Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Safari Tech Books Online  (48)
  • Erl, Thomas
  • Sebastopol, Calif. : O'Reilly  (24)
  • Upper Saddle River, NJ : Prentice Hall Professional Technical Reference  (24)
Datenlieferant
Materialart
Sprache
Erscheinungszeitraum
  • 1
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 202 p. , ill. ; , 24 cm
    DDC: 658.4/012
    Schlagwort(e): Business planning ; Strategic planning ; Electronic books ; local
    Kurzfassung: Praise for Let Go To Grow "Over the next ten years large companies will be hit with a wide array of harrowing new business challenges-commoditization being at the top of that list. Let Go To Grow elegantly outlines the critical new innovation, standardization, and globalization strategies that corporations can use to hurdle these obstacles and thrive in the coming years." -George F. Colony, CEO, Forrester Research, Inc. "This is a very important book for CEOs and top executives who are facing brutal, global competitive pressures, which is probably a majority. Let Go To Grow describes a strategy that will allow you as a business leader to do what you do best, while sidestepping the commoditization that's driving down profit margins in so many businesses. This book reflects not only what IBM is thinking, but also what other companies ranging from Dell to FedEx to Wal-Mart are doing to win in extremely competitive markets. Read this book for practical real-world insights, not for any academic theories." -William J. Holstein, Editor-in-Chief, Chief Executive magazine " Let Go To Grow is a must-read for executives who are trying to use strategy and management practices to drive innovation and productivity gains. It puts concepts like componentization, outsourcing, and off-shoring in a much more strategic context than anything else I've read. The book clearly shows how winning companies have gone from optimizing value chains to managing global "value webs" for competitive advantage. The argument is enhanced significantly by specific practical case examples featuring leading companies like Dell, eBay, GE, Procter & Gamble, and Toyota." -Tony Friscia, President and CEO, AMR Research "Sanford and Taylor carefully analyze the global marketplace and offer a progressive new strategy for transforming an underperforming business...A pioneering blueprint for the 21st-century business." -Kirkus Reports Drive sustained growth! -Use on demand techniques to gain unprecedented speed, flexibility, and adaptability -Construct dynamic "value webs" that leverage innovation from any source Deregulation, globalization, and the Internet are driving rampant commoditization in virtually every industry. To escape that trap and grow profitably, you must "let go" of traditional control mechanisms. In their place, you must build new models, relationships, and platforms that capture and deliver value from multiple sources, inside and outside the enterprise. In Let Go To Grow ,...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.4/46
    Schlagwort(e): Linux ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: Praise for Mark Sobell's Books "I keep searching for books that collect everything you want to know about a subject in one place, and keep getting disappointed. Usually the books leave out some important topic, while others go too deep in some areas and must skim lightly over the others. A Practical Guide to Red Hat® Linux® is one of those rare books that actually pulls it off. Mark G. Sobell has created a single reference for Red Hat Linux that cannot be beat! This marvelous text (with a 4-CD set of Linux Fedora Core 2 included) is well worth the price. This is as close to an 'everything you ever needed to know' book that I've seen. It's just that good and rates 5 out of 5." -Ray Lodato, Slashdot contributor "Mark Sobell has written a book as approachable as it is authoritative." -Jeffrey Bianchine, Advocate, Author, Journalist "Excellent reference book, well suited for the sysadmin of a linux cluster, or the owner of a PC contemplating installing a recent stable linux. Don't be put off by the daunting heft of the book. Sobell has striven to be as inclusive as possible, in trying to anticipate your system administration needs." -Wes Boudville, Inventor " A Practical Guide to Red Hat® Linux® is a brilliant book. Thank you Mark Sobell." -C. Pozrikidis, University of California at San Diego "This book presents the best overview of the Linux operating system that I have found. . . . It should be very helpful and understandable no matter what the reader's background is: traditional UNIX user, new Linux devotee, or even Windows user. Each topic is presented in a clear, complete fashion and very few assumptions are made about what the reader knows. . . . The book is extremely useful as a reference, as it contains a 70-page glossary of terms and is very well indexed. It is organized in such a way that the reader can focus on simple tasks without having to wade through more advanced topics until they are ready." -Cam Marshall, Marshall Information Service LLC, Member of Front Range UNIX Users Group FRUUG, Boulder, Colorado "Conclusively, this is THE book to get if you are a new Linux user and you just got into RH/Fedora world. There's no other book that discusses so many different topics and in such depth." -Eugenia Loli-Queru, Editor in Chief, OSNews.com The Most Useful Linux Tutorial and Reference Ever, with Hundreds of High-Quality Examples Covering Every Linux Distribution! To be truly productive with Linux, you need to thoroughly mast...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Praise for Core Security Patterns Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. --Whitfield Diffie, inventor of Public-Key Cryptography A comprehensive book on Security Patterns, which are critical for secure programming. --Li Gong, former Chief Java Security Architect, Sun Microsystems, and coauthor of Inside Java 2 Platform Security As developers of existing applications, or future innovators that will drive the next generation of highly distributed applications, the patterns and best practices outlined in this book will be an important asset to your development efforts. --Joe Uniejewski, Chief Technology Officer and Senior Vice President, RSA Security, Inc. This book makes an important case for taking a proactive approach to security rather than relying on the reactive security approach common in the software industry. --Judy Lin, Executive Vice President, VeriSign, Inc. Core Security Patterns provides a comprehensive patterns-driven approach and methodology for effectively incorporating security into your applications. I recommend that every application developer keep a copy of this indispensable security reference by their side. --Bill Hamilton, author of ADO.NET Cookbook , ADO.NET in a Nutshell , and NUnit Pocket Reference As a trusted advisor, this book will serve as a Java developers security handbook, providing applied patterns and design strategies for securing Java applications. --Shaheen Nasirudheen, CISSP,Senior Technology Officer, JPMorgan Chase Like Core J2EE Patterns , this book delivers a proactive and patterns-driven approach for designing end-to-end security in your applications. Leveraging the authors strong security experience, they created a must-have book for any designer/developer looking to create secure applications. --John Crupi, Distinguished Engineer, Sun Microsystems, coauthor of Core J2EE Patterns Core Security Patterns is the hands-on practitioners guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisionin...
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.4/32
    Schlagwort(e): Linux ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: Learn Linux kernel programming, hands-on : a uniquely effective top-down approach The Linux ® Kernel Primer is the definitive guide to Linux kernel programming. The authors' unique top-down approach makes kernel programming easier to understand by systematically tracing functionality from user space into the kernel and carefully associating kernel internals with user-level programming fundamentals. Their approach helps you build on what you already know about Linux, gaining a deep understanding of how the kernel works and how its elements fit together. One step at a time, the authors introduce all the tools and assembly language programming techniques required to understand kernel code and control its behavior. They compare x86 and PowerPC implementations side-by-side, illuminating cryptic functionality through carefully-annotated source code examples and realistic projects. The Linux ® Kernel Primer is the first book to offer in-depth coverage of the rapidly growing PowerPC Linux development platform, and the only book to thoroughly discuss kernel configuration with the Linux build system. Coverage includes Data structures x86 and PPC assembly language Viewing kernel internals Linux process model User and kernel space Interrupts and exceptions Memory allocation and tracking Tracing subsystem behavior I/O interactions Filesystems and file operations Scheduling and synchronization Kernel boot process Kernel build system Configuration options Device drivers And more... If you know C, this book teaches you all the skills and techniques you need to succeed with Linux kernel programming. Whether you're a systems programmer, software engineer, systems analyst, test professional, open source project contributor, or simply a Linux enthusiast, you'll find it indispensable. © Copyright Pearson Education. All rights reserved.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 384 p. , ill. ; , 24 cm
    DDC: 005.1
    Schlagwort(e): Computer software ; Development ; Software engineering ; Electronic books ; local
    Kurzfassung: Extend RUP to Drive Improvements Across the Entire IT Lifecycle The Rational Unified Process is a powerful tool for improving software development -- but it doesn't go nearly far enough. Today's development organizations need to extend RUP to cover the entire IT lifecycle, including the cross-project and enterprise issues it largely ignores. The Enterprise Unified Process (EUP) does precisely that, enabling you to deliver systems that meet all the needs of today's businesses. Now, EUP's creator and architects present the definitive introduction to EUP, and demonstrate how to use it in your environment. The Enterprise Unified Process systematically identifies the business and technical problems that RUP fails to address, and shows how EUP fills those gaps. Using actual examples and case studies, the authors introduce processes and disciplines for producing new software, implementing strategic reuse, "sunsetting" obsolete code and systems, managing software portfolios, and much more. Their independent, "tool agnostic" coverage will be indispensable no matter which RUP products or platforms you've invested in. Coverage includes Practical, step-by-step guidance for adopting EUP in midsized-to-large organizations Proven processes for optimizing ongoing IT operations and support Enterprise business modeling and architecture with EUP EUP disciplines for enterprise administration, people management, and software process improvement Using the new EUP plug-in for IBM's RUP platform Workflow diagrams fully consistent with RUP for easy understanding Detailed appendices covering EUP roles, artifacts, and terminology EUP is the missing link that can help IT professionals achieve the full benefits of RUP in the enterprise. This book will help you discover it, master it, implement it, and succeed with it. © Copyright Pearson Education. All rights reserved.
    Anmerkung: Includes bibliographical references (p. 361-369) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 658.4/038
    Schlagwort(e): Chief information officers ; Information resources management ; Information technology ; Management ; Management ; Electronic books ; local
    Kurzfassung: World-class IT leadership solutions from working CIOs: detailed, realistic, proven Every year, IT leadership becomes more challenging. Don't go it alone. Get practical help from the people who know what you're up against, and know what works: your most successful peers . In CIO Wisdom II, more than a dozen of today's leading CIOs share specific, realistic, up-to-the-minute techniques for maximizing agility, cost-effectiveness, and business value . You'll find solutions for managing both the internal and external forces impacting IT, and for dealing with more than 20 of your toughest issues -- business, technical, and human . You'll find specific, realistic approaches to everything from architecture to outsourcing, new technology selection to governance. CIO Wisdom II: it's more valuable than your last consultant -- and a whole lot more cost-effective. Anticipating the next transformation in your role as CIO -- and getting ahead of the curve Delivering real-time, mission-critical business intelligence: lessons from the military Integrating the enterprise: New best practices and cost-effective technical options Quantifying and maximizing software return on investment Mastering five crucial lessons for successful IT outsourcing Managing outsourced environments for maximum responsiveness, flexibility, and efficiency Leveraging the value of open source -- and minimizing its risks Using IT to improve business processes -- and improving your own internal processes, including procurement Systematically securing your IT facilities Achieving compliance -- and leveraging those investments for competitive advantage Previewing tomorrow's key trends in information management © Copyright Pearson Education. All rights reserved.
    Anmerkung: Includes bibliographical references
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 434 p. , ill. ; , 24 cm
    Serie: Robert C. Martin series
    DDC: 005.1
    Schlagwort(e): Application software ; Development ; Electronic books ; local
    Kurzfassung: Get more out of your legacy systems: more performance, functionality, reliability, and manageability Is your code easy to change? Can you get nearly instantaneous feedback when you do change it? Do you understand it? If the answer to any of these questions is no, you have legacy code, and it is draining time and money away from your development efforts. In this book, Michael Feathers offers start-to-finish strategies for working more effectively with large, untested legacy code bases. This book draws on material Michael created for his renowned Object Mentor seminars: techniques Michael has used in mentoring to help hundreds of developers, technical managers, and testers bring their legacy systems under control. The topics covered include Understanding the mechanics of software change: adding features, fixing bugs, improving design, optimizing performance Getting legacy code into a test harness Writing tests that protect you against introducing new problems Techniques that can be used with any language or platformwith examples in Java, C++, C, and C# Accurately identifying where code changes need to be made Coping with legacy systems that aren't object-oriented Handling applications that don't seem to have any structure This book also includes a catalog of twenty-four dependency-breaking techniques that help you work with program elements in isolation and make safer changes. © Copyright Pearson Education. All rights reserved.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 333 p. , ill. ; , 24 cm
    Ausgabe: 3rd ed.
    Serie: Nutshell handbook
    Schlagwort(e): UNIX (Computer file) ; UNIX Shells ; Electronic books ; local
    Kurzfassung: O'Reilly's bestselling book on Linux's bash shell is at it again. Now that Linux is an established player both as a server and on the desktop Learning the bash Shell has been updated and refreshed to account for all the latest changes. Indeed, this third edition serves as the most valuable guide yet to the bash shell.As any good programmer knows, the first thing users of the Linux operating system come face to face with is the shell the UNIX term for a user interface to the system. In other words, it's what lets you communicate with the computer via the keyboard and display. Mastering the bash shell might sound fairly simple but it isn't. In truth, there are many complexities that need careful explanation, which is just what Learning the bash Shell provides.If you are new to shell programming, the book provides an excellent introduction, covering everything from the most basic to the most advanced features. And if you've been writing shell scripts for years, it offers a great way to find out what the new shell offers. Learning the bash Shell is also full of practical examples of shell commands and programs that will make everyday use of Linux that much easier. With this book, programmers will learn: How to install bash as your login shell The basics of interactive shell use, including UNIX file and directory structures, standard I/O, and background jobs Command line editing, history substitution, and key bindings How to customize your shell environment without programming The nuts and bolts of basic shell programming, flow control structures, command-line options and typed variables Process handling, from job control to processes, coroutines and subshells Debugging techniques, such as trace and verbose modes Techniques for implementing system-wide shell customization and features related to system security
    Anmerkung: Includes index. - Previous ed.: 1998
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 333 p., [16] p. of plates , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Spam (Electronic mail) ; Electronic books ; local
    Kurzfassung: More than sixty percent of today's email traffic is spam, according to email filtering firm Brightmail. This year alone, five trillion spam messages will clog Internet users in-boxes, costing society an estimated $10-billion in lost productivity, filtering software, and other expenses. Spam Kings: The Real Story behind the High-Rolling Hucksters Pushing Porn, Pills, and %*)# Enlargements is the first book to expose the shadowy world of the people responsible for the junk email problem. Author and veteran investigative journalist Brian S. McWilliams delivers a compelling account of the cat-and-mouse game played by spam entrepreneurs in search of easy fortunes and those who are trying to stop them. Spam Kings chronicles the evolution of Davis Wolfgang Hawke, a notorious neo-Nazi leader (Jewish-born) who got into junk email in 1999. Using Hawke as a case study, Spam Kings traces the twenty-year-old neophyte's rise in the spam trade to his emergence as a major player in the lucrative penis pill market--a business that would eventually make him a millionaire and the target of lawsuits from AOL and others. Spam Kings also tells the parallel story of Susan Gunn, a computer novice in California who is reluctantly drawn into the spam wars and eventually joins a group of anti-spam activists. Her volunteer sleuth work puts her on a collision course with Hawke and other spammers, who try to wreak revenge on the antis. You'll also meet other cyber-vigilantes who have taken up the fight against spammers as well as the cast of quirky characters who comprise Hawke's business associates.The book sheds light on the technical sleight-of-hand--forged headers, open relays, harvesting tools, and bulletproof hosting--and other sleazy business practices that spammers use; the work of top anti-spam attorneys; the surprising new partnership developing between spammers and computer hackers; and the rise of a new breed of computer viruses designed to turn the PCs of innocent bystanders into secret spam factories.
    Anmerkung: Includes bibliographical references (p. 309-320) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    Ausgabe: 2nd ed.
    Schlagwort(e): Electronic books ; local
    Kurzfassung: " Samba-3 by Example provides useful, thoroughly documented explanations for all aspects of a Samba deployment. They're the same kind of patient answers I got when my dad taught me how to ride a bike without training wheels. Now, if only dad knew active Directory...." -Will Enestvedt, UNIX System Administrator, Johnson & Wales University "When my colleague and I were first reading John Terpstra's Samba-3 by Example , we were impressed by how easy it was to find the chapter we wanted to implement, and the ease of following his step-by-step approach. We always felt Terpstra was there with us, for every configuration line. It was like having our own personal tutor. I always take his book to every client that uses Samba. Additionally, Terpstra does something most authors don't, he keeps his documentation up to date. When we were doing our first implementation, he just released the update that morning; we downloaded it, printed it, and implemented it. Now, to me, that is cutting-edge technology at its best." -Steven C. Henry "A cook learns to follow a recipe until he has mastered the art. This is your cookbook to successful Windows networks. I followed this recipe to migrate our NT4 domain to Samba-3, and the recipe just worked great. I could not have completed this project without the Samba-3 by Example book-it brings dry, lifeless man-pages down to the reality IT support people face." -Geoff Scott, IT Systems Administrator, Guests Furniture Hire Pty Ltd "I used the book Samba-3 by Example to get started at 8:30 last night. I finished my complete PDC and it was up and running in six hours with Windows 2000 and XP Pro clients ready for work in the morning. That's from someone who is brand new to Linux. This book is awesome!" -Jesse Knudsen, Windows Systems Administrator The Practical, Tested, Step-by-Step Samba-3 Guidebook Has Now Been Fully Updated! The definitive Samba-3 guidebook has been completely updated to reflect the latest Samba releases and migration techniques. This book's complete configuration files, step-by-step implementation instructions, network diagrams, and automated scripts make deployment a breeze-even if you've never worked with Samba before. From small office networks to enterprise environments, here are proven configurations, backed by guidance from one of the world's most respected Samba experts, Samba Team contibutor John H. Terpstra. This edition has added comprehensive diagnostic techniques and validation steps, as w...
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 11
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxv, 1150 p. , ill. ; , 24 cm. +
    Ausgabe: 4th ed.
    DDC: 005.4/32
    Schlagwort(e): UNIX (Computer file) ; UNIX Shells ; Electronic books ; local
    Kurzfassung: The world's #1 shell programming book-now fully updated for Linux and more! UNIX Shells by Example is the world's #1 shell programming book, from the world's #1 shell programming instructor: Ellie Quigley. In UNIX Shells by Example, Fourth Edition, Quigley has thoroughly updated her classic and delivers the information today's shell programmers need most-including comprehensive coverage of Linux shell programming with bash! Drawing on 20 years' experience as a shell programming instructor, Quigley guides you through every facet of programming all leading UNIX/Linux shells: bourne, bash, korn, C, and tcsh. Quigley illuminates each concept with up-to-date, classroom-tested code examples designed to help you jump-start your own projects. She also systematically introduces awk, sed, and grep for both UNIX and GNU/Linux . . . making this the only shell programming book you'll ever need! New in this edition: Comprehensive coverage of Linux shell programming with bash Shell Programming QuickStart: makes first-time shell programmers productive in just 15 pages Complete, practical debugging chapter Updated coverage of the latest UNIX and GNU/Linux versions of awk, sed, and grep Shell programming for sysadmins: walks you through key UNIX and Linux system shell scripts Completely updated: Shell programming fundamentals: what shells are, what they do, how they work Choosing the right shell for any application Nearly 50,000 UNIX/Linux sysadmins, developers, and power users have used previous editions of UNIX Shells by Example to become expert shell programmers. With UNIX Shells by Example, Fourth Edition, you can, too-even if you're completely new to shell programming. Then, once you're an expert, you'll turn to this book constantly as the best source for reliable answers, solutions, and code. About the CD-ROM Comprehensive shell programming code library: all source code and data files for this book's hundreds of example programs.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 12
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxv, 585 p. , ill. ; , 24 cm
    DDC: 621.39/2
    Schlagwort(e): Integrated circuits ; Verification ; Electronic books ; local
    Kurzfassung: The Practical, Start-to-Finish Guide to Modern Digital Design Verification As digital logic designs grow larger and more complex, functional verification has become the number one bottleneck in the design process. Reducing verification time is crucial to project success, yet many practicing engineers have had little formal training in verification, and little exposure to the newest solutions. Hardware Design Verification systematically presents today's most valuable simulation-based and formal verification techniques, helping test and design engineers choose the best approach for each project, quickly gain confidence in their designs, and move into fabrication far more rapidly. College students will find that coverage of verification principles and common industry practices will help them prepare for jobs as future verification engineers. Author William K. Lam, one of the world's leading experts in design verification, is a recent winner of the Chairman's Award for Innovation, Sun Microsystems' most prestigious technical achievement award. Drawing on his wide-ranging experience, he introduces the foundational principles of verification, presents traditional techniques that have survived the test of time, and introduces emerging techniques for today's most challenging designs. Throughout, Lam emphasizes practical examples rather than mathematical proofs; wherever advanced math is essential, he explains it clearly and accessibly. Coverage includes Simulation-based versus formal verification: advantages, disadvantages, and tradeoffs Coding for verification: functional and timing correctness, syntactical and structure checks, simulation performance, and more Simulator architectures and operations, including event-driven, cycle-based, hybrid, and hardware-based simulators Testbench organization, design, and tools: creating a fast, efficient test environment Test scenarios and assertion: planning, test cases, test generators, commercial and Verilog assertions, and more Ensuring complete coverage, including code, parameters, functions, items, and cross-coverage The verification cycle: failure capture, scope reduction, bug tracking, simulation data dumping, isolation of underlying causes, revision control, regression, release mechanisms, and tape-out criteria An accessible introduction to the mathematics and algorithms of formal verification, from Boolean functions to state-machine equivalence and graph algorithms Decision diagrams, equivalence checki...
    Anmerkung: Includes bibliographical references (p. 539-559) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 13
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 229 p. , ill. ; , 24 cm
    Serie: Robert C. Martin series
    DDC: 658.4/04
    Schlagwort(e): Organizational effectiveness ; Project management ; Strategic planning ; Electronic books ; local
    Kurzfassung: PRAISE FOR MANAGING AGILE PROJECTS "In the hands of another, this class of material could become incoherent, but Sanjiv has enough intellectual power to ground his subject...Fans of APM and those who prefer new ideas as a catalyst for their management approach should find Managing Agile Projects rewarding." Wes Balakian, Chairman and Executive Advisor, PMI eBusiness SIG "I only wish I had read this book when I started my career in software product management, or even better yet, when I was given my first project to manage. In addition to providing an excellent handbook for managing with agile software development methodologies, Managing Agile Projects offers a guide to more effective project management in many business settings." John P. Barnes, former Vice President of Product Management at Emergis, Inc. "The agile software development movement evolved from a half-dozen methodologies-Scrum, Adaptive, XP, Crystal-that while different, embodied a consistent set of values and similar practices. The agile project management movement is following the same path-strength through a blend of consistency and diversity. Sanjiv's book, Managing Agile Projects , adds both-consistency and diversity-to the concepts and practices of agile project management. His book is rich in ideas and practical advice. It is a wonderful addition to the growing literature about 'alternative' styles of project management." Jim Highsmith Sr. V.P. and Director Agile Software Development and Project Management Practice Fellow, Business Technology Council Cutter Consortium LLC, Arlington, MA "Here is an innovative approach to the management of agile projects, examining traditional project management practices that do not align well with new agile methodologies. Augustine's alternative approaches in regard to personnel, organization, and change make this a valuable resource for project managers as well as for the customer/product owner." Sydney H. Jammes, Retired C.I.A. Economist "Project management has almost become a new paradigm for getting work done in most corporations around the world. This book provides a long overdue synthesis of the diverse strategies and practices in project management. The holistic and organic approach in the book combines the people factor and task complexity elements nicely and delivers an easy-to-read narrative that should be a must-read for every manager." Tojo Thatchenkery, Professor of Organizational Learning, George Mason University "In our wor...
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 14
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxiv, 443 p. , ill. ; , 23 cm
    Ausgabe: 2nd ed.
    Schlagwort(e): Google ; Computer software ; Reusability ; Internet programming ; Web search engines ; Electronic books ; local
    Kurzfassung: Whether you're a high school student looking for the latest info on your favorite rock group, or a seasoned attorney researching an old case, you're probably using Google. It seems like everyone is. And who can blame them? With access to more than three million documents in over 30 languages, Google is a researcher's dream. It's no wonder, then, that nearly 150 million Google searches are conducted each day. As a result, people are hungry to learn new ways to maximize its usefulness. Truth is, there are dozens upon dozens of techniques to learn--each designed to make your Google search more time-efficient, more productive, and more fun. And Google Hacks , Second Edition has the inside scoop on them all. An absolute must-have guide for anyone who searches the Internet--and these days that's just about everybody-- Google Hacks , Second Edition takes its best-selling predecessor one step further. In plain language, Google Hacks , Second Edition is an updated collection of industrial-strength, real-world tested solutions to practical research problems. Best of all, each of its 100 hacks are easy to read and digest--no confusing terminology or extraneous information to hamper your understanding. And although they can be read in just a few short minutes, when put to use, they can easily save you hours of research time. Now that's bang for your buck!
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 15
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 499 p. , ill. (some col.) ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Adobe Photoshop elements ; Image processing ; Digital techniques ; Photography ; Digital techniques ; Electronic books ; local
    Kurzfassung: The recent boom in digital camera sales has created a tremendous demand for simple yet powerful photo-editing software. This is because experienced users, as well as amateurs, are quickly outgrowing the program that was originally bundled with their cameras.Fortunately, Photoshop Elements 3, the latest photo-editing software from Adobe, is filling this void. It allows users to achieve high-quality results without the overwhelming complexity of professional-level software. And it's also affordable. As a result, it is the best-selling photo-editing software on the market today. Yet, while Photoshop Elements 3.0 seems to have everything going in its favor, it is missing one very important element: a manual that explains all of its incredible capabilities.To help consumers truly understand this software, there's now Photoshop Elements 3: The Missing Manual . This comprehensive guide from Barbarba Brundage offers page after page of valuable insight into this popular program, making it the only book readers will need on the topic. Photoshop Elements 3: The Missing Manual does a whole lot more than just point out how to straighten photos, crop, and adjust the color and focus. It's a collection of wonderful tips and tricks, from how to make basic selections to advanced color correction strategies, and from classic darkroom techniques to stylized digital effects. Each feature is carefully explained in easy-to-understand language, so that everyone from professional shooters to hobbyists can benefit. Among other lessons, readers will learn how to: Instantly fix flaws using Elements' Quick Fix mode Gain control with sliders, zoom tools, and before and after views Easily organize photos by calendar or keyword label Make dynamic slide shows with transitions, captions, music, and narration Create themed photo email Whether you're a hobbyist or a professional photographer, Photoshop Elements 3: The Missing Manual will help you become a more efficient, sophisticated digital camera user.
    Anmerkung: "Covers Windows & Mac"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 16
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: p. cm
    DDC: 005.8
    Schlagwort(e): Computer security ; Data protection ; Electronic books ; local
    Kurzfassung: The Definitive Guide to Protecting Enterprise Data Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In Data Protection and Information Lifecycle Management , leading industry consultant Tom Petrocelli presents a systematic, coherent approach to planning and implementing cost-effective data protection. This book introduces Information Lifecycle Management (ILM), a powerful new strategy for managing enterprise information based on its value over time. The author explains emerging techniques for protecting storage systems and storage networks, and for integrating storage security into your overall security plan. He also presents new technical advances and opportunities to improve existing data-protection processes, including backup/restore, replication, and remote copy. Coverage includes A complete, unique framework for considering and planning data protection Understanding storage technology from the standpoint of data protection Architecting more effective backup/restore solutions Using remote copy and replication to keep data synchronized and support immediate failover to hot sites Leveraging core computer security concepts and strategies to protect your most critical data Securing your entire storage infrastructure, not just servers Using policy-driven data protection and Data Lifecycle Management (DLM) to improve security and reduce cost Using ILM to identify your highest-value data and choose the right ways to protect it Data Protection and Information Lifecycle Management is an indispensable resource for IT executives who must plan and implement strategies for data protection; administrators who must protect data on a day-to-day basis; and product managers, consultants, and marketers responsible for crafting superior data-security solutions.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 17
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 476 p. , ill. ; , 24 cm
    DDC: 621.389/28
    Schlagwort(e): Biometric identification ; Identification ; Automation ; Pattern recognition systems ; Electronic books ; local
    Kurzfassung: A breakthrough approach to improving biometrics performance Constructing robust information processing systems for face and voice recognition Supporting high-performance data fusion in multimodal systems Algorithms, implementation techniques, and application examples Machine learning: driving significant improvements in biometric performance As they improve, biometric authentication systems are becoming increasingly indispensable for protecting life and property. This book introduces powerful machine learning techniques that significantly improve biometric performance in a broad spectrum of application domains. Three leading researchers bridge the gap between research, design, and deployment, introducing key algorithms as well as practical implementation techniques. They demonstrate how to construct robust information processing systems for biometric authentication in both face and voice recognition systems, and to support data fusion in multimodal systems. Coverage includes: How machine learning approaches differ from conventional template matching Theoretical pillars of machine learning for complex pattern recognition and classification Expectation-maximization (EM) algorithms and support vector machines (SVM) Multi-layer learning models and back-propagation (BP) algorithms Probabilistic decision-based neural networks (PDNNs) for face biometrics Flexible structural frameworks for incorporating machine learning subsystems in biometric applications Hierarchical mixture of experts and inter-class learning strategies based on class-based modular networks Multi-cue data fusion techniques that integrate face and voice recognition Application case studies
    Anmerkung: Includes bibliographical references (p. 427-456) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 18
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 660 p. , ill. ; , 24 cm
    DDC: 005.75/65
    Schlagwort(e): IBM Database 2 ; z/OS ; Database management ; Examinations ; Study guides ; Electronic data processing personnel ; Certification ; Electronic books ; local
    Kurzfassung: A practical guide to DB2 z/OS database administration that is 100 percent focused on running DB2 in z/OS environments The only comprehensive preparation guide for the IBM Certified Database Administrator for DB2 Universal Database V8 z/OS certification Covers database planning, design, implementation, operation, recovery, security, performance, installation, migration, and more Sample test questions help you prepare for both IBM DB2 DBA Tests 700 and 702 IBM DB2 Universal Database Version 8 for z/OS offers enterprises unprecedented opportunities to integrate information, deliver it on demand, and manage it simply and cost-effectively. Now, one of the world's leading DB2 consultants presents the definitive guide to administering DB2 UDB V8 databases in z/OS environments. DB2 for z/OS Version 8 DBA Certification Guide also serves as a key tool for anyone preparing for IBM Certified Database Administrator for DB2 Universal Database V8 for z/OS certification. IBM Gold Consultant Susan Lawson presents hundreds of practical techniques, expert guidelines, and useful tips for every facet of DB2 UDB database administration, including database implementation, operation, recovery, security, auditing, performance, installation, migration, SQL, and more. Coverage includes Understanding the DB2 product family, architecture, attachments, and the DB2 z/OS environment Securing enterprise-class DB2 installations and applications Using SQL to create and manage database objects, and manipulate and retrieve information Mastering key DBA tasks, including loading, reorganizing, quiescing, repairing, and recovering data; recovering and rebuilding indexes; and gathering statistics Implementing data sharing in Parallel Sysplex environments Learning the fundamentals of DB2 application development from the DBA's perspective Leveraging advanced DB2 functions, including stored procedures and other object-relational extensions Optimizing DB2 applications and the DB2 engine for maximum performance Whether you are administering DB2 UDB V8 in z/OS environments, planning to do so, or preparing for DB2 UDB V8 DBA certification, DB2 for z/OS Version 8 DBA Certification Guide will be your single most valuable resource.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 19
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiv, 428 p. , ill. ; , 24 cm
    Schlagwort(e): C (Computer program language) ; Field programmable gate arrays ; Parallel programming (Computer science) ; Electronic books ; local
    Kurzfassung: C-based techniques for building high-performance, FPGA-accelerated software applications Circuits, Devices, and Systems C-based Techniques for Optimizing FPGA Performance, Design Flexibility, and Time to Market Forward written by Clive "Max" Maxfield. High-performance FPGA-accelerated software applications are a growing demand in fields ranging from communications and image processing to biomedical and scientific computing. This book introduces powerful, C-based parallel-programming techniques for creating these applications, verifying them, and moving them into FPGA hardware. The authors bridge the chasm between "conventional" software development and the methods and philosophies of FPGA-based digital design. Software engineers will learn to look at FPGAs as "just another programmable computing resource," while achieving phenomenal performance because much of their code is running directly in hardware. Hardware engineers will master techniques that perfectly complement their existing HDL expertise, while allowing them to explore design alternatives and create prototypes far more rapidly. Both groups will learn how to leverage C to support efficient hardware/software co-design and improve compilation, debugging, and testing. Understand when C makes sense in FPGA development and where it fits into your existing processes Leverage C to implement software applications directly onto mixed hardware/software platforms Execute and test the same C algorithms in desktop PC environments and in-system using embedded processors Master new, C-based programming models and techniques optimized for highly parallel FPGA platforms Supercharge performance by optimizing through automated compilation Use multiple-process streaming programming models to deliver truly astonishing performance Preview the future of FPGA computing Study an extensive set of realistic C code examples
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 20
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 344 p. , ill. ; , 24 cm
    Serie: Prentice Hall PTR series in computer networking and distributed systems
    DDC: 004.6/8
    Schlagwort(e): Wireless LANs ; Electronic books ; local
    Kurzfassung: Deploy, manage, and troubleshoot any wireless LAN ... home or business WLAN technology for non-experts: clear, accurate, easy Proven quick-start configurations for Windows®, and Linux®, and MacOS® No-hassle wireless security solutions Covers IEEE 802.11a, 802.11b, 802.11g, and 802.11i/WPA Contrasts IEEE 802.11 WLAN technology with IEEE 802.16 WMAN and IEEE 802.15 WPAN technology Expert knowledge and insight for deploying and managing any wireless LAN. In this book, best-selling networking author Thomas Maufer explains how wireless LANs work, and how to make them work for you-reliably and securely. Maufer takes you under the hood with today's latest WLAN technologies, offering practical insight and context for deploying, managing, and troubleshooting WLANs in any environment, from the enterprise to the home. Covers all leading IEEE 802.11 wireless standards: 802.11a, 802.11b, 802.11g, and 802.11i/WPA Shows how to deploy small, mid-sized, large, public, business, and home networks Provides sample Windows®, Linux®, and MacOS® configurations that help you get started quickly Demystifies WLAN security so you can understand how to protect your data Illuminates the 802.11 protocol so you can troubleshoot more effectively Previews tomorrow's WLAN standards and applications for business and home (IEEE 802.11j and 802.11n) Whether you're a network/system administrator or a power user, Thomas Maufer demystifies wireless LAN technology... so you can maximize the benefits while minimizing the hassles.
    Anmerkung: Includes bibliographical references (p. xx-xxii) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 21
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxii, 687 p. , ill. ; , 24 cm
    DDC: 005.4/4682
    Schlagwort(e): Linux ; Operating systems (Computers) ; Electronic books ; local
    Kurzfassung: "This is an excellent introduction to Linux programming. The topics are well chosen and lucidly presented. I learned things myself, especially about internationalization, and I've been at this for quite a while." -Chet Ramey, Coauthor and Maintainer of the Bash shell "This is a good introduction to Linux programming. Arnold's technique of showing how experienced programmers use the Linux programming interfaces is a nice touch, much more useful than the canned programming examples found in most books." -Ulrich Drepper, Project Lead, GNU C library "A gentle yet thorough introduction to the art of UNIX system programming, Linux Programming by Example uses code from a wide range of familiar programs to illustrate each concept it teaches. Readers will enjoy an interesting mix of in-depth API descriptions and portability guidelines, and will come away well prepared to begin reading and writing systems applications. Heartily recommended." -Jim Meyering, Coauthor and Maintainer of the GNU Core Utility Programs Learn Linux® programming, hands-on... from real source code This book teaches Linux programming in the most effective way possible: by showing and explaining well-written programs. Drawing from both V7 Unix® and current GNU source code, Arnold Robbins focuses on the fundamental system call APIs at the core of any significant program, presenting examples from programs that Linux/Unix users already use every day. Gradually, one step at a time, Robbins teaches both high-level principles and "under the hood" techniques. Along the way, he carefully addresses real-world issues like performance, portability, and robustness. Coverage includes: Memory management File I/O File metadata Processes Users and groups Sorting and searching Argument parsing Extended interfaces Signals Internationalization Debugging And more... Just learning to program? Switching from Windows®? Already developing with Linux but interested in exploring the system call interface further? No matter which, quickly and directly, this book will help you master the fundamentals needed to build serious Linux software. Companion Web Sites, authors.phptr.com/robbins and www.linux-by-example.com , include all code examples.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 22
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxiii, 247 p. , ill. ; , 25 cm
    Ausgabe: 1st ed.
    DDC: 004.22
    Schlagwort(e): Computer architecture ; Web services ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Large IT organizations increasingly face the challenge of integrating various web services, applications, and other technologies into a single network. The solution to finding a meaningful large-scale architecture that is capable of spanning a global enterprise appears to have been met in ESB, or Enterprise Service Bus. Rather than conform to the hub-and-spoke architecture of traditional enterprise application integration products, ESB provides a highly distributed approach to integration, with unique capabilities that allow individual departments or business units to build out their integration projects in incremental, digestible chunks, maintaining their own local control and autonomy, while still being able to connect together each integration project into a larger, more global integration fabric, or grid. Enterprise Service Bus offers a thorough introduction and overview for systems architects, system integrators, technical project leads, and CTO/CIO level managers who need to understand, assess, and evaluate this new approach. Written by Dave Chappell, one of the best known and authoritative voices in the field of enterprise middleware and standards-based integration, the book drills down into the technical details of the major components of ESB, showing how it can utilize an event-driven SOA to bring a variety of enterprise applications and services built on J2EE, .NET, C/C++, and other legacy environments into the reach of the everyday IT professional.With Enterprise Service Bus , readers become well versed in the problems faced by IT organizations today, gaining an understanding of how current technology deficiencies impact business issues. Through the study of real-world use cases and integration patterns drawn from several industries using ESB--including Telcos, financial services, retail, B2B exchanges, energy, manufacturing, and more--the book clearly and coherently outlines the benefits of moving toward this integration strategy. The book also compares ESB to other integration architectures, contrasting their inherent strengths and limitations.If you are charged with understanding, assessing, or implementing an integration architecture, Enterprise Service Bus will provide the straightforward information you need to draw your conclusions about this important disruptive technology.
    Anmerkung: Includes bibliographical references (p. 235-238) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 23
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxv, 536 p. , ill. ; , 24 cm
    Ausgabe: Panther ed (2nd ed).
    Schlagwort(e): Mac OS ; Macintosh (Computer) ; Programming ; Electronic books ; local
    Kurzfassung: Mac OS X has captured the attention of consumers and programmers alike with its ability to run existing Mac programs along with Unix and Open Source software. The latest version, Panther, includes more than a hundred new features and improves many of the technologies underlying Mac OS X, including graphics and the Unix-based core. With more than 500 power tips and tricks for Mac aficionados like yourself, Mac OS X Power Hound , Panther Edition helps you unleash the power of Panther. Mac OS X Panther is a complex and powerful operating system with a personality all its own. To make your computing experience with Panther as efficient and enjoyable as possible, you need to learn its secrets, appreciate its idiosyncrasies, and be able to customize it to your needs and wants. Author Rob Griffiths shows you how. Creator and editor of the extremely popular Mac OS X Hints Web site ( www.macosxhints.com ), Griffiths knows Panther inside and out. His Mac OS X Power Hound lifts the hood on the sleek and elegant, Formula-One-powered operating system and delivers over 500 high-octane secrets in every conceivable category, including the Desktop and Finder, iApps, Mac OS X programs, Mastering the system and Terminal, and much more. Consider this book your pit crew, helping you find easier, faster, and better ways of using the Finder, the Dock, the assortment of programs that come with Mac OS X, and a bunch of programs that don't. And if you want to become your own master mechanic, it also includes two rich chapters on Unix, the engine under Mac OS X's hood. With this collection of stand-alone hints, notes, tips, and tricks--every one of them organized, indexed, tested for compatibility with the latest version of Mac OS X 10.3, and, in many cases, illustrated--you'll rapidly progress from an anybody-can-do-this user to a power user.
    Anmerkung: "Originally published by Pogue Press, LLC., under the title, Mac OS hints: Jaguar edition.". - "Revised edition of Mac OS X Hints" -- Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 24
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvii, 291 p. , ill. ; , 23 cm
    DDC: 005.75/6
    Schlagwort(e): Oracle (Computer file) ; Relational databases ; Electronic books ; local
    Kurzfassung: Fast, easy automation for every Oracle 9 i and 10 g DBA! Quick access to real-world examples Installation, database creation, management, monitoring, tuning, and backup/recovery Oracle Universal Installer (OUI), Oracle Net Configuration Assistant (NetCA), and Oracle Database Configuration Assistant (DBCA) The fast, practical Oracle 9 i /10 g automation reference for every DBA! Automate Oracle-and save your time for more important tasks! This is the Oracle automation reference every working Oracle DBA needs... concise, straightforward, and incredibly easy to use . Discover proven solutions for automating installation, database creation, management, monitoring, tuning, backup/recovery, and more. Keep this book by your desk, near your server...wherever you need fast, reliable automation solutions right now ! Master scripting for both Oracle 9 i and Oracle 10 g ! Use Oracle Universal Installer to create response files for automating any installation Use Oracle Network Configuration Assistant (NetCA) to configure network components during installation Use Oracle Database Configuration Assistant (DBCA) to create and clone databases, and to reverse engineer them into templates and scripts Manage files and tablespaces, tune memory, perform backup/recovery, schedule automated administration tasks, and more Extend and customize any script to your own needs Includes concise reference to Perl DBI and its Oracle-specific components-with real-world examples and syntax
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 25
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xviii, 507 p. , ill. ; , 24 cm
    Ausgabe: 2nd ed.
    DDC: 006.7
    Schlagwort(e): Cascading style sheets ; Computer graphics ; Web sites ; Design ; Electronic books ; local
    Kurzfassung: Simply put, Cascading Style Sheets (CSS) is a way to separate a document's structure from its presentation. The benefits of this can be quite profound: CSS allows a much richer document appearance than HTML; CSS saves time--you can create or change the appearance of an entire document in just one place; and its compact file size makes web pages load quickly. Eric Meyer, a member of the CSS&FP Working Group and an internationally known expert on HTML and CSS, tackles the subject with passion and delivers a comprehensive and thorough update to his groundbreaking book. All readers will benefit from both the depth and breadth of his experience and his clear and honest style. Cascading Style Sheets: The Definitive Guide , 2nd Edition is a thorough review of all aspects of CSS2.1 and a comprehensive guide to CSS implementation. The book includes new content on positioning, lists and generated content, table layout, user interface, paged media, and more. It explores in detail each individual CSS property and how it interacts with other properties, and shows how to avoid common mistakes in interpretation. If you're ready to take the next step with your HTML coding and incorporate CSS or are already a CSS code warrior, you'll find Cascading Style Sheets: The Definitive Guide , 2nd Edition is the book you've been craving.
    Anmerkung: "Covers CSS2 and CSS2.1"--Cover. - "Visual presentation for the Web"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 26
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 411 p. , ill. ; , 23 cm
    Ausgabe: 3rd ed.
    DDC: 005.75/85
    Schlagwort(e): Oracle (Computer file) ; Computer software ; Development ; Relational databases ; Electronic books ; local
    Kurzfassung: Complete tutorial for database developers! Thorough coverage of PL/SQL Practical "cookbook" techniques Effectively create and manage complex databases with Oracle! Systems and database expert Kevin Owens explores PL/SQL, Oracle's answer to the Structured Query Language (SQL), and teaches you what you need to know to build robust and complex databases for your business. Using easy-to-follow instructions and examples, this book presents techniques to take advantage of Oracle features such as triggers and stored procedures-features that allow your databases to incorporate business rules which are easy to manage and modify as the business evolves. Topics covered include: Viewing constraints in the data dictionary Complex rule enforcement PL/SQL program units and language features Data types and composite structure Error handling and exceptions Inter-process communications Declarative constraints, including primary key, unique, foreign key, check, and much more Programming Oracle Triggers and Stored Procedures, Third Edition, is an invaluable resource for database developers, designers, and project leaders looking to build and maintain truly intelligent, complex databases
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 27
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 536 p. , ill. ; , 24 cm
    DDC: 006.7/4
    Schlagwort(e): Computer architecture ; Web services ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: Web services is the integration technology preferred by organizations implementing service-oriented architectures. I would recommend that anybody involved in application development obtain a working knowledge of these technologies, and I'm pleased to recommend Erl's book as a great place to begin. -Tom Glover, Senior Program Manager, Web Services Standards, IBM Software Group, and Chairman of the Web Services Interoperability Organization (WS-I). An excellent guide to building and integrating XML and Web services, providing pragmatic recommendations for applying these technologies effectively. The author tackles numerous integration challenges, identifying common mistakes and providing guidance needed to get it right the first time. A valuable resource for understanding and realizing the benefits of service-oriented architecture in the enterprise. -David Keogh, Program Manager, Visual Studio Enterprise Tools, Microsoft. Leading-edge IT organizations are currently exploring second generation web service technologies, but introductory material beyond technical specifications is sparse. Erl explains many of these emerging technologies in simple terms, elucidating the difficult concepts with appropriate examples, and demonstrates how they contribute to service-oriented architectures. I highly recommend this book to enterprise architects for their shelves. -Kevin P. Davis, Ph. D., Software Architect. Service-oriented integration with less cost and less risk The emergence of key second-generation Web services standards has positioned service-oriented architecture (SOA) as the foremost platform for contemporary business automation solutions. The integration of SOA principles and technology is empowering organizations to build applications with unprecedented levels of flexibility, agility, and sophistication (while also allowing them to leverage existing legacy environments). This guide will help you dramatically reduce the risk, complexity, and cost of integrating the many new concepts and technologies introduced by the SOA platform. It brings together the first comprehensive collection of field-proven strategies, guidelines, and best practices for making the transition toward the service-oriented enterprise. Writing for architects, analysts, managers, and developers, Thomas Erl offers expert advice for making strategic decisions about both immediate and long-term integration issues. Erl addresses a broad spectrum of integration challenges, covering...
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 28
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 740 p. , ill. ; , 24 cm
    Ausgabe: 3rd ed.
    DDC: 005.2/762
    Schlagwort(e): JavaServer pages ; Web site development ; Web sites ; Design ; Electronic books ; local
    Kurzfassung: JavaServer Pages (JSP) has built a huge following since the release of JSP 1.0 in 1999, providing Enterprise Java developers with a flexible tool for the development of dynamic web sites and web applications. While new point releases over the years, along with the introduction of the JSP Standard Tag Library (JSTL), have incrementally improved the rough areas of the first version of the JSP specification, JSP 2.0 takes this technology to new heights. JavaServer Pages , Third Edition, is completely revised and updated to cover the JSP 2.0 and JSTL 1.1 specifications. It includes detailed coverage of the Expression Language (EL) incorporated into JSP 2.0, the JSTL 1.1 tag libraries and the new function library, the new tag file format that enables custom tag library development without Java code, the simplified Java tag library API, improvements in the JSP XML syntax, and more. Further, it details setup of the Apache Tomcat server, JSP and JSTL syntax and features, error handling and debugging, authentication and personalization, database access, XML processing, and internationalization.This book recognizes the different needs of the two groups of professionals who want to learn JSP: page authors interested in using JSP elements in web pages, and programmers concerned with learning the JSP API and using JSP effectively as a part of an enterprise application. If you're in the first group, you'll learn from the practical web application examples in the second part of the book. If you're in the latter group, you'll appreciate the detailed coverage of advanced topics in the third part, such as how to integrate servlets and JavaBeans components with JSP using the popular Apache Struts MVC framework, and how to develop custom tag libraries using the JSP API, with realistic examples that you can use as a springboard for your own libraries."Hans Bergsten, a JSP expert group veteran and one of our most active contributors, has thoroughly and accurately captured the new features of JSP 2.0 and JSTL 1.1 in a way that is well-organized and easy to understand. With excellent, to-the-point examples, this book is a 'must have' for any serious JSP 2.0 developer."--Mark Roth, JSP 2.0 Specification Lead, Sun Microsystems, Inc.Hans Bergsten is the founder of Gefion Software, a company focused on Java services and products based on J2EE technologies. Hans has been an active participant in the working groups for both the servlet and JSP specifications since their in...
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 29
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 351 p. , ill. ; , 23 cm
    Ausgabe: 2nd ed.
    DDC: 005.1
    Schlagwort(e): Computer architecture ; Software engineering ; Electronic books ; local
    Kurzfassung: The completely updated "field manual" for becoming a better software architect! The crucial skills you need to survive and thrive as an enterprise software architect! Fully updated for the latest techniques-from lightweight methods and architectural layers to Model-Driven Architecture and UML 2.0! In this book, Raphael Malveau and Thomas J. Mowbray share up-to-the-minute insights and practical solutions for all the key challenges of building enterprise software systems with objects, components, and Internet technologies. You'll master today's best technical and business practices for the entire project lifecycle as you discover how to avoid crucial pitfalls and costly errors. Coverage includes: Choosing the right architectural model for your project Executing heavyweight and lightweight approaches to software architecture Understanding the architectural issues associated with open source development Managing complexity, scalability, reliability, security, latency, and flexibility Making the most of abstraction, refactoring, and architectural prototyping Leveraging proven design patterns and anti-patterns Effective prototyping, business-case development, and project leadership Coordinating smoothly with project managers and teams Managing your own career as a software architect With hands-on exercises, real-life war stories, and a take-no-prisoners attitude, Software Architect Bootcamp, Second Edition, won't just help you become a great software architect: it'll help you become a true technical leader of your organization.
    Anmerkung: Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 30
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxi, 276 p. , ill. ; , 25 cm
    DDC: 005.4'3765
    Schlagwort(e): Mac OS (Computer file) ; User interfaces (Computer systems) ; Electronic books ; local
    Kurzfassung: Modding Mac OS X isn't about cutting up your Power Mac's case with a saws-all; it's about modifying Mac OS X's user interface and unlocking secrets and dispelling your fears of the Unix command line so you can take command of your Mac. Modding Mac OS X starts out with the very basics of showing you how to configure your Mac and do simple things like change Finder views, use an image from iPhoto's library on your desktop, and how to find and use screen savers. From there, Modding Mac OS X shows you how to: Find hidden features in your favorite applications Dive inside application bundles to find hidden resources Change application and system-wide keyboard shortcuts Work with the Property List Editor to read and edit property list files Wrap your head around the defaults command to tweak an application's settings Hack on NIB files to change an application's interface Control an application with AppleScript, even if it isn't scriptable Each Modding example includes detailed step-by-step instructions that even a novice Mac user can follow, while also providing the necessary detail to satisfy the experienced hacker. The knowledge you gain from tweaking one application can be easily applied to the next. So go on, empower your inner Mac geek. You know you want to.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 31
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xi, 258 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 005.1/092
    Schlagwort(e): Computer programmers ; Electronic books ; local
    Kurzfassung: "The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. "--from Hackers & Painters: Big Ideas from the Computer Age , by Paul Graham We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care? Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet. Hackers & Painters: Big Ideas from the Computer Age , by Paul Graham, explains this world and the motivations of the people who occupy it. In clear, thoughtful prose that draws on illuminating historical examples, Graham takes readers on an unflinching exploration into what he calls "an intellectual Wild West." The ideas discussed in this book will have a powerful and lasting impact on how we think, how we work, how we develop technology, and how we live. Topics include the importance of beauty in software design, how to make wealth, heresy and free speech, the programming language renaissance, the open-source movement, digital design, internet startups, and more. And here's a taste of what you'll find in Hackers & Painters : "In most fields the great work is done early on. The paintings made between 1430 and 1500 are still unsurpassed. Shakespeare appeared just as professional theater was being born, and pushed the medium so far that every playwright since has had to live in his shadow. Albrecht Durer did the same thing with engraving, and Jane Austen with the novel. Over and over we see the same pattern. A new medium appears, and people are so excited about it that they explore most of its possibilities in the first couple generations. Hacking seems to be in this phase now. Painting was not, in Leonardo's time, as cool as his work helped make it. How cool hacking turns out to be will depend on what we can do with this new medium." Andy Hertzfeld, co-creator of the Macintosh computer, says about Hackers & Painters :"Paul Graham is a hacker, painter and a terrific writer. ...
    Anmerkung: Includes bibliographical references (p. 223-238) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 32
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxii, 550 p. , ill. ; , 25 cm. +
    Ausgabe: 2nd ed.
    DDC: 005.75/85
    Schlagwort(e): IBM Database 2 ; Database management ; SQL (Computer program language) ; Electronic books ; local
    Kurzfassung: IBM's definitive guide to writing DB2 SQL PL stored procedures, triggers, UDFs, and dynamic compound SQL Fully updated to reflect the entire DB2 UDB product family, and new SQL PL improvements for Windows, UNIX, Linux, iSeries, and zSeries Presents expert tips and best practices drawn from extensive experience in real customer environments Covers everything from basic program structure through advanced techniques Includes up-to-the-minute coverage of optimization and troubleshooting Using the IBM DB2 SQL Procedural Language (SQL PL), programmers can drive major improvements in database performance, manageability, and time-to-market. Now, IBM's own experts present the definitive guide to DB2 SQL PL development on any platform: Windows, UNIX, Linux, iSeries, or zSeries. DB2 SQL PL, Second Edition shows developers how to take advantage of every facet of the SQL PL language and development environment. The authors offer up-to-the-minute coverage, best practices, and tips for building basic SQL procedures, writing flow-of-control statements, creating cursors, handling conditions, and much more. Along the way, they illuminate advanced features ranging from stored procedures and triggers to user-defined functions. The only book to combine practical SQL PL tutorials and a detailed syntax reference, DB2 SQL PL, Second Edition draws on the authors' unparalleled expertise with SQL PL in real business environments. Coverage includes Using SQL PL to improve manageability and performance, while clearly separating DBA and development roles Writing more efficient stored procedures, triggers, user-defined functions (UDFs), and dynamic compound SQL Identifying SQL PL performance bottlenecks--and resolving them Leveraging new language enhancements for Windows, UNIX, and Linux: improved table function support, session based locking, nested save points, new prepare options, and more Using new features for iSeries V5R3: built-in string and date/time manipulation functions, SEQUENCE objects, and more Utilizing zSeries Version 8's integrated stored procedures debugging and improved SQL Conditions support Mastering DB2 Development Center, the unified development environment for creating DB2 stored procedures Whether you're developing new SQL PL applications, migrating or tuning existing applications, or administering DB2, you'll find this book indispensable.
    Anmerkung: "DB2. Information management software.". - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 33
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 566 p. , ill. ; , 24 cm
    Ausgabe: 3rd ed.
    Serie: In a nutshell
    Serie: Java series
    Schlagwort(e): Java (Computer program language) ; Object-oriented programming (Computer science) ; Web servers ; Electronic books ; local
    Kurzfassung: The author of the best-selling Java in a Nutshell has created an entire book of real-world Java programming examples that you can learn from. If you learn best "by example," this is the book for you.This third edition covers Java 1.4 and contains 193 complete, practical examples: over 21,900 lines of densely commented, professionally written Java code, covering 20 distinct client-side and server-side APIs. It includes new chapters on the Java Sound API and the New I/O API. The chapters on XML and servlets have been rewritten to cover the latest versions of the specifications and to demonstrate best practices for Java 1.4. New and updated examples throughout the book demonstrate many other new Java features and APIs. Java Examples in a Nutshell is a companion volume to Java in a Nutshell , Java Foundation Classes in a Nutshell , and Java Enterprise in a Nutshell . It picks up where those quick references leave off, providing a wealth of examples for both novices and experts. This book doesn't hold your hand; it simply delivers well-commented working examples with succinct explanations to help you learn and explore Java and its APIs. Java Examples in a Nutshell contains examples that demonstrate: Core APIs, including I/O, New I/O, threads, networking, security, serialization, and reflection Desktop APIs, highlighting Swing GUIs, Java 2D graphics, preferences, printing, drag-and-drop, JavaBeans, applets, and sound Enterprise APIs, including JDBC (database access), JAXP (XML parsing and transformation), Servlets 2.4, JSP 2.0 (JavaServer Pages), and RMI The book begins with introductory examples demonstrating structured and object-oriented programming techniques for new Java programmers. A special index at the end of the book makes it easy to look up examples that use a particular Java class or accomplish a desired task. In between, each chapter includes exercises that challenge readers and suggest further avenues for exploration.
    Anmerkung: Covers Java 2, version 1.4 - cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 34
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxxvi, 313 p. , ill. ; , 24 cm
    DDC: 005.1
    Schlagwort(e): Computer software ; Development ; Management ; Software engineering ; Electronic books ; local
    Kurzfassung: "This book does a good job of describing the methods employed at Sprintpcs.com ... over 250 people practicing Feature Driven Development and reporting their progress to me at the monthly operations review." --Scott B. Relf, Chief Marketing Officer, Sprint PCS "A tremendous contribution to the literature in the field. This should be required reading for all development teams going forward." --John F. Yuzdepski, VP & GM, Openwave Systems A breakthrough approach to managing agile software development, Agile methods might just be the alternative to outsourcing. However, agile development must scale in scope and discipline to be acceptable in the boardrooms of the Fortune 1000. In Agile Management for Software Engineering, David J. Anderson shows managers how to apply management science to gain the full business benefits of agility through application of the focused approach taught by Eli Goldratt in his Theory of Constraints. Whether you're using XP, Scrum, FDD, or another agile approach, you'll learn how to develop management discipline for all phases of the engineering process, implement realistic financial and production metrics, and focus on building software that delivers maximum customer value and outstanding business results.Coverage includes: Making the business case for agile methods: practical tools and disciplines How to choose an agile method for your next project Breakthrough application of Critical Chain Project Management and constraint-driven control of the flow of value Defines the four new roles for the agile manager in software projects-- and competitive IT organizations Whether you're a development manager, project manager, team leader, or senior IT executive, this book will help you achieve all four of your most urgent challenges: lower cost, faster delivery, improved quality, and focused alignment with the business.
    Anmerkung: Includes bibliographical references (p. 301-313) and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 35
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 320 p. , ill. ; , 24 cm
    DDC: 005.1
    Schlagwort(e): CVS ; Computer software ; Development ; Database management ; Electronic books ; local
    Kurzfassung: CVS, the Concurrent Versions System, is the popular source-code management tool that frees developers from the chaos that too often ensues when multiple users work on the same file. An open source technology that is available on most computer platforms, including Windows® and Mac OS® X, CVS is widely used to manage program code, web site content, and to track changes made to system configuration files. Multiple users can check out files from a directory tree, make changes, and then commit those changes back into the directory. If two developers modify the same file, CVS enables both sets of changes to be merged together into one final file. Although CVS is a lifesaver in many development scenarios, it suffers from poor documentation. But with Essential CVS , developers can have it all: the order that CVS brings and the comprehensive documentation developers need. Essential CVS is a complete and easy-to-follow reference that helps programmers and system administrators apply order to the task of managing large quantities of documents. The book covers basic concepts and usage of CVS, and features a comprehensive reference for CVS commands--including a handy Command Reference Card for quick, on-the-job checks. The book also includes advanced information on all aspects of CVS that involve automation, logging, branching and merging, and "watches." Readers will find in-depth coverage of the following: Installing CVS and building your first repository Basic use of CVS, including importing projects, checking out projects, committing changes, and updating projects Tagging, branching and merging Working with multiple users Clients, operating systems, and IDEs Repository management and managing remote repositories Project administration, including bug tracking systems, enforcing log messages, history and annotation, and more. Troubleshooting Version control is essential to maintaining order in any project, large or small. Any CVS user, from beginners to team leaders and system administrators, will find this practical guide to CVS indispensable in getting the most from this valuable tool.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 36
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 176 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.8
    Schlagwort(e): Computer networks ; Security measures ; IEEE 802.11 (Standard) ; Wireless communication systems ; Security measures ; Electronic books ; local
    Kurzfassung: Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for going wireless, many companies are holding back because of security concerns. But, while it's true that wireless networks create security issues that don't exist in wired networks, the issues are not insurmountable. 802.11 Security shows how you can plan for and successfully contend with security obstacles in your wireless deployment. This authoritative book not only explains the security issues, but shows you how to design and build a your own secure wireless network. 802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") specification. The authors provide detailed coverage of security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent Privacy component of 802.11. You'll learn how to configure a wireless client and to set up a WAP using either Linux or Free BSD. You'll also find thorough information on controlling network access and encrypting client traffic. Beginning with an introduction to 802.11b in general, the book gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. Next, the book details the technical setup instructions needed for both the Linux and FreeBSD operating systems. Some of the topics covered include: Station Security for Linux, FreeBSD, Open BSD, Mac OS X and Windows Setting Up Access Point Security Gateway Security, including building Gateways, firewall Rules, Auditing, etc. Authentication and Encryption FreeBSD IPsec client and gateway configuration Linux IPsec client and gateway configuration 802.1x authentication 802.11 Security is a book whose time has come. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b-based systems, you'll want this book beside you every step of the way.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 37
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xx, 824 p. , ill. ; , 23 cm
    DDC: 005.276
    Schlagwort(e): Active server pages ; Internet programming ; Microsoft .NET ; Web servers ; Web sites ; Design ; Electronic books ; local
    Kurzfassung: Developers who want to create dynamic, data-driven web sites running on Microsoft web servers have long relied on Active Server Pages (ASP). ASP.NET is Microsoft's latest evolution of ASP. While ASP.NET has a lot in common with its predecessor, this new technology takes advantage of object-oriented programming to dramatically improve developer productivity and convenience. Using the .NET Framework and Microsoft's new object-oriented languages, ASP.NET brings the same rapid drag-and-drop productivity to web applications that the Visual Basic programming language brought to Windows applications. ASP.NET also introduces web services, which allow developers to expose the functionality of an application via HTTP and XML, so that clients on any platform can access it via the Internet. ASP.NET is not a simple upgrade of ASP. It s a quantum leap ahead. There are many benefits to using ASP.NET, and one major drawback: the time developers must devote to mastering this new Web application technology. The ASP.NET Cookbook provides a wealth of plug-and-play solutions to problems commonly encountered when developing ASP.NET web applications and services in the popular problem-solution-discussion Cookbook format. The coding solutions in ASP.NET Cookbook appeal to a wide range of developers, from the inexperienced to the expert. For every problem addressed in the book, there's a worked-out solution or recipe a short, focused piece of code that web developers can insert directly into their applications. Developers can save hours by using just a single one of over 100 recipes included in this invaluable cookbook. But the ASP.NET Cookbook provides far more than just a wide range of cut-and-paste code solutions. Each recipe is followed by a discussion including tips, tricks, and possible pitfalls--so developers can learn to adapt the problem-solving techniques to a myriad of similar situations. Each recipe provides an immediate solution to a pressing problem, while simultaneously allowing developers who prefer to a hands-on learning style with the experience they need to master ASP.NET. This ultimate ASP.NET code sourcebook will quickly earn the dog-eared corners and coffee rings that mark a web developer's most valued resource.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 38
    Online-Ressource
    Online-Ressource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 1026 p. , ill. ; , 25 cm
    Ausgabe: 4th ed.
    DDC: 660/.2842
    Schlagwort(e): Transport theory ; Electronic books ; local
    Kurzfassung: The comprehensive, unified, up-to-date guide to transport and separation processes Today, chemical engineering professionals need a thorough understanding of momentum, heat, and mass transfer processes, as well as separation processes. Transport Processes and Separation Process Principles, Fourth Edition offers a unified and up-to-date treatment of all these topics. Thoroughly updated to reflect the field's latest methods and applications, it covers both fundamental principles and practical applications. Part 1 covers the essential principles underlying transport processes: momentum transfer; steady-state and unsteady-state heat transfer; and mass transfer, including both unsteady-state and convective mass transfer. Part 2 covers key separation processes, including evaporation, drying, humidification, absorption, distillation, adsorption, ion exchange, extraction, leaching, crystallization, dialysis, gas membrane separation, reverse osmosis, filtration, ultrafiltration, microfiltration, settling, centrifugal separation, and more. This edition's extensive updates and enhancements include: A more thorough coverage of momentum, heat, and mass transport processes Detailed new coverage of separation process applications Greatly expanded coverage of momentum transfer, including fluidized beds and non-Newtonian fluids More detailed discussions of mass transfer, absorption, distillation, liquid-liquid extraction, and crystallization Extensive new coverage of membrane separation processes and gas-membrane theory Transport Processes and Separation Process Principles, Fourth Edition also features more than 240 example problems and over 550 homework problems reflecting the field's current methods and applications.
    Anmerkung: Rev. ed. of: Transport processes and unit operations. 3rd ed. c1993. - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 39
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiii, 244 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Weblogs ; Computer programs ; Weblogs ; Design ; Weblogs ; Management ; Electronic books ; local
    Kurzfassung: Anyone can run a blog (an online journal). From personal diaries to political commentary and technology observations, bloggers are making their voices heard around the world. Essential Blogging helps you select the right blogging software for your needs and show how to get your blog up and running. You'll learn the ingredients of a successful blog, and then get detailed installation, configuration and operation instructions for the leading blogging software: Blogger, Radio Userland, Movable Type, and Blosxom. After showing you how to acquire, set-up, and run these leading software packages, Essential Blogging takes you through the more advanced features, so that by the time you finish, you'll be up and blogging with the best of them. Essential Blogging covers: the important components of a blog and a blog post installing and configuring the tools a survey of desktop blogging clients advice and experience from real-world bloggers hosted blogging with Blogger and Blogger Pro desktop blogging with Radio Userland server blogging with Movable Type posting, editing, and deleting blog entries adding pictures to blog entries syndicating your stories with RSS consuming RSS feeds with Radio Userland customizing the appearance of your blog with templates managing and customizing archives of blog entries adding comments to your blog self-hosting your blog vs using a blog-hosting service going under the hood with the Blosxom blogging system Written by prominent bloggers and authors of blogging tools, Essential Blogging is a no-nonsense guide to the technology of blogging.
    Anmerkung: "Selecting and using weblog tools"--Cover. - Includes bibliographical references and index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 40
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xv, 263 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.72
    Schlagwort(e): XML (Document markup language) ; Electronic books ; local
    Kurzfassung: No matter how flexible and convenient digital information has become, we haven't done away with the need to see information in print. Extensible Style Language-Formatting Objects, or XSL-FO, is a set of tools developers and web designers use to describe page printouts of their XML (including XHTML) documents. If you need to produce high quality printed material from your XML documents, then XSL-FO provides the bridge. XSL-FO is one of the few books to go beyond a basic introduction to the technology. While many books touch on XSL-FO in their treatment of XSLT, this book offers in-depth coverage of XSL-FO's features and strengths. Author Dave Pawson is well known in the XSLT and XSL-FO communities, and maintains the XSLT FAQ. An online version of this book has helped many developers master this technology. XSL-FO is the first time this reference is available in print.The first part of the book provides an overview of the technology and introduces the XSL-FO vocabulary. The author discusses how to choose among today's implementations, explains how to describe pages, and shows you what is going on in the processor in terms of layout. You'll learn about the basics of formatting and layout as well as readability.The second part focuses on smaller pieces: blocks, inline structures, graphics, color and character level formatting, concluding by showing how to integrate these parts into a coherent whole. XSL-FO also explores organizational aspects you'll need to consider?how to design your stylesheets strategically rather than letting them evolve on their own. XSL-FO is more than just a guide to the technology; the book teaches you how to think about the formatting of your documents and guides you through the questions you'll need to ask to ensure that your printed documents meet the same high standards as your computer-generated content. Written for experienced XML developers and web designers, no other book contains as much useful information on this practical technology.
    Anmerkung: "Making XML look good in print"--Cover. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 41
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 360 p. , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.7/2
    Schlagwort(e): Python (Computer program language) ; XML (Document markup language) ; Electronic books ; local
    Kurzfassung: If you are a Python programmer who wants to incorporate XML into your skill set, this is the book for you. Python has attracted a wide variety of developers, who use it either as glue to connect critical programming tasks together, or as a complete cross-platform application development language. Yet, because it is object-oriented and has powerful text manipulation abilities, Python is an ideal language for manipulating XML. Python & XML gives you a solid foundation for using these two languages together. Loaded with practical examples, this new volume highlights common application tasks, so that you can learn by doing. The book starts with the basics then quickly progresses to complex topics, like transforming XML with XSLT, querying XML with XPath, and working with XML dialects and validation. It also explores the more advanced issues: using Python with SOAP and distributed web services, and using Python to create scalable streams between distributed applications (like databases and web servers).The book provides effective practical applications, while referencing many of the tools involved in XML processing and Python, and highlights cross-platform issues along with tasks relevant to enterprise computing. You will find ample coverage of XML flow analysis and details on ways in which you can transport XML through your network.Whether you are using Python as an application language, or as an administrative or middleware scripting language, you are sure to benefit from this book. If you want to use Python to manipulate XML, this is your guide.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 42
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: v. 〈 1, 〉 , ill. ; , 24 cm
    Ausgabe: 1st ed.
    DDC: 005.13/3
    Schlagwort(e): Database design ; Java (Computer program language) ; Web servers ; Electronic books ; local
    Kurzfassung: What are the key decisions and tradeoffs you face as you design and develop enterprise applications? How do you build the back end so that it not only handles your current needs but is flexible enough to allow your system to evolve as your needs expand? Answer these questions and many more with Building Java Enterprise Applications , an advanced guide to building complex Java Enterprise Applications from the ground up that addresses design issues along the way. These practical books take a step back from detailed examination of the APIs and focus on the entire picture, so you can put the pieces together and build something that works! This book explores the infrastructure issues so important to good application design. It isn't just a book about doing things with Entity Beans, JDBC and JMS and JNDI. It takes you step by step through building the back end, designing the data store so that it gives you convenient access to the data your application needs; designing a directory; figuring out how to handle security and where to store security credentials you need; and so on. On top of this, it shows -- as easily as possible --how to build the entity bean layer that makes information available to the rest of the application. Throughout this guide, author Brett McLaughlin uses his wealth of real-world experience with enterprise development to show you one step at a time how to design and build a comprehensive enterprise application from the ground up, starting with the back end.
    Anmerkung: "Designing with EJBs, databases, and directory servers"--Cover of vol. 1. - Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 43
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xii, 401 p. , ill. ; , 23 cm
    DDC: 004.6
    Schlagwort(e): JXTA (Compurter network protocol) ; Java (Computer program language) ; Peer-to-peer architecture (Computer networks) ; Electronic books ; local
    Kurzfassung: Scott Oaks, lead author of O'Reilly's new JXTA in a Nutshell says,"Fundamental scalability and centralization forces are constraining the Internet and are restricting its growth. Peer-to-peer networks like JXTA are essential to bring the internet to the next level of scalability, management and security in order to handle unconstrained exchanges of information between peers and the wave of new consumer devices." Written by the key members of Sun Microsystem's Project JXTA, JXTA in a Nutshell is the definitive reference to the most solid platform yet for Peer-to-Peer distributed computing. "P2P" enables users with the same networking application to connect with each other and directly access files from one another's hard drives. JXTA is a giant step forward in the evolution of P2P. O'Reilly's pioneering reference is the first and last word on this powerful distributed computing technology. JXTA in a Nutshell delivers all the information you need to get started, including an overview of P2P distributed computing, an explanation of the JXTA Project's new platform, and ways that developers can become a part of the development effort. JXTA in a Nutshell introduces major concepts in a hands-on way by explaining them in context to the shell, and contains a complete reference to the JXTA application bindings. Also included is the full JXTA protocol specification. The book covers important topics such as security, and how the JXTA technology fits into the standard Java classes.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 44
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 288 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    DDC: 621.387/84
    Schlagwort(e): T1 (Telecommunication line) ; United States ; Electronic books ; local
    Kurzfassung: If you haven't worked with T1 before, you could be in for an unpleasant surprise. If you have, you'll already know that T1, the current network standard for business and professional Internet access, is neither efficient, easy to use, nor particularly well-suited to data transmission. T1: A Survival Guide, a practical, applied reference on T1 data transport, is a life raft for navigating the shoals of a 40-year-old technology originally designed for AT&T's voice network. Throughout T1's long life, network administrators have mainly learned it by apprenticeship, stumbling on troubleshooting tidbits and filing them away until they were needed again. This book brings together in one reference the information you need to set up, test, and troubleshoot T1. T1: A Survival Guide covers the following broad topics: What components are needed to build a T1 line, and how those components interact to transmit data effectively How to use standardized link layer protocols to adapt the T1 physical layer to work with data networks How to troubleshoot problems and work with the telephone company, equipment manufacturers, and Internet service providers In spite of its limitations, T1 is a proven, reliable technology that currently meets the need for medium-speed, high reliability Internet access by institutions of many sizes, and it's likely to be around for a while. T1: A Survival Guide will take the guesswork out of using T1 as a data transport.
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 45
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 357 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Schlagwort(e): Tk toolkit ; Perl (Computer program language) ; Electronic books ; local
    Kurzfassung: Learning Perl/Tk is a tutorial for Perl/Tk, the extension to Perl for creating graphical user interfaces. With Tk, Perl programs can be window-based rather than command-line based, with buttons, entry fields, listboxes, menus, and scrollbars. Originally developed for the Tcl language, the Perl port of the Tk toolkit liberates Perl programmers from the world of command-line options, STDIN, and STDOUT, allowing them to build graphical, event-driven applications for both Windows and UNIX. This book is aimed at Perl novices and experts alike. It explains the reasoning behind event-driven applications and drills in guidelines on how to best design graphical applications. It teaches how to implement and configure each of the Perl/Tk graphical elements step-by-step. Special attention is given to the geometry managers, which are needed to position each button, menu, label and listbox in the window frame. Although this book does not teach basic Perl, anyone who has written even the simplest Perl program should be able to learn Tk from this book. The writing is breezy and informal, and gets right to the point of what you need to know and why. The book is rife with illustrations that demonstrate how each element is drawn and how its configuration options affect its presentation. Learning Perl/Tk is for every Perl programmer who would like to implement simple, easy-to-use graphical interfaces.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 46
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xiv, 454 p. , ill. ; , 24 cm
    Schlagwort(e): GIMP (Computer file) ; Computer graphics ; Perl (Computer program language) ; Web sites ; Design ; Electronic books ; local
    Kurzfassung: From access counters and log-report graphs to scientific plots and on-the-fly animated GIFs, graphics scripting is within the grasp of most Web authors. It is a little documented field, however, and the many valuable free libraries and tools available on the Internet remain under-utilized. Programming Web Graphics with Perl & GNU Software is aimed at intermediate and advanced Web users who want to use CGI scripts to generate dynamic graphic content. It will also help to demystify the manipulation of graphics formats for newcomers to the Web. Programming Web Graphics with Perl & GNU Software takes a practical, resource-like approach to the content. It is not a book about design or aesthetics of Web graphics; its focus is on programming or, more accurately, scripting programs that manipulate graphics file to be published on the Web. Most of the examples in the book use Perl as a scripting language, though the concepts are applicable to any programming language. However, several powerful Perl modules for generating graphics (GD, PerlMagick, GIFgraph) should help position Perl as a major contender for your Web graphics applications. Most of the topics covered in the book are applicable to any platform (NT, Linux, Un*x, MaxOS), with the exception of the chapter detailing the Gnu Image Manipulation Program (a free Adobe Photoshop-like application), which requires a connection to an X server. The focus is always on free software, when it is available. This book covers the following: a tour through the most popular Web graphics file formats by implementing parsers for GIF, JPEG, and PNG files descriptions of the PNG, JPEG, and giflib libraries, as well as many other free and proprietary libraries and SDKs extensive documentation and examples using the Perl graphics modules GD and GIFgraph, and the Perl interface to the powerful ImageMagick libraries documentation on the Gnu Image Manipulation Program (GIMP) and the Perl interface that lets you easily script plug-ins or interface to the GIMP via the Web the creation of image maps from data extracted from a database the implementation of several new Perl modules for the creation of neatly formatted PostScript files details on interfacing to a fax gateway reusable recipes for many popular applications such as Web counters and Web cams the creation of animated GIFs on-the-fly One of the key ingredients to the success of the Web is that anyone who wanted to could participate in publishing to the wo...
    Anmerkung: Includes index
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 47
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xxviii, 1227 p. , ill. ; , 23 cm
    Ausgabe: 1st ed.
    Serie: Java series
    DDC: 005.13/3
    Schlagwort(e): Java (Computer program language) ; Electronic books ; local
    Kurzfassung: The Swing classes eliminate Java's biggest weakness: its relatively primitive user interface toolkit. Swing provides many new components and containers that allow you to build sophisticated user interfaces, far beyond what was possible with AWT. The old components have been greatly improved, and there are many new components, like trees, tables, and even text editors. It also adds several completely new features to Java's user interface capabilities: drag-and-drop, undo, and the ability to develop your own "look and feel," or the ability to choose between several standard looks. The Swing components are all "lightweight," and therefore provide more uniform behavior across platforms, making it easier to test your software. All these new features mean that there's a lot to learn. Swing is undoubtedly way ahead of AWT -- or, for that matter, any widely available user interface toolkit -- but it's also a lot more complicated. It's still easy to do simple things. But once you've seen what's possible, you won't want to do the simple things. Java Swing gives you in-depth coverage of everything you need to know to take full advantage of Swing, providing detailed descriptions of every class and interface in the key Swing packages. It shows you how to use all of the new components, allowing you to build state-of-the-art user interfaces. It also discusses how the components implement the MVC (Model View Controller) architecture, so you can understand how the components are designed and subclass them intelligently. Finally, it shows how to create your own "look and feel." Throughout, Java Swing focuses on giving you the context you need to understand what you're doing. It's more than documentation; Java Swing helps you develop code quickly and effectively. Whether you're a serious Java developer, or just trying to find out what Java can do, you'll find Java Swing an indispensable guide.
    Anmerkung: Jan. 1999 printing has Java 1.2 on cover and spine; May 1999 printing has Java 2 on cover and spine
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 48
    Online-Ressource
    Online-Ressource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Sprache: Englisch
    Seiten: xvi, 344 p. , ill. ; , 23 cm
    Serie: Java series
    Schlagwort(e): Cryptography ; Java (Computer program language) ; Electronic books ; local
    Kurzfassung: Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards.The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters.Topics include: The Java Cryptography Architecture (JCA) The Java Cryptography Extension (JCE) Cryptographic providers The Sun key management tools Message digests, digital signatures, and certificates (X509v3) Block and stream ciphers Implementations of the ElGamal signature and cipher algorithms A network talk application that encrypts all data sent over the network An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...