statement will greatly facilitate your mastery of the language. Numerous examples from real life will help you visualize how to use SQL to answer the questions about the data in your database. Just one of the "watch out for this trap" items will save you more than the cost of the book when you avoid that problem when writing your queries. I highly recommend this book if you want to tap the full potential of your database. --Kenneth D. Snell, Ph.D., Database Designer/Programmer I don't think they do this in public schools any more, and it is a shame, but do you remember in the seventh and eighth grades when you learned to diagram a sentence? Those of you who do may no longer remember how you did it, but all of you do write better sentences because of it. John Viescas and Mike Hernandez must have remembered because they take everyday English queries and literally translate them into SQL. This is an important book for all database designers. It takes the complexity of mathematical Set Theory and of First Order Predicate Logic, as outlined in E. F. Codd's original treatise on relational database design, and makes it easy for anyone to understand. If you want an elementary- through intermediate-level course on SQL, this is the one...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321424778 , 0321424778
    Language: English
    Keywords: Computer security ; Debugging in computer science ; Computer software ; Quality control ; Electronic books ; local
    Abstract: The First Expert Guide to Static Analysis for Software Security! Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with a fine-toothed comb and uncover the kinds of errors that lead directly to security vulnerabilities. Now, there's a complete guide to static analysis: how it works, how to integrate it into the software development processes, and how to make the most of it during security code review. Static analysis experts Brian Chess and Jacob West look at the most common types of security defects that occur today. They illustrate main points using Java and C code examples taken from real-world security incidents, showing how coding errors are exploited, how they could have been prevented, and how static analysis can rapidly uncover similar mistakes. This book is for everyone concerned with building more secure software: developers, security engineers, analysts, and testers. Coverage includes: Why conventional bug-catching often misses security problems How static analysis can help programmers get security right The critical attributes and algorithms that make or break a static analysis tool 36 techniques for making static analysis more effective on your code More than 70 types of serious security vulnerabilities, with specific solutions Example vulnerabilities from Firefox, OpenSSH, MySpace, eTrade, Apache httpd, and many more Techniques for handling untrusted input Eliminating buffer overflows: tactical and strategic approaches Avoiding errors specific to Web applications, Web services, and Ajax Security-aware logging, debugging, and error/exception handling Creating, maintaining, and sharing secrets and confidential information Detailed tutorials that walk you through the static analysis process "We designed Java so that it could be analyzed statically. This book shows you how to apply advanced static analysis techniques to create more secure, more reliable software." - Bill Joy, Co-founder of Sun Microsystems, co-inventor of the Java programming language "'Secure Programming with Static Analysis' is a great primer on static analysis for security-minded developers and security practitioners. Well-written, easy to read, tells you what you need to know." - David Wagner, Associate Professor, University of California Berkeley "Software develope...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321336385 , 0321336380
    Language: English
    Keywords: Computer software ; Quality control ; Computer software ; Testing ; Computer software ; Reliability ; Electronic books ; local
    Abstract: For any software developer who has spent days in "integration hell," cobbling together myriad software components, Continuous Integration: Improving Software Quality and Reducing Risk illustrates how to transform integration from a necessary evil into an everyday part of the development process. The key, as the authors show, is to integrate regularly and often using continuous integration (CI) practices and techniques. The authors first examine the concept of CI and its practices from the ground up and then move on to explore other effective processes performed by CI systems, such as database integration, testing, inspection, deployment, and feedback. Through more than forty CI-related practices using application examples in different languages, readers learn that CI leads to more rapid software development, produces deployable software at every step in the development lifecycle, and reduces the time between defect introduction and detection, saving time and lowering costs. With successful implementation of CI, developers reduce risks and repetitive manual processes, and teams receive better project visibility. The book covers How to make integration a "non-event" on your software development projects How to reduce the amount of repetitive processes you perform when building your software Practices and techniques for using CI effectively with your teams Reducing the risks of late defect discovery, low-quality software, lack of visibility, and lack of deployable software Assessments of different CI servers and related tools on the market The book's companion Web site, www.integratebutton.com, provides updates and code examples.
    Note: "A Martin Fowler signature book"--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 0321320492 , 9780321320490
    Language: English
    Keywords: Microsoft Visual BASIC ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: " Doing Objects in Visual Basic 2005 is one of the few books that I've seen that lays the proper object-oriented foundation to make new Visual Basic.NET developers as well as VB6 veterans successful in moving to the .NET Framework." -Paul Ballard, President, Rochester Consulting Partnership, Inc. "Deborah Kurata's Doing Objects in Visual Basic 2005 is salvation for every programmer beached on the forbidding isle of .NET object-oriented programming. 'Right this way,' she says, leading you confidently into that vaguely menacing interior. Step follows step. Suddenly the daunting and unfamiliar become doable and commonplace. You're productive again. My goodness, you're actually enjoying yourself!" -Ward Bell, V.P., Product Management, IdeaBlade, Inc. "When is comes to advice on programming objects in Visual Basic, nobody could be better qualified than Deborah Kurata. She's been doing Doing Objects since VB4, and she doesn't let us down as we move our classic VB code to the Microsoft.NET platform. From initial analysis and design, through to the final implementation, you'll find everything you need here to take on the Visual Basic 2005 development environment. This book is a must have for every VB.NET developer!" -Kel Good, MCT, MCITP, MCPD, Custom Software Development Inc., (www.customsoftware.ca) "I've long been frustrated that I couldn't recommend a book on object-oriented fundamentals in .NET. Sure, there were plenty of books on OO syntax. But what good is explanation of syntax if you don't already understand the concepts? At last, we have the successor to the Doing Objects series for classic VB, from which so many of us learned how to think about objects and object design, completely rewritten for .NET. If you're a VB 2005 developer who needs to add object orientation to your skill set, this is the book you need." -Billy Hollis, author/consultant, Next Version Systems "Deborah Kurata does her Doing Objects thing again! This is the newest book from Deborah which has been completely rewritten from the ground up for the Visual Basic .Net 2005 developer. Anyone needing a solid foundation in object technology, Visual Basic .Net 2005, and Visual Studio .Net 2005 should read this book. Deborah's presentation of core topics such as class design, object state management, exception handling, events, data binding, validation, data access techniques, and many others is clear, concise, and direct. The clarity of the content, coupled with the hands-on examp...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780132413930 , 0132413930
    Language: English
    Keywords: Object-oriented programming (Computer science) ; Java (Computer program language) ; Electronic books ; local
    Abstract: Filthy Rich Clients refers to ultra-graphically rich applications that ooze cool. They suck the user in from the outset and hang on to them with a death grip of excitement. Filthy Rich Clients: Developing Animated and Graphical Effects for Desktop Java™ Applications shows you how to build better, more effective, cooler desktop applications that intensify the user experience. The keys to Filthy Rich Clients are graphical and animated effects. These kinds of effects provide ways of enhancing the user experience of the application through more attractive GUIs, dynamic effects that give your application a pulse, and animated transitions that keep your user connected to the logical flow of the application. The book also discusses how to do so effectively, making sure to enrich applications in sensible ways. In-depth coverage includes Graphics and GUI fundamentals: Dig deep into the internals of how Swing and Java 2D work together to display GUI applications onscreen. Learn how to maximize the flexibility of these libraries and use them most effectively. Performance: Follow in-depth discussions and tips throughout the book that will help you write high-performing GUI applications. Images: Understand how images are created and used to make better Java applications. Advanced graphics: Learn more about elements of Swing and Java 2D that are of particular benefit to Filthy Rich Clients. Animation: Discover general concepts of animation, as well as how to use the facilities provided in the Java platform. Learn new utility libraries that vastly simplify animations in Java. Effects: Learn how to create, customize, and use static and animated effects-the mainstays of Filthy Rich Clients. Code examples illustrate key concepts, and the book's companion Web site, http://filthyrichclients.org, includes extensive demos, utility libraries, additional information on related technologies, and more. Informal, fun, and, most of all, useful, this book is great for any developer working with Java to build desktop applications.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321436955 , 0321436954
    Language: English
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: A Comprehensive, Proven Approach to Securing All Your Network Endpoints! Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today's newest threats, and prepare yourself for tomorrow's attacks. As part of his end-to-end strategy, he shows how to utilize technical innovations ranging from network admission control to "trusted computing." Unlike traditional "one-size-fits-all" solutions, Kadrich's approach reflects the unique features of every endpoint, from its applications to its environment. Kadrich presents specific, customized strategies for Windows PCs, notebooks, Unix/Linux workstations, Macs, PDAs, smartphones, cellphones, embedded devices, and more. You'll learn how to: • Recognize dangerous limitations in conventional endpoint security strategies • Identify the best products, tools, and processes to secure your specific devices and infrastructure • Configure new endpoints securely and reconfigure existing endpoints to optimize security • Rapidly identify and remediate compromised endpoint devices • Systematically defend against new endpoint-focused malware and viruses • Improve security at the point of integration between endpoints and your network Whether you're a security engineer, consultant, administrator, architect, manager, or CSO, this book delivers what you've been searching for: a comprehensive endpoint security strategy that works. Mark Kadrich is President and CEO of The Security Consortium, which performs in-depth testing and evaluation of security products and vendors. As Senior Scientist for Sygate Technologies, he was responsible for developing corporate policies, understanding security trends, managing government certification programs, and evangelization. After Symantec acquired Sygate, Kadrich became Symantec's Senior Manager of Network and Endpoint Security. His 20 years' IT security experience encompasses systems level design, policy generation, endpoint security, risk management, and other key issues. Foreword Preface About the Author Chapter 1 Defini...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321437341 , 0321437349
    Language: English
    Keywords: Internet telephony ; Security measures ; Electronic books ; local
    Abstract: In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users. 1 Introduction 2 VoIP Architectures and Protocols 3 Threats and Attacks 4 VoIP Vulnerabilites 5 Signaling Protection Mechanisms 6 Media Protection Mechanisms 7 Key Management Mechanisms 8 VoIP and Network Security Controls 9 A Security Framework for Enterprise VoIP Networks 10 Provider Architectures and Security 11 Enterprise Architectures and Security
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321498823 , 0321498828
    Language: English
    Edition: 4th ed.
    Keywords: OpenGL ; Computer graphics ; Electronic books ; local
    Abstract: OpenGL ® SuperBible, Fourth Edition , begins by illuminating the core techniques of "classic" OpenGL graphics programming, from drawing in space to geometric transformations, from lighting to texture mapping. The authors cover newer OpenGL capabilities, including OpenGL 2.1's powerful programmable pipeline, vertex and fragment shaders, and advanced buffers. They also present thorough, up-to-date introductions to OpenGL implementations on multiple platforms, including Windows, Mac OS X, GNU/Linux, UNIX, and embedded systems. Coverage includes · An entirely new chapter on OpenGL ES programming for handhelds · Completely rewritten chapters on OpenGL for Mac OS X and GNU/Linux · Up-to-the-minute coverage of OpenGL on Windows Vista · New material on floating-point color buffers and off-screen rendering · In-depth introductions to 3D modeling and object composition · Expert techniques for utilizing OpenGL's programmable shading language · Thorough coverage of curves, surfaces, interactive graphics, textures, shadows, and much more · A fully updated API reference, and an all-new section of full-color images You'll rely on this book constantly-whether you're learning OpenGL for the first time, deepening your graphics programming expertise, upgrading from older versions of OpenGL, or porting applications from other environments. Now part of the OpenGL Technical Library-The official knowledge resource for OpenGL developers The OpenGL Technical Library provides tutorial and reference books for OpenGL. The Library enables programmers to gain a practical understanding of OpenGL and shows them how to unlock its full potential. Originally developed by SGI, the Library continues to evolve under the auspices of the OpenGL Architecture Review Board (ARB) Steering Group (now part of the Khronos Group), an industry consortium responsible for guiding the evolution of OpenGL and related technologies. Contents Preface xxvii About the Authors xxxv Introduction 1 Part I: The Old Testament Chapter 1 Introduction to 3D Graphics and OpenGL 9 Chapter 2 Using OpenGL 33 Chapter 3 Drawing in Space: Geometric Primitives and Buffers 73 Chapter 4 Geometric Transformations: The Pipeline 127 Chapter 5 Color, Materials, and Lighting: The Basics 173 Chapter 6 More on Colors and Materials 229 Chapter 7 Imaging with OpenGL 251 Chapter 8 Texture Mapping: The Basics 303 Chapter 9 ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Addison-Wesley | Boston, Mass. :Safari Books Online
    ISBN: 9780321477170 , 0321477170
    Language: English
    Keywords: Capability maturity model (Computer software) ; Software engineering ; Contracting out ; Electronic books ; local
    Abstract: "By following the guidance contained in [the CMMI-ACQ and this book], you'll be able to build an organic acquisition capability that will position your organization to successfully set the scope of engagements with suppliers, keep suppliers and in-house users focused on a common picture of success, and deliver capabilities that will position your organization as a leader in your market or mission for years to come." --From the Foreword by Brian Gallagher Director, Acquisition Program, Software Engineering Institute Increasingly, both commercial and government organizations are acquiring key software, systems, and IT functions instead of building them. Yet all too often, the technology solutions they purchase cannot be sustained successfully. Now there is a comprehensive solution: the CMMI for Acquisition (CMMI-ACQ) model, which connects the widely adopted CMMI 1.2 framework with established industry best practices for acquisition and outsourcing. This book is a practical introduction to the initial CMMI-ACQ and its use in all phases of technology acquisition. Developed under the leadership of the Software Engineering Institute (SEI) and General Motors (GM), the CMMI-ACQ combines CMMI's successful process discipline with techniques proven to work in GM's own extensive outsourcing program. Reflecting the unique insights of key players in the development and early implementation of the CMMI-ACQ, the book covers the entire acquisition project lifecycle, presenting real-world stories as they might occur in your own organizations, insider experiences, tips, tricks, and pitfalls to avoid. The topics discussed here include: determining when outsourcing is and is not appropriate; developing acquisition strategies and aligning organizational structure with them; capturing accurate requirements; specifying realistic design constraints; writing effective RFPs; selecting, managing, and collaborating with suppliers; negotiating contracts; managing risk; and "measuring for success." CMMI for Outsourcing ® will be valuable to any organization that wants to achieve better results from technology acquisition. It will be especially helpful to organizations already involved with CMMI-related process improvement and to companies that partner with them. Foreword Preface Chapter 1: Introduction to the CMMI-ACQ Chapter 2: Getting Started Chapter 3: Engineering Solutions Chapter 4: Delivering Solutions Chapter 5: Accelerating Acquisition Improvement Appendix: Overview...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...