Sunday, December 6, 2009

The Complete IS IS Routing Protocol or Practical UNIX and Internet Security

The Complete IS-IS Routing Protocol

Author: Hannes Gredler

The IS-IS routing protocol has gone through a high-speed evolution in recent years. Initially deployed by the largest ISPs in a desperate search for a stable link-state protocol, it quickly gained popularity for its advantages in link-state routing. Today, it is a widely deployed protocol even at smaller ISPs but because of its meteoric adoption it has been sparsely documented. As service providers add multivendor platforms from both Cisco and Juniper Networks, it is difficult to get a complete picture of the IS-IS that is deployed in the field. As service providers deploy increasingly multivendor implementations of IS-IS, they desperately need to know how to interoperate the protocol on different routing platforms. Only a book such as The Complete IS-IS Routing Protocol can provide the insight and practical solutions necessary, because it takes a multivendor, real-world competitive approach to implementing IS-IS. The Complete IS-IS Routing Protocol will be the seminal book on IS-IS for many years to come.



See also: Its Okay to Be the Boss or Call Me Ted

Practical UNIX and Internet Security

Author: Simson Garfinkel

When Practical UNIX Security was first published in 1991, it became an instant classic. Crammed with information about host security, it saved many a UNIX system administrator and user from disaster.

This second edition is a complete rewrite of the original book. It's packed with twice the pages and offers even more practical information for UNIX users and administrators. In it you'll find coverage of features of many types of UNIX systems, including SunOS, Solaris, BSDI, AIX, HP-UX, Digital UNIX, Linux, and others. The first edition was practical, entertaining, and full of useful scripts, tips, and warnings. This edition is all those things -- and more.

If you are a UNIX system administrator or user in this security-conscious age, you need this book. It's a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection. It's complete -- covering both host and network security -- and doesn't require that you be a programmer or a UNIX guru to use it.

Practical UNIX & Internet Security describes the issues, approaches, and methods for implementing security measures. It covers UNIX basics, the details of security, the ways that intruders can get into your system, and the ways you can detect them, clean up after them, and even prosecute them if they do get in. Filled with practical scripts, tricks, and warnings, Practical UNIX & Internet Security tells you everything you need to know to make your UNIX system as secure as it possible can be.

Contents include:

  • Part I: Computer Security Basics. Introduction and security policies.
  • Part II: User Responsibilities. Users and their passwords, groups, the superuser, the UNIX filesystem, and cryptography.
  • Part III: System Administrator Responsibilities. Backups, defending accounts, integrity checking, log files, programmed threats, physical security, and personnel security.
  • Part IV: Network and Internet Security: telephone security, UUCP, TCP/IP networks, TCP/IP services, WWW, RPC, NIS, NIS+, Kerberos, and NFS.
  • Part V: Advanced Topics: firewalls, wrappers, proxies, and secure programming.
  • Part VI: Handling Security Incidents: discovering a breakin, U.S. law, and trust.
  • VII: Appendices. UNIX system security checklist, important files, UNIX processes, paper and electronic sources, security organizations, and table of IP services.



Table of Contents:
Preface to the Second Edition
1. Introduction
2. Policies & Guidelines
3. Users and Passwords
4. Users, Groups, and the Superuser
5. The UNIX Filesystem
6. Cryptography
7. Backups
8. Defending Your Accounts
9. Integrity Management
10. Auditing and Logging
11. Protecting Against Programmed Threats
12. Physical Security
13. Personnel Security
14. Modems
15. UUCP 438
16. TCP/IP Networks
17. UNIX TCP/IP Services
18. WWW Security
19. RPC and Configuration Management
20. NFS
21. Firewalls
22. Wrappers & Proxies
23. Writing Secure SUID and Network Programs
24. Discovering a Break-in
25. Denial of Service Attacks and Solutions
26. Computer Security and U.S. Law
27. Who Do You Trust?
APPENDICES.
A. UNIX Security Checklist
B. Important Files
C. UNIX Processes
D. Paper Sources
E. Electronic Resources
F. Other Sources

Saturday, December 5, 2009

Project Management for Modern Information Systems or Essential Digital Manipulation Manual for Photographers

Project Management for Modern Information Systems

Author: Brandon

In the past, project success has been defined too narrowly as simply meeting time and cost constraints for a given scope of work. However, in order for an IT project to be completely successful that basic definition of success needs to be extended to include meeting return on investment expectations, product quality, stakeholder satisfaction, security, maintainability and adaptability. Also, the formal methods and tools of the project management discipline need to evolve to address the changes in modern software engineering and our high-tech global workplaces.

With this broader and more appropriate definition of success, IT project management techniques and tools can be modernized, extended, and otherwise focused to be more effective. Project Management for Modern Information Systems describes and illustrates practices, procedures, methods, and tools for IT project management that address this extended definition of project success for modern times.


About the Author:
Dan Brandon obtained a BS from Case Western Reserve University, an MS, and PhD in Engineering University of Connecticut; his PhD specialization was in computer methods. Before returning to the university environment, Dr. Brandon accumulated over thirty years of commercial experience in both the IT technical and management arenas. He is currently a Professor of Information Technology Management (ITM) and chairperson of that department at Christian Brothers University (CBU) in Memphis, TN. He has been published in a number of books, journals, and conference proceedings. He is a member of the Society of Information Management (SIM), the Information Resource Management Association (IRMA), and theProject Management Institute (PMI). He continues to do consulting with a number of companies both locally and internationally. Currently he is involved in the design and development of comprehensive open source software systems for project management and other business applications.



Table of Contents:
Ch. IA framework for digital accounting1
Ch. IIThe evolution of accounting software15
Ch. IIIThe XML-based Web languages and accounting42
Ch. IVElectronic data interchange88
Ch. VThe revenue cycle131
Ch. VIThe expenditure cycle190
Ch. VIIThe conversion cycle230
Ch. VIIIThe general ledger cycle260
Ch. IXFinancial management, strategic management and digital accounting293
Ch. XControls, security, and audit in online digital accounting318

Look this: Globalization and Its Discontents or Leadership Without Easy Answers

Essential Digital Manipulation Manual for Photographers

Author: Mike Crawford

Now available in paperback, The Essential Digital Manipulation Manual is an in-depth resource for photographers at every level. Clear, concise explanations demystify techniques for capturing, editing, transforming, and manipulating top-quality images. Professional enhancement and correction, digital updates to traditional film-based darkroom techniques, and advanced professional finishes are explored in depth. A comprehensive rundown of all of the major filters found in Photoshop and other image-editing packages, as well as information on output and storage issues, make this the definitive reference guide for professional and amateur photographers alike.



Thursday, December 3, 2009

Performance by Design or Modern Digital and Analog Communication Systems

Performance by Design: Computer Capacity Planning by Example

Author: Daniel A Menasc

Practical systems modeling: planning performance, availability, security, and more

Computing systems must meet increasingly strict Quality of Service (QoS) requirements for performance, availability, security, and maintainability. To achieve these goals, designers, analysts, and capacity planners need a far more thorough understanding of QoS issues, and the implications of their decisions. Now, three leading experts present a complete, application-driven framework for understanding and estimating performance. You'll learn exactly how to map real-life systems to accurate performance models, and use those models to make better decisions--both up front and throughout the entire system lifecycle. Coverage includes:


  • State-of-the-art quantitative analysis techniques, supported by extensive numerical examples and exercises
  • QoS issues in requirements analysis, specification, design, development, testing, deployment, operation, and system evolution
  • Specific scenarios, including e-Business and database services, servers, clusters, and data centers
  • Techniques for identifying potential congestion at both software and hardware levels
  • Performance Engineering concepts and tools
  • Detailed solution techniques including exact and approximate MVA and Markov Chains
  • Modeling of software contention, fork-and-join, service rate variability, and priority
About the Web Site

The accompanying Web site provides companion Excel workbooks that implement many of the book's algorithms and numerical examples.



Look this: Security Analysis or What the CEO Wants You to Know

Modern Digital and Analog Communication Systems

Author: B P Lathi

Lathi's trademark user-friendly and highly readable text presents a complete and modern treatment of communication systems. It begins by introducing students to the basics of communication systems without using probabilistic theory. Only after a solid knowledge base--an understanding of how communication systems work--has been built are concepts requiring probability theory covered. This third edition has been thoroughly updated and revised to include expanded coverage of digital communications. New topics discussed include spread-spectrum systems, cellular communication systems, global positioning systems (GPS), and an entire chapter on emerging digital technologies (such as SONET, ISDN, BISDN, ATM, and video compression).
Ideal for the first communication systems course for electrical engineers, Modern Digital and Analog Communication Systems offers students a superb pedagogical style; it consistently does an excellent job of explaining difficult concepts clearly, using prose as well as mathematics. The author makes every effort to give intuitive insights--rather than just proofs--as well as heuristic explanations of theoretical results wherever possible. Featuring lucid explanations, well-chosen examples clarifying abstract mathematical results, and excellent illustrations, this unique text is highly informative and easily accessible to students.



Table of Contents:
Preface
1Introduction1
2Introduction to Signals14
3Analysis and Transmission of Signals71
4Amplitude (Linear) Modulation151
5Angle (Exponential) Modulation208
6Sampling and Pulse Code Modulation251
7Principles of Digital Data Transmission294
8Emerging Digital Communications Technologies354
9Some Recent Developments and Miscellaneous Topics404
10Introduction to Theory of Probability434
11Random Processes487
12Behavior of Analog Systems in the Presence of Noise532
13Behavior of Digital Communication Systems in the Presence of Noise577
14Optimum Signal Detection626
15Introduction to Information Theory679
16Error Correcting Codes728
App. AOrthogonality of Some Signal Sets764
App. BSchwarz Inequality766
App. CGram-Schmidt Orthogonalization of a Vector Set768
App. D: Miscellaneous771
Index775

Wednesday, December 2, 2009

Instant Vegas Movie Studio DVD or iSeries i5 Primer

Instant Vegas Movie Studio +DVD

Author: Douglas Spotted Eagl

Get to work fast with carefully detailed screenshots and step-by-step directions that illustrate the most-used features of Vegas Movie Studio software in a concise, time-efficient way. Learn how to navigate the interface and perform the essential tasks, from editing video and audio to compositing and outputting.

As a learning tool or a handy reference-this guide is packed with useful, accessible information for novice and experienced users alike. Beginners get a no-fluff introduction to the intelligent use of Vegas Movie Studio, while more experienced users get real-world examples and creative suggestions for producing better projects. VEG files related to projects found in this book may be downloaded from the VASST Web site.

Douglas Spotted Eagle is an award-winning performer, music producer, and videographer. He is the author of Vegas 6 Editing Workshop among many books, and the host of two web sites for users of Vegas and related products.

John J. Rofrano is a musician, vocalist, songwriter, videographer and software architect. He is the author of the Instant ACID book, tutorials on Sony Vegas, and moderates the ACID and Sony Scripting forum at Digital Media Network site. More information can be found at his web site.

What People Are Saying

Dave Chaimson
"Sony Media Software is pleased to have such talented producers creating training materials for our customers. If you have an interest in learning about the Vegas program, this book will be an invaluable resource, helping you find out about the most important features in an instant. Enjoy!"
vice-president, sales and marketing, Sony Media Software




Interesting book: Northwest Flavors or Receive One Another

iSeries/i5 Primer: Concepts and Techniques for Programmers, Administrators, and System Operators

Author: Holt

This comprehensive, 35-chapter book is the ultimate resource and a "must-have" for every professional working with the i5/iSeries. It is perfect for novice and intermediate programmers as well as for system administrators and operators. In simple, straightforward style, the authors explain core i5/iSeries concepts and show you step by step how to perform a wide variety of essential functions.

The book includes sections on installation, operations, administration, system architecture, programming, the Internet, and troubleshooting. These sections are organized in free-standing style so you don’t have to read the book from cover to cover or even sequentially; you can reference the chapters that interest you most, skip some, and jump back and forth as needed. It even contains a helpful glossary to act as a fast reference for all the terms you need to know.

Completely updated through i5/OS V5, the fourth edition of this best-selling book contains page after page of information covering RPG IV and Java programming, system values, database and SQL, important system security information, the i5/iSeries as an Internet server, and much more. You’ll learn the essential technical concepts you need to get up to speed on all areas of the i5/iSeries, and your increased understanding of the i5/iSeries will boost your productivity.
Even if you have a previous edition of this book, you'll want to get this new edition with all of the V5 update and brand new topics like:

• iSeries Navigator
• Java
• SQL
• iSeries Access
• HTTP Server
• Qshell
• Client/Server and TCP/IP
• Client Access

Thisbook is a learning tool and valuable reference you will use for years to come. As one satisfied reader put it, "If you could own only one i5/iSeries book, this would be it."

With IBM i5/iSeries Primer, Fourth Edition you will:

• Learn how to install an i5 server
• Gain a comprehensive knowledge of i5/iSeries operations
• Understand libraries, objects, library lists, and everything you need to know about files
• Be able to configure a system
• Explore programming basics, including how to use utilities, journaling, and commitment control
• Discover what to do in case of trouble, how to request help from IBM, how to report problems, and how to manage PTFs



Tuesday, December 1, 2009

The Digital Photographers Notebook or SELinux

The Digital Photographer's Notebook: A Pro's Guide to Adobe Photoshop CS3, Lightroom, and Bridge

Author: Kevin Ames

In the world of digital photography, inspiration can come at any time. Great images are created behind the camera and then refined at the computer. "Photographers live in the moment when shooting, and I believe we do the same when in front of the monitor," writes Kevin Ames, veteran photographer and Photoshop master. Building on his popular column in Photoshop User magazine, Kevin expands the scope of the original articles to include in-depth information about all aspects of digital photography.

With this book, you'll gain a focused yet thorough understanding of Adobe's suite of digital photography applications - Photoshop CS3 (including the Camera Raw plug-in), Lightroom, and Bridge. You'll not only learn what these powerful applications can do, you'll also learn which one is best for a given task and see how the applications come together to allow you to work efficiently - all while creating and delivering stunning photographs. Whether dealing with workflow, organization, or truly creative enhancements, Kevin candidly shares his personal image-making process from start to finish.

In addition, there are clear and illuminating explanations of many issues relevant to the digital photographer, such as the profound differences between RAW and JPEG, the many benefits of "shooting tethered," and how lighting really works. Whether you've been shooting digital for years or you're just making the switch from film, The Digital Photographer's Notebook is an essential guide to managing your portfolio and creating head-turning photographs.



SELinux: NSA's IOpen Source Security Enhanced Linux

Author: McCarty

The intensive search for a more secure operating system hasoften left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system—including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE—all of it free and open source.

SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days—when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system—are prevented on a properly administered SELinux system.

The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include:

  • A readable and concrete explanation of SELinux concepts and the SELinux security model
  • Installation instructions for numerous distributions Basic system and user administration
  • A detailed dissection of the SELinux policy language

Examples and guidelines for altering and adding policies With SELinux, a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system—and who doesn't?—this book provides the means.



Monday, November 30, 2009

IIS 6 or Pocket PCRef

IIS 6: The Complete Reference

Author: Hethe Henrickson

See why Microsoft Internet Information Server 6 is quickly becoming a force in the Web Server area. Get step-by-step instruction on installing, configuring, maintaining, and administering IIS 6. Troubleshoot the Web Server, learn industry security standards, and cover Virtual Directories and Servers as well as FrontPage Webs, and much more.



Table of Contents:
Acknowledgments
Introduction
Pt. IBasic IIS Services
1IIS Fundamentals3
2The WWW Service21
3The FTP Service83
4The SMTP Service109
5The NNTP Service135
Pt. IIIIS Administration
6Security165
7Authentication189
8TCP/IP and DNS205
9Administration Tasks243
10Encryption259
11Logging289
Pt. IIIIIS Programming
12ASP Programming319
13COM Web Programming363
14ASP.NET Web Forms421
15ASP.NET Web Services457
16ATL Server493
17ISAPI Extensions523
Pt. IVIIS Extras
18Software Process and Methodology for Web Applications571
19Bringing It All Together: Creating Your Own Web Site Using IIS607
20Troubleshooting631
AppXML Escape Values653
Index675

Books about: Stand For Something or Cheney

Pocket PCRef

Author: Thomas J Glover

The heart of every IBM and compatible PC is the BIOS, a low-level operating environment that handles the initial boot, start up and loading of the operating system and hardware level functions, System and service technicians and professionals assembling computer systems, troubleshooting computer hardware troubleshooting, performance tuning or home hobbyists building their own computer will benefit from this book.

There are over 50,000 companies focused in the computer technical service and configuration business in the United States alone. Most of these companies employ between 10-50 technicians. In addition, the target audience

Key Features
-- Over 6,500 hard disks covered (almost twice the number of any competitive product).
-- Also covers common and unusual IDE disk controllers.



Sunday, November 29, 2009

How to Wow or Creative Suite 3 Integration

How to Wow: InDesign

Author: Wayne Rankin

With InDesign CS quickly becoming the new king of the desktop publishing hill, there's no shortage of books promising to get you up to speed it. None, however, does so quite like this one, which keeps the focus right where you, as a designer, want it--on designing! Providing just enough theoretical grounding to use the program effectively but omitting the tech-heavy under-the hood discussions that represent the core of other InDesign tomes, this full-color guide uses gorgeous real-world examples and simple step-by-step instructions to cover all of InDesign CS' features, including its newest: the Story Editor, a Separation Preview palette, nested styles, the Package for GoLive command, and more. As you work through chapters on text and typography, pages and documents, placed images, tables, color, special effects, multimedia, preflighting, and more, you'll quickly master both the InDesign basics you need to get your job done and the advanced techniques that will give your pages that extra flair! A companion CD includes lesson files plus style sheets, templates, graphic libraries, images, and more!



Table of Contents:
1Mastering the basics12
2Text and typography26
3Pages and documents52
4Tables74
5Using color in InDesign documents86
6Importing graphics104
7Working with transparency120
8Adding interactive elements136
9Output154

Book review: A Guide to the Project Management Body of Knowledge or Rebound Rules

Creative Suite 3 Integration: Photoshop, Illustrator, InDesign, Dreamweaver, Flash Pro, Acrobat, Bridge and Version Cue

Author: Keith Martin

Learn how to integrate the new versions and features of all design programs within Creative Suite 3 with this definitive guide. Improve your productively by achieving professional results faster and more collaboratively. Simplify both your creative and production tasks as you move your creative elements freely between applications while maintaining editing capability — all in one unified design environment.

With this book, you get a unique combination with...

* Focus on integration so that you can work most efficiently with the Suite's packages together as part of your overall design workflow, saving valuable time
* Colorful, practical tutorials that use multiple programs for real-life projects
* Look-up reference and troubleshooting organization for cross-program issues - even if you use just 2 or 3 of the CS programs
* Coverage from basics for readers who are just beginning with the Suite through in-depth, comprehensive info for cross program mastery

From print, Web, or multimedia projects to PDFs, you get the most hands-on approach to cross-Suite issues. Exciting real-world projects include building entire websites and multi-chapter books. Produce effective and efficient PDFs for approval and print or screen using Acrobat with content from Photoshop, Illustrator and InDesign.

Whether you work with design, editorial, advertising, or production, you will not find this information anywhere else!

* A unique guide showing you how to use the 7 packages within Adobe's Creative Suite 3 together and efficiently as part of your overall workflow, saving you valuable time
* Produce professional results with highly illustrated, practicalhow-to tutorials
* Ideal to use as a look-up reference and trouble shooting manual for cross-program issues - even if you own just 2 or 3 of the CS programs



Friday, November 27, 2009

The Ultimate CompTIA Network Resource Kit or Linux Desktop Pocket Reference

The Ultimate CompTIA Network + Resource Kit

Author: Course Technology

The Ultimate CompTIA Network+ Resource Kit provides three different ways to prepare for the exam—a book, flashcards, and a computer -based training CD. Combined, they are a solid resource for exam success. The book provides thorough preparation for CompTIA's 2005 Network+ Certification Exam. It covers all fundamental and advanced networking topics a reader would encounter on the job or on the Network+ exam in a style that's easy to read and comprehend. It comes with a downloadable CoursePrep Exam Guide for Network+, offering exam preparation materials that drill down to each certification objective and over 800 practice exam questions. The Network+ In Depth flashcards contain an exam based question on one side with the answer on the other, designed to test the reader's knowledge of key concepts. Each flashcard also includes the source chapter within the accompanying Network+ In Depth book where the topic can be found. The Network+ CBT (Computer-Based Training) CD provides complete preparation for the latest Network+ exam. It includes a prerequisite test and study material that helps the reader zero in on what they specifically need to study, test prep questions that provide practice in a simulated environment, and it features hands-on lessons, simulations, audio narration, video clips, animations, graphics, screenshots, sound effects, and easy-to-use navigation. With three different ways to study, The Ultimate CompTIA Network+ Resource Kit is the only test preparation you'll need to pass.



Go to: Knusprig: Projektmanagement, die Dritte Ausgabe: Praktische Werkzeuge für den Erfolg

Linux Desktop Pocket Reference

Author: David Brickner

While Mac OS X garners all the praise from pundits, and Windows XP attracts all the viruses, Linux is quietly being installed on millions of desktops every year. For programmers and system administrators, business users, and educators, desktop Linux is a breath of fresh air and a needed alternative to other operating systems.

The Linux Desktop Pocket Guide is your introduction to using Linux on five of the most popular distributions: Fedora, Gentoo, Mandriva, SUSE, and Ubuntu. Despite what you may have heard, using Linux is not all that hard. Firefox and Konqueror can handle all your web browsing needs; GAIM and Kopete allow you to chat with your friends on the AOL, MSN, and Yahoo! networks; and the email programs Evolution and Kontact provide the same functionality as Microsoft Outlook, with none of the cost. All of these programs run within the beautiful, feature-packed, and easy-to-use GNOME or KDE desktop environments.

No operating system truly "just works," and Linux is no exception. Although Linux is capable of running on most any computing hardware that Microsoft Windows can use, you sometimes need to tweak it just a little to make it work the way you really want. To help you with this task, Linux Desktop Pocket Guide covers essential topics, such as configuring your video card, screen resolution, sound, and wireless networking. And laptop users are not left out--an entire section is devoted to the laptop issues of battery life, sleep, and hibernate modes.



Table of Contents:
Ch. 1Distributions1
Ch. 2Logging in25
Ch. 3GNOME29
Ch. 4KDE43
Ch. 5Applications65
Ch. 6Add, remove, and update programs95
Ch. 7Configuration119
Ch. 8Laptops142

Thursday, November 26, 2009

Programming Windows Presentation Foundation or Visual QuickStart Guide

Programming Windows Presentation Foundation

Author: Chris Sells

Windows Presentation Foundation (WPF) (formerly known by its code name "Avalon") is a brand-new presentation framework for Windows XP and Windows Vista, the next version of the Windows client operating system. For developers, WPF is a cornucopia of new technologies, including a new graphics engine that supports 3-D graphics, animation, and more; an XML-based markup language (XAML) for declaring the structure of your Windows UI; and a radical new model for controls.

Programming Windows Presentation Foundation is the book you need to get up to speed on WPF. By page two, you'll have written your first WPF application, and by the end of Chapter 1, "Hello WPF," you'll have completed a rapid tour of the framework and its major elements. These include the XAML markup language and the mapping of XAML markup to WinFX code; the WPF content model; layout; controls, styles, and templates; graphics and animation; and, finally, deployment.

Programming Windows Presentation Foundation features:

Scores of C# and XAML examples that show you what it takes to get a WPF application up and running, from a simple "Hello, Avalon" program to a tic-tac-toe game

Insightful discussions of the powerful new programming styles that WPF brings to Windows development, especially its new model for controls

A color insert to better illustrate WPF support for 3-D, color, and other graphics effects

A tutorial on XAML, the new HTML-like markup language for declaring Windows UI

An explanation and comparison of the features that support interoperability with Windows Forms and other Windows legacy applications

The next generation of Windows applications is going to blaze a trail into theunknown. WPF represents the best of the control-based Windows world and the content-based web world; it's an engine just itching to be taken for a spin. Inside, you'll find the keys to the ignition.



Interesting book: The Hidden Pattern or Black White Photography Techniques with Adobe Photoshop

Visual QuickStart Guide: iTunes 6 and iPod for Windows and Macintosh

Author: Judith Stern

Got a new iPod? Need to master it and iTunes fast? Try a Visual QuickStart! This best-selling reference's visual format and step-by-step, task-based instructions will have you up and running with leading digital audio player and music store/jukebox in no time! In this popular guide, leading technology experts Judith Stern and Robert Lettieri use crystal-clear instructions and friendly prose to introduce you everything you need to know about getting the most of latest iPod models and the iTunes 6. Filled with step-by-step, task-based instructions and loads of visual aids, this book explains how to download music, videos, audiobooks, and podcasts; create and share iMixes and on-the-go play lists; watch videos on the iPod and other devices; burn custom CDs and DVDs; add music to your other iLife projects; synch your iPod to your computer; understand Smart Play lists and AAC encoding; and more!



Wednesday, November 25, 2009

Power Up or Macromedia Flash 8

Power Up: A Practical Student's Guide to Online Learning

Author: Stacey Barrett

Online students begin their academic careers like many students-with sheer excitement. Embarking on a dream and making an investment in themselves, they strive for success. While a variety of reasons draw them to online courses, these students may find the non-traditional classroom unexpectedly challenging. Technical skills, time management, and an understanding of personal learning preferences can often overwhelm first-time online students.

A reference text, Power Up frankly discusses the realities of online learning and highlights the resources available to online students. The tips and techniques outlined in the text help students to succeed in the virtual classroom. Students will discover how to regulate their learning paces and processes-skills that will serve them well beyond their online education.

Through proactive advice, authentic experiences, and constructive commentary, this book is accessible and appropriate for all students entering college, as well as for high school students engaged in online learning. It offers supplemental support material to schools and faculty entering the online/hybrid environment.

Among them, the authors share more than 30 years of educational experience, having taught new students at more than six different universities, and possessing an intimate understanding of the theory and practice of impacting student performance and retention. As all three authors are former online students themselves, they also have developed numerous online student success courses.



Table of Contents:
Becoming an Online Learner     1
Know Thyself: Self-Discovery for the Online Learner     9
Motivation and Goal Setting: Overcoming Obstacles     15
The Commitments of an Online Student: Managing Your Priorities     23
The Online Classroom and Community     31
Types of Online Classrooms     37
Communicating Online: Who, What, When, How, and Why     51
Working in the Online Classroom     59
Thinking and Researching Online     65
Strategies for Successful Online Learning     77
Computer Concerns     85
Creating the Ideal Personalized Study Environment     93
Preparing for the First Day of Class     101
Maintaining Your Online Success     109
Financing Your Education     115
Understanding the Importance of Accreditation     117
References     119
Index     121
Study Signs     125

Books about: Kalifornien: Amerikas Experiment der Hohen Anteile

Macromedia Flash 8: Training from the Source

Author: James English

What began life as a simple Web animation tool has evolved into a powerful platform for Web application development- which means that if you're serious about developing for the Web, you need to get serious about learning Flash. With its breakthrough motion-graphics capabilities and powerful run-time effects, Flash 8 provides the tools, authoring power, and rich video capabilities you need to provide stunning interactive content. This Macromedia-certified guide provides the key to learning the basics of Flash 8. Through a series of hands-on projects, master trainer James English provides a firm foundation in everything Flash- from graphics, animation, and video to ActionScript fundamentals. Simple step-by-step instructions and tons of screenshots guide you through the process of creating buttons and links, drawing and animating in Flash, formatting text, adding video and sound, loading data, and more- in short, everything you need to develop sophisticated, professional-looking Web sites. A companion CD includes the lesson files needed to complete the book's projects as well as a trial version of the program itself.



Sunday, February 22, 2009

Naruto Uzumaki Chronicles 2 or How to Do Everything with Your iPAQ Pocket PC

Naruto Uzumaki Chronicles 2

Author: Fernando Bueno

Abilities: Learn to tailor your character's skills and abilities for maximum performance.
Missions: Detailed story mode walkthroughs and strategies to completing all 50 side missions.
Unlockables: A complete list of all secrets and unlockables.
Moves: Complete lists of all special moves and Jutsus.



Table of Contents:
INTRODUCTION
NINJA ACADEMY
THE CAST
NINJA TOOLS
WALKTHROUGH
NARUTO GAIDEN
SURVIVAL TESTS
SECRET SCROLLS
SAY WHAT?–NARUTO DICTIONARY

New interesting book: Tattoo or Toxic Churches

How to Do Everything with Your iPAQ Pocket PC

Author: Derek Ball

Maximize all the powerful capabilities of your iPAQ Pocket PC with help from this easy-to-use guide. You'll learn to use the email, Internet, phone, and camera features, and enjoy all the entertainment options like movies and music. You'll also find out how to be more productive on-the-go using the mobile office software--work on documents, spreadsheets, and presentations, all in the palm of your hand. With coverage of all models, How to Do Everything with Your iPAQ Pocket PC, Third Edition is your one-stop guide for getting the most out of this versatile handheld device.

Derek Ball is a recognized industry expert in mobility and wireless and develops applications for handheld wireless devices such as the HP iPAQ. He has authored or co-authored several books on mobile computing and other emerging technology topics.

Dayton Foster has been working with converged mobile technologies for several years. He is the Director of Mobile Technologies for Avocent Mobile Solutions.



Saturday, February 21, 2009

Introduction to Computational Genomics or Hashimotos Thyroiditis

Introduction to Computational Genomics: A Case Studies Approach

Author: Nello Cristianini

Where did SARS come from? Have we inherited genes from Neanderthals? How do plants use their internal clock? The genomic revolution in biology enables us to answer such questions. But the revolution would have been impossible without the support of powerful computational and statistical methods that enable us to exploit genomic data. Many universities are introducing courses to train the next generation of bioinformaticians: biologists fluent in mathematics and computer science, and data analysts familiar with biology. This readable and entertaining book, based on successful taught courses, provides a roadmap to navigate entry to this field. It guides the reader through key achievements of bioinformatics, using a hands-on approach. Statistical sequence analysis, sequence alignment, hidden Markov models, gene and motif finding and more, are introduced in a rigorous yet accessible way. A companion website provides the reader with Matlab-related software tools for reproducing the steps demonstrated in the book.



New interesting textbook: Tequila and Tequila Drinks or Rick Steins Seafood Odyssey

Hashimoto's Thyroiditis: A Medical Dictionary, Bibliography, and Annotated Research Guide to Internet References

Author: ICON Health Publications

This is a 3-in-1 reference book. It gives a complete medical dictionary covering hundreds of terms and expressions relating to Hashimoto's thyroiditis. It also gives extensive lists of bibliographic citations. Finally, it provides information to users on how to update their knowledge using various Internet resources. The book is designed for physicians, medical students preparing for Board examinations, medical researchers, and patients who want to become familiar with research dedicated to Hashimoto's thyroiditis.If your time is valuable, this book is for you. First, you will not waste time searching the Internet while missing a lot of relevant information. Second, the book also saves you time indexing and defining entries. Finally, you will not waste time and money printing hundreds of web pages.



Table of Contents:
Forward
Chapter 1. Studies on Hashimoto's Thyroiditis
Overview
Federally Funded Research on Hashimoto's Thyroiditis
The National Library of Medicine: PubMed
Chapter 2. Nutrition and Hashimoto's Thyroiditis
Overview
Finding Nutrition Studies on Hashimoto's Thyroiditis
Federal Resources on Nutrition
Additional Web Resources
Chapter 3. Alternative Medicine and Hashimoto's Thyroiditis
Overview
National Center for Complementary and Alternative Medicine
Additional Web Resources
General References
Chapter 4. Books on Hashimoto's Thyroiditis
Overview
Book Summaries: Online Booksellers
Appendix A. Physician Resources
Overview
NIH Guidelines
NIH Databases
Other Commercial Databases
Appendix B. Patient Resources
Overview
Patient Guideline Sources
Finding Associations
Appendix C. Finding Medical Libraries
Overview
Preparation
Finding a Local Medical Library
Medical Libraries in the U.S. and Canada
ONLINE GLOSSARIES
Online Dictionary Directories
HASHIMOTO'S THYROIDITIS DICTIONARY
INDEX

Friday, February 20, 2009

Mastering Microsoft SQL Server 2005 express or Excel 2007 Miracles Made Easy

Mastering Microsoft SQL Server 2005 express

Author: Mike Gunderloy

A Comprehensive Guide to Microsoft's New Express Edition of its Bestselling Database Server

Microsoft's SQL Server 2005 Express Edition is the perfect fit if you're a small business owner, trainer, or student who doesn't need all the bells and whistles of the full version of SQL Server 2005. In this comprehensive guide written by two SQL Server experts, you'll find step-by-step explanations and simplified management tools for

using SQL Server Express in smaller-scale but still mission-critical situations. With a focus on practical tasks, the book thoroughly

covers both database administration and development, smoothly moving you from beginner to advanced subjects.

Coverage Includes
* Understanding basic database concepts
* Getting to know database types: file server, client server, relational and more
* Learning Structured Query Language (SQL) and SQL Server's Transact-SQL
* Creating efficient and useful databases
* Writing queries and stored procedures to explore your data
* Automating the administration of your databases
* Developing database applications with Visual Basic(r) Express
* Using SQL Server Management Studio Express
* Sharing data between multiple servers
* Monitoring and optimizing SQL Server Express

Featured on CD CD includes Microsoft(r) SQL Server Express and Visual Basic(r) Express!

Leverage the Experience of Experts through Real-World Examples

Increase Your Own Productivity with an Entire Chapter on Troubleshootng

Discover Practical Solutions to a Database Administrator's Needs

Reduce Complexity and Build Simple Data-Driven Applications



Interesting book: Comunicazioni di Digitahi

Excel 2007 Miracles Made Easy: Mr. Excel Reveals 25 Amazing Things You Can Do with the New Excel

Author: Bill Jelen

In this addendum to Learn Excel from Mr. Excel, the amazing new features offered in Excel 2007 are introduced. Revealing the features that make this new version the best new release of Excel since 1997, this guide provides the necessary information to teach users to quickly unleash the powerful new features in Excel 2007, create incredible-looking charts, customize color themes to match their corporate logo, utilize data-visualization tools, and learn Pivot Table improvements.



Thursday, February 19, 2009

Xbox 360 Achievements or Real World Nikon Capture NX

Xbox 360 Achievements: Unlocked

Author: BradyGames

THE ULTIMATE GUIDE TO MAXIMIZING YOUR GAMERSCORE!


HOW TO UNLOCK EVERY XBOX 360 ACHIEVEMENT FOR THESE HOT TITLES!


  • BioShock

  • Call of Duty 4: Modern Warfare

  • Conan

  • Crackdown

  • Dead Rising

  • Forza Motorsport 2

  • Gears of War

  • Guitar Hero III

  • Halo 3

  • Half Life 2: Orange Box

  • Lego Star Wars II

  • Madden NFL 08

  • Marvel: Ultimate Alliance

  • NBA 2K8

  • NCAA Football 08

  • Overlord

  • Project Gotham Racing 4

  • The Elder Scrolls IV: Oblivion

  • Tony Hawk's Proving Ground

  • Virtua Fighter 5

PLUS, HOW TO GET 10,000 MORE GAMERPOINTS IN 2 WEEKS!


Platform: Xbox 360


Genre: Various




Book review: Le leadership et la Direction dans les Soins infirmiers

Real World Nikon Capture NX (Real World Series)

Author: Ben Long

Capture NX from Nikon is a powerful image-editing application that lets photographers make complex edits of their digital images with more speed and efficiency than other software programs. Its underlying technology gives photographers the ability to make selective corrections to an image with just one click. "Real World Capture NX," written by digital photography expert Ben Long, takes photographers behind the scenes to see how this innovative program works. Along the way, Ben offers valuable tips and techniques for getting the most out of the software and digital cameras.

Novice and expert photographers alike will benefit from Capture NX. New users can make advanced image corrections without learning sophisticated masking techniques. Advanced users will find they need fewer steps to perform the complex edits they are accustomed to making in other programs. Any image corrections made with Capture NX are non-destructive, which means that the all edits are changeable and reversible until the photographer. Photographers who use Nikon cameras have access to special software features for working with raw, JPEG and TIFF images. While Capture NX was developed with Nikon cameras in mind, the software works with digital cameras from all manufacturers, thus broadening its appeal. Every digital photographer can use Capture NX--and will benefit from "Real World Capture NX."



Tuesday, February 17, 2009

ADTs Data Structures and Problem Solving with C or NET Framework Programmers Reference

ADTs, Data Structures and Problem Solving with C++

Author: Larry Nyhoff

Abstract data types (ADT's) and data structures are key elements in unlocking the power of object-oriented programming. Designed for CS2 course; this popular book thoroughly covers ADTs (Abstract Data Types), data structures, and their use in problem solving. The text guides the student through the development of ADTs such as stacks, queues, and binary trees, the use of key data structures such as arrays, classes and linked lists to implement ADTs, and problem solving using Object-Oriented Design (OOD) methodologies. Algorithms required to design arid implement ADTs in C++ are given thorough treatment along with a solid introduction to the Standard Template Library (STL). C++ topics such as recursion, inheritance, and polymorphism are introduced and some C-style topics relative to data structures are also provided. Using examples, case studies and exercises from various areas of computer science, author Larry Nyhoff offers the student a solid foundation for further studies in CS while providing concrete tools for unlocking the power of C++.

New to the Second Edition
  • New chapters on searching and C++'s I/O and string classes
  • Improvements and additions to diagrams
  • Consistent naming conventions
  • Complete source code for ADTs
  • Expanded treatment of selected topics on the text's website
  • Introduces UML and uses UML-style diagrams for ADT specifications



Table of Contents:
1Software development1
2Introduction to abstract data types45
3Data structures and abstract data types81
4More about OOP and ADTs - classes143
5Standard C++ input/output and string classes193
6Lists253
7Stacks315
8Queues389
9ADT implementations : templates and standard containers445
10ADT implementations : recursion, algorithm analysis, and standard algorithms521
11More linking up with linked lists585
12Searching : binary trees and hash tables645
13Sorting721
14OOP and ADTs779
15Trees831
16Graphs and digraphs883

Books about: State and Local Government or Essential Jefferson

.NET Framework Programmer's Reference

Author: Dan Rahmel

Beginning with an overview of the . NET architecture,this book is an extremely handy desk reference. Outlining basic concepts including syntax,variable passing,class redefinition,and event structure,this book also provides definitions for all of the relevant classes in the framework within topic areas such as graphics,networking,and more. Lastly,the API Quick reference section will offer indexes and cross references to the classes and their methods.


Quick Reference for Effective Programming in the . NET Framework!


Quick,accurate answers to all your . NET technology questions are within easy reach—just grab your copy of . NET Framework Programmer's Reference. Now you can program in the standardized,shared environment of Visual Studio,using Visual Basic,C#,C++,or other third-party languages. This handy resource provides a structural overview of the extensible,reusable classes that comprise the . NET Framework. Execute applications using ASP. NET—plus locate and understand specific routines,syntax,variable passing,and event structure. Organized and cross-referenced by topics,subclasses,and namespace location,this vital reference is likely to be the most used book in any developer's library.



  • Access all system services—including Web services,I/O,networking,memory management,and events
  • Individual chapters devoted to essential topics including COM,database access,security,XML,and runtime services
  • Solve problems on the spot—designed to provide quick,usable explanations
  • Complete coverage of Common Language Runtime,Framework classes,and ASP. NET



Monday, February 16, 2009

The IT Value Quest or Actionscript 20 Language Reference for Macromedia Flash 8

The IT Value Quest: How to Capture the Business Value of IT-Based Infrastructure

Author: Theo J Renkema

The IT Value Quest How to Capture the Business Value of IT-based infrastructure Theo J.W. Renkema Although the potential of information technology (IT) is beyond dispute, it proves to be very difficult to evaluate its true business value. In the present competitive business arena, modern IT provides the enabling infrastructure for efficient and effective business operations, leveraging business improvements and securing a competitive edge. Capturing the value of this IT-based infrastructure is often considered as the most critical and yet the most complex part of managerial decision-making. Many managers do not try to justify their expenditure or measure whether their money was well spent. This situation has become unacceptable in the light of the rising costs and uncertain benefits of this increasingly important type of business investment. The call for more financial returns and more 'value for money' can no longer be ignored. Making the right investment evaluations will make the vital difference between business success and failure. This book provides a unique perspective on assessing and creating business value from investments in IT-based infrastructure and, more importantly, it shows how the role of IT-based infrastructure is critical to obtain the full benefits of IT. Management/Information Systems



Table of Contents:
INVESTMENT ISSUES AND MANAGEMENT CHALLENGES.

IT-Based Infrastructure: Value for Money?

Refocusing the Search for IT Value.

THE NEW DIGITAL INFRASTRUCTURE.

Strategic Dimensions of IT-Based Infrastructure.

The Business Role of IT-Based Infrastructure.

INVESTMENT GOVERNANCE AND CONTROL.

Infrastructure Governance Through Investment Decisions.

Appraisal Methods for IT Investments.

Investment Decisions with the P4 Model.

The P4 Model in Practice.

THE BUSINESS CASE FOR INVESTMENT.

Assessing Infrastructure Projects.

Assessing Infrastructure Synergy.

CONCLUDING MANAGEMENT PERSPECTIVES.

An Investment Methodology for IT-Based Infrastructure.

Managing IT-Based Infrastructure for Business Value.

References.

Index.

Book about: Primer of Cooking and Housekeeping or Way Back in the Country Cookbook

Actionscript 2.0 Language Reference for Macromedia Flash 8

Author: Instructional Media Macromedia

The ActionScript 2.0 Language Reference for Macromedia Flash 8 is a comprhensive reference manual that describes the application programming interface (API) for Macromedia Flash Player. It includes valuable syntax and usage information; descriptions of classes, functions, properties, and events; and code samples for every element in the ActionScript language.



Sunday, February 15, 2009

First Course in Discrete Mathematics or Intelligent Help Systems for UNIX

First Course in Discrete Mathematics

Author: John C Molluzzo

This highly regarded work fills the need for a treatment of elementary discrete mathematics that provides a core of mathematical terminology and concepts as well as emphasizes computer applications. Includes numerous elementary applications to computing and examples with solutions.



Books about: Crochet Kitchen or The Queen of Quick Cooks Italian and More

Intelligent Help Systems for UNIX

Author: Stephen J Hegner

In this international collection of papers there is a wealth of knowledge on artificial intelligence (AI) and cognitive science (CS) techniques applied to the problem of providing help systems mainly for the UNIX operating system. The research described here involves the representation of technical computer concepts, but also the representation of how users conceptualise such concepts. The collection looks at computational models and systems such as UC, Yucca, and OSCON programmed in languages such as Lisp, Prolog, OPS-5, and C which have been developed to provide UNIX help. These systems range from being menu-based to ones with natural language interfaces, some providing active help, intervening when they believe the user to have misconceptions, and some based on empirical studies of what users actually do while using UNIX. Further papers investigate planning and knowledge representation where the focus is on discovering what the user wants to do, and figuring out a way to do it, as well as representing the knowledge needed to do so. There is a significant focus on natural language dialogue where consultation systems can become active, incorporating user modfelling, natural language generation and plan recognition, modelling metaphors, and users' mistaken beliefs. Much can be learned from seeing how AI and CS techniques can be investigated in depth while being applied to a real test-bed domain such as help on UNIX.



Thursday, February 12, 2009

Adobe Premiere Elements 2 in a Snap or MATLAB for Behavioral Scientists

Adobe Premiere Elements 2 in a Snap

Author: Grisetti

Adobe Premiere Elements 2 In a Snap is an effective guide to getting things done quickly in Adobe Premiere Elements 2. Our In a Snap format allows you to easily jump in anywhere in the book. You can focus on only the tasks that you want to learn about. Organized into a series of well-organized, bite-sized tasks, the book covers key techniques that will quickly improve your editing skills. In addition to this coverage, the authors will provide you with guidance on how to imitate the editing styles of the masters.

Chapters include:

  • Working with Stills and Graphics

    Table of Contents:
    Ch. 1Start here1
    Ch. 2Getting to know the workspace23
    Ch. 3Get the picture : capturing video33
    Ch. 4Adding media65
    Ch. 5Working with stills and graphics93
    Ch. 6Editing on the timeline121
    Ch. 7Using transitions155
    Ch. 8Advanced timeline video and audio editing167
    Ch. 9Adding spice to your video187
    Ch. 10The power of keyframing213
    Ch. 11Advanced special effects235
    Ch. 12Cool tricks263
    Ch. 13Adding text, creating titles, making credits297
    Ch. 14Exporting your video325
    Ch. 15DVD authoring349

    Book about: Robo Sapiens or Zoo Tycoon 2

    MATLAB for Behavioral Scientists

    Author: David A Rosenbaum

    MATLAB for Behavioral Scientists is a tremendously valuable textbook that walks behavioral scientists through the computer programming process, using terms that are relevant to their concerns and appreciating their special programming needs. Autho



Wednesday, February 11, 2009

Cities and Complexity or Computer Forensics

Cities and Complexity: Understanding Cities with Cellular Automata, Agent-Based Models, and Fractals

Author: Michael Batty

As urban planning moves from a centralized, top-down approach to a decentralized, bottom-up perspective, our conception of urban systems is changing. In Cities and Complexity, Michael Batty offers a comprehensive view of urban dynamics in the context of complexity theory, presenting models that demonstrate how complexity theory can embrace a myriad of processes and elements that combine into organic wholes. He argues that bottom-up processes -- in which the outcomes are always uncertain -- can combine with new forms of geometry associated with fractal patterns and chaotic dynamics to provide theories that are applicable to highly complex systems such as cities.

Batty begins with models based on cellular automata (CA), simulating urban dynamics through the local actions of automata. He then introduces agent-based models (ABM), in which agents are mobile and move between locations. These models relate to many scales, from the scale of the street to patterns and structure at the scale of the urban region. Finally, Batty develops applications of all these models to specific urban situations, discussing concepts of criticality, threshold, surprise, novelty, and phase transition in the context of spatial developments. Every theory and model presented in the book is developed through examples that range from the simplified and hypothetical to the actual. Deploying extensive visual, mathematical, and textual material, Cities and Complexity will be read both by urban researchers and by complexity theorists with an interest in new kinds of computational models.

Sample chapters and examples from the book, and other related material, can be found at complexcity.info.



Books about: Knusprig: Wirksame E-Mail, Verbesserte Auflage schreibend: Besserung Ihres Elektronischen

Computer Forensics: Computer Crime Scene Investigation

Author: John R Vacca

The Most Comprehensive, Up-to-Date, Reference on Computer Forensics!

Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package provides a complete overview of computer forensics from information security issues to "crime scene investigation," seizure of data, determining the "fingerprints" of the crime, and tracking down the criminals. The book's companion CD-ROM contains demos of the latest computer forensics software. Numerous exercises, case studies, and vignettes of actual crimes enhance the topics under discussion, and provide the reader with solutions to computer crime in the real world.
 
KEY FEATURES
Comprehensive overview of the subject from information security issues to data recovery techniques to auditing methods to terrorist cyber-attacks
Includes Evidence Identifi cation and Checklist forms, hands-on projects, exercises, and case studies for each chapter
CD includes tools, presentations, and demos of the latest computer forensics software
Selected topics include: Computer Forensics Fundamentals; Data Recovery; Evidence Collection and Data Seizure; Computer Image Verifi cation; Duplication and Preservation of Digital Evidence; Electronic Evidence Reconstructing Past Events; Deterrence through Attacker ID; Destruction of e-mail; Networks; Protection against Random Terrorist Information Warfare Tactics; The Cyber Foot Print and Criminal Tracking; The Individual Exposed; Advanced Encryption & Hacking; Case Studies and Vignettes; Evidence Checklists and Forms
 
On the CD-ROM
(See Appendix G for Details)
Includes a collection of forensic tools, demonstrations, docs, product presentations, and figures from the book. Topics and demos include: analysis tools, data recovery, forensic examination checklists, instant messenger issues, litigation, forensic training and certification information, case profiles, and more
 
SYSTEM REQUIREMENTS
The third party software contained on the CD-ROM runs on a variety of platforms and operating systems. Please consult Appendix G for more details, and especially Web site information for specific requirements, updates, etc. Minimum system requirements for all of these software products include Adobe Acrobat 5.0 or higher, Windows 2000, XP; an Internet connection; some also require basic hardware such as Firewire, USB Devices, Zip, Jaz, Floppy Diskettes, or hard disk drives (IDE, EIDE, SCSI, ATA, SATA).



Table of Contents:

Acknowledgments
Foreword
Introduction

Monday, February 9, 2009

Cyber Safe Kids Cyber Savvy Teens or Digital Character Painting Using PhotoShop CS3 2E

Cyber-Safe Kids, Cyber-Savvy Teens: Helping Young People Learn To Use the Internet Safely and Responsibly

Author: Nancy E Willard

Essential strategies to keep children and teens safe online

As our children and teens race down the onramp to the Information Superhighway, many parents feel left behind in the dust. News stories about online sexual predators, child pornography, cyberbullies, hate groups, gaming addiction, and other dangers that lurk in the online world make us feel increasingly concerned about what our children are doing (and with whom) in cyberspace. In Cyber-Safe Kids, Cyber-Savvy Teens, Internet safety expert Nancy Willard provides you with need-to-know information about those online dangers, and she gives you the practical parenting strategies necessary to help children and teens learn to use the Internet safely and responsibly.

Parents protect younger children by keeping them in safe places, teaching them simple safety rules, and paying close attention. As children grow, we help them gain the knowledge, skills, and values to make good choices—choices that will keep them safe and show respect for the rights of others. In Cyber-Safe Kids, Cyber-Savvy Teens, Willard shows you how those same strategies can be translated from the real world to the cyberworld, and that you don't have to learn advanced computer skills to put them into effect. As you work on these strategies with your child, you will also discover that remaining engaged with what your children are doing online is much more valuable than any blocking software you could buy.

"Willard blends the perspectives of a wise parent and a serious scholar about issues related to Internet behavior and safety. . . . Pick up the book, open it to any random page, and you will find on thatpage or nearby a wealth of helpful advice and useful commentary on the cyberreality facing our children and on how to deal with any of the issues she's identified."
—Dick Thornburgh, J.D., former U.S. Attorney General; chair, National Academy of Sciences Committee on Youth Pornography and the Internet

"Simply put, this book is a must-read for anyone—parents, educators, law enforcement, and policymakers alike—concerned with the critical issue of children's internet safety and what to do about it."
—Douglas Levin, senior director of education policy, Cable in the Classroom

Children's Literature

The Internet provides its users with virtually unlimited access to information and communication opportunities. Concerned parents rightly find themselves in a precarious position: the appropriate use of the World Wide Web will be necessary in their children's' lives, yet the potential for inappropriate uses are lurking around every corner. Within this informative text, parents have the chance to learn how to be critical consumers of the Internet and how to effectively guard their children against would-be pitfalls. Discerning parents can discover strategies for safeguarding their children at every age, from eight and under, through eighteen and over. At each level, different issues are addressed, from cyber bullying and unsafe communication, to gaming, to spam and scams. By providing real life examples and statistics that bring the realities of Internet dangers to life, parents are taught to become confident in setting regulations for their children when it comes to using the Web. Yet the real value of this text comes from the specific suggestions and ideas offered to prevent intentional or unintentional access to explicit online content. While the premise of the text is to safeguard children against the dangers found online, the author encourages parents not to see the Internet as a negative, reminding us that the Internet opens up a world of possibilities that can remain positive if monitored correctly. Arming parents with the information they need to be more Internet savvy than their teens, this book is a must read for concerned parents. Reviewer: Ginny Sautner



Go to: Aprendizagem eletrônica por Desenho

Digital Character Painting Using PhotoShop CS3 2E

Author: Don Seegmiller

Digital Character Painting Using Photoshop CS3 is a brilliantly illustrated, full-color book that combines both the fundamentals of character design and the skills of digital painting. Completely updated using Photoshop CS3 as the primary tool, the book details how to create characters that elicit specific emotions and how to beautifully render those characters by applying conventional painting skills to digital tools. Written for both the seasoned professional and aspiring artist alike, Digital Character Painting Using Photoshop CS3 explores the key principles of design and reveals how to enhance traditional skills and apply them to digital art for use in games, film, animation, and other commercial productions. Using practical tutorials, the book covers basic skills such as value, edges, color, texturing, and light, and then moves on to teach in-depth techniques on specific features including eyes, face, clothing, hair, and fur. Whatever your skill level, you will discover practical ideas and techniques to apply to your craft and to help you improve and create masterful works of digital art! Features: - Presents a completely updated, beautiful, full color guide to character design and computer art using Photoshop. - Provides practical insights into how to master Photoshop CS3 as a powerful painting tool, including how to customize the brushes to achieve the best possible results. - Focuses on learning artistic skills that can be applied to a variety of 2D and 3D programs, with an emphasis on Photoshop CS3. - Teaches how to combine traditional artistic values with today's graphics software. - Includes a CD-ROM with the figures and files for the tutorials in the book, along witha QuickTime movie showing how a painting is created.



Sunday, February 8, 2009

Physics for Game Programmers or Ajax in Practice

Physics for Game Programmers

Author: Grant Palmer

First, you can get the source code directly from Apress' website. Second...the implementations are in simple terms. Third...(Grant Palmer's) book is full of trivia about physics that are just plain fun to read.


— InkBlog: The Random Musings of David Weller


As far as the style of the book goes, I think that's actually where it really shines. The author has a way of explaining things that's thorough without being verbose.


— Craig Andera, Pluralsight

Physics for Game Programmers shows you how to infuse compelling and realistic action into game programming--even if you don't have a college-level physics background! Author Grant Palmer covers basic physics and mathematical models and then shows how to implement them, to simulate motion and behavior of cars, planes, projectiles, rockets, and boats.

This book is neither code heavy nor language specific, and all chapters include unique, challenging exercises for you to solve. This unique book also includes historical footnotes and interesting trivia. You'll enjoy the conversational tone, and rest assured: all physics jargon will be properly explained.



Book about: Personal Financial Planning or Marketing Channels

Ajax in Practice

Author: Dave Cran

"Ajax in Practice" provides example-rich coverage of Ajax packed with ready-to-use code and practical recipes for common and not-so-common tasks. Ajax developers now face the move from Ajax-as-theory to Ajax-in-practice. "Ajax in Practice" guides web developers through the transition from learning about Ajax to successfully "applying" Ajax-driven techniques in real-world development scenarios.

Ajax gives web developers the potential to create rich user-centered internet applications. But Ajax also adds a new level of complexity and sophistication to those applications. "Ajax in Practice" tackles Ajax head-on, providing countless hands-on techniques and tons of reusable code to address the specific issues developers face when building Ajax-driven solutions.

After a brief overview of Ajax, this book takes the reader through dozens of working examples, all presented in an easy-to-use cookbook format. Readers will learn how to implement drag-and-drop interfaces and will discover how to create effective nagigation strategies for their applications. Unlike a traditional cookbook, though, "Ajax in Practice" provides a thorough discussion of each technique presented and shows how the individual components can be connected to create powerful solutions. A fun "mash-up" chapter concludes the book. Throughout "Ajax in Practice," the examples chosen are interesting, entertaining, and practical.



Saturday, February 7, 2009

Digital Video or Oracle PL SQL For Dummies

Digital Video: An Introduction

Author: Tom Ang

From weddings to making your own films, transform your video-making with this special, easy-to-use guide from digital expert, Tom Ang.

Author Biography: Tom Ang has worked as a photo editor on many magazines. He is the winner of the Thomas Cook Travel Book Award for photography, and the author of the Digital Photographer's Handbook and Digital Video Handbook.



Look this: Fresh from the Sea or Its Just a Dinner Party

Oracle PL/SQL For Dummies

Author: Michael Rosenblum

Find tips for creating efficient PL/SQL code

If you know a bit about SQL, this book will make PL/SQL programming painless!

The Oracle has spoken—you need to get up to speed on PL/SQL programming, right? We predict it'll be a breeze with this book! You'll find out about code structures, best practices, and code naming standards, how to use conditions and loops, where to place PL/SQL code in system projects, ways to manipulate data, and more.

Discover how to



• Write efficient, easy-to-maintain code

• Test and debug PL/SQL routines

• Integrate SQL and PL/SQL

• Apply PL/SQL best practices

• Use new features introduced in Oracle 9i and 10g




Friday, February 6, 2009

Microsoft SharePoint or Software Configuration Management Handbook Second Edtion

Microsoft SharePoint: Building Office 2003 Solutions

Author: Scot P Hillier

This detailed second edition is Scot Hillier's follow-up to his market-leading SharePoint book. The new version includes extensive updates to the previous edition, with emphasis on Visual Studio Tools for Office 2005 and new approaches for using SharePoint to improve business efficiency. Also featured are new workflow solutions for SharePoint and BizTalk, and a new chapter on building a SharePoint solution from start to finish.

In this second edition, Hillier's goal remains to provide intermediate-level guidance for those who want to design and deploy business solutions based on Microsoft SharePoint technologies. Hillier defines the business cases and scenarios for these technologies. He reviews the installation, configuration, and administration of business solutions based on Microsoft SharePoint technologies, and provides programming instruction, guidance, and examples for custom web parts and solutions.



Table of Contents:
Ch. 1SharePoint business solutions1
Ch. 2SharePoint products and technologies overview17
Ch. 3SharePoint portal server basics47
Ch. 4SharePoint content development85
Ch. 5Building Web parts119
Ch. 6The Microsoft single sign-on service161
Ch. 7Advanced Web part development187
Ch. 8The Microsoft Office system229
Ch. 9Programming SharePoint services277
Ch. 10Visual studio 2005 and the Microsoft Office system327
Ch. 11SharePoint portal server administration357

New interesting textbook: Formazione di Ronald Reagan: Gli anni della General Electric e la storia incalcolabile di sua conversione a tradizionalismo

Software Configuration Management Handbook, Second Edtion

Author: Alexis Leon

Other books on the market have explored the principles of software configuration management (SCM), but none have tackled the nuts-and-bolts of implementing an SCM system — until now. This completely revised edition of an Artech House bestseller goes far above and beyond other SCM books as the only complete guide that integrates SCM principles, advanced topics, and implementation procedures in one easy-access resource. The second edition is greatly expanded with new chapters on documentation control, product data management, and SCM standards, and explores the latest advances in SCM tools, organization, operation, and maintenance as well as new software development methodologies.

 

Market

Project managers, SCM systems designers, and software developers.

 

Contents

The Software Development Process. Pitfalls in the Software Development Process. Need and Importance of Software Configuration Management. SCM—Basic Concepts. The Different Phases in Software Configuration Management. Configuration Identification. Configuration Control. Status Accounting. Configuration Audits and Reviews. SCM—Advanced Concepts. SCM Standards. Software Process Improvement Models and SCM. Software Configuration Management Plans. SCM Organization. Software Configuration Management Tools. Documentation Control. Product Data Management. SCM Implementation. SCM Operation and Maintenance. SCM in Special Circumstances. SCM Resources on the Internet.

 

 

 

About the Author

Alexis Leon has written more than 35 books on various computer, IT and management topics. He

is currently the managing director of L and L Consultancy Services Pvt. Ltd. He has extensive consulting experience in the areas of software product design, process improvement, project management, software configuration management, software quality assurance, etc. Mr. Leon received his master's degree (M.Tech) in industrial engineering from Kerala University, Kerala, India.



Thursday, February 5, 2009

Flash CS4 Professional Bible or Java

Flash CS4 Professional Bible

Author: Robert Reinhardt

A completely revised and updated edition of the all-time bestselling Flash title

  • Written by two of the world’s leading Flash experts, this comprehensive reference provides you with undocumented techniques, tips, and tricks on the CS4 release of Flash, the popular tool that allows you to create animations and build interactive Web sites
  • In-depth coverage on more than one thousand pages includes something for everyone—whether you’re a Web novice or an accomplished Web professional—this resource will be your guide to the inner workings and capabilities of Flash CS4
  • Two of the world’s leading Flash experts offer more coverage than any other book on the market
  • The accompanying CD-ROM includes trial software, addons, plugins, shareware, templates, and examples



See also: Brand Management Estratégico

Java(tm) Platform Performance: Strategies and Tactics

Author: Steve Wilson

This book addresses a vital issue for all those developing software for the Java™ platform: how to achieve maximum performance and scalability for their applications.

Drawing on the authors' knowledge of the Java programming language and their extensive experience working on performance issues, the book reveals common mistakes and misconceptions concerning the performance characteristics of Java technologies. It offers overall development strategies and concrete, battle-tested techniques to dramatically improve the performance of applications constructed with the Java programming language.

Java™ Platform Performance highlights the importance of integrating performance evaluation into the application development process and discusses measurement techniques. The book then presents practical tactics for enhancing application performance in the areas of I/O, RAM footprint, small object management, algorithms, data structures, Swing, and deployment. Specific topics covered include:

  • Incorporating performance evaluation into the development process
  • Profiling and benchmarking
  • Building scalable, fast Swing GUIs
  • Using high-speed I/O
  • Computing and controlling the RAM footprint
  • Reducing the number of classes
  • Eliminating temporary objects
  • Selecting high-performance algorithms and data structures
  • Using Java native code and applet packaging efficiently
  • Garbage collection
  • Java HotSpot™ technology

With an understanding of the performance issues and specific techniques for reducing overhead discussed in this book, you will have the information you need to enhance the efficiency,speed, and scalability of your software.
0201709694B04062001

Booknews

Intended for software developers, this book presents methods for improving the performance and scalability of applications. The authors, a Java engineer and engineering manager, clarify common mistakes and misconceptions about Java performance and provide overall development strategies and techniques for improving applications constructed with Java. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Wednesday, February 4, 2009

Systems Architecture or Web 101

Systems Architecture

Author: Stephen D Burd

Systems Architecture, Fifth Edition is the most comprehensive introduction to information systems hardware and software in business. This new edition remains an indispensable tool for IS students. Each chapter has been thoroughly updated to reflect the changing nature of new technologies, and all of the end-of-chapter material has been enhanced and expanded.



Table of Contents:
1. Computer Technology: Your Need to Know
2. Introduction to Systems Architecture
3. Data Representation
4. Processor Technology and Architecture
5. Data Storage Technology
6. System Integration and Performance
7. Input/Output Technology
8. Data and Network Communication Technology
9. Computer Networks
10. Application Development
11. Operating Systems
12. File and Secondary Storage Management
13. Internet and Distributed Application Services
14. System Administration
Appendix: Measurement Units

Look this: Financing and Acquiring Park and Recreation Resources or African Successes

Web 101

Author: Wendy G Lehnert

  As the Internet continues to develop as the central resource for entertainment, news, communication, and research, Web 101 continues to include all the tools readers need to acquire a foundational understanding of the online resources available today and how to take full advantage of the Web’s power. Lehnert and Kopec cover the fundamentals of the Internet’s most popular features—communication tools, e-mail, searching, personal safety, and software—with new material on social networking and Web construction and design. Web 101 gives readers all the background information and tools they need to become proficient users and savvy content-providers of the Internet.
Getting Started; Personal Safety Online; E-mail Management; Web 2.0; Find What You Want—Fast!; Software on the Internet; E-Commerce; Encryption and the Internet; Basic Web Page Construction; Advanced Web Page Construction; HTML Character Codes; Style Sheets; File Types; Copyright Law. For all readers interested in the fundamentals of the Internet's most popular features.



Monday, February 2, 2009

Easy Invitations Announcements and Personalized Stationery or Windows

Easy Invitations, Announcements, and Personalized Stationery: Create Custom Invitations Using Your Home Computer

Author: Patty Hoffman

Easy Invitations is the ultimate guidebook to creating invitations and personalized stationery using a home computer and printer.

This book provides design ideas and instruction for creating professional quality, customized invitations and note cards using card stock, envelopes, and other readily available stationery. Use it as a standalone guide or in tandem with PrintingPress software by Mountaincow, which offers easy stationery layout, photo tools, a built-in address book, and hundreds of templates and graphics.

Easy Invitations features original ideas for major life events such as birth announcements, traditional and modern wedding invitations, save-the-date cards, milestone birthdays, anniversary parties, and coming of age celebrations. It also includes ideas for thank-you notes, personalized stationery, informal get-togethers such as dinner and cocktail parties, a wine tasting, and even a romantic picnic for two. This book offers tips for making any party distinctive with creative and easy place cards, menus, gift tags, and favors.



New interesting textbook: Contemporary Management Theory or Fundamentals of Management E Business

Windows(R) 2000 and Windows(R) Server 2003 Clustering and Load Balancing

Author: Robert Shimonski

Learn to implement clustering and load balancing solutions with Windows 2000 and Windows Server 2003, and deliver nearly 100 percent uptime. With a focus on real world production-based problems, the author delivers detailed high availability solutions that will give you the tools to roll out and troubleshoot these technologies.



Table of Contents:
Acknowledgments
Introduction
1Introduction to High Availability, Clustering, and Load-Balancing Technologies1
2Designing a Clustered Solution with Windows 2000 Advanced Server43
3Designing a Clustered Solution with Windows Server 2003123
4Designing a Clustered and Load-Balanced Solution with Application Center 2000203
5Designing a Clustered Solution with Windows SQL Server 2000 Enterprise Edition231
6Designing a Highly Available Solution with Windows Services265
7Building Advanced Highly Available Load-Balanced Configurations289
8High Availability, Baselining, Performance Monitoring, and Disaster Recovery Planning315
AProject Plan Sample351
BAdvanced Troubleshooting: Event IDs357
Index369