Saturday, January 31, 2009

In Code or Internet Information Services IIS 70 Administrators Pocket Consultant

In Code: A Mathematical Journey

Author: Sarah Flannery

In January 1999, Sarah Flannery, a sports-loving teenager from Blarney in County Cork, Ireland was awarded Ireland's Young Scientist of the Year for her extraordinary research and discoveries in Internet cryptography. The following day, her story began appearing in Irish papers and soon after was splashed across the front page of the London Times, complete with a photo of Sarah and a caption calling her "brilliant." Just 16, she was a mathematician with an international reputation.

In Code is a heartwarming story that will have readers cheering Sarah on. Originally published in England and co-written with her mathematician father, David Flannery, In Code is "a wonderfully moving story . . . about the thrill of the mathematical chase" (Nature) and "a paean to intellectual adventure" (Times Educational Supplement). A memoir in mathematics, it is all about how a girl next door, nurtured by her family, moved from the simple math puzzles that were the staple of dinnertime conversation to prime numbers, the Sieve of Eratosthenes, Fermat's Little Theorem, Googols-- and finally into her breathtaking algorithm. Parallel with each step is a modest girl's own self-discovery--her values, her burning curiosity, the joy of persistence, and, above all, her love for her family.

Nature - John L. Casti

...a book about the thrill of the mathematical chase, and how it is a game that anyone can play.

Irish Independent - John Daly

[In Code] removes much of the fear about that world of numbers that assault most of us who grapple with it.

Irish Post - John Crowley

In Code is also much more than a mathematical treatise, it's also a lesson in the human condition.

Times (London) - Victoria Neumark

Sarah's achievements are an inspiring reminder of the nurturing power of education.

Dublin Sunday Independent - Patricia Deevy

...a tale of an intellectual quest shared by a parent and a child ... a roadmap for living.

Daily Telegraph - Cassandra Jardine

[The Flannerys] succeeded in writing gripping howdunnit....By the end I was half-persuaded that I too could be a cryptologist.

Science News

This innovative text based on anecdotes and stimulating math puzzles... earned Sarah instant celebrity status and respect in the mathematics world.

Publishers Weekly

At 16, Flannery made worldwide headlines as Ireland's 1999 Young Scientist of the Year for her discovery and presentation of the Cayley-Purser algorithm, an innovative encryption system roughly 22 times faster than the worldwide standard RSA algorithm. She declines the "genius" label, and a method for cracking her algorithm has since been discovered, but this only makes the book more interesting and unpredictable. It's more about the journey's adventure than the destination and less about Sarah's specialness than her spirit. The mix is part memoir, part puzzle book and part mathematical exploration, with scattered bits of mathematical lore. (The heaviest math is concentrated into two chapters and the appendices, leaving the remainder easy going for the fainthearted.) The puzzle-solving approach to math cultivated by her father (and coauthor) encourages exploration, an adventurous attitude, attention to concepts more than calculations and sheer enjoyment of taking on a challenge. It's also more egalitarian than proof-based approaches, giving newcomers a more equal footing with old pros, emphasizing the process of discovery and making connections, which is more fundamental than finished proofs. All this is wonderfully illustrated by Flannery's own story of her rapidly developing interest and proficiency in cryptography, as well as by the puzzles she uses to get readers thinking and introduce some basic concepts. Other threads, running from brief descriptions of her grandparents to her father's teaching methods and her relationship to family in the face of a media frenzy, give her story added depth, warmth and humor. 8 pages of b&w photos. (June) Forecast: Workman is hoping to, and should, attract budding young mathematicians with a first printing of 35,000, a $65,000 marketing budget and an eight-city author tour. Copyright 2001 Cahners Business Information.

Thomas Downey - KLIATT

Many high school students do not enjoy mathematics, based on their experiences with the subject. This book, however, is the story of a young woman, Sarah Flannery, at the other end of the spectrum: very interested in mathematics after many positive experiences with it while growing up. Written with help from her father, the memoir chronicles her early years solving puzzles posed by her father, her experiences competing in national and international science/mathematics fairs, and some of the aftereffects of her successes. It is an engaging story, well told, and is interspersed with discussions of the mathematics of cryptography (as well as some interesting math puzzles and problems in the early chapters). The writing is accessible to high school students, although some of the mathematics of cryptography that is discussed will require dedication and rereading to understand (the most difficult discussions are in appendices). Any student who has competed in a science or math fair can relate to Flannery's anxieties, but she demonstrates that study, thought and preparation can win the day. While the mathematics that she researched goes beyond the typical high school math curriculum, her story is not one of genius but rather of a very interested, motivated and capable young woman. I highly recommend this book for high school libraries. KLIATT Codes: SA-Recommended for senior high school students, advanced students, and adults. 2002, Algonquin, 341p., Ages 15 to adult.

Booknews

Sarah Flannery, a student at Cambridge University, describes her passion for cryptography and how it led to her invention of an innovative algorithm for encoding data on the internet<-->an invention that caused her to be named European Young Scientist of the year and brought her awards in her native Ireland and in Europe. This book is written for a general audience. The co-author is her father, a mathematician affiliated with Ireland's Cork Institute of Technology. Annotation c. Book News, Inc., Portland, OR (booknews.com)

Kirkus Reviews

A young Irishwoman's account of the mathematical studies that made her Young Scientist of the Year. Flannery, now a first-year student at Cambridge, grew up solving logic puzzles posed by her father, a math teacher (and her collaborator here). In the beginning chapters, she offers the reader a selection of those brainteasers, many of which depend on mathematical reasoning. So when her high school science teacher recruited her to enter Ireland's Young Scientist competition, Sarah's father steered her toward a project with a strong math basis: cryptography, the encoding and decoding of messages. This once-cumbersome process is now handled by sophisticated computer programs based on number theory—especially the factoring of very large numbers. Sarah decided to concentrate on the programming aspect, to give herself hands-on experience with the computer work. But first she had to learn the relevant mathematics. To bring the reader up to speed, the authors step back from Sarah's story to present the mathematical foundations of modern cryptology: prime numbers, factoring, and other arcana of number theory. This section is in many ways the meat of the story, accessible to anyone not totally allergic to equations. As Sarah learned the math, she spotted an alternative to the standard RSA algorithm on which modern cryptology is based, and soon her project turned into an exposition of her new method—which in time won her honors as Young Scientist of the Year not only in Ireland, but in all of Europe. The latter chapters tell of the competitions, her preparation and her bouts of nerves, her genuine surprise at winning, and the sometimes-exasperating aftermath as the mediadiscovered her and turned her (for a while, at least) into a celebrity. A charming story, well worth slogging through the heavy loads of math. First printing of 35,000; $65,000 ad/promo; author tour



Table of Contents:
Forewordvii
Prefaceix
Part IBackground1
1Early Influences3
2Early Challenges8
3Beginning My First Project32
Part IIMathematical Excursions41
4Dad's Evening Class43
5Of Prime Importance47
6The Arithmetic of Cryptography71
7Sums with a Difference113
8One Way Only149
9Public Key Cryptography164
Part IIIExhibition Time187
10Young Scientist '98189
11The Birth of a Project194
12Young Scientist '99218
Part IVAfter-Math229
13Media Blitz231
14Around the World and Back254
About This Book269
Appendix A"Cryptography--A New Algorithm Versus the RSA"271
Appendix BAnswers to Miscellaneous Questions297
Appendix CEuclid's Algorithm305
Appendix DThe Euler [phis]-function and the Euler-Fermat Theorem315
Acknowledgments320
Bibliography323
Index325

Look this: Environmental Politics and Policy or The End of the European Era

Internet Information Services IIS 7.0 Administrator's Pocket Consultant

Author: William R Stanek

Here's the eminently practical, pocket-sized reference for IT and Web professionals working with IIS 7.0. Designed for quick referencing and compulsively readable, this portable guide covers all the basics needed for Web administration fundamentals, Web server administration, essential services administration, and performance, optimization, and maintenance. It's the fast-answers guide that helps users consistently save time and energy as they administer IIS 7.0. Written by an award-winning author of more than two dozen computer books, this guide puts expert administration and troubleshooting advice right at your fingertips. Featuring quick-reference tables, concise lists, and step-by-step instructions, this handy, one-stop guide provides fast, accurate answers on the spot-whether you're at your desk or in the field.

Key Book Benefits:
•Delivers must-know details and procedures for administering, supporting and troubleshooting IIS 7.0, including information for performance optimization
•Features concise tables, easy-to-scan lists, and step-by-step instructions for the answers you need, wherever you need them



Friday, January 30, 2009

Introduction to Color Imaging Science or Evaluating Software Architectures

Introduction to Color Imaging Science

Author: Hsien Che Le

Color imaging technology has become almost ubiquitous in modern life in the form of monitors, liquid crystal screens, color printers, scanners, and digital cameras. This book is a comprehensive guide to the scientific and engineering principles of color imaging. It covers the physics of light and color, how the eye and physical devices capture color images, how color is measured and calibrated, and how images are processed. It stresses physical principles and includes a wealth of real-world examples. The book will be of value to scientists and engineers in the color imaging industry and, with homework problems, can also be used as a text for graduate courses on color imaging.



Book review: Yoga of the Nine Emotions or Detox Manual

Evaluating Software Architectures: Methods and Case Studies

Author: Paul Clements

Praise for Evaluating Software Architectures

“The architecture of complex software or systems is a collection of hard decisions that are very expensive to change. Successful product development and evolution depend on making the right architectural choices. Can you afford not to identify and not to evaluate these choices? The authors of this book are experts in software architecture and its evaluation. They collected a wealth of ideas and experience in a well-organized and accessible form. If you are involved in the development of complex systems or software, you will find this book an invaluable guide for establishing and improving architecture evaluation practice in your organization.”          —Alexander Ran, Principal Scientist of Software Architecture, Nokia

“Software engineers must own this book. It is a well-written guide to the steps for evaluating software architecture. It argues for the inclusion of architecture evaluation and review as a standard part of the software development lifecycle. It introduces some new and innovative methods for analyzing important architecture characteristics, like extensibility, portability, and reliability. I believe these methods will become new engineering cornerstones for creating good software systems.”          —Joe Maranzano, AT&T Bell Labs Fellow in Software Architecture (1990), and former head of the Bell Labs Software Technology Center

“Experience and teamwork are the only approaches I know of to deliver products faster, cheaper, and yet to delight your customers. Intheir first book, Software Architecture in Practice, Paul and Rick (and Len Bass) helped me match my experience with theory. Their invaluable approaches and case studies changed my practice and the way I proceed to design systems and software architectures. This second book, with Mark, covers what I will look at before I feel good about an architecture. It is about how I can tap other people's experience to produce an improved outcome, using other people's feedback. I have used many of the concepts explained in this book for my customers' benefit. Using this book, you—architects, developers, and managers—will develop a common language and practice to team up and deliver more successful products.”          —Bertrand Salle, lead architect with a major telecommunications company

“If architecture is the foundation of system construction, architectural evaluation is part of the foundation of getting to a ‘good’ architecture. In this book, the authors put their considerable expertise to one of the most pressing issues in systems development today: how to evaluate an architecture prior to system construction to ascertain its feasibility and suitability to the system of interest. The book provides a practical guide to architecture evaluation using three contemporary evaluation methods. It should prove valuable to practitioners and as a basis for the evolution of architectural evaluation as an engineering practice.”
         —Rich Hilliard, Chief Technical Officer, ConsentCache, Inc., and technical editor, IEEE Recommended Practice for Architectural Description of Software-Intensive Systems

“Too many systems have performance and other problems caused by an inappropriate architecture. Thus problems are introduced early, but are usually detected too late—when the deadline is near or, even worse, after the problem makes the headlines. Remedies lead to missed schedules, cost overruns, missed market windows, damaged customer relations, and many other difficulties. It is easy to prevent these problems by evaluating the architecture choices early, and selecting an appropriate one.”          —Connie U. Smith, Ph.D., principal consultant, Performance Engineering Services Division, L&S Computer Technology, Inc., and coauthor of the new book, Performance Solutions: A Practical Guide to Creating Responsive, Scalable Software

“The ATAM an evaluation method described in this book is the natural quality-gate through which a high-level design should pass before a detail design project is initiated. Why use the ATAM to evaluate an architecture? Mitigation of design risk is a major reason, but more importantly, the ATAM provides an interactive vehicle that can give key development and user stakeholders architectural visibility—visibility that can lead to an important ‘early buy-in.’”          —Rich Zebrowski, Software Technology Manager, Motorola, Inc.

“Caterpillar's experience with architecture reviews includes SAAM, ATAM, ARID, and ADR evaluation methods described in this book, the first three in detail. These reviews ensured that the needs of the user community were being met, and they exposed the architecture to others in the organization helping with understanding and organizational buy-in. The SAAM- and ATAM-based evaluations worked well to expose the architecture early in the development cycle to a broad range of people. The ARID- and ADR-based evaluations facilitated the exposure of technical details of the architecture later in the development cycle. As the architect of the pilot project for ARID, I observed that this review even served as an architecture training session before the architecture was fully documented.”          —Lee R. DenBraber, former Lead Software Architect, Caterpillar, Inc.

“We’ve heard all the management hype about harnessing the innovative creativity of our teams, establishing integrated customer-developer-product teams, and better targeting our systems to meet end user needs. The ATAM techniques described in this book give technical managers, system architects, and engineers proven tools for breaking down the communications barriers that impede our ability to realize these goals. We have successfully integrated the ATAM techniques throughout our lifecycle, including development and maintenance, and have found that they provide the strong technical basis we need to evaluate the many difficult trades required by a system as large as EOSDIS.”          —Mike Moore, Deputy Manager, Science Systems Development Office, Earth Observing System Data Information System (EOSDIS) Project, NASA Goddard Space Flight Center

“If you know how difficult architecture reviews are, you will be amazed how effective ATAM evaluations can be. For example, an ATAM evaluation we conducted on an important software product line identified a major architectural risk, which we subsequently were able to avoid-a benefit we expect to continue seeing. Moreover, ATAM techniques have enabled us to explain such risks to stakeholders far more clearly than by any other review method.”         —Stefan Ferber, Corporate Research, Robert Bosch GmbH

Drawing on clearly identified connections between architecture design decisions and resulting software properties, this book describes systematic methods for evaluating software architectures and applies them to real-life cases. It shows you how such evaluation can substantially reduce risk while adding remarkably little expense and time to the development effort (in most cases, no more than a few days). Evaluating Software Architectures introduces the conceptual background for architecture evaluation and provides a step-by-step guide to the process based on numerous evaluations performed in government and industry.

In particular, the book presents three important evaluation methods:


  • Architecture Tradeoff Analysis Method (ATAM)
  • Software Architecture Analysis Method (SAAM)
  • Active Reviews for Intermediate Designs (ARID)

Detailed case studies demonstrate the value and practical application of these methods to real-world systems, and sidebars throughout the book provide interesting background and hands-on tips from the trenches.

All software engineers should know how to carry out software architecture evaluations. Evaluating Software Architectures is the chance to get up to speed quickly by learning from the experience of others.

What People Are Saying

B Wright
"This book provides a practical guide to architecture evaluation using three contemporary evaluation methods. It should prove valuable to practitioners and as a basis for the evolution of architectural evaluation as an engineering practice."
--Chief Technical Officer, ConsentCache, Inc.


Attilio Maranzano
"Software engineers must own this book."
--Former Head of the AT&T Bell Labs Software Technology Center


Alexander Ran
"Successful product development and evolution depends on making right architectural choices. Can you afford not to identify and not to evaluate these choices?"
--Principal Scientist of Software Architecture, Nokia


Joe Maranzano
"Software engineers must own this book."
--Former Head of the AT&T Bell Labs Software Technology Center




Table of Contents:
List of Figures
List of Tables
Preface
Acknowledgments
Reader's Guide
Ch. 1What is Software Architecture?1
Ch. 2Evaluating a Software Architecture19
Ch. 3The ATAM - A Method for Architecture Evaluation43
Ch. 4The Battlefield Control System - The First Case Study in Applying the ATAM87
Ch. 5Understanding Quality Attributes109
Ch. 6A Case Study in Applying the ATAM127
Ch. 7Using the SAAM to Evaluate an Example Architecture211
Ch. 8ARID - An Evaluation Method for Partial Architectures241
Ch. 9Comparing Software Architecture Evaluation Methods255
Ch. 10Growing an Architecture Evaluation Capability in Your Organization275
Ch. 11Conclusions287
App. AAn Example Attribute-Based Architectural Style297
References303
Index307

Thursday, January 29, 2009

Exploring Microsoft Office Access 2007 Volume 1 or Introduction to Security

Exploring Microsoft Office Access 2007 Volume 1

Author: Robert Grauer

The Exploring series helps students master the "How and Why" of performing tasks in Office to gain a greater understanding of how to use the individual applications together to solve business problems. Exploring titles feature “Perfect pages” where every step of every hands-on exercise as well as every end-of-chapter problem begins on a new page and has its own screen shot to make it easier to follow. Each chapter contains Hands-on Exercises, Capstone Exercises, and Mini-Cases for practicing and reviewing skills acquired. Exploring Microsoft Office Access 2007 Volume 1, 1/e covers the following topics: introduction to Access and databases; relational databases and multi-table queries; customize, analyze, and summarize query data; creating and editing professional, useful reports Ideal for students and individuals seeking comprehensive instruction for Access 2007.



Table of Contents:
Chapter 1 - Introduction to Access: Finding Your Way through a Database

Section 1: Data and Files Everywhere!
Exploring, Describing, and Navigating Among the Objects in an Access Database
Understanding the Difference Between Working in Storage and Memory
Practicing Good File Management
Backing up, Compacting, and Repairing Access Files
Hands-On Exercises 1 Introduction to Databases

Section 2: Filters, Sorts, and Access Versus Excel
Creating Filters
Sorting Table Data on One or More Fields
Knowing When to Use Access or Excel to Manage Data
Hands-On Exercises 2: Data Manipulation: Filters and Sorts

Section 3: The Relational Database
Using the Relationship Window
Understanding Relational Power
Hands-On Exercises 3: Introduction to Relationships

Summary
Key Terms
Multiple Choice
Practice Exercises
Mid-Level Exercises
Capstone Exercise
Mini Cases

Chapter 2 - Relational Databases and Multi-Table Queries: Designing Databases and Using

Section 1: Related Data
Table Design, Properties, Views, and Wizards
Designing Data
Creating Tables
Hands-On Exercises 1: Table Design, Properties, Views, and Wizards

Section 2: Multiple Table Database
Understanding Table Relationships
Sharing Data with Excel
Establishing Table Relationships
Hands-on Exercises 2: Imports andRelationships

Section 3: Queries
Creating a Query
Specifying Criteria for Different Data Types
Copying and Running a Query
Using the Query Wizard
Understanding Large Database Differences
Hands-On Exercises 3: Multi-Table Query

Summary
Key Terms
Multiple Choice
Practice Exercises
Mid-Level Exercises
Capstone Exercise
Mini Cases

Chapter 3 - Customize, Analyze, and Summarize Query Data: Creating and Using Queries to Make Decisions

Section 1: Data Summary and Analysis
Understanding the Order of Precedence
Creating a Calculated Field in a Query
Hands-On Exercises 1: Calculated Query Fields

Section 2: Expression Builder
Creating Expressions with the Expression Builder
Creating and Editing Access Functions
Performing Date Arithmetic
Hands-On Exercises 2: Expression Builder, Functions, and Date Arithmetic

Section 3: Data Aggregates
Creating and Working with Data Aggregates
Hands-On Exercises 3: Data Aggregates

Summary
Key Terms
Multiple Choice
Practice Exercises
Mid-Level Exercises
Capstone Exercise
Mini Cases

Chapter 4 - Create, Edit and Perform Calculations in Reports: Creating Professional and Useful Reports
Section 1: Appearance Matter
Planning Reports
Using Different Report Views
Creating and Editing a Report
Hands-On Exercises 1: Introduction to Access Reports

Section 2: The Anatomy of a Report
Identifying Report Elements, Sections and Controls
Adding Grouping Levels Using the Layout View
Adding Fields to a Report
Hands-On Exercises 2: Create, Sort, Edit, Nest and Remove Groups from Reports

Section 3: The Report and Label Wizard
Using the Report Wizard
Hands-On Exercises 3: Report Wizard

Summary
Key Terms
Multiple Choice
Practice Exercises
Mid-Level Exercises
Capstone Exercise
Mini Cases

Interesting book: Systèmes informatiques D'entreprise :une Approche basée sur le Dessin

Introduction to Security: Operations and Management

Author: P J Ortmeier

Introduction to Security, 3e addresses public and private security operations and management all in a single text. The history, threats to, and legal aspects of security are included, as well as global considerations. This edition features unprecedented coverage of budgeting; planning; homeland security; career opportunities and future trends. New case studies have been added to each chapter and numerous examples tackle issues encountered in the field. With a focus on career preparation, this edition can be used as a prep tool for the ASIS International Certified Protection Professional (CPP) exam and introduces readers to 18 of the most popular security sectors.



Tuesday, January 27, 2009

Cyber Crime Investigations or Sonic the Hedgehog

Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors

Author: Anthony Reyes

Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.

The book begins with the chapter "What is Cyber Crime?" This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions, the electronic crime scene, computer forensics, and preparing and presenting a cyber crime investigation in court will be examined. Not only will these topics be generally be discussed and explained for the novice, but the hard questions —the questions that have the power to divide this community— will also be examined in a comprehensive and thoughtful manner.

This book will serve as a foundational text for the cyber crime community to begin to move past current difficulties into its next evolution.



* This book has been written by a retired NYPD cyber cop, who has worked many high-profile computer crime cases

* Discusses the complex relationship between the public and private sector with regards to cyber crime

* Provides essential information for IT security professionals and first responders on maintaining chain of evidence



New interesting textbook: El Desarrollo de Potencial a Través de una Variedad Llena de Mandos:Casos en Mando Transaccional y Transformacional

Sonic the Hedgehog

Author: Fletcher Black

Platform: Sony PlayStation 3 and X-Box 360

The Blue Blur is Back!

• Maps of Soleanna's city reveal every side mission and ability enhancement
• Expert strategy for defeating colossal bosses
• Race past Dr. Eggman's robot army with complete mission walkthroughs
• Complete episode guide for each of the hedgehogs: Sonic, Shadow, and newcomer Silver
• Master Silver The Hedgehog's psychic powers



Table of Contents:
Sonic Boom
Cast, The Hedgehogs, The Villains, The Humans, Supporting Crew

How to Play
Action Stages, Town, Controls, Sonic The Hedgehog, Shadow The Hedgehog, Silver The Hedgehog, Supporting Cast, Amy Rose, Blaze The Cat, E-123 Omega, Knuckles The Echidna, Miles ÒTailsÓ Prower, Rouge The Bat, Stage Features, Environment Objects/Items, Power-Ups

Multiplayer
Tag
Battle

Town Stage
Soleanna City Life, Sonic The Hedgehog, Shadow The Hedgehog, Silver The Hedgehog

Sonic the Hedgehog
The Blue Blur, Wave Ocean, Dusty Desert, White Acropolis, Crisis City, Flame Core, Radical Train, Tropical Jungle, Extra Stage: Wave Ocean, Kingdom Valley, Aquatic Base

Shadow the Hedgehog
Fueled by Anger, Shadow The Hedgehog, White Acropolis, Kingdom Valley
Crisis City, Flame Core, Extra Stage: Tropical Jungle, Radical Train, Aquatic Base, Wave Ocean, Dusty Desert

Silver The Hedgehog
Psychic Hedgehog, Crisis City, Tropical Jungle, Extra Stage: Wave Ocean, Dusty Desert, White Acropolis, Radical Train, Aquatic Base, Kingdom Valley, Flame Core

Last Episode
End of the World, Tails at Crisis City, E-123 Omega at Flame Core, Knuckles The Echidna at Tropical Jungle, Silver The Hedgehog at Dusty Desert, Rouge The Bat at Wave Ocean, Amy Rose at White Acropolis, Shadow The Hedgehog at Kingdom Valley, Boss Battle: Solaris, First Form, Second Form

Enemy Gallery
Monster Menagerie, Dr. Eggman’s Robots, Iblis’s Minions

Gold Medals
Gold Rush, Sonic The Hedgehog, Shadow The Hedgehog, Silver The Hedgehog, Last Episode

Monday, January 26, 2009

Microsoft Windows Server 2008 Security Resource Kit with CDROM or Professional IIS 7

Microsoft Windows Server 2008 Security Resource Kit with CDROM

Author: Jesper M Johansson

Get the definitive reference for planning and implementing security features in Windows Server 2008-with expert insights from Microsoft Most Valuable Professionals (MVPs) and the Windows Server Security Team at Microsoft. This official Microsoft Resource Kit delivers the in-depth, technical information and tools you need to help protect your Windowsr-based clients, server roles, networks, and Internet services. Leading security experts explain how to plan and implement comprehensive security with special emphasis on new Windows security tools, security objects, security services, user authentication and access control, network security, application security, Windows Firewall, Active Directoryr security, group policy, auditing, and patch management. The kit also provides best practices based on real-world implementations. You also get must-have tools, scripts, templates, and other key job aids, including an eBook of the entire Resource Kit on CD.

Key Book Benefits:
• Definitive technical information and expert insights straight from the Windows Server Security Team and leading Microsoft MVPs • Provides in-depth information that every Windows administrator needs to know about helping protect Windows-based environments • Includes best practices from real-world implementations • CD includes additional job aids, including tools, scripts, and a fully searchable version of the entire Resource Kit book



Book about: Confianza & Traición en el Lugar de trabajo:Edificio de Relaciones Eficaces en Su Organización

Professional IIS 7

Author: Ken Schaefer

This book is a complete reference to IIS7.0---both for developers and administrators. In addition to covering the common administrative tasks, this book will take an in depth look at IIS7.0 extensibility and operations management. This information will be pulled from people running major intranets and web hosting facilities. The book will differentiate itself from other IIS 7.0 books by showing how to:



• Automate administrative tasks.

• Monitor and manage an IIS environment, including MOF (Microsoft Operations Framework) and MOM (Microsoft Operations Manager). This information would be useful to systems administrators after they have deployed an IIS solution, by ensuring they are able to stabilize and monitor the environment.

• Debug and troubleshoot IIS. Few people (outside PSS and so forth) have the necessary information on available tools and how to use them effectively.

• Secure the IIS environment--including coverage of authentication protocols, PKI/SSL etc. Most books merely remark that a particular protocol is "secure" (or not secure) without detailing how these protocols work, what their strengths are, and how they can be subverted.

• Extend IIS7.0 through the use of ISAPI filters and HTTPModules.

• Master advanced topics (such as Network Load Balancing/High Availability) that are not covered by other books. Our author team has experience in large scale IIS hosting that few others do.




Sunday, January 25, 2009

Electronic Warfare in the Information Age or Digital Photography All in One Desk Reference For Dummies

Electronic Warfare in the Information Age

Author: D Curtis Schleher

Here's an advanced practitioner's guide to the latest concepts and threats associated with modern electronic warfare (EW). This new book identifies and explains the newest radar and communications threats, and provides EW and radar engineers, managers, and technical professionals with practical, "how-to" information on designing and implementing ECM and ECCM systems.

Written by a world-renowned expert in radar and electronic warfare, the book helps you develop state-of-the-art ESM systems designed specifically to exploit the vulnerabilities of modern radar. It also identifies and evaluates the latest ESM receiving equipment, and outlines advanced ECM methods, including monopulse deception, coherent radar jamming, and high-ERP generation. Other well-structured sections cover modern ECCM countermeasure techniques, the impact of new stealth technology on ESM and ECM requirements, jammer upgrading procedures, and much more.

Booknews

Schleher (Navy Postgraduate School) begins by familiarizing the reader with the numerous acronyms associated with EW<-->e.g. C2W (command and control warfare), EA (electronic attack), IW (information warfare), and DRFMs (digital radio frequency memories). Coverage includes threats, requirements, and principles; advanced radar threat; EA against modern radar systems; electronic warfare support; expendables and decoy systems; stealth technology; and radar jamming modeling. The disk includes 50 MATLAB programs for use with the text's many examples. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Table of Contents:
Preface
1Electronic Warfare - Threats, Requirements, and Principles1
2Advanced Radar Threat63
3Modern EA Systems - Architecture, Types, and Technology133
4EA Against Modern Radar Systems201
5Digital Radio Frequency Memory293
6Electronic Warfare Support333
7Expendables and Decoy Systems405
8Directed Energy Weapons and Stealth Technology471
App. ARadar Jamming Modeling and Analysis Tool539
Acronym List579
Index581

New interesting book: Direzione ed amministrazione di professione d'infermiera: Una guida pratica

Digital Photography All-in-One Desk Reference For Dummies

Author: David D Busch

It’s easy to get started in digital photography and take great photos with Digital Photography All-in-One Desk Reference For Dummies!   This fourth edition helps you choose the right camera, compose and capture great photos, load them onto your computer, enhance them with Photoshop, and share them online or as prints. Here’s how to compare digital camera features, choose accessories, and explore digital SLRs; get great close-ups, sports and action shots, and portraits; and use image editors including Paint Shop Pro, Corel PhotoPaint, PhotoImpact, and Adobe’s popular Photoshop and Photoshop Elements. You’ll also discover how to:

  • Compose pictures that communicate
  • Make the most of macro photography
  • Get great candid photos
  • Create the right lighting and use cool lighting gadgets


Take advantage of six cool improvements in digital SLRs
  • Follow great ideas for getting your photos published
  • Take great shots in a wide range of situations
  • Learn to repair and restore treasured heirloom photos
  • Turn your images into greeting cards, T-shirts, online albums, or prints


You’ll quickly find what you need in one of the seven minibooks:
  • Your Digital Studio
  • Using Digital SLRs
  • Taking Great Pictures
  • Basics of Image Editing
  • Editing with Photoshop/Photoshop Elements
  • Restoring Old Photos
  • Printing and Sharing Digital Images


Digital Photography All-in-One Desk Reference For Dummies, 4th Edition gets you up to speed on digital cameras and all the tricks, so you can truly enjoy yourdigital photography experience.



Saturday, January 24, 2009

IT Strategy in Action or Oracle Shell Scripting

IT Strategy in Action

Author: James D McKeen

This book teaches students how to use and manage IT to deliver business value, with a focus on IT management issues, rather than technical issues. KEY TOPICS: IT Strategy in Actiontackles the real world challenges of IT management first, by exploring a set of the most important issues facing IT managers today and second, by providing a series of mini-cases which present these critical IT issues within the context of real organizations. Most suited for business professionals who are interested in discovering the latest research in business solutions through IT.



Table of Contents:
Table of Contents



Section I:        Delivering Value with IT


 


1.      Developing and Delivering on the IT Value Proposition


2.      Developing IT Strategy for Business Value


3.      Linking IT to Business Metrics


4.      Managing Perceptions of IT


Mini-cases:


·         IT Leadership at MaxTrade


·         Investing in TUFS


·         IT Planning at ModMeters


 



Section II:       IT Governance


 


5.      IT in the New World of Corporate Governance Reforms


6.      Creating and Evolving a Technology Roadmap


7.      The IT Budgeting Process


8.      Information Management: The Nexus of Business and IT


9.      IT in 2010


Mini-cases:


·         Shared Services at RR Communications


·         Creating a Process-Driven Organization at AgCredit


 



Section III:      IT-Enabled Innovation


 


10.  Strategic Experimentation with IT


11.  Enhancing theCustomer Experience with Technology


12.  Information Delivery: IT’s Evolving Role


13.  Digital Dashboards


14.  Managing Electronic Communications


Mini-cases:


·         Information Management at Homestyle Hotels


·         Knowledge Management at Acme Consulting


·         CRM at Minitrex


·         Managing Technology at Genex Fuels


 



Section IV:     Reinventing IT Capabilities


 


15.  Developing IT Capabilities


16.  IT Sourcing


17.  Delivering IT Functions: A Decision Framework


18.  Building Better IT Leaders: From the Bottom Up


19.  Developing IT Professionalism


Mini-cases:


§         Leveraging IT Vendors at SleepSmart


§         Desktop Provisioning at CanCredit


§         Project Management at MM

Read also Writing Space or Professional Microsoft SQL Server 2008 Reporting Services

Oracle Shell Scripting: Linux and UNIX Programming for Oracle

Author: Jon Emmons

With the expert techniques discussed in this book, Oracle database administrators can automate routine tasks to save time and money and better monitor the flow of work. Using shell scripts—an indispensable tool on UIX and Linux—any number of commands can be combined and executed either simultaneously or sequentially. More than 50 working shell scripts for both beginners and experts give Oracle professionals a fantastic head-start on automating their administration duties and are easily modifiable for any environment. Topics include the history of shells and shell scripting, detailed step-by-step instructions on building shell scripts, how to tell when things are working right, and how to effectively monitor the system for failures.



Friday, January 23, 2009

Video Demystified or Final Cut Pro 4 for Dummies

Video Demystified: A Handbook for the Digital Engineer

Author: Keith Jack

Covers the essentials of video technology with an emphasis on implementing video on computer systems for such applications as multimedia and video teleconferencing.

Booknews

A guide to the intricacies of video-computer system design, covering the essentials of video standards and applications, design architectures, video processing requirements, color space conversion, digital encoding/decoding techniques, and video data compression/decompression standards. Published by HighText Publications Inc., 125 N. Acacia Ave., Suite 110, Solano Beach, CA 92075. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Table of Contents:
Contents ..... vii
Foreword ..... iii
Chapter 1: Introduction ..... 1
Chapter 2: Video and the Computer Environment ..... 7
Chapter 3: Color Spaces ..... 27
Chapter 4: Video Overview ..... 55
Chapter 5: NTSC/PAL Digital Encoding ..... 106
Chapter 6: NTSC/PAL Digital Decoding ..... 197
Chapter 7: Digital Composite Video ..... 257
Chapter 8: 4:2:2 Digital Component Video ..... 282
Chapter 9: Video Processing ..... 330
Chapter 10: MPEG 1 ..... 426
Chapter 11: MPEG 2 ..... 503
Chapter 12: VIdeo Conferencing (ISDN) ..... 601
Chapter 13: Video Conferencing (GSTN) ..... 633
Chapter 14: High Definition Production Standards ..... 658
References ..... 691
Appendix ..... A-1
Glossary ..... A-49
Index ..... A-87

Interesting book: Weight Watchers Great Cooking Every Day or Sexual Male

Final Cut Pro 4 for Dummies

Author: Chad Fahs

* Covers rendering, compositing, transitions, adding titles, audio and video filters, and advanced effects, as well as basic digital video editing information.
* Includes instructions on outputting the final product to videotape, DVD, CD-ROM, or even onto the Web.
* Provides practical, real-world solutions to managing media and incorporating various special effects into unique video/film productions.
* Includes a DVD packed with first hand commentary and project examples from the personal files of author Helmut Kobler, an independent filmmaker.



Thursday, January 22, 2009

Adobe Creative Suite 2 All in One Desk Reference for Dummies or Sams Teach Yourself Exchange Server 2003 in 10 Minutes

Adobe Creative Suite 2 All-in-One Desk Reference for Dummies

Author: Christopher Smith

Adobe software has always been highly respected for creative design and development. Its programs allow you to produce amazing designs and creations with ease, and with the release of the Adobe Creative Suite 2, you can design a wide range of productions ranging from illustrations and Web sites to professional documents and photographic manipulations.

Adobe Creative Suite 2 All-In-One Desk Reference For Dummies is your one-stop guide to creating great graphics with all the cool CS2 tools. Written in a thorough, fun way to show you the basics on how to use each of the programs, you’ll find out just how easy it is to start designing brilliant images and graphics. This guide gives you the tools you need to:



• Draw with InDesign

• Understand page layout and color

• Create colorful images with Illustrator C2

• Use the pen tool, type, and image placing

• Choose the correct Photoshop mode for your creation

• Create images on PhotoShop CS2 for print

• Paint and retouch images

• Create and secure PDF files with Acrobat 7.0

• Edit and extract text and graphics

• Build and publish a Web site with GoLive CS2

• Work with multimedia



Packed with easy-to-follow steps and guidance, you’ll be up to speed with all the features in no time. With these six great reference guides rolled into one, this is the ultimate book for becoming a CS2 pro!



Table of Contents:
Bk. IAdobe Creative Suite 2 basics7
Ch. 1Introduction Adobe Creative Suite 29
Ch. 2Using common menus and commands19
Ch. 3Using common palettes31
Ch. 4Using common plug-ins39
Ch. 5Importing and exporting47
Ch. 6Handling graphics, paths, text, and fonts61
Ch. 7Using color73
Ch. 8Printing documents81
Bk. IIInDesign CS291
Ch. 1Introducing InDesign CS293
Ch. 2Drawing in InDesign115
Ch. 3Working with text and text frames139
Ch. 4Understanding page layout171
Ch. 5Clipping paths, transforming objects, and alignment193
Ch. 6Understanding color and printing205
Ch. 7Exporting your work219
Ch. 8Integrating InDesign231
Bk. IIIIllustrator CS2243
Ch. 1Discovering Illustrator CS2245
Ch. 2Using the selection tools259
Ch. 3Creating basic shapes269
Ch. 4Using the pen tool and placing images275
Ch. 5Using type in Illustrator287
Ch. 6Organizing your illustrations311
Ch. 7Using layers321
Ch. 8Livening up illustrations with color329
Ch. 9The transform and distortions tools345
Ch. 10Transparency and special effects tools357
Ch. 11Using filters and effects369
Ch. 12Using your Illustrator image381
Bk. IVPhotoshop CS2397
Ch. 1Photoshop CS2 basics399
Ch. 2Mode matters407
Ch. 3Creating a selection419
Ch. 4Using the Photoshop pen tool433
Ch. 5Resolution basics443
Ch. 6Creating a good image451
Ch. 7Painting and retouching tools467
Ch. 8Using layers485
Ch. 9Saving Photoshop images for print and the Web503
Bk. VAcrobat 7.0515
Ch. 1Discovering essential Acrobat information517
Ch. 2Creating PDF files527
Ch. 3Adding interactivity to PDF files539
Ch. 4Editing and extracting text and graphics549
Ch. 5Using commenting and annotation tools557
Ch. 6Securing your PDF files567
Bk. VIGoLive CS2573
Ch. 1Introducing GoLive CS2575
Ch. 2Creating a Web site587
Ch. 3Working with images597
Ch. 4Text and CSS609
Ch. 5Layout grids, tables, and frames623
Ch. 6Links637
Ch. 7Layers647
Ch. 8Forms661
Ch. 9Multimedia677
Ch. 10Publishing your Web site687

New interesting textbook: La Compréhension des Comportements pour Leaderhsip Efficace

Sams Teach Yourself Exchange Server 2003 in 10 Minutes

Author: James Walker

In your daily maintenance routine of your company's Microsoft Exchange Server, you probably run into bumps along the way. Sams Teach Yourself Exchange Server 2003 in 10 Minutes is a great, quick-reference guide to the most common tasks you perform as an Exchange Server administrator. Use this guide as a basis for practical knowledge and solutions to problems with managing mailboxes, performing database maintenance, Outlook Web access, performance optimization and group policy management. When all you need is a quick-hit of information so you can quickly get back to work, Sams Teach Yourself Exchange Server 2003 in 10 Minutes is your best option.



Tuesday, January 20, 2009

The Internet Galaxy or Object Oriented Software Engineering

The Internet Galaxy: Reflections on the Internet, Business, and Society

Author: Manuel Castells

Manuel Castells is one of the world's leading thinkers on the new information age, hailed by The Economist as "the first significant philosopher of cyberspace," and by Christian Science Monitor as "a pioneer who has hacked out a logical, well-documented, and coherent picture of early 21st century civilization, even as it rockets forward largely in a blur." Now, in The Internet Galaxy, this brilliantly insightful writer speculates on how the Internet will change our lives.

Castells believes that we are "entering, full speed, the Internet Galaxy, in the midst of informed bewilderment." His aim in this exciting and profound work is to help us to understand how the Internet came into being, and how it is affecting every area of human life--from work, politics, planning and development, media, and privacy, to our social interaction and life in the home. We are at ground zero of the new network society. In this book, its major commentator reveals the Internet's huge capacity to liberate, but also its ability to marginalize and exclude those who do not have access to it. Castells provides no glib solutions, but asks us all to take responsibility for the future of this new information age.

The Internet is becoming the essential communication and information medium in our society, and stands alongside electricity and the printing press as one of the greatest innovations of all time. The Internet Galaxy offers an illuminating look at how this new technology will influence business, the economy, and our daily lives.

Publishers Weekly

Castells, best known for his three-volume study The Information Age (Blackwell), an analysis of societal changes wrought by communications advances, trims that work to appeal to readers who were daunted by its 1,200 pages, $80 paperback price and ponderous prose. In this excellent, readable, nontechnical summary of the history, social implications and likely future of Internet business, Castells, professor of planning and of sociology at Berkeley, covers institutions like the World Wide Web Consortium, which "presides over the protocols and development" of the Web, and phenomena like the Internet's immense ability to simultaneously liberate and exclude. There are still too many sentences like "It is fair to say that most hackers live normal lives, at least as normal as most people, which does not necessarily mean that hackers (or anybody else) fit into the ideal type of normalcy, conforming to the dominant ideology in our societies," leaving readers wondering if hackers' lives are normal or not, and whether he's trying to give a sociological side lesson. Those willing to overlook such prosodic lapses will appreciate the astute accounts of, e.g., the complications for early grassroots online citizen networks headed by community activists, but seen by many as an opportunity to move beyond their local community. (Dec.) Copyright 2001 Cahners Business Information.

Library Journal

Based on the author's Clarendon Lectures in Management at Oxford University, this work focuses on the Internet and the future of networked societies. More specifically, Castells (sociology, Univ. of California, Berkeley; The Information Age: Economy, Society, and Culture) examines cultures spawned by the Internet as well as the Internet's effects on culture. He provides balanced coverage of e-business and the new economy; the politics of the Internet, including privacy and freedom; and the geography of the Internet. Thereafter, he considers how those topics have influenced the globalization of the Internet and the growing digital divide. This thoroughly researched volume features numerous international examples and statistics that effectively illustrate key points and make the book truly global in scope. With his knack for analyzing contemporary society, Castells has produced a timely book indeed. Including constructive lists of "reading links" and "e-links" at the end of each chapter, the text would serve as a good companion for courses in the social and computer sciences. Highly recommended for academic libraries. Colleen Cuddy, New York Univ. Sch. of Medicine Lib. Copyright 2001 Cahners Business Information.

Kirkus Reviews

Far-reaching analysis by the author of the Information Age trilogy (The Rise of the Network Society, not reviewed, etc.) of the Internet's birth and its impact on a range of human activities, including business, social relationships, and politics. Castells (Planning and Sociology/Univ. of California, Berkeley) begins his study by looking at the creation of the Internet, developed not by business but in government institutions, universities, think tanks, and research centers: environments that fostered freedom of thinking and innovation. Its origins, he points out, are what have given the Internet its most distinctive features, openness in technical architecture and social forms and uses, and business built upon these features when it became the driving force behind the Internet's rapid expansion in the 1990s. Castells examines the new economy in some detail, looking at the relationship between the Internet and capital markets, changes in employment practices, and networking as a management tool. With a new economy based on the culture of innovation, risk, and expectations, Castells sees the emergence of a new kind of business cycle characterized by volatile, information-driven financial markets. Turning to the impact of the Internet on social relationships, he notes a new pattern of sociability, "networked individualism," in which individuals build their networks on- and offline on the basis of values, interests, and projects. Castells observes that while the Internet has the potential to strengthen democracy through broadening the sources of information and enabling greater citizenship participation, it has at the same time contributed greatly to the politics of scandal. He also looksat unresolved issues of privacy and security, describing the Internet as "contested terrain, where the new, fundamental battle for freedom in the Information Age is being fought." In his sobering final chapter, the author studies the divide between peoples and regions that operate in the digital world and those that cannot. Absorbing history-but, with the jargon of academic sociology, an arduous read.



See also: Masters of Deception or How to Cheat at Configuring VmWare ESX Server

Object-Oriented Software Engineering: Using UML, Patterns and Java

Author: Bernd Bruegg

Object-Oriented Software Engineering Using UML, Patterns and Java was designed as a software engineering project course text and professional reference. In their second edition, the authors effectively incorporate a step-by-step case study as a unifying thread throughout the text, giving students the opportunity to apply the tools in a real-world scenario. This bottom-up approach assists students or professionals in learning the material incrementally.

This thoroughly updated text teaches students or industry R & D practitioners to successfully negotiate the terrain for building and maintaining large, complex software systems. The authors introduce the basic skills needed for a developer to apply software engineering techniques. Next, they focus on methods and technologies that enable developers to specify, design, and implement complex systems. Finally, the authors show how to support the system changes throughout the software life cycle.

New features with the second edition:
  • More usable organization and fine-tuned presentation
  • Shows the state of the art in Object-oriented Software Engineering: UML, Java, Distributed Development, Rationale and Configuration Management
  • Detailed new chapter teaches students and professionals the steps for moving from UML models to Java source code
  • Instructors can now use the book for class projects with newly differentiated basic or advanced software project management materials
  • Updated material on Unified Process and XP exposes students to typical changes in system development



Table of Contents:
Foreword
Preface
Acknowledgments
Pt. IGetting Started1
Ch. 1Introduction to Software Engineering3
Ch. 2Modeling with UML29
Ch. 3Project Organization and Communication77
Pt. IIDealing with Complexity119
Ch. 4Requirements Elicitation121
Ch. 5Analysis173
Ch. 6System Design: Decomposing the System223
Ch. 7System Design: Addressing Design Goals259
Ch. 8Object Design: Reusing Pattern Solutions303
Ch. 9Object Design: Specifying Interfaces347
Ch. 10Mapping Models to Code391
Ch. 11Testing435
Pt. IIIManaging Change485
Ch. 12Rationale Management487
Ch. 13Configuration Management531
Ch. 14Project Management567
Ch. 15Software Life Cycle613
Ch. 16Methodologies: Putting It All Together643
Pt. IVAppendices693
App. ADesign Patterns695
App. B: Glossary707
App. C: Bibliography739
Index751

Monday, January 19, 2009

Digital Communications or AutoCAD 2004 and AutoCAD LT 2004

Digital Communications: A Discrete-Time Approach

Author: Michael Ric

This text uses the principles of discrete-time signal processing to introduce and analyze digital communications – connecting continuous-time and discrete-time ideas. The text brings under one cover the theoretical and practical issues from discrete-time signal processing, discrete-time filter design, multi-rate discrete-time processing, estimation theory, signal space analysis, numerical algorithms – all focused on digital communications. A useful reference for programmers.


 



New interesting book: Mosbys Handbook of Herbs and Supplements and Their Therapeutic Uses or Real People Need Real Food

AutoCAD 2004 and AutoCAD LT 2004: No Experience Required

Author: David Frey

AutoCAD 2004 and AutoCAD LT 2004: No Experience Required is your step-by-step introduction to the latest versions of AutoCAD and AutoCAD LT, the industry-leading design and drafting programs used by architects, engineers, drafters, and design teams worldwide. Inside this perfectly-paced guide are the clear-cut explanations and practical, step-by-step tutorials that you need to create, develop, and complete even the most elaborate AutoCAD projects.



• Gain the Imperative AutoCAD Skills

• Finding your way around AutoCAD and LT

• Understanding basic commands

• Applying AutoCAD's coordinate systems

• Setting up a drawing

• Mastering drawing strategies

• Employing Polar and Object Snap Tracking

• Setting up layers, colors, and linetypes

• Using blocks and Wblocks

• Dragging AutoCAD objects from one drawing to another

• Generating elevations and orthographic views

• Working with hatches and fills

• Controlling text in a drawing

• Managing external references

• Setting up layouts and printing an AutoCAD drawing

• Using AutoCAD's tool palettes

• Creating and rendering a 3D model

• Setting up attributes




Table of Contents:
Introduction

Chapter 1: Getting to Know AutoCAD

Mastering AutoCAD 2008 and AutoCAD LT 2008 or Microsoft Expression Design Step by Step

Mastering AutoCAD 2008 and AutoCAD LT 2008

Author: George Omura

Mastering AutoCAD teaches AutoCAD essentials using concise explanations, focused examples, step-by-step instructions, and hands-on projects for both AutoCAD and AutoCAD LT. This detailed resource works as both a tutorial and stand-alone reference. Part I introduces the basics of the interface and drafting tools; Part II moves into such intermediate skills as effectively using hatches, fields, and tables; Part III details such advanced skills as attributes, dynamic blocks, drawing curves and solid fills; Part IV explores 3D modeling and imaging; and Part V discusses customization and integration. The book includes a passcode to access further information on a website.



Read also The General Theory of Employment Interest and Money or The Lion and the Unicorn

Microsoft Expression Design Step by Step

Author: Sara Froelich

The smart way to learn Microsoft Expression Design-one step at a time! Work at your own pace through the easy numbered steps, practice files on CD, and hands-on exercises to master the fundamentals of creating professional-looking designs and illustrations with the powerful tools that Expression Design delivers. You'll learn how to produce high-quality effects by using the Live Effects feature, how to use a variety of brush types, and how to work with vector images. With STEP BY STEP, you can take just the lessons you need or work from cover to cover. Either way, you drive the instruction, building and practicing the skills you need, just when you need them! Includes an easy-search companion CD with files for practicing the book's lessons, a complete eBook, and more!

Key Book Benefits
• Includes coverage of the fundamentals for building high-quality design and illustrations with easy-to-use tools in a professional design environment
• Features an easy-search companion CD with practice files, a complete eBook, and other resources



Lattice or Effective Software Test Automation

Lattice: Multivariate Data Visualization with R

Author: Deepayan Sarkar

R is rapidly growing in popularity as the environment of choice for data analysis and graphics both in academia and industry. Lattice brings the proven design of Trellis graphics (originally developed for S by William S. Cleveland and colleagues at Bell Labs) to R, considerably expanding its capabilities in the process. Lattice is a powerful and elegant high level data visualization system that is sufficient for most everyday graphics needs, yet flexible enough to be easily extended to handle demands of cutting edge research. Written by the author of the lattice system, this book describes it in considerable depth, beginning with the essentials and systematically delving into specific low levels details as necessary. No prior experience with lattice is required to read the book, although basic familiarity with R is assumed.

The book contains close to150 figures produced with lattice. Many of the examples emphasize principles of good graphical design; almost all use real data sets that are publicly available in various R packages. All code and figures in the book are also available online, along with supplementary material covering more advanced topics.



Table of Contents:
Preface     vii
Introduction     1
Multipanel conditioning     2
A histogram for every group     2
The Trellis call     3
Kernel density plots     4
Superposition     5
The "trellis" object     6
The missing Trellis display     7
Arranging multiple Trellis plots     7
Looking ahead     7
Basics
A Technical Overview of lattice     13
Basic usage     13
The Trellis formula     13
The data argument     14
Conditioning     14
Shingles     15
Dimension and physical layout     16
Aspect ratio     19
Layout     20
Fine-tuning the layout: between and skip     24
Grouped displays     24
Annotation: Captions, labels, and legends     26
More on legends     26
Graphing the data     28
Scales and axes     28
The panel function     30
The panel function demystified     31
Return value     33
Visualizing Univariate Distributions     35
Density Plot     35
Large datasets     37
Histograms     39
Normal Q-Q plots     40
Normality and the Box-Cox transformation     42
Other theoretical Q-Q plots     43
The empirical CDF     44
Two-sample Q-Q plots     44
Box-and-whisker plots     47
Violin plots     47
Strip plots     50
Coercion rules     52
Discrete distributions     53
A note on the formula interface     54
Displaying Multiway Tables     55
Cleveland dot plot     55
Bar chart     57
Manipulating order     61
Bar charts and discrete distributions     63
Visualizing categorical data     65
Scatter Plots and Extensions     67
The standard scatter plot     67
Advanced indexing using subscripts     71
Variants using the type argument     75
Superposition and type     79
Scatter-plot variants for large data     82
Scatter-plot matrix     84
Interacting with scatter-plot matrices     86
Parallel coordinates plot     87
Trivariate Displays      91
Three-dimensional scatter plots     91
Dynamic manipulation versus stereo viewing     95
Variants and panel functions     96
Surfaces and two-way tables     98
Data preparation     99
Visualizing surfaces     102
Visualizing discrete array data     105
Theoretical surfaces     110
Parameterized surfaces     111
Choosing a palette for false-color plots     113
Finer Control
Graphical Parameters and Other Settings     119
The parameter system     119
Themes     120
Devices     120
Initializing a graphics device     121
Reading and modifying a theme     122
Usage and alternative forms     125
The par.settings argument     125
Available graphical parameters     126
Nonstandard settings     129
Non-graphical options     131
Argument defaults     131
Making customizations persistent     131
Plot Coordinates and Axis Annotation     133
Packets and the prepanel function     133
The scales argument     134
Relation     134
Axis annotation: Ticks and labels     135
Defaults     138
Three-dimensional displays: cloud() and wireframe()     139
Limits and aspect ratio     140
The prepanel function revisited     140
Explicit specification of limits     141
Choosing aspect ratio by banking     143
Scale components and the axis function     144
Components     144
Axis     148
Labels and Legends     151
Labels     151
Legends     152
Legends as grid graphical objects     152
The colorkey argument     155
The key argument     156
The problem with settings, and the auto.key argument     158
Dropping unused levels from groups     159
A more complicated example     159
Further control: The legend argument     161
Page annotation     162
Data Manipulation and Related Topics     165
Nonstandard evaluation     165
The extended formula interface     166
Combining data sources with make.groups()     170
Subsetting     173
Dropping of factor levels     176
Shingles and related utilities      177
Coercion to factors and shingles     182
Using shingles for axis breaks     183
Cut-and-stack plots     184
Ordering levels of categorical variables     187
Controlling the appearance of strips     193
An Example Revisited     198
Manipulating the "trellis" Object     201
Methods for "trellis" objects     201
The plot(), print(), and summary() methods     202
The update() method and trellis.last.object()     206
Tukey mean-difference plot     208
Specialized manipulations     210
Manipulating the display     211
Interacting with Trellis Displays     215
The traditional graphics model     215
Interaction     216
Viewports, trellis.vpname(), and trellis.focus()     216
Interactive additions     217
Other uses     223
Extending Trellis Displays
Advanced Panel Functions     229
Preliminaries     229
Building blocks for panel functions     229
Accessor functions     231
Arguments     232
A toy example: Hypotrochoids and hypocycloids     232
Some more examples     235
An alternative density estimate     235
A modified box-and-whisker plot     237
Corrgrams as customized level plots     238
Three-dimensional projections     241
Maps     242
A simple projection scheme     244
Maps with conditioning     245
New Trellis Displays     247
S3 methods     248
S4 methods     249
New functions     251
A complete example: Multipanel pie charts     252
References     255
Index     259

Books about: Bereich-Guide zum Verstehen des Menschlichen Fehlers

Effective Software Test Automation: Developing an Automated Software Testing Tool

Author: Kanglin Li

"If you'd like a glimpse at how the next generation is going to program, this book is a good place to start."
—Gregory V. Wilson, Dr. Dobbs Journal (October 2004)

Build Your Own Automated Software Testing Tool

Whatever its claims, commercially available testing software is not automatic. Configuring it to test your product is almost as time-consuming and error-prone as purely manual testing.

There is an alternative that makes both engineering and economic sense: building your own, truly automatic tool. Inside, you'll learn a repeatable, step-by-step approach, suitable for virtually any development environment. Code-intensive examples support the book's instruction, which includes these key topics:



• Conducting active software testing without capture/replay

• Generating a script to test all members of one class without reverse-engineering

• Using XML to store previously designed testing cases

• Automatically generating testing data

• Combining Reflection and CodeDom to write test scripts focused on high-risk areas

• Generating test scripts from external data sources

• Using real and complete objects for integration testing

• Modifying your tool to test third-party software components

• Testing your testing tool



Effective Software Test Automation goes well beyond the building of your own testing tool: it also provides expert guidance on deploying it in ways that let you reap the greatest benefits: earlier detection of coding errors, a smoother, swifter development process,and final software that is as bug-free as possible. Written for programmers, testers, designers, and managers, it will improve the way your team works and the quality of its products.



Sunday, January 18, 2009

Bullying Beyond the Schoolyard or Mastering Microsoft System Center Operations Manager 2007

Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying

Author: Justin W Patchin

"Cyberbullying is a significant concern for teens and tweens in the 21st century. This timely and informative book brings adults up to speed on how kids are using technology to harm their peers."
вЂ"Tina Meier, Cyberbullying Activist
Founder, The Megan Meier Foundation

"School leaders need information about cyberbullying and resources on how to protect children. This book provides timely research, best practices, and personal voices from students that will go a long way toward improving student safety."
вЂ"Gail Connelly, Executive Director
National Association of Elementary School Principals

"Hinduja and Patchin are two of the most respected researchers on cyberbullying. This book contains the best practices that principals can implement at their schools to prevent and respond to acts of cyberbullying."
вЂ"Gerald N. Tirozzi, Executive Director
National Association of Secondary School Principals

Identify the warning signs of cyberbullying and prevent inappropriate behaviors!

Cyberbullying is the intentional and repeated act of causing harm to others through the use of computers, cell phones, and other electronic devices. The authors help educators understand the potential consequences of this deliberate behavior and present strategies for effective identification, prevention, and response.

Focusing on the way technology can facilitate or magnify bullying behavior, this comprehensive resource offers information, guidelines, and resources to give students the protection they need. Written by leading experts, this groundbreaking book offers the voices of youth affected by or involved inreal cyberbullying incidents and includes:

  • Illustrations of what cyberbullying looks like
  • Tips for identifying cyberbullies or targets
  • "Breakout boxes" highlighting hundreds of anti-cyberbullying strategies
  • A review of current research and legal rulings
  • Strategies for responsible social networking
  • Follow-up reflection questions in each chapter
  • Guidelines for working with parents and law enforcement

Bullying Beyond the Schoolyard helps educators confront technology-based aggression and ensure the safe and responsible use of computers and the Internet.



Books about: Criminal Elite or Smith and Thomas Employment Law

Mastering Microsoft System Center Operations Manager 2007

Author: Brad Pric

If you're an IT professional, you're busy enough trying to manage multiple systems and stay proactive with the technology demands of today's fast-moving companies. System Center Operations Manager 2007 is designed to make your life easier, and this comprehensive book is your one-stop gateway to it all. With intermediate to advanced coverage, this book gives you the information you need to deploy, manage, and maintain SCOM 2007, and use it to monitor your network.



Table of Contents:
Introduction.

Part 1: Implementation and Administration.

Chapter 1: Overview of Operations Management.

Chapter 2: Installing System Center Operations Manager 2007.

Chapter 3: Management Group Settings.

Chapter 4: Installing and Configuring Agents.

Chapter 5: Managing Management Packs.

Chapter 6: Authoring and the Management Pack Life Cycle.

Chapter 7: Monitoring with the Console.

Chapter 8: Audit Collection Services and Agentless Exception Monitoring.

Chapter 9: Reporting.

Chapter 10: Working with Complex Environments.

Part 2: Maintenance and Troubleshooting.

Chapter 11: Optimizing Your Environment.

Chapter 12: Backup, Restore, and Disaster Recovery.

Chapter 13: Troubleshooting.

Chapter 14: Scripting Operations Manager 2007.

Index.

Saturday, January 17, 2009

Beginning PHP and MySQL E Commerce or Head First Software Development

Beginning PHP and MySQL E-Commerce: From Novice to Professional

Author: Cristian Dari

Beginning PHP and MySQL E-Commerce: From Novice to Professional, Second Edition covers every step of the design and building process involved in creating powerful, extendable e-commerce web sites. Based around a real-world example involving a web site selling t-shirts, you'll learn how to create and manage a product catalog, build and integrate a shopping cart, and process customer accounts and PayPal/credit card transactions.

With the e-commerce framework in place, authors Emilian Balanescu and Cristian Darie show you how to integrate advanced features sure to set your web site apart from the competition. You'll learn how to expand your catalog using Amazon Web Services, optimize the web site for the search engines, and take advantage of Ajax to build an even more user-friendly shopping cart.

Other highlights:

  • The authors show you how to build a complex, extendable e-commerce web site using sound development practices.
  • This second edition has been updated to take advantage of a more flexible templating system, and new chapters cover Ajax integration and search engine optimization.
  • The text goes beyond basic product and customer management, showing you how to integrate product reviews, process payments using both credit cards and PayPal, and expand your web site catalog using third-party services such as Amazon's affiliate program.



What you'll learn

  • Build an extensible e-commerce web site using sound development techniques.
  • Increase sales through proven techniques such as cross-selling, upselling, and enhancing customer service offerings.
  • Expand your product and serviceofferings by integrating with reseller programs such as Amazon Affiliates via XML web services.
  • Take advantage of search engine optimization techniques to make your web site more easy to find.



Who is this book for?

This book was written for individuals seeking to build e-commerce web sites using the PHP language and MySQL database.


About the Apress Beginning Series

The Beginning series from Apress is the right choice to get the information you need to land that crucial entry-level job. These books will teach you a standard and important technology from the ground up because they are explicitly designed to take you from "novice to professional." You'll start your journey by seeing what you need to know--but without needless theory and filler. You'll build your skill set by learning how to put together real-world projects step by step. So whether your goal is your next career challenge or a new learning opportunity, the Beginning series from Apress will take you there--it is your trusted guide through unfamiliar territory!


Related Titles

Beginning PHP and MySQL 5: From Novice to Professional, Second Edition

PHP 5 Objects, Patterns, and Practice



Read also Nicht Behaltene Versprechungen: Armut und Der Verrat der Entwicklung der Dritten Welt

Head First Software Development

Author: Dan Pilon

Even the best developers have seen well-intentioned software projects fail -- often because the customer kept changing requirements, and end users didn't know how to use the software you developed. Instead of surrendering to these common problems, let Head First Software Development guide you through the best practices of software development. Before you know it, those failed projects will be a thing of the past. With its unique visually rich format, this book pulls together the hard lessons learned by expert software developers over the years. You'll gain essential information about each step of the software development lifecycle -- requirements, design, coding, testing, implementing, and maintenance -- and understand why and how different development processes work. This book is for you if you are: Tired of your customers assuming you're psychic. You'll learn not only how to get good requirements, but how to make sure you're always building the software that customers want (even when they're not sure themselves) Wondering when the other 15 programmers you need to get your project done on time are going to show up. You'll learn how some very simple scheduling and prioritizing will revolutionize your success rate in developing software. Confused about being rational, agile, or a tester. You'll learn not only about the various development methodologies out there, but how to choose a solution that's right for your project. Confused because the way you ran your last project worked so well, but failed miserably this time around. You'll learn how to tackle each project individually, combine lessons you've learned on previous projects with cutting-edge development techniques, and end upwithgreat software on every project. Head First Software Development is here to help you learn in a way that your brain likes... and you'll have a blast along the way. Why pick up hundreds of boring books on the philosophy of this approach or the formal techniques required for that one? Stick with Head First Software Development, and your projects will succeed like never before. Go on, get started... you'll learn and have fun. We promise.