Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari Tech Books Online  (269)
  • Boston : Addison-Wesley  (175)
  • Upper Saddle River, NJ : Prentice Hall PTR  (69)
  • Berkeley, CA : Peachpit Press  (25)
Datasource
Material
Language
Years
  • 1
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxx, 972 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: Written for C# 2.0 and .NET 2.0: contains coverage of generics, Master Pages, the DataGridView, and other new features Covers Web development, Windows development, data management, security, threading, remoting, and much more Presents hundreds of non-trivial code examples that help you solve real-world problems The Complete and Comprehensive Developer's Guide to C# 2.0 and .NET 2.0 Core C# and .NET is the no-nonsense, example-rich guide to achieving exceptional results with C# 2.0 and .NET 2.0. Writing for experienced programmers, Stephen Perry presents today's best practices for leveraging both C# 2.0 language features and Microsoft's .NET 2.0 infrastructure. Like all books in the Core Series, Core C# and .NET focuses on solving real-world problems with serious, non-trivial code. Perry's broad, deep coverage ranges from new C# generics to Web services, from reflection to security. He systematically introduces the development of Windows Forms applications and the effective use of GDI+ graphics classes. He offers detailed guidance on data management with XML and ADO.NET, plus advanced coverage of threading, remoting, and code security. Finally, Perry presents an extensive section on Web development, covering ASP.NET, state management, HTTP requests, and much more. With practical insights into everything from scalability to localization, this is the C# book you've been searching for: your definitive guide to building production-quality C# applications. Core C# and .NET delivers Best practices for building C#/.NET Windows applications, Web applications, and Web services Expert insight into security, scalability, and other crucial issues Hundreds of professional-quality code examples In-depth coverage of the latest C# 2.0 features, including generics EVERY CORE SERIES BOOK: DEMONSTRATES practical techniques used by professional developers FEATURES robust, thoroughly tested sample code and realistic examples FOCUSES on the cutting-edge technologies you need to master today PROVIDES expert advice that will help you build superior software © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: 156 p. , col. ill. ; , 23 cm
    DDC: 745.59402856686
    Keywords: Adobe Photoshop elements ; Handicraft ; Image processing ; Digital techniques ; Electronic books ; local
    Abstract: "Elizabeth Bulger has taken Photoshop Elements to a whole new level with this unique book of projects. She shows you how to use Photoshop Elements to create all sorts of cool things: holiday gifts, book covers, coasters, postcards, and a zillion other nifty 'I didn't know you could do that!' crafts."- Scott Kelby , President, National Association of Photoshop Professionals Millions of people own digital cameras, yet most of us just store our digital photos on a hard drive or email them to friends. But what if you want to get a little more creative with your images? Armed with little more than a copy of Photoshop Elements, a computer, an inkjet printer, and a handful of basic tools, you can transform your digital photos into beautiful, custom-made crafts. Written by designer and Photoshop guru Elizabeth Bulger , The Adobe Photoshop Elements Crafts Book will motivate you to get creative with your own images while learning basic Photoshop Elements skills along the way. Each project begins with a list of the tools and materials you'll need to get started. From there, full-color photographs, clear instructions, and numbered steps walk you through every step of the project. You'll learn how to create unique crafts out of a variety of materials, including paper, ceramic, metal, glass, fabric, and polymer clay. Whether you're a longtime D.I.Y. devotee or completely new to crafting, this book will show you everything you need to create attractive, unique keepsakes for you or your family and friends to cherish. Elizabeth Bulger shows you how to Get your photos ready for projects: Learn how to import, edit, crop, and apply quick fixes to your images Create custom brushes in Photoshop Elements and make unique gift-wrapping paper with your own images Customize a notebook by creating a new cover with decorative borders, text, and your own photos Use custom shape and type tools to create unique ceramic tiles Learn how to transfer your images to fabric to create custom throw pillows, aprons, and more Design and create your own canning labels, CD covers, beverage coasters, and gift boxes.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xix, 213 p. , ill. ; , 25 cm
    Series Statement: Prentice Hall communications engineering and emerging technologies series
    Keywords: Broadband communication systems ; Ultra-wideband devices ; Wireless communication systems ; Electronic books ; local
    Abstract: The Easy-to-Understand, Up-to-the-Minute Guide to UWB Technologies, Applications, and Markets Ultra-wideband's exceptional capacity and power characteristics make it one of this generation's most exciting technologies. From wireless communications to entertainment, and from the automotive industry to homeland security, UWB is poised to revolutionize an extraordinary array of applications. Now, one of the field's leading experts presents the most accessible and up-to-date UWB guidebook ever written. Dr. Faranak Nekoogar explains UWB principles and technologies simply and clearly, addressing key issues such as pulse generation, modulation, multiple access techniques, and interference. In addition, she presents a complete market analysis--identifying the most promising applications, initial and future markets, and regulatory trends. Ultra-Wideband Communications: Fundamentals and Applications will be indispensable for everyone interested in UWB technology, regardless of their radio frequency experience: engineers, managers, marketers, analysts, purchasing agents, business strategists, journalists, and students alike. Inside you will find An introduction to UWB: history, background, advantages, and challenges How UWB compares to narrowband and spread-spectrum wideband systems Fundamentals of UWB short-pulse generation and propagation Competing single-band and multiband approaches UWB antenna concepts and their implications for systems and networks Popular modulation/demodulation schemes and multiple-access techniques Coexistence with today's WLAN, GPS, and cellular phone systems Current and evolving FCC and worldwide regulation of UWB technology In-depth coverage of UWB applications and markets, with adoption timelines and forecasts through 2010 A comprehensive, easy-to-understand glossary and extensive references for further reading
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xxii, 888 p. , ill. ; , 24 cm. +
    DDC: 778.5'93'0285536
    Keywords: Final cut (Electronic resource) ; Digital video ; Editing ; Data processing ; Video tapes ; Editing ; Data processing ; Electronic books ; local
    Abstract: If it's good enough for the legendary Hollywood film editors, it's good enough for you! This guide is aimed squarely at Final Cut Pro users just like yourself--at corporate, commercial, and independent post-production houses--who want to move beyond simple Final Cut Pro installations for their film and video masterworks. Through project-based lessons and step-by-step instructions, this self-paced guide shows you how to integrate high-end capture cards, storage systems, and other industry-standard hardware into a Final Cut Pro workflow, as well as how to install and configure Final Cut Pro to make the most of your professional non-linear editing system. This is the technical information most frequently requested by Final Cut Pro users, pulled together into one book that is both a self-paced learning tool and the official curriculum for the Apple Pro Training and Certification Program. The guide covers everything from system configuration, storage, and device connectivity to the intricacies of SAN solutions, and includes special sections on optimizing short-form/broadcast workflows and long-form/HD workflows. It offers troubleshooting advice at every turn: for dropped frames, mismatched audio and audio distortion; imported graphic file issues, media management, file recovery and archiving strategies, and much more. DVD with lesson files and media included.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xix, 530 p. , ill. ; , 23 cm
    Edition: [2nd ed.].
    DDC: 005.432
    Keywords: Mac OS ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: As Unix spreads its tentacles across users' desktops, more and more Mac users are starting to pop the hood and learn about the operating system that's at the root of it all. And there's no better way to conquer that fear than by consulting this Visual QuickPro Guide. Matisse Enzer , who wrote the first edition of this book, Unix for Mac OS X: Visual QuickPro Guide has completely updated this guide to reflect all that's new in Tiger's version of Unix. Readers will learn everything they need to know to make sense of the commands and technical jargon surrounding Unix. In the process they'll find out about useful utilities, editing and printing files, security, and more--all through simple, step-by-step instructions that break the learning process into manageable chunks. Throughout, users will find plenty of the tips and visual references that have become the hallmark of Peachpit's popular Visual QuickPro Guides. Unix for Mac OS X 10.4: Visual QuickPro Guide is perfect for any Mac user interested in learning about the Unix operating system.
    Note: Includes index. - Previous ed.: 2003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 338 p. , ill. ; , 24 cm
    DDC: 005.2762
    Keywords: Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: Easy-to-follow coverage of twelve indispensable Jakarta Commons packages Code examples that show innovative uses of Commons components, including using HttpClient to access Web resources, FileUpload for handling HTTP file uploads, and BeanUtils for easy form generation Detailed instructions for combining the Commons project libraries with the popular Eclipse IDE Save time and money with reusable open source Java™ components Master the Jakarta Commons Library of Open Source JavaTM Components Using the Apache Jakarta Commons reusable Java™ components, you can leverage the work of the global open-source community to solve common programming problems reliably, quickly, and inexpensively. But, to use the Commons libraries effectively, you need far more guidance than the official documentation offers. In Apache Jakarta Commons: Reusable Java™ Components, Will Iverson covers what Java developers need to know to take full advantage of Jakarta Commons-starting right now. Iverson begins with a definitive overview of the Commons project: goals, installation, and getting started with Commons components. Next, he presents example-rich chapters on the twelve most useful Commons packages, covering topics ranging from HTTP FileUpload to database connectivity. Iverson provides detailed code samples for every component he describes. After you've mastered the core Jakarta Commons packages, you'll constantly rely on this book's handy seventy-five page quick-reference. Iverson's coverage includes Downloading Commons project libraries and installing them into Eclipse Programmatically accessing resources via HTTP, FTP, NNTP, and other Internet protocols Using the Jakarta Commons suite of configurable object pools Managing database connectivity in Swing applications-and anywhere containers aren't doing it for you Using BeanUtils to generate forms and gain runtime access to information provided by JavaBeans-style objects Traversing complex object graphs with JXPath Using Jakarta Commons' advanced collections tools to establish richer object relationships Extending java.lang with better methods for manipulating core classes Implementing conversion routines, configurable logging, command-line help, and more Exploring the newest packages, including emerging "sandbox" packages Whether you're building code for front-end Web applications, client-side software, or back-end servers, learning Jakarta Commons will make you far more efficient. Apache Jakarta Commons is the faste...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 695 p. , ill. ; , 24 cm
    Series Statement: IBM Press series--information management
    Keywords: WebSphere ; Application software ; Development ; Java (Computer program language) ; Web servers ; Computer programs ; Web site development ; Electronic books ; local
    Abstract: The expert guide to deploying and managing any WebSphere Application Server V5.x application and environment If you're a WebSphere Application Server administrator or developer, this is your advanced guide for delivering applications rapidly, running them smoothly, and administering them efficiently. Four leading IBM consultants draw on their years of experience to illuminate the key steps involved in taking WebSphere Application Server applications from development to production. They focus on the areas most crucial to success, including application assembly and build, application and infrastructure configuration and administration, and application testing and verification. Along the way, they show how to implement automated deployment processes that can be executed frequently, reliably, and quickly-so you can get your applications to market fast. The focus is on WebSphere Application Server Version 5.1, but much of the information applies to other versions. Coverage includes Installing, testing, and managing WebSphere Application Server environments: clustering, security, messaging, integration, and more Deploying and managing key J2EE technologies: JDBC, Connectors, EJB, container managed and message driven beans, transactions, JMS, JavaMail, and more Deploying highly available, scalable multi-node WebSphere Application Server environments: clustering, distributed session management, and edge components Advanced considerations: working with Java Management Extensions, caching, and much more Performance-tuning tools Troubleshooting Leveraging key WebSphere deployment and administration tools: ANT, wsadmin, Admin Console, and the Application Server Toolkit Advanced discussions of J2EE and architectural concepts you need to deploy successfully-with practical examples © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 306 p. ; , 24 cm
    DDC: 005.1/4
    Keywords: Debugging in computer science ; Electronic books ; local
    Abstract: 50 exercises to help you find bugs faster -- with less aggravation! Bug hunting is an art, and you need to be a master . Get Find the Bug , and you'll become one. Long-time Microsoft programmer Adam Barr presents 50 programs, each with exactly one bug. Your assignment: find it. As you do, Barr will teach you how to "think like your processor"... anticipating exactly how code will behave, even without running it. You'll learn better ways to read code, understand it -- and above all, improve it. Whether you're building new systems or maintaining someone else's, you'll find bugs earlier, faster, with less frustration... and write cleaner code to begin with. Presents "bugged" programs in C, Java, Python, Perl, and x86 assembly language, with carefully explained solutions Includes language overviews to help you debug all 50 examples, even if you don't know the language Shows how to look past the "surface" of code to uncover its hidden internal logic Offers practical guidance on analyzing programs, including specific inputs to test Presents a wide range of realistic bugs, with no phony "gotchas" Draws on the types of coding and debugging challenges Microsoft uses to interview new programmers An indispensable resource for working programmers, maintainers, testers, quality specialists, and everyone involved in code reviews © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 295-298) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 434 p. , ill. ; , 24 cm
    DDC: 004.6/2
    Keywords: BGP (Computer network protocol) ; Electronic books ; local
    Abstract: PRACTICAL BGP "I would recommend this book to network engineers, Internet service providers, network software developers, and IT staff who need to deal with network planning and routing." -Enke Chen, Redback Networks Hands-on guidance for deploying and optimizing BGP networks-enterprise and ISP Now there's a practical guide to deploying and managing BGPv4 in any environment-from small enterprises to the largest Tier 2 and Tier 3 service providers. A team of the world's leading BGP experts brings together powerful insights into network design, configuration, and deployment with the latest version of BGP-including hands-on guidance for leveraging its key enhancements. Coverage includes • Best practices and diverse real-world scenarios for applying BGPv4 • Understanding the impact of BGP design on local networks and the global Internet backbone • Building effective BGP policies: aggregation, propagation, accounting, and more • Maximizing scalability and performance in BGPv4 networks • BGP and network security, including Secure Origin BGP • Deploying BGP/MPLS Layer 3 VPNs • Extensive troubleshooting guidance unavailable in any other book If you're a network engineer or administrator looking to drive maximum reliability and performance from BGP-based networks, Practical BGP will help you get the job done-from start to finish. RUSS WHITE is a Network Protocols Deployment Engineer in Cisco Systems Routing DNA Team specializing in routing protocols. A widely recognized expert in networking, he co-chairs the IETF Routing Protocols Security working group, and co-authored Advanced IP Network Design, IS-IS for IP Networks, and Inside Cisco IOS Software Architecture. DANNY McPHERSON is a member of the Architecture Team at Arbor Networks. He has held technical leadership positions with several global ISPs, is active within the IETF, and is an acknowledged expert in Internet architecture and security. He co-authored Internet Routing Architectures, Second Edition. SRIHARI SANGLI , Senior Manager for MPLS and routing development at Procket Networks, was formerly Senior Technical Leader in Cisco's IOS Routing Protocols group. He, along with others at Cisco, coded the industry-first implementation of BGP/MPLS based Layer-3 VPN.
    Note: Includes index. - The author's name Sangli Srihari is listed as Srihari Sangli on cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 352 p. , ill. ; , 23 cm. +
    DDC: 005.446
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Enter your Linux Desktop Garage Don't just survive with Linux: thrive Find tools & info to do practically everything , such as: Ripping your CDs (&DVDs) De-Spam-ifying your email Capturing, editing, organizing your digital photos Chatting with your Linux-deficient IM pals Tracking your contacts, appointments, life Transforming Firefox into easy blogware Finding great substitutes for your Windows apps Diving into a veritable plethora of games Where you get the truth (unvarnished) Where you get productive (quick) Where Linux is fun (honest) Your guide: Susan Matteson , real user, real expert She reveals the fun stuff (from MP3s to desktop wallpaper) Demystifies the essentials (from file management to passwords) Simplifies the tasks they said were easy, but weren't (until now) Where there's even more (plenty) Step-by-step instructions for both Mandrake & Fedora Linux Zero-hassle tips for managing & personalizing your PC Gnoppix Linux on CD-ROM (run Linux without touching Windows) © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 312 p. , ill., facsims. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: "The best thinking in the agile development community brought to street-level in the form of implementable strategy and tactics. Essential reading for anyone who shares the passion for creating quality software." -Eric Olafson, CEO Tomax "Crystal Clear is beyond agile. This book leads you from software process hell to successful software development by practical examples and useful samples." -Basaki Satoshi, Schlumberger "A very powerful message, delivered in a variety of ways to touch the motivation and understanding of many points of view." -Laurie Williams, Assistant Professor, North Carolina State University "A broad, rich understanding of small-team software development based on observations of what actually works." -John Rusk "A superb synthesis of underlying principles and a clear description of strategies and techniques." -Géry Derbier, Project Manager, Solistic "Alistair Cockburn shows how small teams can be highly effective at developing fit-for-purpose software by following a few basic software development practices and by creating proper team dynamics. These small teams can be much more effective and predictable than much larger teams that follow overly bureaucratic and prescriptive development processes." - Todd Little, Sr. Development Manager, Landmark Graphics "I find Cockburn's writings on agile methods enlightening: He describes 'how to do,' of course, but also how to tell whether you're doing it right, to reach into the feeling of the project. This particular book's value is that actual project experiences leading to and confirming the principles and practices are so...well...clearly presented." - Scott Duncan, ASQ Software Division Standards Chair and representative to the US SC7 TAG and IEEE S2ESC Executive Committee and Management Board and Chair of IEEE Working Group 1648 on agile methods " Crystal Clear identifies principles that work not only for software development, but also for any results-centric activities. Dr. Cockburn follows these principles with concrete, practical examples of how to apply the principles to real situations and roles and to resolve real issues." - Niel Nickolaisen, COO, Deseret Book "All the successful projects I've been involved with or have observed over the past 19 or so years have had many of the same characteristics as described in Crystal Clear (even the big projects). And many of the failed projects failed because they missed something-such as expert end-user involvement or accessibility ...
    Note: Includes bibliographical references (p. 304-307) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 525 p. , ill. ; , 24 cm
    DDC: 005.2'765
    Keywords: Lotus Notes ; WebSphere ; Software configuration management ; Web servers ; Computer programs ; Electronic books ; local
    Abstract: Straight from IBM, this is the first comprehensive guide to building collaborative solutions that integrate WebSphere and Lotus to drive maximum business value. Writing for experienced Web developers, three leading IBM consultants show how to design and deploy WebSphere and Domino together in any environment, no matter how large or complex. The authors address architecture, security, performance, availability, development, and much more. Using their techniques, you can implement cutting-edge collaboration, drive productivity improvements, streamline business processes, accelerate response times-and build your On Demand enterprise. Coverage includes Architecting WebSphere and Lotus collaboration for maximum effectiveness Establishing a common platform that reduces administrative costs and increases ROI Choosing what to deploy on WebSphere and what to deploy on Domino Optimizing new Lotus collaborative applications for existing WebSphere environments Managing integrated WebSphere and Domino systems Using WebSphere and Domino development tools to extend and customize your system Accessing J2EE from Domino-and vice versa Detailed appendices on WebSphere Application Server, Domino, WebSphere Portal, Lotus Workplace, and much more... © Copyright Pearson Education. All rights reserved.
    Note: Includes bibliographical references (p. 501-504) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 747 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments. Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools--as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company. Coverage includes Confidentiality, integrity, and availability Operational issues, cost-benefit and risk analyses, legal and human factors Planning and implementing effective access control Defining security, confidentiality, and integrity policies Using cryptography and public-key systems, and recognizing their limits Understanding and using authentication: from passwords to biometrics Security design principles: least-privilege, fail-safe defaults, open design, economy of mechanism, and more Controlling information flow through systems and networks Assuring security throughout the system lifecycle Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defenses against them Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention Applying security principles to networks, systems, users, and programs Introduction to Computer Security is adapted from Bishop's comprehensive and widely praised book, Computer Security: Art and Science. This shorter version of the original work omits much mathematical formalism, making it more accessible for professionals and students who have a less formal mathematical background, or for readers with a more practical than theoretical interest.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 798 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: "The book you are about to read will arm you with the knowledge you need to defend your network from attackers-both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking 'What's next?' If so, this book is for you." -Ron Gula, founder and CTO, Tenable Network Security, from the Foreword "Richard Bejtlich has a good perspective on Internet security-one that is orderly and practical at the same time. He keeps readers grounded and addresses the fundamentals in an accessible way." -Marcus Ranum, TruSecure "This book is not about security or network monitoring: It's about both, and in reality these are two aspects of the same problem. You can easily find people who are security experts or network monitors, but this book explains how to master both topics." -Luca Deri, ntop.org "This book will enable security professionals of all skill sets to improve their understanding of what it takes to set up, maintain, and utilize a successful network intrusion detection strategy." -Kirby Kuehl, Cisco Systems Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen? Network security monitoring (NSM) equips security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes-resulting in decreased impact from unauthorized activities. In The Tao of Network Security Monitoring , Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. Inside, you will find in-depth information on the following areas. The NSM operational framework and deployment considerations. How to use a variety of open-source tools-including Sguil, Argus, and Ethereal-to mine network traffic for full content, session, statistical, and ale...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 367 p. , ill. ; , 24 cm
    DDC: 005.1/6
    Keywords: Software patterns ; Software refactoring ; Electronic books ; local
    Abstract: In 1994, Design Patterns changed the landscape of object-oriented development by introducing classic solutions to recurring design problems. In 1999, Refactoring revolutionized design by introducing an effective process for improving code. With the highly anticipated Refactoring to Patterns , Joshua Kerievsky has changed our approach to design by forever uniting patterns with the evolutionary process of refactoring. This book introduces the theory and practice of pattern-directed refactorings: sequences of low-level refactorings that allow designers to safely move designs to, towards, or away from pattern implementations. Using code from real-world projects, Kerievsky documents the thinking and steps underlying over two dozen pattern-based design transformations. Along the way he offers insights into pattern differences and how to implement patterns in the simplest possible ways. Coverage includes: A catalog of twenty-seven pattern-directed refactorings, featuring real-world code examples Descriptions of twelve design smells that indicate the need for this book's refactorings General information and new insights about patterns and refactoring Detailed implementation mechanics: how low-level refactorings are combined to implement high-level patterns Multiple ways to implement the same pattern-and when to use each Practical ways to get started even if you have little experience with patterns or refactoring Refactoring to Patterns reflects three years of refinement and the insights of more than sixty software engineering thought leaders in the global patterns, refactoring, and agile development communities. Whether you're focused on legacy or "greenfield" development, this book will make you a better software designer by helping you learn how to make important design changes safely and effectively.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 701 p. , ill. ; , 25 cm
    DDC: 005.1
    Keywords: Software engineering ; UML (Computer science) ; Electronic books ; local
    Abstract: "Designing Software Product Lines with UML is well-written, informative, and addresses a very important topic. It is a valuable contribution to the literature in this area, and offers practical guidance for software architects and engineers." -Alan Brown Distinguished Engineer, Rational Software, IBM Software Group "Gomaa's process and UML extensions allow development teams to focus on feature-oriented development and provide a basis for improving the level of reuse across multiple software development efforts. This book will be valuable to any software development professional who needs to manage across projects and wants to focus on creating software that is consistent, reusable, and modular in nature." -Jeffrey S Hammond Group Marketing Manager, Rational Software, IBM Software Group "This book brings together a good range of concepts for understanding software product lines and provides an organized method for developing product lines using object-oriented techniques with the UML. Once again, Hassan has done an excellent job in balancing the needs of both experienced and novice software engineers." -Robert G. Pettit IV, Ph.D. Adjunct Professor of Software Engineering, George Mason University "This breakthrough book provides a comprehensive step-by-step approach on how to develop software product lines, which is of great strategic benefit to industry. The development of software product lines enables significant reuse of software architectures. Practitioners will benefit from the well-defined PLUS process and rich case studies." -Hurley V. Blankenship II Program Manager, Justice and Public Safety, Science Applications International Corporation "The Product Line UML based Software engineering (PLUS) is leading edge. With the author's wide experience and deep knowledge, PLUS is well harmonized with architectural and design pattern technologies." -Michael Shin Assistant Professor, Texas Tech University Long a standard practice in traditional manufacturing, the concept of product lines is quickly earning recognition in the software industry. A software product line is a family of systems that shares a common set of core technical assets with preplanned extensions and variations to address the needs of specific customers or market segments. When skillfully implemented, a product line strategy can yield enormous gains in productivity, quality, and time-to-market. Studies indicate that if three or more systems with a degree of common functiona...
    Note: Includes bibliographical references (p. 675-685) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Language: English
    Pages: xxviii, 683 p. , ill. ; , 25 cm
    DDC: 005.3
    Keywords: FreeBSD ; Free computer software ; Operating systems (Computers) ; Electronic books ; local
    Abstract: As in earlier Addison-Wesley books on the UNIX-based BSD operating system, Kirk McKusick and George Neville-Neil deliver here the most comprehensive, up-to-date, and authoritative technical information on the internal structure of open source FreeBSD. Readers involved in technical and sales support can learn the capabilities and limitations of the system; applications developers can learn effectively and efficiently how to interface to the system; system administrators can learn how to maintain, tune, and configure the system; and systems programmers can learn how to extend, enhance, and interface to the system. The authors provide a concise overview of FreeBSD's design and implementation. Then, while explaining key design decisions, they detail the concepts, data structures, and algorithms used in implementing the systems facilities. As a result, readers can use this book as both a practical reference and an in-depth study of a contemporary, portable, open source operating system. This book: Details the many performance improvements in the virtual memory system Describes the new symmetric multiprocessor support Includes new sections on threads and their scheduling Introduces the new jail facility to ease the hosting of multiple domains Updates information on networking and interprocess communication Already widely used for Internet services and firewalls, high-availability servers, and general timesharing systems, the lean quality of FreeBSD also suits the growing area of embedded systems. Unlike Linux, FreeBSD does not require users to publicize any changes they make to the source code.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xiv, 266 p. , ill. ; , 23 cm
    DDC: 005.72
    Keywords: Contribute (Computer file) ; Web site development ; Web sites ; Design ; Electronic books ; local
    Abstract: Visitors to your Web site want to see up-to-date content--period. They don't care how complicated it is to edit that content or about the manpower issues involved: If they don't find what they need, they'll get it elsewhere. To ensure that they don't, you need Macromedia's hot content management tool Contribute and this task-based guide to get you up to speed on it. In this thoroughly updated guide, popular author Tom Negrino uses simple step-by-step instructions and loads of visual aids to show you how to build Web pages, edit content, create tables, employ Dreamweaver templates, and more with the newly updated Contribute 3. If you're a first-time user, you'll find all the instruction you need to start adding content to Web pages immediately (without fear of breaking the site). And if you're a Contribute veteran, you'll want to go straight to the sections covering this version's new features: integrated image editing, Microsoft Office integration, automatic publishing to PDF and Flash file formats, and more.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: lxxxix, 1649 p. , ill. ; , 24 cm. +
    DDC: 004.165
    Keywords: Pentium (Microprocessor) ; Electronic books ; local
    Abstract: "In this monumental new book, Tom Shanley pulls together 15 years of history of Intel's mainline microprocessors, the most popular and important computer architecture in history. Shanley has a keen eye for the salient facts, and an outstanding sense for how to organize and display the material for easy accessibility by the reader. If you want to know what does this bit control, what does that feature do, and how did those instructions evolve through several generations of x86, this is the reference book for you. This is the book Intel should have written, but now they don't have to." - Bob Colwell , Intel Fellow The Unabridged Pentium 4 offers unparalleled coverage of Intel's IA32 family of processors, from the 386 through the Pentium 4 and Pentium M processors. Unlike other texts, which address solely a hardware or software audience, this book serves as a comprehensive technical reference for both audiences. Inside, Tom Shanley covers not only the hardware design and software enhancements of Intel's latest processors, he also explains the relationship between these hardware and software characteristics. As a result, readers will come away with a complete understanding of the processor's internal architecture, the Front Side Bus (FSB), the processor's relationship to the system, and the processor's software architecture. Essential topics covered include: Goals of single-task and multi-task operating systems The 386 processor-the baseline ancestor of the IA32 processor family The 486 processor, including a cache primer The Pentium processor The P6 roadmap, P6 processor core, and P6 FSB The Pentium Pro processor, including the Microcode Update feature The Pentium II and the Pentium II Xeon and Celeron processors The Pentium III and the Pentium III Xeon and Celeron processors The Pentium 4 processor family The Pentium M processor Processor identification, System Management Mode, and the IO and Local APICs An "at-a-glance" table of contents allows readers to quickly find topics ranging from 386 Demand Mode Paging to Pentium 4 CPU Arbitration. The accompanying CD-ROM contains 16 extra chapters. Whether you design software or hardware or are responsible for system maintenance or customer support, The Unabridged Pentium 4 will prove an invaluable reference to the world's most widely used microprocessor chips. MindShare's PC System Architecture series is a crisply written and comprehensive set of guides to the most important PC hardware standards. Boo...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 621 p. , ill. ; , 25 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Management ; Software engineering ; Management ; Electronic books ; local
    Abstract: "This pioneering book highlights critical, overlooked skills needed by true software professionals." Steve McConnell CEO and Chief Software Engineering Construx Software "It's about time someone took this stuff seriously." Steven Mellor Chief Scientist Embedded Systems Division Mentor Graphics Corporation Co-Author of Exploring the Role of Executable UML in Model-Driven Architecture and six other books "Despite the fact that engineering economics is considered a core area of any engineering field, virtually no books have been written in the area of software engineering economics. Steve Tockey's Return on Software nicely fills this gaps by providing a comprehensive introduction to software engineering economics accessible both to students and to new software professionals." Donald J. Bagert, Ph.D., P.E. Director of Software Engineering and Professor of Computer Science & Software Engineering Rose-Hulman Institute of Technology "The elements of this book are useful not only in making decisions but also in understanding why and how other people and organizations make decisions" Shari Lawrence Pfleeger Senior Researcher, RAND Co-author of Security in Computing and eight other software engineering titles "This just what the doctor ordered to help software programs solve the problem of how to introduce engineering economics and business decision-making into their curricula. The economics of software development should not only be part of any computing curriculum they are an essential element of recent accreditation and certification recommendations. This book is an accessible and relevant text for any student of software engineering. The style is clear and straightforward and the software examples will be appealing to students and faculty alike. I can't wait to use it in class!" Thomas B. Hilburn, Professor Department of Computer and Software Engineering Embry-Riddle Aeronautical University Is your organization maximizing the return on its investments of money, time, and personnel? Probably not, because most software professionals don't know how to consider the business aspects of their software decisions. Most don't even know that it's important to do so. Business consequences should play a critical role in all software technical choices-from choosing which projects to do, selecting software development processes, choosing algorithms and data structures, all the way to determining how much testing is enough. Return on Software: Maximizing the Retur...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Language: English
    Pages: xiv, 373 p. , ill. ; , 24 cm. +
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Computer programming ; Electronic books ; local
    Abstract: Abrahams and Gurtovoy have written something close to a classic... marvelous fun to read... Read the complete book review by Jack J. Woehr, Dr. Dobbs Journal, June 03, 2005 "If you're like me, you're excited by what people do with template metaprogramming (TMP) but are frustrated at the lack of clear guidance and powerful tools. Well, this is the book we've been waiting for. With help from the excellent Boost Metaprogramming Library, David and Aleksey take TMP from the laboratory to the workplace with readable prose and practical examples, showing that "compile-time STL" is as able as its runtime counterpart. Serving as a tutorial as well as a handbook for experts, this is the book on C++ template metaprogramming." -Chuck Allison, Editor, The C++ Source C++ Template Metaprogramming sheds light on the most powerful idioms of today's C++, at long last delivering practical metaprogramming tools and techniques into the hands of the everyday programmer. A metaprogram is a program that generates or manipulates program code. Ever since generic programming was introduced to C++, programmers have discovered myriad "template tricks" for manipulating programs as they are compiled, effectively eliminating the barrier between program and metaprogram. While excitement among C++ experts about these capabilities has reached the community at large, their practical application remains out of reach for most programmers. This book explains what metaprogramming is and how it is best used. It provides the foundation you'll need to use the template metaprogramming effectively in your own work. This book is aimed at any programmer who is comfortable with idioms of the Standard Template Library (STL). C++ power-users will gain a new insight into their existing work and a new fluency in the domain of metaprogramming. Intermediate-level programmers who have learned a few advanced template techniques will see where these tricks fit in the big picture and will gain the conceptual foundation to use them with discipline. Programmers who have caught the scent of metaprogramming, but for whom it is still mysterious, will finally gain a clear understanding of how, when, and why it works. All readers will leave with a new tool of unprecedented power at their disposal-the Boost Metaprogramming Library. The companion CD-ROM contains all Boost C++ libraries, including the Boost Metaprogramming Library and its reference documentation, along with all of the book's sample code and extens...
    Note: Includes bibliographical references (p. 345-348) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 412 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer crimes ; Prevention ; Computer hackers ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes. High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run. Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice. Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigations This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen-and what can be done to protect yourself. "Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well." -Mike Tarrani, Independent Consultant "Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security." -Michael Nickle, Lead Consultant, VeriSign "Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy." -David Kensiski, Director of Operations, InfiniRoute Networks "The modern high-tech industry brought new things to our lives. B...
    Note: Includes bibliographical references (p. [389]-395) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvi, 460 p. , ill. ; , 24 cm. +
    DDC: 005.8/6
    Keywords: Data recovery (Computer science) ; Electronic data processing ; Backup processing alternatives ; Electronic books ; local
    Abstract: Praise for Windows Forensics and Incident Recovery " Windows Forensics and Incident Recovery doesn't just discuss forensics, it also includes tools for analysis and shows readers how to use them. I look forward to putting these tools through their paces, and I recommend Carvey's book as a terrific addition to the security professional's bookshelf." -Warren G. Kruse II, Partner Computer Forensic Services, LLC "This book is a good reference for the tools needed to prepare for, respond to, and confirm a Windows-based computer incident." -Brian Carrier Digital forensics researcher "This book provides a unique 'command-line centric' view of Microsoft and non-Microsoft tools that can be very helpful to folks responsible for security and system administration on the Windows platform." -Vishwas Lele, principal architect Applied Information Sciences, Inc. "Harlan Carvey's book serves as a great resource for investigators and systems administrators looking to peek under the hoods of their Windows systems." -Jason Chan, security consultant stake "Regardless of what you know already, you are guaranteed to learn something new about Windows incident response from this book." -Brian Behler, computer forensics and intrusion analyst/engineer "Harlan Carvey's vast security and forensics experience shows through in all facets of this work. Many books have attempted to be the prescriptive guide to forensics on the Windows platform. This book not only attempts it, but it succeeds-with guidance to spare." -Rick Kingslan, Microsoft MVP West Corporation "This book is the first to bring together into a single volume the topics of malicious code, incident response, and forensics on the Windows platform. Mr. Carvey's work should serve as a valuable reference for any Windows system administrator or security professional." -Jennifer Kolde, information security consultant, author, and instructor "Harlan Carvey's book is a one-of-a-kind approach to do-it-yourself Windows forensics. With detailed and illustrative examples coupled with Harlan's renowned Perl scripts, this book certainly is a great find." -Mark Burnett, security consultant and author The first book to focus on forensics and incident recovery in a Windows environment Teaches through case studies and real world-examples Companion CD contains unique tools developed by the author. Covers Windows Server 2003, Windows 2000, Windows NT, and Windows XP If you're responsible for protecting Windows systems, firewalls a...
    Note: Includes bibliographical references (p. 435-442) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xiv, 325 p. ; , 24 cm
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Electronic books ; local
    Abstract: Software "style" is about finding the perfect balance between overhead and functionality... elegance and maintainability... flexibility and excess. In Exceptional C++ Style , legendary C++ guru Herb Sutter presents 40 new programming scenarios designed to analyze not only the what but the why and help you find just the right balance in your software. Organized around practical problems and solutions, this book offers new insight into crucial C++ details and interrelationships, and new strategies for today's key C++ programming techniques--including generic programming, STL, exception safety, and more. You'll find answers to questions like: What can you learn about library design from the STL itself? How do you avoid making templated code needlessly non-generic? Why shouldn't you specialize function templates? What should you do instead? How does exception safety go beyond try and catch statements? Should you use exception specifications, or not? When and how should you "leak" the private parts of a class? How do you make classes safer for versioning? What's the real memory cost of using standard containers? How can using const really optimize your code? How does writing inline affect performance? When does code that looks wrong actually compile and run perfectly, and why should you care? What's wrong with the design of std::string? Exceptional C++ Style will help you design, architect, and code with style--and achieve greater robustness and performance in all your C++ software.
    Note: Includes bibliographical references (p. 315-318) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 396 p. ; , 23 cm
    DDC: 346.7304/8
    Keywords: Open source software ; Law and legislation ; United States ; Electronic books ; local
    Abstract: "I have studied Rosen's book in detail and am impressed with its scope and content. I strongly recommend it to anybody interested in the current controversies surrounding open source licensing." -John Terpstra, Samba.org; cofounder, Samba-Team "Linux and open source software have forever altered the computing landscape. The important conversations no longer revolve around the technology but rather the business and legal issues. Rosen's book is must reading for anyone using or providing open source solutions." -Stuart Open Source Development Labs A Complete Guide to the Law of Open Source for Developers, Managers, and Lawyers Now that open source software is blossoming around the world, it is crucial to understand how open source licenses work-and their solid legal foundations. Open Source Initiative general counsel Lawrence Rosen presents a plain-English guide to open source law for developers, managers, users, and lawyers. Rosen clearly explains the intellectual property laws that support open source licensing, carefully reviews today's leading licenses, and helps you make the best choices for your project or organization. Coverage includes: Explanation of why the SCO litigation and other attacks won't derail open source Dispelling the myths of open source licensing Intellectual property law for nonlawyers: ownership and licensing of copyrights, patents, and trademarks "Academic licenses": BSD, MIT, Apache, and beyond The "reciprocal bargain" at the heart of the GPL Alternative licenses: Mozilla, CPL, OSL and AFL Benefits of open source, and the obligations and risks facing businesses that deploy open source software Choosing the right license: considering business models, product architecture, IP ownership, license compatibility issues, relicensing, and more Enforcing the terms and conditions of open source licenses Shared source, eventual source, and other alternative models to open source Protecting yourself against lawsuits
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xv, 127 p. , col. ill. ; , 23 cm
    DDC: 005.36
    Keywords: Microsoft Excel (Computer file) ; Handbooks, manuals, etc ; Business ; Computer programs ; Handbooks, manuals, etc ; Electronic spreadsheets ; Computer programs ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Excel can be daunting: that empty grid just stares you in the face when you start the program, challenging you to fill in the cells with thenumbers you need to crunch. How do you start? What do you do? Creating Spreadsheets and Charts in Excel: Visual QuickProject Guide answers those questions and puts you on the straight track to getting the job done. This new addition to Peachpit's Visual QuickProject Guide series by Excel guru Maria Langer uses full color screen shots and numbered steps to walk you through the process of creating an Excel workbook file. You'll learn how to build a worksheet from the ground up, enter data, write formulas, and copy cell contents. You'll then see how to duplicate and modify worksheets to fine-tune them for your needs. The project's steps also include creating a consolidation worksheet, formatting all worksheets, creating a colorful pie chart, and setting options for printing your work. There's no time wasted in this book; Maria shows you the quickest and most efficient way to perform each task and doesn't waste paper with lengthy explanations or alternative methods. This slim book is all you'll need to get started creating spreadsheets and charts with Excel.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 271 p. , ill. ; , 24 cm
    DDC: 005.3
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: "Very informative...The perfect resource when just getting started, and a great reference for someone who has used the product for some time." --John Burrows, Software Configuration Process Manager, DST Interactive, Inc. "If only this book existed when I began using InstallAnywhere!" --Daniel Kirsch, Senior Software Engineer, Symantec Corporation Software installation and deployment made simple--that's the promise of InstallAnywhere from Zero G Software. Are you harnessing the full potential of InstallAnywhere in your software installation project? InstallAnywhere Tutorial and Reference Guide is the authoritative guide for users of InstallAnywhere. It helps you maximize your investment in this powerful deployment tool by taking you step by step through easy-to-follow exercises that will unleash the power and productivity of InstallAnywhere in your organization. InstallAnywhere Tutorial and Reference Guide is perfect for developers of all knowledge levels. Whether you're just getting started or an experienced user of InstallAnywhere, this handy tutorial will help you build and reinforce the skills necessary to create reliable installations every time. And after you've mastered those skills, it is an ideal resource for troubleshooting the most common installation problems. Inside you'll find best practices for making even the most complex software deployments easy. You will learn essential InstallAnywhere user principles and effortlessly discover why InstallAnywhere is the only software installation and deployment solution you'll ever need. Highlights include: Basic installer development strategies Basic installer customization Using advanced actions, interface options, and organization concepts Managing installation locations and uninstaller issues Source and resource management Integrating InstallAnywhere with advanced build environments Developing and using custom code actions InstallAnywhere has been recognized as the preferred multiplatform software deployment and installation tool by developers worldwide. It is the recipient of prestigious industry accolades, including two consecutive Java Developer's Journal Readers' Choice Awards, the Jolt Product Excellence Award from Software Development, and JavaWorld 's Editor's Choice Award.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Language: English
    Pages: xxii, 408 p. , ill. ; , 24 cm. +
    DDC: 658.4/038/011
    Keywords: Information resources management ; Management information systems ; Systems engineering ; Electronic books ; local
    Abstract: "The book's use of real-world case study vignettes really does go to the heart of the subject matter. This stuff is real, it has real applicability to real problems, and, as with most things in life, it shows how it all comes down to real money in the final analysis. This book shows you what your peers are doing to drive costs out of integration projects and to build new applications without re-inventing the entire wheel-just a few new spokes and off you go. This is a good book. Read it." - Peter Rhys Jenkins , Complex Systems Architect, Candle Corporation "When you get two long-term, acknowledged experts on integration and interoperability together to lay out the current state of the IT universe you expect an immediate return on investment-and this book delivers. It's common knowledge that 90% of total software lifecycle cost is in maintenance and integration, and that needs to drive IT decision-making. With comprehensive coverage of the integration technology landscape, and clear case studies presented at every turn, this book belongs on every IT manager's, every system architect's, and every software developer's bookshelf." - Richard Mark Soley , chairman and CEO, Object Management Group "Today's myriad of integration technologies and alternatives can be daunting. This book presents a framework and process for the evaluation, design, and selection of the appropriate integration technologies to meet your strategic business needs. You will find the templates a particularly useful mechanism to jump-start documentation and drive your decision-making process." - Ron Zahavi , CIO, Global Business Transformation, Unisys Global Transformation Team; author of Enterprise Application Integration with CORBA "It is refreshing to read a book that presents a good business approach to the integration challenge facing most business leaders today, while at the same time educating them about the major components of the required technologies and management practices changes required. The narrative, examples, and templates establish a common reference point between the business and the technology organizations. A must-read for senior business leaders challenged with the complexities of business integration, as well as Senior IT Leaders challenged with shrinking budgets and lower tolerances for failures." - Chuck Papageorgiou , managing partner, Ideasphere "Integration has, and will continue to be, one of the success indicators of any enterprise project. Failing...
    Note: Includes bibliographical references (p. 387-392) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 702 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    DDC: 005.1
    Keywords: Linux ; Application software ; Development ; Electronic books ; local
    Abstract: "The first edition of this book has always been kept within arm's reach of my desk due to the wonderful explanations of all areas of the Linux userspace API. This second edition greatly overshadows the first one, and will replace it." --Greg Kroah-Hartman, Linux kernel programmer Develop Software that Leverages the Full Power of Today's Linux Linux Application Development, Second Edition, is the definitive reference for Linux programmers at all levels of experience, including C programmers moving from other operating systems. Building on their widely praised first edition, leading Linux programmers Michael Johnson and Erik Troan systematically present the key APIs and techniques you need to create robust, secure, efficient software or to port existing code to Linux. This book has been fully updated for the Linux 2.6 kernel, GNU C library version 2.3, the latest POSIX standards, and the Single Unix Specification, Issue 6. Its deep coverage of Linux-specific extensions and features helps you take advantage of the full power of contemporary Linux. Along the way, the authors share insights, tips, and tricks for developers working with any recent Linux distribution, and virtually any version of Unix. Topics include Developing in Linux: understanding the operating system, licensing, and documentation The development environment: compilers, linker and loader, and unique debugging tools System programming: process models, file handling, signal processing, directory operations, and job control Terminals, sockets, timers, virtual consoles, and the Linux console Development libraries: string matching, terminal handling, command-line parsing, authentication, and more Hundreds of downloadable code samples New to this edition The GNU C library (glibc), underlying standards, and test macros Writing secure Linux programs, system daemons, and utilities Significantly expanded coverage of memory debugging, including Valgrind and mpr Greatly improved coverage of regular expressions IPv6 networking coverage, including new system library interfaces for using IPv6 and IPv4 interchangeably Coverage of strace, ltrace, real-time signals, poll and epoll system calls, popt library improvements, Pluggable Authentication Modules (PAM), qdbm, and much more Improved index and glossary, plus line-numbered code examples
    Note: Includes bibliographical references (p. 679-682) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 273 p. , ill. ; , 24 cm
    DDC: 658.4
    Keywords: Industrial management ; Organizational change ; Technological innovations ; Electronic books ; local
    Abstract: "All that have ever tried to impose change in their organization will immediately recognize and truly value the in-depth knowledge and experience captured in this book. It contains a collection of eye-openers that is a treasure chest for pioneers of new organizational ideas, A fantastic toolbox for use in future missions!" -Lise B. Hvatum, product development manager, Schlumberger "If you have need of changing your organization, and especially of introducing new techniques, then you want to understand what is in this book. It will help you avoid common pitfalls that doom many such projects and will show you a clear path to success. The techniques are derived from the experience of many individuals and organizations. Many are also fun to apply. This stuff is really cool-and really hot." -Joseph Bergin, professor of computer science, Pace University, New York "If change is the only guarantee in life, why is it so hard to do? As this book points out, people are not so much resistant to change itself as they are to being changed. Mary Lynn and Linda have successfully used the pattern form to capture and present the recurring lessons of successful change efforts and have placed a powerful knowledge resource in the hands of their readers." -Alan O'Callaghan, researcher, Software Technology Research Laboratory, De Montfort University, United Kingdom "The most difficult part of absorbing patterns, or any technology, into an organization is overcoming the people issues. The patterns in this book are the documentation of having gone through that experience, giving those that dare push the envelope a head start at success." -David E. DeLano, IBM Pervasive Computing "If you have ever wondered how you could possibly foster any cultural changes in your organization, in this book you will find a lot of concrete advice for doing so. I recommend that everyone read this book who has a vast interest in keeping his or her organization flexible and open for cultural change." -Jutta Eckstein, Independent Consultant, Objects In Action Author of Agile Software Development in the Large 48 Patterns for Driving and Sustaining Change in Your Organization Change. It's brutally tough to initiate, even harder to sustain. It takes too long. People resist it. But without it, organizations lose their competitive edge. Fortunately, you can succeed at making change. In Fearless Change, Mary Lynn Manns and Linda Rising illuminate 48 proven techniques, or patterns, for im...
    Note: Includes bibliographical references (p. 261-266) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 620/.5
    Keywords: Nanotechnology ; Social aspects ; Nanotechnology ; Electronic books ; local
    Abstract: Inside the Emerging Multibillion-Dollar Nanotechnology Industry Suddenly, nanotechnology isn't science fiction or mere theory: It's becoming one of the world's fastest-growing, highest-impact industries. In Nanotechnology: Science, Innovation, and Opportunity , the field's leading experts offer an up-to-the-minute briefing on where the industry stands now, how it will unfold over the coming decade, and how it will impact you. Edited by a key industry advisor, this book covers the latest in nanotech science, technology, and applications. You'll meet the key players, and discover nanotech at work in fields ranging from drug delivery to energy efficiency. Here are the opportunities, the challenges, and the implications: all you need to know about today's nanotech business--and tomorrow's. Coverage includes How the convergence of nanoscale science foreshadows revolutionary societal change Technical and business obstacles that still challenge the industry Lessons from the early "gold rush" days of biotech: managing the hype Nanotech as disruptive innovation: implications for investors and venture capitalists The evolving roles of entrepreneurs, universities, and the U.S. government Key application areas: materials, microelectronics, sensors, energy, and beyond Bio-Nano-Information fusion: the potential to transform medicine Relevant patent law and intellectual property issues The ethics of nanotechnology "A fascinating look at the art and science of nanotechnology. Hold on to your hats, the world is about to change big time. . . . A comprehensive look at nanotechnology from the perspective of science, investment, IP, and business development with a healthy dose of vision for good measure. First-rate authors with an excellent presentation of the material. Buy this book." --David Bishop, Ph.D., V.P. of Nanotechnology Research, Bell Labs, Lucent Technologies "An absolute must-read for every technology sector being impacted by nanotechnology. This book presents the true value of these technologies, delivering a comprehensive prospectus on the science to commercialization of nanotechnology." --Matthew Laudon, Ph.D., Executive Director, Nano Science & Technology Institute "This is an excellent book for anyone trying to get a general grasp on the emerging science and technology of nanotechnology in particular for business executives, engineers, or entrepreneurs who are trying to decide what this technology can mean to them." --Charles H. Volk, Ph.D., V.P....
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.1
    Keywords: Business ; Data processing ; Computer architecture ; Computer software ; Development ; System design ; Electronic books ; local
    Abstract: Praise for Service-Oriented Architecture Compass "A comprehensive roadmap to Service-Oriented Architecture (SOA). SOA is, in reality, a business architecture to be used by those enterprises intending to prosper in the 21st century. Decision makers who desire that their business become flexible can jumpstart that process by adopting the best practices and rules of thumb described in SOA Compass ." -Bob Laird, MCI IT Chief Architect "The book Service-Oriented Architecture Compass shows very clearly by means of real projects how agile business processes can be implemented using Service-Oriented Architectures. The entire development cycle from planning through implementation is presented very close to practice and the critical success factors are presented very convincingly." -Professor Dr. Thomas Obermeier, Vice Dean of FHDW Bergisch Gladbach, Germany "This book is a major improvement in the field. It gives a clear view and all the key points on how to really face a SOA deployment in today's organizations." -Mario Moreno, IT Architect Leader, Generali France "Service-Oriented Architecture enables organizations to be agile and flexible enough to adopt new business strategies and produce new services to overcome the challenges created by business dynamism today. CIOs have to consider SOA as a foundation of their Enterprise Applications Architecture primarily because it demonstrates that IT aligns to business processes and also because it positions IT as a service enabler and maximizes previous investments on business applications. To understand and profit from SOA, this book provides CIOs with the necessary concepts and knowledge needed to understand and adapt it into their IT organizations." -Sabri Hamed Al-Azazi, CIO of Dubai Holding, Sabri "I am extremely impressed by the depth and scale of this book! The title is perfect-when you know where you want to go, you need a compass to guide you there! After good IT strategy leads you to SOA, this book is the perfect vehicle that will drive you from dream to reality. We in DSK Bank will use it as our SOA bible in the ongoing project." -Miro Vichev, CIO, DSK Bank, Bulgaria, member of OTP Group "Service-Oriented Architecture offers a pathway to networking of intra- and inter-corporate business systems. The standards have the potential to create far more flexible and resilient business information systems than have been possible in the past. This book is a must-read for those who care about the future of ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xii, 232 p. , ill. ; , 23 cm
    Keywords: Digital video ; Handbooks, manuals, etc ; Video Recording ; Handbooks, manuals, etc ; Electronic books ; local
    Abstract: Corporations, government offices, and academic institutions have long used video to educate and inform. The only thing that's changed is the people who are producing them: With low-priced equipment and easy-to-use software flooding the market, now you're the person behind the camera, not some high-priced video specialist! This is the guide for you, then-and all of the other nonprofessionals who've been called upon to produce top-quality videos. Long on essentials-like where to place the camera, how to connect microphones, and which font to use in titles-and short on theory, this guide focuses instead on the simple steps and best practices needed to produce great videos. Veteran author Jan Ozer gives you the lowdown on shooting, audio, and lighting before describing the workflow and procedures involved in converting raw DV footage to streaming video and DVDs, and distributing the final product. For software-specific guidance, you can purchase downloadable PDF workbooks that use the book's projects to walk you through the production process.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xvi, 390 p. , ill. ; , 23 cm
    DDC: 005.133
    Keywords: C (Computer program language) ; Electronic books ; local
    Abstract: It's no secret: When it comes to learning a programming language, Larry Ullman is the man you want at your side! As the best-selling author of guides to PHP, MySQL, and more, he's proved that programming doesn't have to be painful, especially when it comes to a language that is at its core both simple and small. We're talking, of course, about C, and if you want to learn it fast (not to mention well), this book provides the key. Joined by co-author and fellow programmer Marc Liyanage, this author team tackles both programming fundamentals and the ABCs of C itself through a series of task-based lessons that use step-by-step instructions and a plethora of visual aids to make C if not instantly accessible, then almost. This book uses friendly, straightforward language to explain every aspect of this fundamental technology: from basic syntax and data types to working with numbers, characters, loops, and arrays; creating functions; using the C preprocessor; file input and output; and more.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 242 p. ; , 24 cm
    DDC: 005.36
    Keywords: Open source software ; Shareware (Computer software) ; Electronic books ; local
    Abstract: "Open source requires a fundamentally different operating model in order for IT organizations to succeed. Succeeding with Open Source is the first how-to book about selecting open source software based on a product's characteristics such as quality, support, and longevity. Open source software is here to stay. Golden provides an essential tool for evaluating its usefulness/readiness for the corporation." - Martin Fink , Vice-President-Linux, Hewlett-Packard, and author of The Business and Economics of Linux and Open Source "Open source software is transforming the way companies acquire and manage software at every level, from operating systems to applications. Today, IT managers who don't evaluate open source alternatives to proprietary software are doing their companies a profound disservice. If you are involved in any aspect of software acquisition and you aren't intimately familiar with how open source systems are created, documented, and supported, you need this book. It provides you with a new framework for assessing the maturity of open source solutions, walks you through every step of the evaluation process, and provides vital insights into the risks and benefits of making the open source decision." - David A. Taylor, Ph.D., author of Object Technology: A Manager's Guide and Supply Chains: A Manager's Guide "Novell, its customers, and its partners have been waiting for something like this: a quantitative and qualitative way to assess the strength of open source projects we hope to support or build into our products. Golden provides a clear, concise methodology for determining whether an open source project is enterprise-ready and what it would take to make it so." - Chris Stone, Vice Chairman, Novell "Open source software addresses many of the needs of IT organizations. While more and more organizations are using open source software, few understand how to evaluate it in the absence of a parent organization. Golden provides an effective mechanism to quickly evaluate open source software based on standard software measures-such as quality, support, and documentation-and to share those evaluations with other organizations. Using Golden's model, IT organizations can efficiently compare proprietary solutions to open source software solutions." - Stormy Peters, Open Source Program Office, Hewlett-Packard Company "This book contains some of the most valuable, practical advice I have seen on how to transform the use of open source software f...
    Note: Includes bibliographical references (p. 233-234) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Language: English
    Pages: xiii, 355 p. , ill. ; , 24 cm
    DDC: 005.2/75
    Keywords: Parallel programming (Computer science) ; Electronic books ; local
    Abstract: The Parallel Programming Guide for Every Software Developer From grids and clusters to next-generation game consoles, parallel computing is going mainstream. Innovations such as Hyper-Threading Technology, HyperTransport Technology, and multicore microprocessors from IBM, Intel, and Sun are accelerating the movement's growth. Only one thing is missing: programmers with the skills to meet the soaring demand for parallel software. That's where Patterns for Parallel Programming comes in. It's the first parallel programming guide written specifically to serve working software developers, not just computer scientists. The authors introduce a complete, highly accessible pattern language that will help any experienced developer "think parallel"-and start writing effective parallel code almost immediately. Instead of formal theory, they deliver proven solutions to the challenges faced by parallel programmers, and pragmatic guidance for using today's parallel APIs in the real world. Coverage includes: Understanding the parallel computing landscape and the challenges faced by parallel developers Finding the concurrency in a software design problem and decomposing it into concurrent tasks Managing the use of data across tasks Creating an algorithm structure that effectively exploits the concurrency you've identified Connecting your algorithmic structures to the APIs needed to implement them Specific software constructs for implementing parallel programs Working with today's leading parallel programming environments: OpenMP, MPI, and Java Patterns have helped thousands of programmers master object-oriented development and other complex programming technologies. With this book, you will learn that they're the best way to master parallel programming too. 0321228111B08232004
    Note: Includes bibliographical references (p. 321-331) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 470 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Electronic books ; local
    Abstract: "With this book, Ted Neward helps you make the leap from being a good Java enterprise developer to a great developer!" -John Crupi, Sun Distinguished Engineer coauthor, Core J2EE Patterns If you want to build better Java enterprise applications and work more efficiently, look no further. Inside, you will find an accessible guide to the nuances of Java 2 Platform, Enterprise Edition (J2EE) development. Learn how to: Use in-process or local storage to avoid the network, see item 44 Set lower isolation levels for better transactional throughput, see item 35 Use Web services for open integration, see item 22 Consider your lookup carefully, see item 16 Pre-generate content to minimize processing, see item 55 Utilize role-based authorization, see item 63 Be robust in the face of failure, see item 7 Employ independent JREs for side-by-side versioning, see item 69 Ted Neward provides you with 75 easily digestible tips that will help you master J2EE development on a systemic and architectural level. His panoramic look at the good, the bad, and the ugly aspects of J2EE development will address your most pressing concerns. Learn how to design your enterprise systems so they adapt to future demands. Improve the efficiency of your code without compromising its correctness. Discover how to implement sophisticated functionality that is not directly supported by the language or platform. After reading Effective Enterprise Java , you will know how to design and implement better, more scalable enterprise-scope Java software systems.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 2nd ed.
    Keywords: Electronic books ; local
    Abstract: Fully Updated to Reflect Major Improvements and Configuration Changes in Samba-3.0.11 through 3.0.20+! You've deployed Samba: Now get the most out of it with today's definitive guide to maximizing Samba performance, stability, reliability, and power in your production environment. Direct from members of the Samba Team, The Official Samba-3 HOWTO and Reference Guide, Second Edition, offers the most systematic and authoritative coverage of Samba's advanced features and capabilities. It has been extensively updated to reflect major improvements in the Samba-3.0 series of releases and additional performance enhancements in Samba-3.0.20 and later. Use this book to go far beyond basic deployment, leveraging all of Samba's components, from directory services to remote administration. Use it to find practical optimization techniques for any environment, from the workgroup to the enterprise. Use it to find detailed guidance and best practices for troubleshooting and problem solving. And, if your background is in Windows networking, use this book to get up to speed rapidly with Samba network administration in Linux/UNIX environments. Coverage includes NEW! User Rights and Privileges features and their impact on default system behavior NEW! Expanded LDAP capabilities, the new Winbind subsystem, and Samba's improved ACL handling NEW! Detailed coverage of the powerful Samba-3.x net local/remote administration utility NEW! Comprehensive documentation of IDMAP functionality NEW! Proven techniques for improving performance with large directories NEW! Samba integration with Windows Server 2003 and the latest versions of Active Directory Advanced techniques: interdomain trusts, loadable VFS file system drivers, distributed authentication, desktop profile management, CUPS printing, high availability, and more Contains a dramatically improved, more-detailed index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 416 p. , ill. ; , 23 cm
    DDC: 006.7/6
    Keywords: Web services ; Electronic books ; local
    Abstract: "Other books claim to present the complete Web services platform architecture, but this is the first one I've seen that really does. The authors have been intimately involved in the creation of the architecture. Who better to write this book?" -Anne Thomas Manes, Vice President and Research Director, Burton Group "This is a very important book, providing a lot of technical detail and background that very few (if any) other books will be able to provide. The list of authors includes some of the top experts in the various specifications covered, and they have done an excellent job explaining the background motivation for and pertinent details of each specification. The benefit of their perspectives and collective expertise alone make the book worth reading." -Eric Newcomer, CTO, IONA Technologies "Most Web services books barely cover the basics, but this book informs practitioners of the "real-world" Web services aspects that they need to know to build real applications. The authors are well-known technical leaders in the Web services community and they helped write the Web services specifications covered in this book. Anyone who wants to do serious Web services development should read this book." -Steve Vinoski, Chief Engineer, Product Innovation, IONA Technologies "There aren't many books that are as ambitious as this one is. The most notable distinguishing factor of this book is that the authors have tried to pair down the specifications for the user and rather than focusing on competing specifications, they focus on complementary ones. Nearly every chapter provides a business justification and need for each feature discussed in the Web services stack. I would recommend this book to developers, integrators, and architects." -Daniel Edgar, Systems Architect, Portland General Electric "Rarely does a project arrive with such a list of qualified and talented authors. The subject matter is timely and significant to the industry. " -Eric Newcomer, author of Understanding SOA with Web Services and Understanding Web Services and Chief Technology officer, IONA The Insider's Guide to Building Breakthrough Services with Today'sNew Web Services Platform Using today's new Web services platform, you can build services that are secure, reliable, efficient at handling transactions, and well suited to your evolving service-oriented architecture. What's more, you can do all that without compromising the simplicity or interoperability that made Web services so ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 320 p. , ill. ; , 24 cm +
    Edition: 1st ed.
    DDC: 004.67/8
    Keywords: WebSphere ; Application software ; Development ; Web servers ; Computer programs ; Web site development ; Electronic books ; local
    Abstract: Make the most of completely revamped administration tools in WebSphere Version 5 IBM WebSphere Version 5 offers a completely rewritten, radically improved infrastructure for administering servers and applications. Now, its creators have written the definitive WebSphere Version 5 administration reference and tutorial: everything you need to manage WebSphere to the highest levels of performance and efficiency. The authors systematically cover all four WebSphere administration toolsets: command-line utilities, the new Administrative Console, scripting tools, and Java management APIs. You'll find a complete library of code examples, plus powerful new insider's tips for maximizing your productivity as a WebSphere administrator. Whether you're managing WebSphere Version 5 or incorporating administrative support into new WebSphere applications, this book provides you with the techniques, examples, and tips you need to do it right. Fundamentals of WebSphere administration: servers, nodes, node agents, cells, clusters, and the deployment manager Revamped package structure of WebSphere Version 5 and its implications Process internals, distributed administration features, administrative security, and XML configuration file structure Command-line tools: a complete reference with practical examples Web-based graphical management with the new Administrative Console Scripting the management features of WebSphere Version 5 with wsadmin Writing custom management programs Extending the native WebSphere administrative system with new managed options Using Java administrative APIs to manage WebSphere applications from other products Sum Includes extensive code examples, real-world scenarios, and best practices
    Note: "Version 5.1 (Trial version)," from CD-ROM. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xiii, 855 p. , ill. ; , 24 cm. +
    DDC: 778.59/3/0285536
    Keywords: Final cut (Electronic resource) ; Digital video ; Editing ; Data processing ; Macintosh (Computer) ; Programming ; Motion pictures ; Editing ; Data processing ; Video tapes ; Editing ; Data processing ; Electronic books ; local
    Abstract: If you're ready to get serious about editing video, this best-selling, Apple-certified guide to Final Cut Pro is the best place to start. Master trainer Diana Weynand starts with basic video editing techniques and takes you all the way through Final Cut Pro's powerful advanced features, delivering comprehensive training--the equivalent of a five-day course--in one project-based book. Each chapter presents a complete lesson in an aspect of video editing and finishing, with hands-on projects for you to complete as you go. All the files you need are on the DVD-ROM. After getting acquainted with the software's interface, you'll learn how to mark and edit clips, insert and adjust edits, and work with clips on the timeline, before moving on to complex topics like creating transitions and motion effects, real-time color correcting, and titling techniques. Previously published as Final Cut Pro 4, this revision has been updated for the HD interface. Publisher¿s Note If you previously purchased Apple Pro Training Series: Final Cut Pro 4, there is no need to purchase this revision: All the project files and exercises in the previous edition can be used with Final Cut Pro HD.
    Note: "Apple certified : level 1 certification"--Cover. - "Covers all versions of Final Cut Pro 4 and HD"--Cover. - Accompanying DVD-ROM includes lessons and media files. - Includes index. - Rev. ed. of: Final Cut Pro 4. c2004
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 418 p. , ill. ; , 23 cm. +
    DDC: 005.13/3
    Keywords: Application software ; Development ; Internet programming ; Java (Computer program language) ; Web servers ; Web site development ; Java (Langage de programmation) ; Logiciels d'application ; Développement ; Programmation sur Internet ; Serveurs Web ; Sites Web ; Développement ; Electronic books ; local
    Abstract: Written by Sun Microsystems' Java™ BluePrints team, Designing Web Services with the J2EE™ 1.4 Platform is the authoritative guide to the best practices for designing and integrating enterprise-level Web services using the Java 2 Platform, Enterprise Edition (J2EE) 1.4. This book provides the guidelines, patterns, and real-world examples architects and developers need in order to shorten the learning curve and start building robust, scalable, and portable solutions. The authors use the Java Adventure Builder application to bring the design process to life and help illustrate the use of Java APIs for XML Processing (JAXP), Java APIs for XML-Based RPC (JAX-RPC), and other Web service and Java-XML technologies. Key topic coverage includes: Web service requirements and design issues Support for Web services provided by the J2EE 1.4 platform Designing and implementing Web service end points Writing efficient Web service client applications Designing and developing XML-based applications Integrating applications and data using Web services The J2EE platform security model as it applies to Web services A coherent programming model for designing and developing Web service endpoints and clients Designing Web Services with the J2EE™ 1.4 Platform provides the insight, advice, and detail that make it easier to create effective Web service applications using the J2EE 1.4 platform.
    Note: Includes bibliographical references (p. xx-xxii) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Language: English
    Pages: xxvii, 1090 p. , ill. ; , 24 cm. +
    Edition: 2nd ed. /
    DDC: 686.2/2544536
    Keywords: LaTeX (Computer file) ; Computerized typesetting ; Electronic books ; local
    Abstract: This is the digial version of the printed book (Copyright © 2004). The LaTeX Companion has long been the essential resource for anyone using LaTeX to create high-quality printed documents. This completely updated edition brings you all the latest information about LaTeX and the vast range of add-on packages now available--over 200 are covered! Full of new tips and tricks for using LaTeX in both traditional and modern typesetting, this book will also show you how to customize layout features to your own needs--from phrases and paragraphs to headings, lists, and pages. Inside, you will find: Expert advice on using LaTeX's basic formatting tools to create all types of publications--from memos to encyclopedias In-depth coverage of important extension packages for tabular and technical typesetting, floats and captions, multicolumn layouts--including reference guides and discussions of the underlying typographic and TeXnical concepts Detailed techniques for generating and typesetting contents lists, bibliographies, indexes, etc. Tips and tricks for LaTeX programmers and systems support New to this edition: Nearly 1,000 fully tested examples that illustrate the text and solve typographical and technical problems--all ready to run! An additional chapter on citations and bibliographies Expanded material on the setup and use of fonts to access a huge collection of glyphs, and to typeset text from a wide range of languages and cultures Major new packages for graphics, "verbatim" listings, floats, and page layout Full coverage of the latest packages for all types ofdocuments--mathematical, multilingual, and many more Detailed help on all error messages, including those troublesome low-level TeX errors Like its predecessor, The LaTeX Companion, Second Edition, is an indispensable reference for anyone wishing to use LaTeX productively. The accompanying CD-ROM contains a complete plug-and-play LaTeX installation, including all the packages and examples featured in the book.
    Note: Goossens's name appears first on the earlier edition. - Includes bibliographical references (p. [963]-982) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Language: English
    Pages: xxxv, 612 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: FireWall-1 ; Computer networks ; Security measures ; Computer programs ; Computer security ; Computer programs ; Electronic books ; local
    Abstract: "When it comes to security products and technologies, experience is far and away the best teacher. PhoneBoy has been installing, running, and supporting Check Point FireWall-1 for years, and his experience shows in this book. Save yourself the pain of learning from your own mistakes--let PhoneBoy show you the right way to manage your FireWall-1 NG infrastructure." --Tina Bird, Computer Security Officer, Stanford University "Dameon has taken his original definitive guide and updated it thoroughly for NG. No other book is informed by his depth of experience with Check Point. Accept no substitutes!" --Matthew Gast, author of 802.11 Wireless Networks: The Definitive Guide "PhoneBoy is the de facto expert on this product, and people have been clamoring for an NG book from him since he published the first one. No one can compete with him." --Valerie M. Leveille, Professional Educator "Dameon is the foremost authority on FireWall-1. He has the knowledge to give details of FireWall-1 functionality that no other reference on this topic can." --Paul Keser, Senior Network Security Engineer, Raytheon ITSS/NASA Ames Research Center "This book is the Swiss army knife solution for Check Point FireWall-1 NG." --Thomas Warfield, TNT-OK.com Now there's a definitive insider's guide to planning, installing, configuring, and maintaining the newest version of the world's #1 firewall: Check Point™ FireWall-1 ® Next Generation™. Leading Check Point support authority Dameon Welch-Abernathy (a.k.a. PhoneBoy) offers exclusive hands-on tips, techniques, checklists, and detailed sample configurations you can use right now to improve reliability, efficiency, and manageability in your Check Point environment. The author's previous Check Point FireWall-1 guide became an instant bestseller, earning the praise of security professionals worldwide. This new book has been thoroughly revamped to reflect Check Point FireWall-1 NG's powerful new features, and it includes even more expert solutions from PhoneBoy's FireWall-1 FAQ, the Web's #1 independent Check Point support site. Whether you're a security/network architect, administrator, or manager, you'll find it indispensable. Whether you're running FireWall-1 NG on UNIX or Windows platforms, this book brings together expert guidance for virtually every challenge you'll face: building your rulebase, logging and alerting, remote management, user authentication, inbound/outbound content restriction, managing NAT environments, buildi...
    Note: Includes bibliographical references (p. 587-588) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.2/762
    Keywords: Internet programming ; Java (Computer program language) ; Web services ; Electronic books ; local
    Abstract: " J2EE™ Web Services is written in the tradition of great books people have come to expect from author Richard Monson-Haefel. More than a complete and concise Web services reference, this essential guide is the way for J2EE developers to quickly master Web services architecture and development." - Floyd Marinescu Author, EJB Design Patterns Director, TheServerSide.com "Written in a straightforward and approachable style, Monson-Haefel's latest book is a mustread for any Java developer who is serious about understanding and applying the J2EE APIs in support of Web services. By concentrating on the core technologies endorsed by the WS-I, it clearly explains why Web services will succeed in realizing the interoperability promise where previous attempts have failed." - James McCabe Software IT Architect IBM "This is the best-and most complete-description of J2EE Web services that I've seen. If you're a Java developer, you need this book." - David Chappell Chappell & Associates "For Java Web service developers, this book is going to be there on their desk next to their PC for easy reference. The book has it all, clear guides as to what WSDL, SAAJ, UDDI are, and how they are used in a variety of examples. Monson-Haefel has created another classic with this volume." - Dr. Bruce Scharlau Department of Computing Science University of Aberdeen, Scotland "Richard Monson-Haefel provides the most comprehensive analysis of J2EE Web services that I've seen so far to date. This book covers the core Web services technologies (XML, SOAP, WSDL, and UDDI), as well as the Java APIs for Web services (JAX-RPC, SAAJ, JAXR, JAXP, and Web Services for J2EE, version 1.1). Richard also goes into detail on issues such as fault handling, type mapping, and JAX-RPC handlers. Developers will find this book to be a very valuable reference." - Anne Thomas Manes Research Director, Burton Group Author, Web Services: A Manager's Guide " J2EE™ Web Services is an excellent reference and tutorial for both beginning and seasoned Web services architects and developers. This book is the first to fully cover the WS-I 1.0 Web services standards and their integration with J2EE 1.4 components. Spend time with this book, and you'll soon master J2EE Web Services and be able to successfully use this technology to solve key business integration problems in your enterprise." - Tom Marrs Senior J2EE/XML/Web Services Architect Distributed Computing Solutions, Inc. Web services are revolutionizing ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.2/768
    Keywords: Microsoft Visual BASIC ; Computer software ; Development ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: Praise Page for Windows Forms Programming in Visual Basic .NET "This is the .NET WinForms book to have. If you have been looking for a good Windows Forms book for your bookshelf, here it is. Windows Forms Programming in Visual Basic .NET covers everything from 'Hello World' to multithreading the user interface. Sells and Gehtland definitely understand Windows Forms and VB and are able to bring many new .NET techniques and concepts to the VB masses." - Darrin Bishop , Senior Technical Specialist "Not only does Sells do a great job of breaking down all the quintessential components that anyone developing a Windows Forms application should know, but he also covers the critical pieces of functionality, like multi-threaded programming and resource management, which every Windows Forms developer should incorporate into his or her applications." - Colin Bowern , Senior Consultant, Microsoft Corporation "With its excellent content, this book is easily an important component for any Visual Basic .NET developer's toolbox." - Amit Kalani , coauthor of MCAD/MCSD Developing and Implementing Windows®-based Applications with Microsoft Visual C#™ .NET and Microsoft Visual Studio®.NET Exam Cram 2 (Exam Cram 70-316) "If you are a VB.NET developer-or one coming from a 'classic' VB background-and you want a no-nonsense guide to the key elements of WinForms development, this book is for you. In-depth practical experience shines through each chapter." - Martin Naughton , Independent Freelance Software Consultant "If you're planning on using the .NET Framework, this book is an invaluable resource. Chris dives straight into the heart of what makes the Windows Forms Framework tick. He has a real talent for striking the proper balance between showing you the theory behind the software and demonstrating coding techniques that will make you instantly productive." -From the Foreword by Ted Pattison , VB .NET Guru and author of Building Applications and Components with Visual Basic .NET "This book contains consistent and detailed hands-on examples about Windows Forms. Whether you are new to programming in .NET or already experienced, Chris Sells gives you the thorough grounding you need to write Windows Forms applications." - Erick Sgarbi , Software Engineer "This is a great book for programmers who need to get work done with WinForms, and don't have time to read a 1,200-page tome. Unlike many of the other WinForms books out there, it goes beyond the available Microsof...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xlv, 1507 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.2/762
    Keywords: Business ; Data processing ; Java (Computer program language) ; Electronic books ; local
    Abstract: The J2EE™ Tutorial, Second Edition , is the complete guide to all major components of the Java 2 Platform, Enterprise Edition (J2EE) version 1.4. Written by members of the J2EE platform team at Sun Microsystems, this is the task-oriented and example-driven book that will have new and intermediate Java programmers building J2EE applications right away. The first chapters introduce the J2EE 1.4 platform architecture and APIs, the Sun Java System Application Server Platform Edition 8, and the basics of working with XML and Web applications. The greater part of the book is devoted to describing and demonstrating the Java XML, Web-tier, and Enterprise JavaBeans technologies and platform services. Extensive examples and case studies show you how to put these technologies to work in the real world. The technologies and services detailed include: Java API for XML Processing (JAXP) Java API for XML-Based RPC (JAX-RPC) SOAP with Attachments API for Java (SAAJ) Java API for XML Registries (JAXR) Java Servlet JavaServer Pages (JSP) JSP Standard Tag Library (JSTL) JavaServer Faces Internationalization and localization Enterprise JavaBeans (EJB) Transactions Resource connections Security Java Message Service API (JMS API) The J2EE™ Tutorial, Second Edition, will give you a head start in developing and deploying J2EE applications. The accompanying CD-ROM includes the tutorial examples (binary and source code) and the J2EE Software Development Kit, Enterprise Edition 1.4 (J2EE 1.4 SDK), which contains the Sun Java System Application Server Platform Edition 8, Java 2 Software Development Kit (J2SE SDK), and BluePrints sample applications.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Language: English
    Pages: xiv, 698 p. , col. ill. ; , 24 cm
    Edition: 2nd ed. /
    DDC: 775
    Keywords: Digital cameras ; Photography ; Digital techniques ; Electronic books ; local
    Abstract: Whether you're just making the transition from a lifetime of traditional photography or are looking to bring your digital photography skills in line with today's market, if you're serious about digital photography, you need this book. In the four years since the first edition was published, just about every aspect of digital photography has changed (often radically--and it's all covered in these pages. Organized in four major sections--Digital Processing Essentials, Digital Processing Techniques, The Digital Darkroom, and Output and Presentation--the focus here is on getting great pictures and spectacular printed output through a combination of smart techniques and the right equipment. As with all of the titles in the Real World series, the authors here realize that this entails learning not just techniques but the concepts behind them. For a professional-level understanding of the digital photography process--from how a digital camera works to advice on buying cameras and accessories, choosing hardware and software, downloading and outputting images, and more--this is the place to turn.
    Note: Includes index. - Rev. ed. of: Real world digital photography / Deke McClelland, Katrin Eismann. c1999
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xiv, 498 p. , ill. ; , 23 cm
    Edition: 5th ed.
    DDC: 005.2/762
    Keywords: JavaScript (Computer program language) ; World Wide Web ; Electronic books ; local
    Abstract: The Web doesn¿t stand still¿not even for a minute¿and neither do the languages that Web pages are based on. That¿s why you need this eagerly anticipated update to the popular JavaScript for the World Wide Web: Visual QuickStart Guide. Through a combination of task-based instruction and strong visuals, best-selling authors and Web gurus Tom Negrino and Dori Smith take you step by step through all of today¿s JavaScript essentials: creating navigation bars and other user interface elements, producing dynamic images and smart forms, controlling and detecting browsers, creating and manipulating windows, validating user entries in Web forms, and more. Whether you¿re a beginning scripter who wants a thorough introduction to the topic or a more advanced scripter who needs a convenient reference, you¿ll find what you need here¿in straightforward language peppered with tips and techniques drawn from the authors¿ years of experience. By the end of the volume, you¿ll be able to smoothly integrate HTML, JavaScript, and CSS to bring your Web sites to life.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvii, 347 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    Keywords: JavaServer pages ; Web sites ; Design ; Electronic books ; local
    Abstract: Since being introduced in 1999, JavaServer Pages™ (JSP) have become a popular and important technology for building dynamic, interactive, content-rich Web sites. JavaServer Pages™, Second Edition is a hands-on guide to working with JSP, offering the easiest and most efficient ways for non-programmers and Web designers to create sophisticated, dynamic sites. Programmers can also utilize this book to independently create new dynamic components. This second edition covers the latest release of the JSP specification (2.0), many standard extensions to JSPs, and a number of best practices that have been developed since the publication of the first edition. This book also offers overviews of some related technologies, including: JavaBeans™ Servlets JavaServer Pages Standard Tag Library (JSTL) Jakarta Struts Databases JavaServer Pages™, Second Edition contains all the information necessary to start writing JSP--for anyone who has a computer and can write HTML. It includes practical, Java-based techniques for maintaining and personalizing information-rich Web sites, as well as examples based on Jakarta Struts, the new JSP toolkit. Recent updates provide a number of new tools and techniques that will allow readers to get the most productivity from JSPs, with the least amount of effort. Also included is a CD-ROM containing everything you need to get started. The tools, which are free, open-source, stable, secure, and run on pretty much every platform, are powerful enough to serve even a mid-sized Web site without problems. Contents of the CD-ROM include: Tomcat™, the open-source reference implementation of the latest JSP and Servlet specification; useful libraries such as the JavaServer Pages Standard Tag Library (JSTL) and Struts; Hsqldb, a self-contained, 100 percent pure Java database; all the code examples from the book; and a number of Java beans, providing ready-to-use components for many of the tasks frequently needed on a dynamic Web page. 0321150791B06042003
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 581 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: Enterprise Java™ Security: Building Secure J2EE™ Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehensive guide covers the current status of the Java™ 2 Platform, Enterprise Edition (J2EE), and Java™ 2 Platform, Standard Edition (J2SE™), security architectures and offers practical solutions and usage patterns to address the challenges of Java security. To aid developers who need to build secure J2EE applications, Enterprise Java™ Security covers at length the J2EE security technologies, including the security aspects of servlets, JavaServer Pages(TM) (JSP™), and Enterprise JavaBeans™ (EJB™)-technologies that are at the core of the J2EE architecture. In addition, the book covers Web Services security. Examples and sample code are provided throughout the book to give readers a solid understanding of the underlying technology. The relationship between Java and cryptographic technologies is covered in great detail, including: Java Cryptography Architecture (JCA) Java Cryptography Extension (JCE) Public-Key Cryptography Standards (PKCS) Secure/Multipurpose Internet Mail Extensions (S/MIME) Java Secure Socket Extension (JSSE)
    Note: Includes bibliographical references (p. 563) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 452 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Java (Computer program language) ; Wireless communication systems ; Electronic books ; local
    Abstract: Industrial-strength J2ME™ for enterprise developers, architects, and decision-makers J2ME offers an extraordinarily flexible and robust platform for developing mobile applications with enterprise-class performance, reliability, and value. Now, leading mobile developer Michael Yuan covers every aspect of building industrial-strength applications with J2ME: design, architecture, tools, processes, business issues, and more. Yuan introduces innovations that make the platform even more powerful, ranging from new J2ME profiles and wireless messaging APIs to mobile databases and web services tools. These innovations allow existing Java™ developers (especially J2EE™ developers) to leverage their skills and add mobility to enterprise applications. Yuan also presents more than a dozen complete sample applications-including the application that earned him the grand prize in Nextel, Sun, and Motorola's nationwide wireless developer contest. Coverage includes: Patterns and best practices for building end-to-end mobile applications Emerging mobile "killer applications": driving productivity and cost reduction "Smart client" applications: architecture and construction Advanced HTTP techniques for authentication and session tracking Overcoming hardware and network limitations Leading-edge mobile enterprise messaging techniques Mobile databases and synchronization engines XML and mobile web services, including the J2ME Web Services Optional Package New options for mobile security in the enterprise
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Language: English
    Pages: xiv, 462 p. , ill. ; , 25 cm
    DDC: 004
    Keywords: Computer capacity ; Planning ; Electronic digital computers ; Evaluation ; Electronic books ; local
    Abstract: Practical systems modeling: planning performance, availability, security, and more Computing systems must meet increasingly strict Quality of Service (QoS) requirements for performance, availability, security, and maintainability. To achieve these goals, designers, analysts, and capacity planners need a far more thorough understanding of QoS issues, and the implications of their decisions. Now, three leading experts present a complete, application-driven framework for understanding and estimating performance. You'll learn exactly how to map real-life systems to accurate performance models, and use those models to make better decisions--both up front and throughout the entire system lifecycle. Coverage includes: State-of-the-art quantitative analysis techniques, supported by extensive numerical examples and exercises QoS issues in requirements analysis, specification, design, development, testing, deployment, operation, and system evolution Specific scenarios, including e-Business and database services, servers, clusters, and data centers Techniques for identifying potential congestion at both software and hardware levels Performance Engineering concepts and tools Detailed solution techniques including exact and approximate MVA and Markov Chains Modeling of software contention, fork-and-join, service rate variability, and priority About the Web Site The accompanying Web site provides companion Excel workbooks that implement many of the book's algorithms and numerical examples.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xix, 450 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.26/8
    Keywords: Mac OS ; Cocoa (Application development environment) ; Macintosh (Computer) ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: A new edition of this title is available, ISBN-10: 0321503619 ISBN-13: 9780321503619 The highly acclaimed introduction to Cocoa-recommended most by experienced Mac OS X developers now updated and expanded. Here's what critics said about the first edition: "Reading this book is the absolute best way to learn how to harness the power of this amazing technology." - Andrew Stone, President, Stone Design, www.stone.com "Make sure this is the first one you pick up. It's the best book for a beginning Cocoa programmer." -From the review on HyperJeff.net & "I love this book. The descriptions are clear, the examples logical. Everything a programmer needs to get up to speed on Cocoa." - Dave Mark, Editor, MacTech Magazine To help programmers develop applications for Mac OS X, Apple is now giving away XCode, Interface Builder, and the Cocoa frameworks-the tools used to create Safari, GarageBand, Mail, and the iApps. Cocoa® Programming for Mac® OS X, Second Edition, will give you a complete understanding of how to use these tremendously powerful tools and frameworks to write full-featured applications for the Mac. Guiding programmers through the key features of Cocoa, this book emphasizes design patterns that enable you to predict the behavior of classes you have never used before. Written in a tutorial format, it takes you step-by-step through the creation of six applications and an Interface Builder palette. Each project introduces several new ideas, and as each concept or technique is discussed, the author, drawing on his own extensive experience, shows you the right way to use it. Updated for Xcode and Mac OS X 10.3, new chapters in this second edition include coverage of OpenGL, AppleScriptability, the undo manager, creating frameworks, and a brief introduction to using GNUstep on Linux.
    Note: Includes bibliographical references (p. 427-428) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xlix, 694 p. , ill. ; , 24 cm
    Edition: 3rd ed.
    DDC: 005.1/17
    Keywords: Embedded computer systems ; Programming ; Object-oriented methods (Computer science) ; Real-time data processing ; Electronic books ; local
    Abstract: Praise for Real Time UML, Third Edition "I found Real Time UML, Third Edition, to provide an informative and practical application of UML 2.0 to the development of real-time systems, and well worth the read by systems and software engineers. It is written in plain English and provides the right balance of depth and breadth." - Sanford Friedenthal, Deputy, Corporate Systems Engineering, Lockheed Martin Corporation; Chair: OMG Systems Engineering, Domain Special Interest Group "Douglass has again made highly technical material accessible to everyone. This book is an excellent introduction to the new UML 2.0, and if you want to learn what modeling for real-time environments is like, this is the book to read. His witty, conversational style should be a model for all authors of technical material." - Gary K. Evans, Founder and Object Evangelist, Evanetics, Inc. (www.evanetics.com) "Douglass has been a co-chair of the OMG's group interested in quality of service issues and, therefore, has valuable insights into the usefulness of these emerging technologies. His clear presentation of this information helps those applying these advanced technologies to extract the most benefit for their organizations and products, not only for the intended real-time embedded product, but also for products whose quality of performance, while not critical, is nevertheless of interest." - Thérèse M. Smith, President and CEO, Air Traffic Software Architecture, Inc. (USA and Canada) "The author presents an excellent overview of UML in the real-time space with plenty of colorful examples. This book is an excellent teaching tool for a newcomer or a reference for an expert!" - Soma Chatterjee, Senior Product Manager, I-Logix The increasing complexity of embedded and real-time systems requires a more premeditated and sophisticated design approach for successful implementation. The object-based Unified Modeling Language (UML) can describe the structural and behavioral aspects critical to real-time systems and has come to the fore as an outstanding medium for effective design. Like its best-selling predecessors, Real Time UML, Third Edition, provides an overview of the essentials of real-time systems and an introduction to UML that focuses on the use of the ever-evolving standard in design and development. This accessible book examines requirements analysis, the definition of object structure and behavior, architectural and mechanistic design, and more detailed designs that enco...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    ISBN: 0321125215
    Language: English
    Pages: xxx, 529 p. , ill. ; , 25 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: "Eric Evans has written a fantastic book on how you can make the design of your software match your mental model of the problem domain you are addressing. "His book is very compatible with XP. It is not about drawing pictures of a domain; it is about how you think of it, the language you use to talk about it, and how you organize your software to reflect your improving understanding of it. Eric thinks that learning about your problem domain is as likely to happen at the end of your project as at the beginning, and so refactoring is a big part of his technique. "The book is a fun read. Eric has lots of interesting stories, and he has a way with words. I see this book as essential reading for software developers-it is a future classic." - Ralph Johnson , author of Design Patterns "If you don't think you are getting value from your investment in object-oriented programming, this book will tell you what you've forgotten to do. "Eric Evans convincingly argues for the importance of domain modeling as the central focus of development and provides a solid framework and set of techniques for accomplishing it. This is timeless wisdom, and will hold up long after the methodologies du jour have gone out of fashion." - Dave Collins , author of Designing Object-Oriented User Interfaces "Eric weaves real-world experience modeling-and building-business applications into a practical, useful book. Written from the perspective of a trusted practitioner, Eric's descriptions of ubiquitous language, the benefits of sharing models with users, object life-cycle management, logical and physical application structuring, and the process and results of deep refactoring are major contributions to our field." - Luke Hohmann , author of Beyond Software Architecture "This book belongs on the shelf of every thoughtful software developer." - Kent Beck "What Eric has managed to capture is a part of the design process that experienced object designers have always used, but that we have been singularly unsuccessful as a group in conveying to the rest of the industry. We've given away bits and pieces of this knowledge...but we've never organized and systematized the principles of building domain logic. This book is important." - Kyle Brown , author of Enterprise Java™ Programming with IBM ® WebSphere ® The software development community widely acknowledges that domain modeling is central to software design. Through domain models, software developers are able to express rich functi...
    Note: Includes bibliographical references (p. 515-516) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 647 p. , ill. ; , 23 cm
    Series Statement: Prentice Hall series in computer networking and distributed systems
    DDC: 005.8
    Keywords: Computer crimes ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Reveals how attackers install malicious code and how they evade detection Shows how you can defeat their schemes and keep your computers and network safe! Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats Explains how to handle today's threats, with an eye on handling the threats to come "This is a truly outstanding book-enormous technical wealth and beautifully written." -Warwick Ford "Ed does it again, piercing the veil of mystery surrounding many of the more technical aspects of computer security!" -Harlan Carvey, CISSP "This book is entertaining and informative, while justifiably scaring you. Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle." -Radia Perlman, Distinguished Engineer, Sun Microsystems Keep control of your systems out of the hands of unknown attackers Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it! This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes: Solutions and examples that cover both UNIX® and Windows® Practical, time-tested, real-world actions you can take to secure your systems Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly! Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home compu...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: v. 〈1 〉 , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.2/762
    Keywords: JavaServer pages ; Java (Computer program language) ; Servlets ; Web servers ; Electronic books ; local
    Abstract: The J2EE(TM) Platform has become the technology of choice for developing professional e-commerce applications, interactive Web sites, and Web-enabled applications and services. Servlet and JSP(TM) technology is the foundation of this platform: it provides the link between Web clients and server-side applications. In this 2nd edition of the worldwide bestseller, the authors show you how to apply the latest servlet and JSP capabilities. Unlike other books that treat servlet or JSP technology in isolation, Core Servlets and JavaServer Pages provides a unified treatment, showing you when servlet technology is best, when the JSP approach is preferred, and when (and how) servlets and JSP should work together. Part I provides exhaustive coverage of the servlet 2.4 specification. It starts with server configuration, basic syntax, the servlet life cycle, and use of form data. It moves on to applying HTTP 1.1, cookies, and session tracking. Advanced topics include compressing Web content, incrementally updating results, dynamically generating images, and creating shopping carts. Part II gives an in-depth guide to JSP 2.0. It covers both the "classic" JSP scripting elements and the new JSP 2.0 expression language. It shows how to control the content type, designate error pages, include files, and integrate JavaBeans components. Advanced topics include sharing beans, generating Excel spreadsheets, and dealing with concurrency. Part III covers two key supporting technologies: HTML forms and database access with JDBC(TM). It explains every standard HTML input element and shows how to use appropriate JDBC drivers, perform database queries, process results, and perform updates. Advanced topics include parameterized queries, stored procedures, and transaction control. Design strategies include ways to integrate servlet and JSP technology, best practices for invoking Java code from JSP pages, plans for dealing with missing and malformed data, and application of the MVC architecture. Handy guides walk you through use of three popular servlet and JSP engines (Apache Tomcat, Macromedia JRun, and Caucho Resin) and some of the most widely used database systems (MySQL, Oracle9i, Microsoft Access). Volume 2 of this book covers advanced topics: filters, custom tag libraries, database connection pooling, Web application security, the JSP Standard Tag Library (JSTL), Apache Struts, JavaServer Faces (JSF), JAXB, and more. The same clear step-by-step explanations that made...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 386 p. , ill. ; , 23 cm. +
    DDC: 005
    Keywords: Computer software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: "I had a question about how to use a new Eclipse 3.0 feature, job scheduling, so I thought I would try out this book. I immediately found the answer with a concise explanation. Cool!" --Erich Gamma Official Eclipse 3.0 FAQs is the convenient source for answers to your most crucial questions about writing Eclipse plug-ins. Whether you're creating simple extensions for personal use or commercial Eclipse-based applications, you'll find hundreds of concise solutions here--including many that aren't answered anywhere else. John Arthorne and Chris Laffra have worked with Eclipse technology since the very beginning; both are active members of the Eclipse development community and frequently answer questions on Eclipse newsgroups and mailing lists. Here, they cover an extraordinary range of topics, from workspace management to documentation, SWT to JFace, JDT to natural language support. Many FAQs include code samples and references to other information, making the book an invaluable desk reference for anyone working with Eclipse. Just a few of the 350+ questions answered here... How do I upgrade Eclipse? Page 29 What is new in Eclipse 3.0? Page 34 How can I add my views and actions to an existing perspective? Page 187 How do I set up a Java project to share in a repository? Page 58 How do I declare my own extension point? Page 74 How do I display a Web page in SWT? Page 141 How do I support multiple natural languages in my plug-in messages? Page 253 How do I save settings for a dialog or wizard? Page 166 How do I provide syntax coloring in an editor? Page 269 How do I hook into global actions, such as Copy and Delete? Page 225 How do I create a Rich Client application? Page 241 What is the purpose of activities? Page 229 How do I create and examine an AST? Page 369
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 277 p. , ill. ; , 24 cm
    DDC: 005.1/2
    Keywords: Computer software ; Development ; Management ; Software engineering ; Electronic books ; local
    Abstract: Please note - there is now a second edition of this book available, with the ISBN of 0321658396. "Jim Highsmith is one of a few modern writers who are helping us understand the new nature of work in the knowledge economy." -Rob Austin, Assistant Professor, Harvard Business School "This is the project management book we've all been waiting for-the book that effectively combines Agile methods and rigorous project management. Not only does this book help us make sense of project management in this current world of iterative, incremental Agile methods, but it's an all-around good read!" -Lynne Ellen, Sr. VP & CIO, DTE Energy "Finally a book that reconciles the passion of the Agile Software movement with the needed disciplines of project management. Jim's book has provided a service to all of us." -Neville R(oy) Singham, CEO, ThoughtWorks, Inc. "The world of product development is becoming more dynamic and uncertain. Many managers cope by reinforcing processes, adding documentation, or further honing costs. This isn't working. Highsmith brilliantly guides us into an alternative that fits the times." -Preston G. Smith, principal, New Product Dynamics/coauthor, Developing Products in Half the Time One of the field's leading experts brings together all the knowledge and resources you need to use APM in your next project. Jim Highsmith shows why APM should be in every manager's toolkit, thoroughly addressing the questions project managers raise about Agile approaches. He systematically introduces the five-phase APM framework, then presents specific, proven tools for every project participant. Coverage includes: Six principles of Agile Project Management How to capitalize on emerging new product development technologies Putting customers at the center of your project, where they belong Creating adaptive teams that respond quickly to changes in your project's "ecosystem" Which projects will benefit from APM-and which won't APM's five phases: Envision, Speculate, Explore, Adapt, Close APM practices, including the Product Vision Box and Project Data Sheet Leveraging your PMI skills in Agile environments Scaling APM to larger projects and teams For every project manager, team leader, and team member
    Note: Includes bibliographical references (p. 263-267) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: v. 〈1〉 , ill. ; , 25 cm. +
    DDC: 005.2/768
    Keywords: Microsoft .NET Framework ; Electronic books ; local
    Abstract: Edited by a Lead Program Manager on Microsoft's .NET Framework team, .NET Framework Standard Library Annotated Reference, Volume 1, is the definitive reference for the .NET Framework base class library. This book utilizes extensive annotations and code samples from the creators of the technology to move beyond the online documentation and provide .NET developers with a dictionary-style reference to the most-used parts of the Framework. This volume covers a subset of the ISO CLI Standards, including the Base Class Library and the Extended Numerics Library. In the printed book you will find informative overviews of each namespace covered and an easy-to-follow alphabetic reference of types in the standard, including type-level descriptions, sample code with output, and annotations from the design team and standardization committee. With the ECMA and ISO standards as its core, this book includes: Annotations from key members of the Microsoft design team and the Standardization committee. Comments cover everything from design rationale and history to common problems and shortcomings. An overview of each namespace, describing its functionality and the inheritance hierarchy of types it defines. Type descriptions. Each type is covered in its own chapter, with a detailed description of how the type is to be used and a quick reference of the C# declaration syntax for all members defined on the type. Also noted: which members are only available in the Microsoft implementation of the .NET Framework, which are not available in the .NET Compact Framework, and which are only available in V1.1 of the .NET Framework. Code samples. Types are illustrated by fully compilable code samples with output included. Reference tabs and an exhaustive index, which allow readers to quickly and easily navigate the text. Reusable source code for more than one thousand samples. All code has been tested with versions 1.0, 1.1, and the 2.0 technical preview of the .NET Framework, and, where appropriate, with the .NET Compact Framework.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xliii, 681 p. , ill. (some col.) ; , 24 cm
    DDC: 005.2/762
    Keywords: C# (Computer program language) ; Computer software ; Development ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: Praise for Windows Forms Programming in C# "Chris may have a strong affinity for semi-colons, but anybody who's programming Windows Forms needs to read this book." - Brian Randell , Visual Basic Guru and DevelopMentor Instructor "Chris Sells has done it again. This book has everything a developer needs to know to write serious WinForms applications. Chris leaves no stone unturned in explaining the WinForms programming model and arming developers with the knowledge they need to exploit WinForms to the fullest. And, as if that weren't enough, Chris's writing style makes this book a page-turner for geeks. I couldn't put it down! Until John Grisham gets the .NET religion, you won't find a better WinForms book anywhere." - Jeff Prosise , co-founder of Wintellect, author of Programming Microsoft .NET "Chris is clearly *the* expert on web deployment of WinForms. In this book, Chris explains this material clearly and the power of the technology really shows. Unlike other WinForms books, this manuscript takes a more practical approach to the use of programming tools, such as Visual Studio. Sells's book strikes a nice balance between theory and practice. Windows Forms is an important technology that needs more press. Chris Sells' book is in great position to be the definitive work on the emerging technology." - Brian Graff , Sr. SW Engineer, PreEmptive Solutions, Inc. "Chris has written the best WinForms book around. Period." - Pierre Nallet , DevelopMentor Instructor "Chris does a nice job of presenting the core elements of WinForms complete with many concise samples and graphic depictions of UI features in action. Even more compelling, however, is how Chris anticipates how most developers will want to use these features, and presents techniques and paradigms of usage that will be invaluable for any serious WinForms developer. This book is destined to become dog-eared in the hands anyone building WinForms applications." - Fritz Onion , DevelopMentor instructor and author of Essential ASP.NET "I don't want just a description of the WinForms widgets. I can get that online or from other books. What I want is a roadmap for pitfalls to avoid, and innovative solutions for common problems. That is where this book shines." - Johan Ericcson , SW Engineer, Agilent "This is the definitive book for every Windows Programmer." - Fumiaki Yoshimatsu , Sr. Engineer, Intoferia Corporation "After browsing through countless books that introduce me to Windows Forms basics,...
    Note: Includes bibliographical references (p. 659-662) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 312 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Perl (Computer program language) ; Electronic books ; local
    Abstract: Bring new power, performance, and scalability to your existing Perl code! Cure whatever ails your Perl code! Maintain, optimize, and scale any Perl software... whether you wrote it or not Perl software engineering best practices for enterprise environments Includes case studies and code in a fun-to-read format Today's Perl developers spend 60-80% of their time working with existing Perl code. Now, there's a start-to-finish guide to understanding that code, maintaining it, updating it, and refactoring it for maximum performance and reliability. Peter J. Scott, lead author of Perl Debugged, has written the first systematic guide to Perl software engineering. Through extensive examples, he shows how to bring powerful discipline, consistency, and structure to any Perl program-new or old. You'll discover how to: Scale existing Perl code to serve larger network, Web, enterprise, or e-commerce applications Rewrite, restructure, and upgrade any Perl program for improved performance Bring standards and best practices to your entire library of Perl software Organize Perl code into modules and components that are easier to reuse Upgrade code written for earlier versions of Perl Write and execute better tests for your software...or anyone else's Use Perl in team-based, methodology-driven environments Document your Perl code more effectively and efficiently If you've ever inherited Perl code that's hard to maintain, if you write Perl code others will read, if you want to write code that'll be easier for you to maintain, the book that comes to your rescue is Perl Medic. If you code in Perl, you need to read this book.-Adam Turoff, Technical Editor, The Perl Review. Perl Medic is more than a book. It is a well-crafted strategy for approaching, updating, and furthering the cause of inherited Perl programs.-Allen Wyke, co-author of several computer books including JavaScript Unleashed and Pure JavaScript. Scott's explanations of complex material are smooth and deceptively simple. He knows his subject matter and his craft-he makes it look easy. Scott remains relentless practical-even the 'Analysis' chapter is filled with code and tests to run.-Dan Livingston, author of several computer books including Advanced Flash 5: Actionscript in Action
    Note: Includes bibliographical references (p. 303-306) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: Agile/iterative methods: From business case to successful implementation This is the definitive guide for managers and students to agile and iterative development methods: what they are, how they work, how to implement them- and why you should. Using statistically significant research and large-scale case studies, noted methods expert Craig Larman presents the most convincing case ever made for iterative development. Larman offers a concise, information-packed summary of the key ideas that drive all agile and iterative processes, with the details of four noteworthy iterative methods: Scrum, XP, RUP, and Evo. Coverage includes: Compelling evidence that iterative methods reduce project risk Frequently asked questions Agile and iterative values and practices Dozens of useful iterative and agile practice tips New management skills for agile/iterative project leaders Key practices of Scrum, XP, RUP, and Evo Whether you're an IT executive, project manager, student of software engineering, or developer, Craig Larman will help you understand the promise of agile/iterative development, sell it throughout your organizationaeand transform the promise into reality .
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 199 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computers ; Access control ; Wireless LANs ; Security measures ; Electronic books ; local
    Abstract: Now you can have the awesome benefits of wireless LANswithout falling victim to their notorious security flaws. Leadingwireless security expert Lee Barken shows you practicalworkarounds and fixes for the vulnerabilities in today'sWLANs, introduces high-security wireless protocols new to themarketplace, and offers step-by-step instructions for protectingall your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you'vebeen searching for--whether you're a network administrator,security specialist, manager, or home user. Topics covered include-- Why conventional wireless LANs are so insecure--and what you can do about it "Wardriving" software, equipment, and techniques: knowing your enemy 802.11i, WPA, TKIP, and AES: the new wireless security options 802.1x and EAP: enabling port-based authentication on your WLAN Safely connecting WLANs to wired networks Securing home and small office environments, one step at a time Accessing VPNs from wireless devices Integrating firewalls and wireless access points Improving security in public access environments Securing enterprise environments with 802.1x--a start-to-finish walkthrough
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvii, 456 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: C# (Computer program language) ; Microsoft .NET ; Object-oriented programming (Computer science) ; Software patterns ; UML (Computer science) ; Electronic books ; local
    Abstract: Steven John Metsker explains how to use C# as an object-oriented language, using design patterns to create clean code while taking advantage of the extensive Microsoft(R) .NET Framework Class Libraries. For all 23 classic "Gang of Four" design patterns, Metsker offers detailed code examples utilizing C# and the .NET Framework--as well as programming exercises crafted to help you rapidly build expertise. His exercises and explanations make extensive use of the Unified Modeling Language, helping you build your skills in this standard notation. Design patterns covered include: Interfaces: Adapter, Facade, Composite, and Bridge Responsibility: Singleton, Observer, Mediator, Proxy, Chain of Responsibility, and Flyweight Construction: Builder, Factory Method, Abstract Factory, Prototype, and Memento Extensions: Decorator, Iterator, and Visitor If you've already used design patterns in other languages, Design Patterns in C# will deepen your understanding, build your confidence, and help you apply them to any C# project. If you're a Microsoft programmer who's new to design patterns, this book will be an ideal practical introduction. www.awprofessional.com/patterns/ ADDISON-WESLEY PROFESSIONAL Pearson Education ISBN: 0-321-12697-1
    Note: Includes bibliographical references (p. 439-440) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.13/3
    Keywords: C++ (Computer program language) ; Electronic books ; local
    Abstract: Consistent, high-quality coding standards improve software quality, reduce time-to-market, promote teamwork, eliminate time wasted on inconsequential matters, and simplify maintenance. Now, two of the world's most respected C++ experts distill the rich collective experience of the global C++ community into a set of coding standards that every developer and development team can understand and use as a basis for their own coding standards. The authors cover virtually every facet of C++ programming: design and coding style, functions, operators, class design, inheritance, construction/destruction, copying, assignment, namespaces, modules, templates, genericity, exceptions, STL containers and algorithms, and more. Each standard is described concisely, with practical examples. From type definition to error handling, this book presents C++ best practices, including some that have only recently been identified and standardized-techniques you may not know even if you've used C++ for years. Along the way, you'll find answers to questions like What's worth standardizing--and what isn't? What are the best ways to code for scalability? What are the elements of a rational error handling policy? How (and why) do you avoid unnecessary initialization, cyclic, and definitional dependencies? When (and how) should you use static and dynamic polymorphism together? How do you practice "safe" overriding? When should you provide a no-fail swap? Why and how should you prevent exceptions from propagating across module boundaries? Why shouldn't you write namespace declarations or directives in a header file? Why should you use STL vector and string instead of arrays? How do you choose the right STL search or sort algorithm? What rules should you follow to ensure type-safe code? Whether you're working alone or with others, C++ Coding Standards will help you write cleaner code--and write it faster, with fewer hassles and less frustration.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 236 p. , ill. ; , 24 cm
    DDC: 025.04
    Keywords: Internet addresses ; Internet searching ; Search engines ; Web search engines ; Web sites ; Electronic books ; local
    Abstract: Best-selling author and research expert Tara Calishain offers her insider tips and tricks for web searching in this title from Prentice Hall PTR's Garage Series. The book begins with an in-depth look at search engines and other online tools such as browsers. It describes several principles of web searching to help you leverage the scope of the Internet to discover information. The book also covers specific topic areas of Internet searching, both domestically and internationally. Finally, Web Search Garage includes a special technical support section to teach you how to find the support solutions you need on the Internet. Specific topics covered include Search engines Browsers The principles of web searching Searching for news, jobs, and local information Finding images and audio on the web Searching for people Genealogy research Consumer help Drugs and medical information Kid-safe searching Whether you're a newbie or an Internet search guru, Web Search Garage is a valuable resource for using the Internet wisely to find the information you're looking for. Calishain's thorough explanations and examples, combined with her entertaining wit will help you fine-tune your skills and search the Internet to find convenient solutions.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxi, 564 p. , ill. ; , 24 cm
    DDC: 005.7/137682
    Keywords: Microsoft Exchange server ; Client/server computing ; Electronic books ; local
    Abstract: "Scott Schnoll has the amazing ability to present deeply technical information in an easy-to-understand, light-hearted way. This book is a must-read for anyone who is implementing Exchange 2003." - Paul Bowden , lead program manager, Exchange Server Development, Microsoft Corporation "Scott Schnoll's clear, concise writing style and diverse knowledge makes his Exchange 2003 book readable and valuable to anyone deploying, inheriting, or considering Exchange Server 2003. An excellent, thorough, all-purpose Exchange 2003 book." - William Lefkovics , senior messaging and systems analyst,eEye Digital Security "This is one Exchange Server book that you'll actually enjoy reading from cover to cover. You won't want to put it down . . . I didn't! It's easy to read, yet it contains all of the essential information that you need to know." Christopher Meirick , co-blogger, MS Exchange Blog: http://www.msexchange.co.uk "Scott Schnoll's knowledge of Exchange is second to none, and he has the ability to take very technical topics and explain them in a manner that is easy to digest. This book should be in every Exchange administrator's toolkit." Mark Fugatt , MCT,Exchange MVP "I really enjoyed reading this book. I found it to be extremely informative, especially in covering the new features of Exchange 2003. I have no doubts in recommending this book to those who are serious about Exchange 2003." - Neil Hobson , Exchange MVP, lead messaging consultant,Silversands "Scott has written the essential administrative guide for Exchange 2003 deployment. Not only covering the 'how-to,' but also truly exploring the 'what-if' scenarios as well." - Kevin T. Price , deputy chief technical officer, CMS Information Services, Inc. "An essential technical reference containing the critical information necessary for successful administration and deployment of Exchange Server 2003. New features, removed features-this book covers it all." - James V. Walker , consultant "Scott Schnoll's clear, concise writing style and diverse knowledge make his Exchange 2003 book readable and valuable to anyone deploying, inheriting, or considering Exchange Server 2003. An excellent, thorough, all-purpose Exchange book." - William Lefkovics, Senior Messaging and Systems Analyst, eEye Digital Security Nearly three years in the making, Exchange Server 2003 is the most reliable and secure messaging solution that Microsoft has ever produced. Microsoft Exchange Server 2003 Distilled is a practical, ha...
    Note: Includes bibliographical references (510-525) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 006.7/6
    Keywords: Application software ; Development ; Internet programming ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Abstract: Praise for XForms: XML Powered Web Forms "XForms is an exciting new technology for designing Web forms in an elegant and accessible way. Raman's book provides strong motivations for flexibility in the design of human-machine interactions, and explains how to use XForms to this end in crystal-clear prose." - Eve Maler XML Standards Architect, Sun Microsystems "Interactive forms technology is the logical evolution of Web user interface design. XForms represents a significant leap forward in that evolution." - Sean McGrath CTO, Propylon "The greatest strength of this book is the skill with which T. V. Raman links the XForms technology with the larger context of the Web. The limitations of HTML forms, the ways in which XForms provides a better foundation for Web and Web service user interfaces, and the opportunities for an XForms-powered Web that is accessible to all users and devices are outlined and brought together in a compelling way." - Michael Champion Advisory Research and Development Specialist, Software AG "Raman's book gives the reader an excellent explanation of the emerging W3C XForms recommendation. It's a well-organized and well-written book that begins with a gentle introduction to the concepts that motivated the development of XForms and then provides a reasonable overview of the relevant XML technology related to XForms. Most of the book covers XForms components: user interface controls, model properties, functions, actions, and events. It concludes with XForms as a Web service, offering multi-modal access and accessibility. In light of the October 2003 deadline for U.S. federal agencies to comply with the mandate of the Government Paperwork Elimination Act (GPEA) to give citizens the opportunity to provide information online, this important technical work comes none too soon. As T. V. masterfully elucidates, XForms provides the 'last mile' in 'connecting users to their data.' Insightfully, he also observes 'the document is the human interface' to data-an understanding without which the challenge to make eGov services 'citizen-centered' simply cannot and will not be met." - Owen Ambur Cofounder and Cochair, XML Working Group, U.S. CIO Council "I found the author's straightforward style quite comfortable and informative. I heartily recommend this book, especially for government XML developers interested in the broader area of E-Forms. Understanding XForms is key to developing robust and flexible E-Forms solutions that separate cont...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 488 p. , ill. ; , 24 cm
    DDC: 005.2/76
    Keywords: Application software ; Development ; Business enterprise ; Data processing ; Web services ; Electronic books ; local
    Abstract: "Linthicum provides an insightful overview of the services-integration issues that will enable you to capitalize on current and future integration technologies. He also dives deep into the key Web services technologies for implementing the next generation integration architecture. Highly recommended for those thinking of moving from traditional EAI to Web services." --Dr. Ravi Kalakota, CEO, E-Business Strategies Author of Services Blueprint: Roadmap for Execution For a majority of businesses, application integration is an outright failure. Most companies' computer systems are labyrinthine at best and self-destructive at worst. With the arrival of Web services, the new service-oriented middleware technology standard, and increasingly complex and challenging problem domains, it's time to take application integration to the next level. In Next Generation Application Integration distributed computing and application-integration expert David S. Linthicum describes the effect that this new generation of middleware will have on traditional application-integration efforts. Using key industry examples and case studies, Linthicum reveals the techniques and practices that are necessary to revolutionize data-sharing for any company--from sole-proprietorship to Fortune 500. In this book you'll find a thorough discussion of today's most advanced application-integration concepts, approaches, technologies, and solutions. Written with the technical manager and enterprise architect in mind, this book addresses essential application integration issues such as: Strategies for dealing with complex problem domains Forward-looking approaches to ensure long-term solutions that are right for your company Techniques for implementation of new Web services middleware Introductions to the appropriate technologies for next generation application integration Scenarios for Web services integration Support concepts outlined by case studies and real-world examples Descriptions and analyses of the different types of Web service integration--standards, implementation, and enabling technology Full analysis of Web services and integration, including the relationship between EAI and Web services How to leverage both vertical and horizontal application-integration standards If you're responsible for managing or implementing application-integration middleware, Next Generation Application Integration will prove to be an indispensable resource. 0201844567B07142003
    Note: Includes bibliographical references (p. 463-470) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 252 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Biometric identification ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: The complete guide to implementing biometric security solutions for your network Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application. In Biometrics for Network Security , biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems. Coverage includes: An introduction to authentication technologies and biometrics Dealing with privacy issues Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face Security concerns related to biometrics, including attempts to spoof or fake results Deployment of biometric security systems, including vendor selection and roll out procedures Real-life case studies For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!
    Note: Includes bibliographical references (p. 239-241) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Object-oriented programming (Computer science) ; Electronic books ; local
    Abstract: "A refreshingly new approach toward improving use-case modeling by fortifying it with aspect orientation." - Ramnivas Laddad, author of AspectJ in Action "Since the 1980s, use cases have been a way to bring users into software design, but translating use cases into software has been an art, at best, because user goods often don't respect code boundaries. Now that aspect-oriented programming (AOP) can express crosscutting concerns directly in code, the man who developed use cases has proposed step-by-step methods for recognizing crosscutting concerns in use cases and writing the code in separate modules. If these methods are at all fruitful in your design and development practice, they will make a big difference in software quality for developers and users alike. - Wes Isberg, AspectJ team member "This book not only provides ideas and examples of what aspect-oriented software development is but how it can be utilized in a real development project." - MichaelWard, ThoughtWorks, Inc. "No system has ever been designed from scratch perfectly; every system is composed of features layered in top of features that accumulate over time. Conventional design techniques do not handle this well, and over time the integrity of most systems degrades as a result. For the first time, here is a set of techniques that facilitates composition of behavior that not only allows systems to be defined in terms of layered functionality but composition is at the very heart of the approach. This book is an important advance in modern methodology and is certain to influence the direction of software engineering in the next decade, just as Object-Oriented Software Engineering influenced the last." - Kurt Bittner, IBM Corporation "Use cases are an excellent means to capture system requirements and drive a user-centric view of system development and testing. This book offers a comprehensive guide on explicit use-case-driven development from early requirements modeling to design and implementation. It provides a simple yet rich set of guidelines to realize use-case models using aspect-oriented design and programming. It is a valuable resource to researchers and practitioners alike." - Dr. Awais Rashid, Lancaster University, U.K., and author of Aspect-Oriented Database Systems "AOSD is important technology that will help developers produce better systems. Unfortunately, it has not been obvious how to integrate AOSD across a project's lifecycle. This book shatters that ba...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xv, 392 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Microsoft .NET ; Electronic books ; local
    Abstract: "As usual, Keith masterfully explains complex security issues in down-to-earth and easy-to-understand language. I bet you'll reach for this book often when building your next software application." --Michael Howard, coauthor, Writing Secure Code "When it comes to teaching Windows security, Keith Brown is 'The Man.' In The .NET Developer's Guide to Windows Security, Keith has written a book that explains the key security concepts of Windows NT, Windows 2000, Windows XP, and Windows Server 2003, and teaches you both how to apply them and how to implement them in C# code. By organizing his material into short, clear snippets, Brown has made a complicated subject highly accessible." --Martin Heller, senior contributing editor at Byte.com and owner of Martin Heller & Co. "Keith Brown has a unique ability to describe complex technical topics, such as security, in a way that can be understood by mere mortals (such as myself). Keith's book is a must read for anyone attempting to keep up with Microsoft's enhancements to its security features and the next major version of .NET." --Peter Partch, principal software engineer, PM Consulting "Keith's book is a collection of practical, concise, and carefully thought out nuggets of security insight. Every .NET developer would be wise to keep a copy of this book close at hand and to consult it first when questions of security arise during application development." --Fritz Onion, author of Essential ASP.NET with Examples in C# The .NET Developer's Guide to Windows Security is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems that run on Windows Server 2003, Windows XP, and Windows 2000. Author Keith Brown crystallizes his application security expertise into 75 short, specific guidelines. Each item is clearly explained, cross-referenced, and illustrated with detailed examples. The items build on one another until they produce a comprehensive picture of what tools are available and how developers should use them. The book highlights new features in Windows Server 2003 and previews features of the upcoming version 2.0 of the .NET Framework. A companion Web site includes the source code and examples used throughout the book. Topics covered include: Kerberos authentication Access control Impersonation Network security Constrained delegation Protocol transition Securing enterprise servi...
    Note: Includes bibliographical references (p. 379-380) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxi, 268 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; Electronic books ; local
    Abstract: Thoroughly reviewed and eagerly anticipated by the agile community, User Stories Applied offers a requirements process that saves time, eliminates rework, and leads directly to better software. The best way to build software that meets users' needs is to begin with "user stories": simple, clear, brief descriptions of functionality that will be valuable to real users. In User Stories Applied , Mike Cohn provides you with a front-to-back blueprint for writing these user stories and weaving them into your development lifecycle. You'll learn what makes a great user story, and what makes a bad one. You'll discover practical ways to gather user stories, even when you can't speak with your users. Then, once you've compiled your user stories, Cohn shows how to organize them, prioritize them, and use them for planning, management, and testing. User role modeling: understanding what users have in common, and where they differ Gathering stories: user interviewing, questionnaires, observation, and workshops Working with managers, trainers, salespeople and other "proxies" Writing user stories for acceptance testing Using stories to prioritize, set schedules, and estimate release costs Includes end-of-chapter practice questions and exercises User Stories Applied will be invaluable to every software developer, tester, analyst, and manager working with any agile method: XP, Scrum... or even your own home-grown approach.
    Note: "A Kent Beck signature book"--Cover. - Includes bibliographical references (p. 259-262) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 349 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: "Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important security principles. This approach works well and is particularly valuable in the security space, where companies and consultants are often hesitant to discuss true security incidents for potential embarrassment and confidentiality reasons. Defend I.T. is full of engaging stories and is a good read." --Fyodor, author of the Nmap Security Scanner and Insecure.Org " Defend I.T. answers reader demand for scenario-driven examples. Security professionals will be able to look at these case studies and relate them to their own experiences. That sets this book apart." --Lance Hayden, Cisco Systems "This is an exciting book! It's like reading several mysteries at once from different viewpoints, with the added benefit of learning forensic procedures along the way. Readers will benefit from the procedures, and the entertaining presentation is a real plus." --Elizabeth Zinkann, Equilink Consulting The battle between IT professionals and those who use the Internet for destructive purposes is raging--and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to take down organizations for days. Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with. Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio...
    Note: Includes bibliographical references (p. 321-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxiii, 386 p. , ill. ; , 24 cm
    DDC: 005.4/3
    Keywords: HP-UX ; Operating systems (Computers) ; Electronic books ; local
    Abstract: HP-UX 11i Internals Chris CooperChris Moore Invaluable information for optimizing HP-UX performance, reliability, and efficiency Find out how to approach system administration, tuning, and troubleshooting from a more informed perspective For every HP-UX sysadmin, programmer, and performance specialist HP Professional Books HP-UX 11i Internals HP-UX under the hood: practical insight for optimization and troubleshooting To maximize the performance, efficiency, and reliability of your HP-UX sysem, you need to know what's going on under the hood. HP-UX 11i Internals goes beyond generic UNIX internals, showing exactly how HP-UX works in PA-RISC environments. HP experts Cooper and Moore systematically illuminate HP-UX kernel data structures and algorithms for memory management, process and thread scheduling, I/O control, files and file systems, resource management, and more. They focus on HP-UX 11i, while also offering valuable insight for those using earlier versions. PA-RISC architecture: register set, virtual memory, key instructions, and procedure calling conventions HP-UX kernel organization: hardware-dependent and independent data structures Process and thread management: proc tables, memory management, scheduling, and the complete process/thread lifecycle System-wide memory resources: allocation and mapping to physical memory HP-UX paging and swapping Files and filesystems: traditional UNIX filesystems, HFS, VFS, and dynamic buffer cache I/O and device management: addressing, DMA, interrupts, device files, I/O configuration, device driver assignments, and I/O request pathways Logical Volume Management (LVM): abstracting physical disks from the disk I/O system HP-UX multiprocessing: challenges, data structures, and interfaces Kernel communication services: semaphores, message queues, shared memory, signals, and the kernel "callout" system Signaling in complex threaded environments System initialization, from vmunix to init: running HP-UX on diverse platforms Whether you administer HP-UX, tune it, troubleshoot it, or write kernel modules for it, you'll find HP-UX 11i Internals indispensable. U.S. $59.99 Canada $90.99 PRENTICE HALL Upper Saddle River, NJ 07458 www.phptr.com Hewlett-Packard(R) Professional Books A Prentice Hall Title www.hp.com/hpbooks ISBN: 0-13-032861-8
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 336 p. , ill. ; , 28 cm
    DDC: 621.39/9
    Keywords: Automatic speech recognition ; Human-computer interaction ; User interfaces (Computer systems) ; Electronic books ; local
    Abstract: This book is a comprehensive and authoritative guide to voice user interface (VUI) design. The VUI is perhaps the most critical factor in the success of any automated speech recognition (ASR) system, determining whether the user experience will be satisfying or frustrating, or even whether the customer will remain one. This book describes a practical methodology for creating an effective VUI design. The methodology is scientifically based on principles in linguistics, psychology, and language technology, and is illustrated here by examples drawn from the authors' work at Nuance Communications, the market leader in ASR development and deployment. The book begins with an overview of VUI design issues and a description of the technology. The authors then introduce the major phases of their methodology. They first show how to specify requirements and make high-level design decisions during the definition phase. They next cover, in great detail, the design phase, with clear explanations and demonstrations of each design principle and its real-world applications. Finally, they examine problems unique to VUI design in system development, testing, and tuning. Key principles are illustrated with a running sample application. A companion Web site provides audio clips for each example: www.VUIDesign.org The cover photograph depicts the first ASR system, Radio Rex: a toy dog who sits in his house until the sound of his name calls him out. Produced in 1911, Rex was among the few commercial successes in earlier days of speech recognition. Voice User Interface Design reveals the design principles and practices that produce commercial success in an era when effective ASRs are not toys but competitive necessities.
    Note: Includes bibliographical references (p. 315-324) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 407 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Microsoft Visual Basic for Windows ; BASIC (Computer program language) ; Microsoft .NET ; Electronic books ; local
    Abstract: Praise for The Visual Basic .NET Programming Language "There is no substitute to getting the inside scoop directly from a book written by the father of a programming language such as Bjarne Stroustrup for C++, James Gosling for Java and Alan Cooper for the original version of Visual Basic. Paul Vick, the father of Visual Basic .NET, explains the whys and hows of this exciting new language better than any other human being on the planet." - Ted Pattison , Barracuda.NET " The Visual Basic .NET Programming Language includes nuances that in all my use and study of VB .NET, I haven't seen discussed anywhere else. For example, I learned that you can use the Imports statement to import an Enum name, so that you needn't refer to the enum in all its uses. In addition, I learned that the dictionary lookup operator, '!', works in VB .NET-I thought this one had been retired. In any case, if you're searching for a book that covers all the language syntax issues, and more, Paul Vick's book is a great place to look." - Ken Getz , Senior Consultant, MCW Technologies, LLC "This book is an excellent stepping stone for Visual Basic developers wanting to get their toes wet in the .NET waters. Paul's presentation of the core topics all VB developers should tackle first is clear, concise, and unlike other books in the genre, does not overwhelm the reader. The VB6 vs. VB.NET task-oriented approach guides you through the new language and OO features, and then moves to basic threading and other CLR topics-as well as to the key points in the COM to .NET transition-in a well thought-out sequence. If you've been holding out on VB .NET, this is a great book to get you started." - Klaus H. Probst, Sr. Consultant/Architect, Spherion Technology Services, Microsoft MVP "There is no shortage of VB .NET books in the market, but this is the only book straight from the creators. While that is an excellent reason in itself for reading this book, it is the brevity and clarity of the content, along with the examples, that makes this book a must-have." - Amit Kalani , Developer "Overall, I liked this book and it definitely benefited me. I learned new things I didn't see anywhere else and I'll certainly put these to good use in the future. Paul's book makes a great reference manual for intermediate and advanced VB .NET developers." - Philip Williams , System Engineer, LDC Direct "This book contains a lot of great information I have seen nowhere else and addresses issues that other boo...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xviii, 605 p. , ill. ; , 24 cm
    DDC: 005.7/2
    Keywords: Business ; Computer programs ; XML (Document markup language) ; Electronic books ; local
    Abstract: "This volume offers relentlessly pragmatic solutions to help your business applications get the most out of XML, with a breezy style that makes the going easy. Mike has lived this stuff; he has a strong command of the solutions and the philosophy that underlies them." --Eve Maler, XML Standards Architect, Sun Microsystems Businesses running legacy applications that do not support XML can face a tough choice: Either keep their legacy applications or switch to newer, XML-enhanced applications. XML presents both challenges and opportunities for organizations as they struggle with their data. Does this dilemma sound familiar? What if you could enable a legacy application to support XML? You can. In Using XML with Legacy Business Applications, e-commerce expert Michael C. Rawlins outlines usable techniques for solving day-to-day XML-related data exchange problems. Using an easy-to-understand cookbook approach, Rawlins shows you how to build XML support into legacy business applications using Java and C++. The techniques are illustrated by building converters for legacy formats. Converting CSV files, flat files, and X12 EDI to and from XML will never be easier! Inside you'll find: A concise tutorial for learning to read W3C XML schemas An introduction to using XSLT to transform between different XML formats Simple, pragmatic advice on transporting XML documents securely over the Internet For developers working with either MSXML with Visual C++ or Java and Xerces: See Chapter 3 for a step-by-step guide to enabling existing business applications to export XML documents See Chapter 2 for a step-by-step guide to enabling existing business applications to import XML documents See Chapter 5 for code examples and tips for validating XML documents against schemas See Chapter 12 for general tips on building commerce support into an application For end users who need a simple and robust conversion utility: See Chapter 7 for converting CSV files to and from XML See Chapter 8 for converting flat files to and from XML See Chapter 9 for converting X12 EDI to and from XML See Chapter 11 for tips on how to use these techniques together for complex format conversions The resource-filled companion Web site (www.rawlinsecconsulting.com/booksupplement) includes executable versions of the utilities described in the book, full source code in C++ and Java, XSLT stylesheets, bug fixes, sample input and output files, and more. 0321154940B07142003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Language: English
    Pages: xxvii, 495 p. , ill. ; , 24 cm
    DDC: 005.1/17
    Keywords: Business enterprises ; Data processing ; Computer software ; Development ; Object-Oriented programming (Computer science) ; Software patterns ; UML (Computer science) ; Electronic books ; local
    Abstract: Praise for Enterprise Patterns and MDA &#8220I've never seen a system of business patterns as detailed as this one. The completeness that Arlow and Neustadt provide in these patterns is impressive. The explanations for why the patterns are formed the way they are and how they're interconnected are incredibly thorough. The patterns presented here have the potential to impact business applications in the same way the 'Gang of Four' patterns have impacted general software development." - Steve Vinoski Chief Engineer of Product Innovation IONA Technologies &#8220 Enterprise Patterns and MDA is a detailed, yet very readable, guide to designing business applications using reusable model components and Model Driven Architecture. It deserves a place on every application designer's desk." - Andrew Watson Vice President and Technical Director Object Management Group, Inc. &#8220Design patterns are generally acknowledged as an effective approach to developing robust and highly reusable software. Now that Model Driven Architecture is raising software design to ever-higher levels of abstraction, it is only natural that pattern concepts should find application in advanced modeling techniques. With this book, Arlow and Neustadt have greatly advanced the state of the art of MDA by defining both a theory and a methodology for applying the concept of Archetype Patterns to business software modeling." - John Poole Distinguished Software Engineer Hyperion Solutions Corporation "The burgeoning field of Model Driven Architecture tools and worldwide support for the Unified Modeling Language are finally being met with high-quality books that explain standard modeling techniques in a way any developer can follow. This book meets an urgent need squarely and clearly, and explains with copious examples a powerful approach to building usable (and reusable!) assets and applications. Every enterprise developer needs this book." - Richard Mark Soley, Ph.D. Chairman and CEO Object Management Group This book is a practical guide to applying Model Driven Architecture (MDA) and patterns in order to create business applications more easily. It provides you with a proven catalog of archetype patterns: high-value model components that can be easily incorporated into Unified Modeling Language (UML) models. Each archetype pattern allows you to understand and model a specific part of an enterprise system. Enterprise Patterns and MDA teaches you how to customize any archetype pattern-s...
    Note: Includes bibliographical references (p. 477-479) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and respond to such attacks and breaches. The Effective Incident Response Team is the first complete guide to forming and managing a Computer Incident Response Team (CIRT). In this book, system and network administrators and managers will find comprehensive information on establishing a CIRT's focus and scope, complete with organizational and workflow strategies for maximizing available technical resources. The text is also a valuable resource for working teams, thanks to its many examples of day-to-day team operations, communications, forms, and legal references. IT administrators and managers must be prepared for attacks on any platform, exploiting any vulnerability, at any time. The Effective Incident Response Team will guide readers through the critical decisions involved in forming a CIRT and serve as a valuable resource as the team evolves to meet the demands of ever-changing vulnerabilities. Inside, readers will find information on: Formulating reactive or preventative operational strategy Forming, training, and marketing the CIRT Selecting penetration-testing, intrusion-detection, network-monitoring, and forensics tools Recognizing and responding to computer incidents and attacks, including unauthorized access, denial-of-service attacks, port scans, and viruses Tracking, storing, and counting incident reports and assessing the cost of an incident Working with law enforcement and the legal community Benefiting from shared resources Scrutinizing closed incidents to further prevention Offering services such as user-awareness training, vulnerability and risk assessments, penetration testing, and architectural reviews Communicating the CIRT's return on investment through management reporting 0201761750B10062003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Language: English
    Pages: xxx, 337 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 004.36
    Keywords: Computer architecture ; Information technology ; Middleware ; Electronic books ; local
    Abstract: The challenges of designing, building, and maintaining large-scale, distributed enterprise systems are truly daunting. Written by and for IT professionals, IT Architectures and Middleware, Second Edition, will help you rise above the conflicts of new business objectives, new technologies, and vendor wars, allowing you to think clearly and productively about the particular challenges you face. This book focuses on the essential principles and priorities of system design and emphasizes the new requirements emerging from the rise of e-commerce and distributed, integrated systems. It offers a concise overview of middleware technology alternatives and distributed systems. Numerous increasingly complex examples are incorporated throughout, and the book concludes with some short case studies. Topics covered include: Middleware technology review Key principles of distributed systems: resiliency, performance and scalability, security, and systems management Information access requirements and data consistency Application integration design Recasting existing applications as services In this new edition, with updates throughout, coverage has been expanded to include: Service-oriented architecture concepts Web services and .NET technology A more structured approach to system integration design
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Language: English
    Pages: xx, 721 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.3
    Keywords: Computer software ; Development ; UML (Computer science) ; Electronic books ; local
    Abstract: "If you are a serious user of UML, there is no other book quite like this one. I have been involved with the UML specification process for some time, but I still found myself learning things while reading through this book-especially on the changes and new capabilities that have come with UML." - Ed Seidewitz , Chief Architect, IntelliData Technologies Corporation The latest version of the Unified Modeling Language-UML 2.0-has increased its capabilities as the standard notation for modeling software-intensive systems. Like most standards documents, however, the official UML specification is difficult to read and navigate. In addition, UML 2.0 is far more complex than previous versions, making a thorough reference book more essential than ever. In this significantly updated and expanded edition of the definitive reference to the standard, James Rumbaugh, Ivar Jacobson, and Grady Booch-the UML's creators-clearly and completely describe UML concepts, including major revisions to sequence diagrams, activity models, state machines, components, internal structure of classes and components, and profiles. Whether you are capturing requirements, developing software architectures, designing implementations, or trying to understand existing systems, this is the book for you. Highlights include: Alphabetical dictionary of articles covering every UML concept Integrated summary of UML concepts by diagram type Two-color diagrams with extensive annotations in blue Thorough coverage of both semantics and notation, separated in each article for easy reference Further explanations of concepts whose meaning or purpose is obscure in the original specifications Discussion sections offering usage advice and additional insight into tricky concepts Notation summary, with references to individual articles A hyperlinked version of the book in Adobe Reader format on CD-ROM, an excellent resource for browsing or searching the text for specific information An enhanced online index available on the book's web site allowing readers to quickly and easily search the entire text for specific topics The result is an indispensable resource for anyone who needs to understand the inner workings of the industry standard modeling language.
    Note: Includes bibliographical references (p. 703-705) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xiii, 378 p. , ill. ; , 23 cm
    DDC: 778.59/3/0285536
    Keywords: Microsoft Windows Movie Maker ; Motion pictures ; Editing ; Data processing ; Electronic books ; local
    Abstract: Just because you have the built-in software to transform your homemade videos into compelling, creative content doesn't necessarily mean you have the know-how to do so. For that you need this no-nonsense task-based guide. In these pages video guru Jan Ozer uses simple, step-by-step instructions peppered with plenty of visual aids and loads of time-saving tips to show you how to use Microsoft's Movie Maker 2 video-editing software (which is included with Windows XP) to edit your videos and share them with family and friends. Providing a visual approach to a visual product, Jan shows you how to start making movie magic instantly and effortlessly with the transitions, title options, and 2-D special effects included in Movie Maker 2. You'll learn how to create wipes, dissolves, freeze frames, and more in the process of producing a finished product that you'll be proud to email to friends, post on your Web site, or copy to CD or DVD.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Language: English
    Pages: xxii, 517 p. , ill. ; , 24 cm
    DDC: 025.04
    Keywords: Intranets (Computer networks) ; Design and construction ; Web portals ; Design ; Electronic books ; local
    Abstract: Building Portals, Intranets, and Corporate Web Sites Using Microsoft Servers is the practical guide to designing, developing, and implementing Web portals using Microsoft servers and the .NET Framework. James J. Townsend provides portal development teams with a working developer's overview of the concepts, technologies, and products used in building successful corporate portals. Readers learn how to create a portal architecture based on Microsoft .NET and integrate multiple server technologies and components to create a powerful portal solution. After introducing basic concepts in portal development, Townsend describes the Microsoft portal strategy and the importance of Web services to .NET. Readers become familiar with the .NET portal framework and the roles of Microsoft's SQL Server, Commerce Server (MCS), SharePoint Portal Server, BizTalk Server, Internet Security and Acceleration (ISA) Server, Content Management Server (MCMS), and related technologies. Key topic coverage includes security feature integration, personalization, content management, enterprise application integration (EAI), collaboration features, providing full search capability, and achieving scalability. A companion Web site features all the source code used in examples throughout the book. This book provides practical development advice in answer to questions commonly faced by portal developers, such as: When does it make sense to develop or deploy a Web service? Page 87 Is there a straightforward way to mitigate almost all potential security risks? Page 197 How do you get the most out of personalization? Page 266 How can you measure the return on investment for content management? Page 269 Which is the best online conferencing solution for your organization? Page 403 When and how should you scale up and/or out? Page 446 Building Portals, Intranets, and Corporate Web Sites Using Microsoft Servers shows you how to choose and integrate the right products and build the best portal for your organization.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxv, 505 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Query languages (Computer science) ; Electronic books ; local
    Abstract: "An excellent, early look at the emerging XML Query standard. The chapters on surprises and gotchas alone are worth the price of admission!" - Ashok Malhotra , Architect, Microsoft "XQuery is the most important XML standard to emerge in recent years, and is a language with which anyone using XML on a regular basis should become acquainted. Michael Brundage's accessible introduction to XQuery provides enough information on all aspects of the standard, including its dark corners, to allow any XML developer to jump right in and start coding." - Damien Fisher , Kernel Team Member, Soda Technologies Pty Ltd "This book does an excellent job of distilling the essentials of XQuery in an understandable, straightforward and easily digestable manner. This book has already become an indispensible part of my library and is a welcome addition to my XML repertoire." - Dare Obasanjo , Program Manager, Microsoft Corporation "Simply put, the emerging XQuery standard adds enormous value to XML data and this book is your key to unlocking that value. Here in one stop you will find an accessible introduction to XQuery and a complete reference. Practitioners will particularly value the sections on XQuery idioms and surprises where Michael shares his tricks of the trade." - Dave Van Buren , Project Manager, Jet Propulsion Laboratory "It's both a stupendous reference on XQuery and a good read. Michael writes with verve, authority, and an eminently readable style. What a rare delight to discover all this, and in a technical book too! When the sequel comes along, sign me up." - Howard Katz , Owner, Fatdog Software Inc., Editor, XQuery from the Experts (Addison-Wesley, 2003) From corporate IT departments to academic institutions, XML has become the language of choice for storing and transmitting data across diverse application domains. XQuery, an XML Query Language invented by the World Wide Web Consortium, offers a powerful, standardized way to query all of that XML-encapsulated information. With its ability to integrate XML and non-XML data, XQuery seems poised to do for XML what SQL has done for relational data. Written by the Technical Lead for XML query processing at Microsoft, XQuery: The XML Query Language is an invaluable resource for XQuery novices and experts alike. For those new to XQuery, this example-rich text serves as a tutorial that brings readers quickly up to speed on XQuery's data model, type system, and core language features. More experienced XML and...
    Note: Includes bibliographical references (p. 473-477) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Language: English
    Pages: p. cm
    DDC: 005.7/13769
    Keywords: Microsoft Windows server ; Computer storage devices ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Dilip Naik's Inside Windows Storage is an invaluable reference for developers and customers alike and is a must-read for anyone wishing to implement Windows-based storage networking." -Tom Clark, Director, Technical Marketing, Nishan Systems The Windows and enterprise storage markets are converging. Migrating upwards from low-end servers, Windows is becoming a genuine platform for running mission-critical applications. The enterprise storage market is moving from high-end servers to also include medium range servers. Thanks to a slew of enterprise storage related features, Microsoft Windows storage technologies are rapidly gaining widespread acceptance. System administrators, programmers, and technical managers need to learn to appreciate and to tap the full potential of Windows enterprise storage. Inside Windows Storage is the first book to provide a comprehensive look at new and emerging Microsoft storage technologies. The text begins with an overview of the enterprise storage industry and Windows Server architecture, including the Windows NT I/O subsystem. With that foundation in place, readers explore the ins and outs of current Windows offerings, upcoming Windows server releases, and third-party products. Key topic coverage includes: Direct Attached Storage, including the new Windows Storport driver model Fibre Channel Storage Area Networks (SANs) Network Attached Storage (NAS), including the Windows NT network stack and an overview of CIFS Backup and restore technologies, including Windows XP and Windows Server 2003 Volume Shadow Copy Service File systems and disk virtualization, including a detailed overview of NTFS as well as a study of Windows cluster file systems Storage management, including the new Windows Virtual Disk Service IP Storage and Infiniband High availability, including RAID mirroring as well as multi path I/O solutions This extensive guide concludes by tracing Windows NT storage features as they appear in Windows NT 4.0, Windows 2000, and Windows Server 2003, and by offering a preview of what to expect from future Windows server releases. In short, Inside Windows Storage will help IT professionals gear up for the major role that Windows servers will surely play in the future of enterprise storage. 032112698XB06302003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 150 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Computer architecture ; Computer software ; Development ; Electronic books ; local
    Abstract: "A readable and much needed introduction to MDA." --Dr. Jim Arlow, coauthor of UML and the Unified Process (Addison-Wesley, 2002) and Enterprise Patterns and MDA (Addison-Wesley, 2004) "This book provides an excellent introduction to the ideas and technologies that will form the foundation of the model-driven architecture over the coming years. I recommend it wholeheartedly." --Dr. Andy Evans, Managing Director, Xactium Limited, UK "Excellent job of distilling MDA down to its core concepts." --Krzysztof Czarnecki, Univeristy of Waterloo, coauthor of Generative Programming (Addison-Wesley, 2000) As systems have grown more crucial to the operations of organizations worldwide, so too have the costs associated with building and maintaining them. Enter model-driven architecture (MDA), a standard framework from the Object Management Group (OMG) that allows developers to link object models together to build complete systems. MDA prevents design decisions from being intertwined with the application and keeps it independent of its implementation. The result is an application that can be combined with other technologies as well as other applications, and models that become highly reusable assets. MDA Distilled is an accessible introduction to the MDA standard and its tools and technologies. The book describes the fundamental features of MDA, how they fit together, and how you can use them in your organization today. You will also learn how to define a model-driven process for a project involving multiple platforms, implement that process, and then test the resulting system. MDA Distilled will help you understand: The MDA framework, including the platform-independent model (PIM) and the platform-specific model (PSM) The Meta Object Facility (MOF)--the OMG's adopted standard for metamodeling Horizontal, vertical, and merging mappings between models Building marks and marking models Elaborating models, including viewing generated models, and managing manual changes Building executable models with Executable UML Agile MDA development Developers and architects can dramatically improve productivity, portability, interoperability, and maintenance with MDA. Find out how with this essential reference, and quickly learn how to harness the significant power of this new framework.
    Note: Includes bibliographical references (p. 143-144) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Berkeley, CA : Peachpit Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 572 p. , ill. ; , 23 cm
    DDC: 005.13/3
    Keywords: MySQL (Electronic resource) ; PHP (Computer program language) ; Web sites ; Design ; Electronic books ; local
    Abstract: When static HTML pages no longer cut it, you need to step up to dynamic, database-driven sites that represent the future of the Web. In PHP and MySQL for Dynamic Web Sites: Visual QuickPro Guide , the author of best-selling guides to both the database program (MySQL) and the scripting language (PHP) returns to cover the winning pair in tandem¿the way users work with them today to build dynamic sites using Open Source tools. Using step-by-step instructions, clearly written scripts, and expert tips to ease the way, author Larry Ullman discusses PHP and MySQL separately before going on to cover security, sessions and cookies, and using additional Web tools, with several sections devoted to creating sample applications. A companion Web site includes source code and demonstrations of techniques used in the volume. If you¿re already at home with HTML, you¿ll find this volume the perfect launching pad to creating dynamic sites with PHP and MySQL.
    Note: "Covers PHP 3 and 4 and MySQL 3 and 4"--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxi, 201 p. ; , 24 cm
    DDC: 005.1
    Keywords: Computer software ; Development ; eXtreme programming ; Electronic books ; local
    Abstract: Extreme Programming (XP) has been the subject of heated debate since its arrival on the programming scene in 1998-understandably so, as it contradicts many traditional software development beliefs. We¿ve heard success stories about sweeping changes made to organizations as a result of XP. We've read books about how this approach can work for our teams. However, are there times when XP isn't appropriate? There are certainly instances when making the leap to XP could potentially jeopardize a whole project. What's missing from all of this rhetoric? Witness Pete McBreen, software craftsman, examine the issue from both sides. In Questioning Extreme Programming , the author helps you examine and answer the following questions: Is the cost of change really low? Does XP allow proper testing? Does XP make sense? Is XP a return to the dark ages? Can we adopt XP practices for other approaches? Do you need process improvement or process change? Why are developers so zealous about adopting XP? Is XP suitable for your projects? What is the next step after Extreme Programming? After reading this thought-provoking book, software developers can make informed decisions about Extreme Programming, and whether it is suitable for their organization. Readers will also be able to determine whether Extreme Programming is inappropriate for a particular project. The author challenges you to look past the hype and start asking the hard questions about how software is built. Discover for yourself. 0201844575B07092002
    Note: Includes bibliographical references (p. 187-190) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Language: English
    Pages: xix, 265 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Computer software ; Development ; Java (Computer program language) ; Software engineering ; Electronic books ; local
    Abstract: Two of the most significant technological development trends of the past few years have been the Java 2 Platform, Enterprise Edition (J2EE), a platform specifically geared to the needs of enterprise systems, and the Rational Unified Process (RUP), a comprehensive development methodology. Building J2EE™ Applications with the Rational Unified Process is the first book to bring these two key development concepts together. Featuring a non-trivial sample application, the book demonstrates a customized subset of RUP that is relevant and essential to J2EE development. The text guides readers through the entire development process, from initial requirements gathering through system implementation, illuminating real-world intricacies, complications, tradeoffs, and decision making. The book presents a review of the latest releases of J2EE and RUP, emphasizing the rationale behind their content. A developer roadmap helps readers navigate the development process successfully, and detailed discussions of each aspect of the process reveal practical strategies and techniques. Also provided is detailed coverage of the key aspects behind any successful software development effort: Requirements, including use-case modeling and the gathering of architecturally significant requirements Analysis, including the transformation of requirements into a first-cut design model and a user-experience model Design, including the refinement of a design model, introducing interfaces, framework components, design classes, and use-case realizations Implementation, including the creation of source code and executable code based on the design, and the production of J2EE modules necessary for deployment Architectural concerns, including the production of a Software Architecture Document, Deployment Model, and Data Model The use of patterns, in particular J2EE design patterns The use of UML to model J2EE technologies such as Enterprise JavaBeans™ Written for anyone working in J2EE or using RUP, this book is an comprehensive guide that reveals how J2EE and the Rational Unified Process come together to produce a powerful, efficient, and effective approach to enterprise application development. Forewords were prepared by John Crupi, Distinguished Engineer at Sun Microsystems (and coauthor of Core J2EE Patterns, Prentice Hall, 2001), and Philippe Kruchten, Director of RUP Development at Rational Software (and author of The Rational Unified Process, Addison-Wesley, 2000). 0201791668B072...
    Note: Includes bibliographical references (p. 257) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxv, 466 p. , ill. ; , 24 cm
    DDC: 005.1
    Keywords: Java (Computer program language) ; Software engineering ; Electronic books ; local
    Abstract: TechnicalJava™ Developing Scientific and Engineering Applications Grant Palmer The practical, example-rich guide to Java technical programming If you want to use Java todevelop scientific or engineering programs, Technical Java is the Java guide you'vebeen searching for. Using real-life examples, expert scientific programmerGrant Palmer shows how to build powerful, versatile, and flexible software forvirtually any technical application. Whether you're moving from FORTRAN,C, or C ++, or learning Java as your first language, Palmer covers all you needto know- Java, FORTRAN, C, and C ++, similarities, differences, and migration issues Java 1.4 syntax, objects, classes, methods, interfaces, variables, arrays, exceptions, packages, I/O, and more Working with java.math and creating your own math functions-including detailed trigonometric and transcendental examples Data modeling, in depth: class hierarchies, generic class libraries, least-squares fit, fitting to non-polynomial equations, and more Solving differential equations and systems of equations, including Gauss-Jordan and Gaussian elimination, lower-upper decomposition, and matrix inversion Solving integral equations with both proper and improper integrals Working with Fourier transforms (DFT and FFT) Building Web and GUI-based technical applications with Swing/AWT and servlets PRENTICE HALL Profession TechnicalReference Upper Saddle River, NJ 07458 www.phptr.com ISBN: 0-13-101815-9 UPC: 076092022398
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 529 p. , ill. ; , 24 cm
    DDC: 004.165
    Keywords: Itanium (Microprocessor) ; Electronic books ; local
    Abstract: Step-by-step guide to assembly language for the 64-bit Itanium processors, with extensive examples Details of Explicitly Parallel Instruction Computing (EPIC): Instruction set, addressing, register stack engine, predication, I/O, procedure calls, floating-point operations, and more Learn how to comprehend and optimize open source, Intel, and HP-UX compiler output Understand the full power of 64-bit Itanium EPIC processors Itanium® Architecture for Programmers is a comprehensive introduction to the breakthrough capabilities of the new 64-bit Itanium architecture. Using standard command-line tools and extensive examples, the authors illuminate the Itanium design within the broader context of contemporary computer architecture via a step-by-step investigation of Itanium assembly language. Coverage includes: The potential of Explicitly Parallel Instruction Computing (EPIC) Itanium instruction formats and addressing modes Innovations such as the register stack engine (RSE) and extensive predication Procedure calls and procedure-calling mechanisms Floating-point operations I/O techniques, from simple debugging to the use of files Optimization of output from open source, Intel, and HP-UX compilers An essential resource for both computing professionals and students of architecture or assembly language, Itanium Architecture for Programmers includes extensive printed and Web-based references, plus many numeric, essay, and programming exercises for each chapter.
    Note: Includes bibliographical references (p. 485-493) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xviii, 600 p. , ill. ; , 24 cm
    DDC: 005.2/82
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The definitive guide to Linux processes and IPC for programmers and system administrators Pipes, message queues, semaphores, shared memory, RPC, sockets, the /proc filesystem, and much more In-depth coverage of multithreading with POSIX compliant LinuxThreads Contains dozens of detailedprogram examples (GNU C/C++ 2.96/Red Hat Linux 7.3 & 8.0) Raves for Gray's companion UNIX® volume! "Concepts I only vaguely understood now make complete sense to me! The sample code and exercises are so good,they seem to clamp down on the concepts like a vise grip..."-S. Lee Henry, Johns HopkinsUniversity The expert, example-rich guide to Linuxprocesses and IPC Serious Linux software developers need a sophisticated understanding of processes, system level programming andinterprocess communication techniques. Now, John Shapley Gray, author of the widely praised Interprocess Communicationin UNIX, Second Edition, zeroes in on the core techniques Linux uses to manage processes and IPC. With exceptionalprecision and great clarity, Gray explains what processes are, how they're generated, how they access their environments,how they communicate- and how to use them to build robust, high-performance systems . Includes extensive coverage of named/unnamed pipes, message queues, semaphores, and shared memory. Provides C++ classes for System V IPC facilities. Offers an in-depth introduction to socket-basedcommunication. Demystifies Linux's /proc file system. Illuminates the LinuxThreads POSIX threadimplementation and its use in multithreaded applications. Provides valuable tips and warnings, plus insight intokey differences amongst Linux and Unix implementations. Includes problem sets and illustrations designed toreinforce key concepts. Gray presents dozens of standalone program examples; all compiled with the GNU C/C++ compiler 2.96 & 3.2, and fullytested on PC platforms running Red Hat Linux 7.3 & 8.0. http://authors.phptr.com/gray/
    Note: Includes bibliographical references (p. 587-590) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    Edition: 3rd ed.
    DDC: 005.1
    Keywords: Computer software ; Development ; Software engineering ; Electronic books ; local
    Abstract: The Rational Unified Process, Third Edition , is a concise introduction to IBM's Web-enabled software engineering process. Rational Unified Process®, or RUP®, Lead Architect Philippe Kruchten quickly and clearly describes the concepts, structure, content, and motivation that are central to the RUP. Readers will learn how this approach to software development can be used to produce high-quality software, on schedule and on budget, using the Unified Modeling Language (UML), software automation, and other industry best practices. The RUP unifies the entire software development team and optimizes the productivity of each team member by bringing them the experience of industry leaders and lessons learned from thousands of projects. It provides detailed and practical guidance through all phases of the software development life cycle, but it is not inflexible. The RUP can be tailored to suit a wide variety of projects and organizations. This new edition has been updated to reflect all the changes integrated into the latest version of the Rational Unified Process--RUP 2003. It includes a four-color poster that lists key RUP elements: disciplines, workflows, artifacts, phases, and milestones. RUP 2003 also offers The RUP Builder with enhanced configurability, process views, and three base configurations. MyRUP, enabling personalized views of the RUP configuration. Additions to the Rational Process Workbench, used to define process components, perform modifications to the RUP, and create process plugins. The introduction of a separate Process Engineering Process offering guidance on adapting the RUP, creating plugins, and deploying the RUP. The Rational Unified Process, Third Edition , is a reliable introduction to the Rational Unified Process that will serve project managers and software professionals alike. 0321197704B11072003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 484 p. ; , 24 cm
    DDC: 005.13
    Keywords: Query languages (computer science) ; Electronic books ; local
    Abstract: "The individual perspectives on the concepts behind the XQuery language offered by XQuery from the Experts will be of great value to those who are seeking to understand the implications, opportunities, and challenges of XQuery as they design future information systems based on XML." -Michael Champion, Advisory Research and Development Specialist, Software AG XQuery answers the growing need for a functional XML search and transformation standard. Backed by the full weight of the World Wide Web Consortium (W3C), XQuery is being extremely well received by the IT community worldwide. The first major XML language that takes advantage of the benefits of strong typing provided by XML Schema, XQuery has the versatility to manipulate both XML and non-XML data and provides a valuable connection between the world of XML and relational databases. In XQuery from the Experts , select members of the W3C's XML Query working group come together to discuss every facet of XQuery. From Jonathan Robie's introductory "XQuery: A Guided Tour" to Mary Mary Fernández, Jérôme Siméon, and Philip Wadler's "Introduction to the Formal Semantics," XQuery is revealed in a way that both novice programmers and industry experts can appreciate. Edited by long-time XML expert and programmer Howard Katz, coverage ranges from strictly technical chapters to comparative essays such as Michael Kay's "XQuery, XPath, and XSLT," which explores the common ancestry of all three languages, and Don Chamberlin's "Influences on the Design of XQuery," which details the process behind XQuery's design. Key coverage includes: Denise Draper on "Mapping Between XML and Relational Data" Michael Rys exploring "Integrating XQuery and Relational Database Systems" Jim Tivy's analysis of "A Native XML DBMS" Mary Mary Fernández, Jérôme Siméon, and Philip Wadler, presenting "Static Typing in XQuery" Information presented in both a tutorial and a reference framework for use by XML professionals of any level For IT managers, professionals, programmers, or anyone involved with XML, XQuery from the Experts is an invaluable resource. 0321180607B07212003
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Language: English
    Pages: xx, 663 p. ; , 24 cm
    DDC: 005.1/068/5
    Keywords: Capability maturity model (Computer software) ; Software engineering ; Electronic books ; local
    Abstract: Many organizations use Capability Maturity Models® (CMMs®) to assess development and maintenance processes, implement improvements, and measure progress. Although consistent in purpose, these models differ in terminology and design--enough sometimes to cause conflict and confusion when used within the same organization. Addressing the need for a more coordinated approach, Capability Maturity Model Integration (CMMI®) provides a single framework for improvement in software engineering, systems engineering, integrated product and process development, and supplier sourcing. This book is the definitive reference for the most current release of CMMI models. To use a CMMI model available on the SEI Web site, users must choose from among multiple models based on their organization's improvement needs. This book provides a single source for all CMMI model information. Readers can get started without having to select a model first--all of the choices are compiled in one place and explained in detail. The book begins with background information needed to understand the content and structure of these integrated models and how to use them. A case study illustrates their implementation in a real environment. A variety of practical material, such as glossary and index, is also provided. The bulk of the book comprises the content of all CMMI models, covering the 25 process areas (PAs) that span the product life cycle, including detailed best practices. All CMMI models have two representations. The continuous representation allows an organization to improve using selected PAs at different rates. The staged representation enables organizations to follow a predefined and proven improvement path using multiple PAs. Both representations are described so that readers will more clearly see the similarities and differences between the two representations and will be able to choose the right approach for their organization. Whether you are new to CMMI or are already familiar with some version of it, this book is an essential resource for managers, practitioners, and process improvement team members who need to understand, evaluate, and/or implement a CMMI model. The ultimate objective of CMMI is integrating processes to improve products; this book contains everything you need to get that done. 0321154967B01232003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 025.04
    Keywords: Business enterprises ; Computer networks ; Web portals ; Design ; Web site development ; Electronic books ; local
    Abstract: Praise for Proven Portals "Enterprise portals are a key component in supporting enterprise business integration, and this book is a must-read for anyone involved in planning or deploying a portal solution." - Colin White , President, Intelligent Business Strategies "Enterprise portals have moved from the fringes of business to a core competency in the span of a few short years. This book provides the balanced overview managers need to make intelligent decisions without dragging them into a morass of technical detail." - Marcia Robinson , President, E-Business Strategies Author of Services Blueprint: Roadmap for Execution "Portals have become the ubiquitous format for most uses of the Web. If you are venturing into portal land, whether for the first time or after a few experiences, Dan Sullivan's book, Proven Portals: Best Practices for Planning, Designing, and Developing Enterprise Portals , is a valuable guide for getting organized and oriented. Understanding the approaches, technologies, and best practices described in this book will help ensure that your portal project is both a technical and a business success." - Rose O'Donnell , Vice President of Engineering, Bowstreet, Inc. "This book is chock-full of valuable knowledge and practical advice on implementing portals. Dan Sullivan once again gives us comprehensive information and useful techniques for delivering what's become a business staple. A must-read for practitioners and managers alike!" --Jill Dyché, Partner, Baseline Consulting Group Increasingly, corporations are turning to portals to foster more integrated, Web-based user experiences for employees, customers, and vendors. By providing collaborative, personalized environments and adaptive workspaces, portals allow businesses to better acquire, serve, and retain customers; more effectively manage production and sales; and empower their staff with instant access to critical information. Focusing on critical elements of portal implementations, Proven Portals combines design principles with a series of in-depth case studies exploring how innovative enterprises, from NASA and Johnson Controls to CARE Canada and Empire Blue Cross Blue Shield, have successfully deployed portal technologies to reap significant rewards. In this book the author shares proven strategies for: Organizing information in an intuitive, coherent manner Creating a modular, adaptable framework for application integration Developing a robust, scalable architecture I...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxi, 346 p. , ill. ; , 24 cm
    DDC: 004.6/068
    Keywords: Computer networks ; Management ; Computer storage devices ; iSCSI (Computer network protocol) ; Electronic books ; local
    Abstract: iSCSI: The Universal Storage Connection is an informative overview and in-depth guide to the emerging iSCSI standard, the technology that enables data storage, access, and management over networks, intranets, and the Internet. The iSCSI protocol reduces the total cost of ownership of shared storage solutions and enables an organization to tie together disparate systems and data, including both server class systems and laptop and desktop systems. Numerous leading technology companies, including IBM®, Cisco Systems®, and Intel®, are currently supporting iSCSI initiatives. Written for network and data storage professionals, this comprehensive book introduces iSCSI and explores its growing role within the data storage industry. It describes each element of the technology in detail-from session establishment through error handling-and examines the relationship between iSCSI and the SCSI protocol from which it evolved. Specific topics discussed include: iSCSI's use in small office, midrange, and high-end settings TCP/IP fundamentals, and how they apply to iSCSI The importance of data integrity New hardware that addresses bandwidth and latency issues iSCSI naming conventions The establishment of a communication path between the host system and storage controller Commands and data sequencing Control of the flow of commands Task management Error handling Companion technologies, including discovery and security processes Backup and disaster preparation iSCSI performance issues In addition, the book includes an explanation of the technologies that hardware vendors are implementing to permit direct memory placement of iSCSI messages without additional main processor involvement. A helpful icon appears throughout the book, mapping out appropriate reading tracks based on your technical level. Comprehensive, clearly written, and organized for easy access, this iSCSI handbook serves as both an excellent starting point for those involved in data storage solutions and a guide to understanding the technically detailed Internet Engineering Task Force (IETF) iSCSI Standards document.
    Note: Includes bibliographical references (p. 323-327) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...