Sunday, December 6, 2009

A Comprehensive Guide to Digital Portrait Photography or Public Information Technology

A Comprehensive Guide to Digital Portrait Photography

Author: Duncan Evans

To get the best results out of digital photography portrait making, you need the guidance and proven techniques that only a professional can provide. That's exactly what you'll find here. The advice and information is highlighted with illustrations and screen captures, as well as some 300 color and black-and-white photographs. In nontechnical language, the pros cover the various types of digital cameras available, including compact, single-lens reflex (SLR), and specialized "gadget" models. See how to create a home studio; begin to understand the basics of portrait composition, texture and mood. Color, computer manipulation, and getting the most from your digital outputs are included. Topics also covered are portrait photography using duotones, tritones and sepia tones, manipulating light and shadow, and correcting mistakes. You'll find invaluable practical tips for wedding photography, capturing kids at play, family portraits, candid and street portraits, and more, including the special challenge of shooting at night.



See also: Coordination Organizations Institutions and Norms in Agent Systems II or Pro Java EE 5 Performance Management and Optimization

Public Information Technology: Policy and Management Issues

Author: Garson

Public Information Technology: Policy and Management Issues constitutes a survey of many of the most important dimensions of managing information technology in the public sector. Written by noted academics and public administration practitioners, this book addresses general policy and administrative issues in this arena as well as the information technology skills needed by public managers.

About the Author
G. David Garson is professor of public administration at North Carolina State University, where he teaches courses on American government, research methodology, computer applications, and geographic information systems. His most recent works include Guide to Writing Empirical Papers, Theses, and Dissertations (2002), Social Dimensions of Information Technology (ed., 2000), Handbook of Public Information Systems (ed., 2000), and Neural Network Analysis for Social Scientists (1998). For the last two decades he has also served as editor of the Social Science Computer Review.



Table of Contents:
Preface
Ch. IInformation Technology and Public Administration: The View from the Profession1
Ch. IIPolitics, Accountability, and Governmental Information Systems20
Ch. IIIThe Evolution of Information Technology Management at the Federal Level: Implications for Public Administration53
Ch. IVThe Realities of the Paperwork Reduction Act of 1995: A Government-Wide Strategy for Information Resources Management74
Ch. VMediating the Tension between Information Privacy and Information Access: The Role of Digital Government94
Ch. VIE-Government: An Overview120
Ch. VIILeading-Edge Information Technologies and American Local Governments139
Ch. VIIIInformation Technology as a Facilitator of Results-Based Management in Government170
Ch. IXComputer Tools for Better Public Sector Management190
Ch. XSurvey Research, Focus Groups, and Information Technology in Research and Practice221
Ch. XIGeographic Information Systems in the Public Sector252
Ch. XIIElectronic Mail in the Public Workplace: Issues of Privacy and Public Disclosure271
Ch. XIIIWorld Wide Web Site Design and Use in Public Management299
Ch. XIVToward an Information Technology Research Agenda for Public Administration331
AppDoing Online Research in Public Administration358
About the Authors384
Index390

Saturday, December 5, 2009

Strategic Decision Making or Requirements Engineering

Strategic Decision Making: Multiobjective Decision Analysis with Spreadshee

Author: Craig W Kirkwood

Intended for courses in multiobjective decision analysis or as a supplement to a first course in decision analysis, this text emphasizes practical applications and problem solving.
Students learn how to use spreadsheets and other analytical tools in considering such important tradeoffs as cost versus quality and market share versus short-term return on investment.



Table of Contents:
1Making Decisions Strategically1
2Structuring Objectives11
3Developing Alternatives43
4Multiobjective Value Analysis53
5Thinking about Uncertainty107
6Decisions with Uncertainty129
7Multiple Objectives and Uncertainty155
8Resource Allocation199
9Multiattribute Preference Theory227
App. ACase: Computer Networking Strategy271
App. BScenario Planning for Decision Making285
App. CProbability Elicitation Interview299
App. DInterdependent Uncertainties321
Index339

Book about: Living with Germs or Common Fragrance and Flavor Materials

Requirements Engineering: Processes and Techniques

Author: Gerald Kotonya

Requirements Engineering Processes and Techniques Why this book was written The value of introducing requirements engineering to trainee software engineers is to equip them for the real world of software and systems development. What is involved in Requirements Engineering? As a discipline, newly emerging from software engineering, there are a range of views on where requirements engineering starts and finishes and what it should encompass. This book offers the most comprehensive coverage of the requirements engineering process to date - from initial requirements elicitation through to requirements validation. How and Which methods and techniques should you use? As there is no one catch-all technique applicable to all types of system, requirements engineers need to know about a range of different techniques. Tried and tested techniques such as data-flow and object-oriented models are covered as well as some promising new ones. They are all based on real systems descriptions to demonstrate the applicability of the approach. Who should read it? Principally written for senior undergraduate and graduate students studying computer science, software engineering or systems engineering, this text will also be helpful for those in industry new to requirements engineering. Accompanying Website: http: //comp.lancs.ac.uk/computing/resources/re Visit our Website: wiley.com/college/wws

Booknews

Introduces requirements engineering to undergraduate and graduate students in computer science, software engineering, and systems engineering. Part I is process-oriented and describes different activities in the requirements engineering process. Part II focuses on requirements engineering techniques, covering the use of structured methods, viewpoint-oriented approaches, and specification of non- functional requirements and of interactive systems. A final chapter presents a case study illustrating a viewpoint-oriented approach. Includes chapter key points and exercises. Annotation c. by Book News, Inc., Portland, Or.



Thursday, December 3, 2009

How to Cheat at Managing Windows Small Business Server 2003 or Microcontroller Projects Using the Basic Stamp

How to Cheat at Managing Windows Small Business Server 2003

Author: Susan Snedaker

How to Cheat at Managing Windows Small Business Server 2003 deals only with the vital, and will be a huge relief to the hundreds of thousands of managers who probably never imagined they would be managing the operating system equivalent of the Space Shuttle.

* The "80/20" Rule applied to managing a Windows Small Business Server 2003 network. Concise coverage, with ready-to-use solutions, of the most commonly encountered W2K3 Server tasks and problems.
* Written for the non-MCSE, with little technical training, who is responsible for running a small to medium sized network.
* Microsoft has announced it will no longer support Windows NT 4 products, effective Dec. 31, 2004. Millions of small businesses that did not upgrade to Windows Server 2000 will choose to upgrade directly to Windows Server 2003, and this will be a timely book.



Table of Contents:
1: Essentials of Windows Small Business Server

Interesting book: Module 1 or Building Services Procurement

Microcontroller Projects Using the Basic Stamp

Author: Al Williams

Complete BS2P command reference Demo projects include: * Internet-to-Stamp gateways * Infrared remote controls * Test instrumentation * Robot motor controls Want to build an electronic game, a robot, or an automated manufacturing process? A



Updated with a complete, task-oriented command reference for the BS2P Stamp and detailed instructions for new projects including Internet-to-Stamp gateways, test instruments, infrared remote controls, and robot motor controls. Includes practical advice for PC interfacing and analog I/O capabilities. CD contains a Basic Stamp emulator and a tool to program PIC chips.



Wednesday, December 2, 2009

Microsoft Windows Server 2008 or Robs Guide to Using VMware Second

Microsoft Windows Server 2008: The Complete Reference

Author: Nelson Ruest

Your complete guide to Microsoft Windows Server 2008

Featuring best practices for network implementation and configuration, this authoritative resource has been fully updated to cover all of the new and improved features of Windows Server 2008. This comprehensive guide covers everything from Active Directory and Web servers to security, network management, and performance optimization. A step-by-step network implementation is included.



Table of Contents:

Part 1 - Tour Windows Server 2008


Chapter 1 - The Windows Server 2008 Delta


Chapter 2 - Interact with Windows Server 2008


Part 2 - Plan and Prepare


Chapter 3 - Plan for Windows Server 2008


Chapter 4 - Explore Windows Server 2008 Installation Modes


Part 3 - Design Server Roles


Chapter 5 - Identity Management


Chapter 6 - Deploy the Windows Server 2008 Network and Build Network Infrastructure Servers


Part 4 - Manage Objects with Windows Server Cod2008


Chapter 7 - Object Management


Chapter 8 - Build the Service Offerings

Infrastructure: File and Print Servers


Chapter 9 - Build the Service Offerings

Infrastructure: Application-oriented Servers


Part 5 - Secure Windows Server 2008


Chapter 10 - Security


Chapter 11 - Business Continuity for Physical and Virtual Machines


Part 6 - Migrate to Windows Server 2008


Chapter 12 - Put the Virtual Service Offering Network into Production


Part 7 - Administer Windows Server 2008


Chapter 13 - Common Administrative Tasks









Read also Cajun Night before Christmas or Little House

Rob's Guide to Using VMware Second

Author: Rob Bastiaansen

The second edition of Rob's Guide to Using VMWare continues where the author stopped with the first edition. New topics covered in the book are VMWare ACE and VMWare GSX Server. The book now also contains information on VMWare and Linux. This new edition features an overview of the new version 5 of VMWare Workstation. Many topics which were included in the first edition have been updated.



Tuesday, December 1, 2009

Beginning ASPNET 20 in C 2005 or Illustrator CS2 Bible

Beginning ASP.NET 2.0 in C# 2005: From Novice to Professional

Author: Matthew MacDonald

 

Purchase this book and you'll get the free, fully searchable eBook--a $25 value! (Details are printed inside the book.)

 


I was pleasantly surprised by both the clarity and depth that author Matthew MacDonald provides.


— Mike Riley, asp.netPRO, July 2006

Beginning ASP.NET 2.0 in C# 2005: From Novice to Professional steers you through the maze of ASP.NET web programming concepts. You will learn language and theory simultaneously, mastering the core techniques necessary to develop good coding practices and enhance your skill set.

This book provides thorough coverage of ASP.NET, guiding you from beginning to advanced techniques, such as querying databases from within a web page and performance-tuning your site. You'll find tips for best practices and comprehensive discussions of key database and XML principles.

The book also emphasizes the invaluable coding techniques of object orientation and code-behind, which will enable you to build real-world websites instead of just scraping by with simplified coding practices. By the time you finish this book, you will have mastered the core techniques essential to professional ASP.NET developers.



Table of Contents:
Ch. 1Introducing the .NET framework3
Ch. 2Learning the C# language23
Ch. 3Types, objects, and namespaces59
Ch. 4Introducing Visual Studio 200591
Pt. IIDeveloping ASP.NET applications
Ch. 5Web form fundamentals125
Ch. 6Web Controls175
Ch. 7Tracing, logging, and error handling219
Ch. 8Validation and rich controls267
Ch. 9State management317
Ch. 10Master pages and themes359
Ch. 11Website navigation389
Ch. 12Deploying ASP.NET applications427
Pt. IIIWorking with data
Ch. 13ADO.NET fundamentals471
Ch. 14Data binding539
Ch. 15The data controls581
Ch. 16Files and streams625
Ch. 17XML655
Pt. IVWebsite security
Ch. 18Security fundamentals707
Ch. 19Membership739
Ch. 20Profiles781
Pt. VWeb services
Ch. 21Web services architecture813
Ch. 22Creating Web services831
Ch. 23Enhancing Web services869
Pt. VIAdvanced ASP.NET
Ch. 24Component-based programming903
Ch. 25Custom controls937
Ch. 26Caching and performance tuning985
Ch. 27Web parts1029

Look this: Philanthrocapitalism or Toyota Culture

Illustrator CS2 Bible

Author: Brian Underdahl

If Illustrator CS2 can do it, you can do it too ...

With its array of enhancements, Adobe Illustrator CS2 has made this quintessential artist's tool even more indispensable. This comprehensive guidebook has been updated to help you take advantage of every one. Part 1 introduces each new element and walks you through Illustrator basics. Parts 2 and 3 take you deeper into mastery of Illustrator, while Part 4 tells you all you need to know about outputting your work.

Inside, you'll find complete coverage of Illustrator CS2
* Explore the flexibility and intuitive functionality of the new Live Paint tool
* Convert bitmap images into vector-based artwork with amazing ease and accuracy using Live Trace
* Use the Control palette to easily locate common settings for selected objects
* Work with Photoshop(r) layer comps directly inside Illustrator CS2
* Become more efficient by setting up and saving custom desktop layouts for the way you work
* Browse and select files in all Adobe-supported formats using the Bridge application
* Generate more accurate vector graphics and spot-color separations with spot-color raster and SVG 1.1 support
* Achieve greater control over text handling and the use of paths



Monday, November 30, 2009

Online Encyclopedia or PowerPoint 2003 Just the Steps for Dummies

Online Encyclopedia

Author: DK Publishing

From Dk and Google comes the first encyclopedia with its own website, providing additional photography, streaming video, and a continually updated list of links to supplement the information in the book.

  • Now in paperback!
  • Originally published as e.encyclopedia
  • Produced in association with Google, the world's largest search engine
  • Includes Q&A, charts, maps, links, and full color photos for every entry



Go to: Introducing Routing and Switching in the Enterprise or Java I O

PowerPoint 2003 Just the Steps for Dummies

Author: Barbara Obermeier



• Offers an easy-to-navigate design featuring a two-column landscape layout loaded with step-by-step instructions and illustrations to help readers get up to speed fast on key PowerPoint tasks-and create effective and striking presentations

• Covers creating a new presentation, resizing or moving an object, duplicating a slide, using the outlining toolbar, and adding notes to a slide

• Shows how to print a presentation, set up a slide show, work with pictures and clip art, color text and objects, modify the slide master, create a template, insert a diagram or chart, add sound and video, and much more




Sunday, November 29, 2009

Implementing Soa or GarageBand Tips and Tricks

Implementing SOA: Total Architecture in Practice

Author: Paul C Brown

Putting Service-Oriented Architecture (SOA) into Practice

This book is a must-have for enterprise architects implementing SOA. Through practical examples, it explains the relationship between business requirements, business process design, and service architecture. By tying the SOA implementation directly to business value, it reveals the key to ongoing success and funding. I particularly liked the author’s practical suggestions for organically growing the inventory of services project by project while maintaining the integrity of the overall service architecture. I highly recommend this book.

Maja Tibbling, Lead Enterprise Architect
Con-way, Inc.

While there are other books on architecture and the implementation of ESB, SOA, and related technologies, this new book by Paul Brown uniquely captures the knowledge and experience of the real world. It shows clearly and convincingly how you can transform requirements and vision into solid, repeatable, and value-added architectures. I heartily recommend the book as a 'must read' for any serious practitioner.

Mark Wencek, SVP, Consulting Services & Alliances
Ultimo Software Solutions, Inc.

In his first book, Succeeding with SOA, Paul Brown explained that if enterprise goals are to be met, business processes and information systems must be designed together as parts of a total architecture. In this second book, Implementing SOA, he guides you through the entire process of designing and developing a successful total architecture at both project and enterprise levels. Drawing on his own extensive experience, he provides best practices forcreating services and leveraging them to create robust and flexible SOA solutions.

Coverage includes

  • Evolving the enterprise architecture towards an SOA while continuing to deliver business value on a project-by-project basis
  • Understanding the fundamentals of SOA and distributed systems, the architectural issues that dominate these architectures, and the design patterns available for addressing these issues
  • Understanding the distinct roles of project and enterprise architects and how they collaborate to realize a flexible and robust enterprise SOA architecture
  • Understanding the need for a comprehensive total architecture approach that encompasses business processes, people, systems, data, and infrastructure
  • Understanding different architectural strategies and tradeoffs for implementing robust, secure, high performance, and high availability solutions
  • Understanding how to incorporate business process management (BPM) and business process monitoring into the enterprise architecture

Whether you’re defining an enterprise architecture or delivering individual SOA projects, this book will give you the practical advice you need to get the job done.





Table of Contents:

Pt. I Fundamentals 1

Ch. 1 SOA and the Enterprise 3

Ch. 2 Architecture Fundamentals 11

Ch. 3 Service Fundamentals 37

Ch. 4 Using Services 61

Ch. 5 The SOA Development Process 91

Pt. II The Business Process Perspective 111

Ch. 6 Processes 113

Ch. 7 Initial Project Scoping 123

Ch. 8 The Artifice of Requirements 151

Ch. 9 Business Process Architecture 179

Ch. 10 Milestones 211

Ch. 11 Process Constraints 221

Ch. 12 Related Processes 249

Ch. 13 Modeling the Domain 267

Ch. 14 Enterprise Architecture: Process and Domain Modeling 281

Pt. III The Systems Perspective 291

Ch. 15 Systems Architecture Overview 293

Ch. 16 Top-Level Systems Architecture 305

Pt. IV Communications 329

Ch. 17 Transport 331

Ch. 18 Adapters 353

Ch. 19 Enterprise Architecture: Communications 361

Pt. V Data and Operations 367

Ch. 20 Data Challenges 369

Ch. 21 Messages and Operations 371

Ch. 22 Data Consistency: Maintaining One Version of the Truth 383

Ch. 23 Common Data Models (CDM) 397

Ch. 24 Identifiers (Unique Names) 417

Ch. 25 Results Validation 435

Ch. 26 Enterprise Architecture: Data 441

Pt. VI Coordination 451

Ch. 27 Coordination and Breakdown Detection 453

Ch. 28 Transactions: Coordinating Two or More Activities 471

Ch. 29 Process Monitors and Managers 481

Ch. 30 Detecting and Responding to Breakdowns 489

Ch. 31 Enterprise Architecture: Coordination 507

Pt. VII High Availability, Fault Tolerance, and Load Distribution 513

Ch. 32 High Availability and Fault Tolerance Fundamentals 515

Ch. 33 Stateless and Stateful Failover 525

Ch. 34 Multiple Component Failover 543

Ch. 35 Workload Distribution 553

Ch. 36 EnterpriseArchitecture: Fault Tolerance, High Availability, and Load Distribution 561

Pt. VIII Completing the Architecture 571

Ch. 37 Process Security 573

Ch. 38 Process Monitoring 591

Ch. 39 Architecture Evaluation 599

Ch. 40 Testing 619

Pt. IX Advanced Topics 631

Ch. 41 Representing a Complex Process 633

Ch. 42 Process Management and Workflow 641

Ch. 43 The Enterprise Architecture Group 671

Index 687

Books about: Youll Never Nanny in This Town Again or The Money Book for the Young Fabulous Broke

GarageBand Tips and Tricks

Author: Keith Gemmell

If you've purchased an Apple Mac computer in the last few years you're probably already familiar with GarageBand, Apple's incredibly easy-to-use, virtual recording studio. Perhaps you're new to recording and dipping your toe in the water. Maybe you're already using this powerful software to write and record your own songs. If you're running version 3, you may even be producing your own radio and video podcasts, using the new jingle content. Whatever your skill-level, one things for sure: you're bound to find this book an invaluable working companion.

Okay, the online help and PDF manuals do a fine job of describing how things work but they don't tell you that GarageBand's software instruments are the same powerful synthesisers as those found in Logic Pro, only with simplified controls. Once you discover their true potential, there are some powerful editing features just begging to be used. That's the kind of insider knowledge revealed in this book along with tips on buying hardware for your personal studio, Apple loops, audio and MIDI, effects, production, mixing and mastering.

Some dismiss GarageBand as a toy. But that's just plain silly. Yes it does lack the high-end features of some of the more expensive recording software programs. But rest assured, there are plenty of useful work-arounds and tips and tricks to be had. For those in the know, GarageBand provides all the power tools needed to produce stunning, CD-quality audio projects. Read this book and all will be revealed.



Saturday, November 28, 2009

Murachs ASPNET 20 Web Programming with C 2005 or Oracle Database 10g Performance Tuning Tips and Techniques

Murach's ASP.NET 2.0 Web Programming with C# 2005

Author: Joel Murach

Are you trying to decide which ASP.NET 2.0 book to buy?

As its title implies, this book teaches you how to develop web applications using ASP.NET 2.0. That means it teaches all the features that are new in ASP.NET 2.0, including master pages, database access using both SQL and object data sources, the new code-behind model, site navigation features, authentication using the Web Site Administration tool and login controls, profiles, themes, and web parts.

But that’s just the beginning! Here are just a few of the features that set this book apart from other ASP.NET 2.0 books:

#1: It gives you a 5-chapter section on database programming

This is an area that’s changed dramatically from ASP.NET 1.x. So this section teaches you how to use SQL data sources and the GridView, DetailsView, and FormView controls...all new in ASP.NET 2.0...to develop database applications with little or no C# code. Then, it teaches how to use object data sources, also new in ASP.NET 2.0, to create 3-layer applications that let you separate the presentation code from the data access code in an application.

#2: It teaches you ASP.NET 2.0 development the way it should be done, using Visual Studio 2005

Today, no developer should miss out on the productivity features of Visual Studio 2005 by using limited tools like Notepad. So section 1 in this book teaches you how to use Visual Studio 2005 to design, code, and test multi-page web applications that get database data and manage session state. Then, later chapters cover time-saving VS tools like the Query Builder and the Web Site Administration Tool.

#3: Complete applications show you how all the pieces interact

The key to mastering ASP.NET 2.0 is to have plenty of real-world applications that guide you in using the new features you’re learning...and that help you avoid the problems that you can run into as you build complex web sites. That’s why this book gives you complete applications, including the web forms, the aspx code, and the C# code.

So if you need to learn ASP.NET 2.0, we hope you'll try this book first. We're convinced that it will deliver the training you need in record time.



See also: Before Fidel or From British Peasants to Colonial American Farmers

Oracle Database 10g Performance Tuning Tips and Techniques

Author: Richard J Niemiec

Exclusively from Oracle Press 

The definitive guide to Oracle performance tuning has been fully expanded to cover every aspect of Oracle Database 10g. This comprehensive resource contains everything database administrators and developers need to know to keep Oracle Database 10g performing at its peak. Real-world case studies and in-depth examples illustrate best practices and highlight the latest tuning options.

Richard J. Niemiec is CEO of TUSC, an Oracle Expert-Level consulting firm. He is the former president of the International Oracle Users Group and the president of the Midwest Oracle Users Group.



Table of Contents:

Introduction

Chapter 1. Oracle10g New Features and Tuning Overview

Chapter 2. Basic Index Principles

Chapter 3. Finding Disk I/O Bottlenecks

Chapter 4. Init.ora Parameters and Tuning

Chapter 5. Oracle Enterprise Manager

Chapter 6. Using Explain Plan and Tkprof

Chapter 7. Using Hints for Query Tuning

Chapter 8. Developer/Query Tuning

Chapter 9. Table Joins & other Advanced Tuning

Chapter 10. Using PL/SQL to Enhance Performance

Chapter 11. Tuning RAC & Using Parallel Features

Chapter 12. V$ Views and Tuning

Chapter 13. X$ Tables and Tuning

Chapter 14. Using statspack to tune waits & latches

Chapter 15. Performing a Quick System Review

Chapter 16. Monitoring the system using UNIX utilities

Appendix A: Key init.ora Parameters

Appendix B: V$ Views and Descriptions

Appendix C: X$ Tables and Descriptions

Thursday, November 26, 2009

Agile Development with the ICONIX Process or Geoprocessing in Arcgis

Agile Development with the ICONIX Process: People, Process, and Pragmatism

Author: Doug Rosenberg

...the authors were careful not to throw the (agile) baby out with the (XP) bathwater. The aim was to refactor the process not to destroy it completely.


— Pan Pantziarka, Application Development Advisor

This book describes how to apply ICONIX Process (a minimal, use case-driven modeling process) in an agile software project. It's full of practical advice for avoiding common "agile" pitfalls. Further, the book defines a core agile subset--so those of you who want to "get agile" need not spend years learning to do it. Instead, you can simply read this book and apply the core subset of techniques.

The book follows a real-life .NET/C# project from inception and UML modeling, to working code--through several iterations. You can then go on-line to compare the finished product with the initial set of use cases.

The book also introduces several extensions to the core ICONIX Process, including combining Test-Driven Development (TDD) with up-front design to maximize both approaches (with examples using Java and JUnit). And the book incorporates persona analysis to drive the project's goals and reduce requirements churn.



New interesting textbook: Walnut Cookbook or Cocina Rica y Nutritiva para Hipertensos

Geoprocessing in ArcGIS: ArcGIS 9

Author: ESRI Press

Geoprocessing is the processing of geographic information, one of the most basic functions of a geographic information system (GIS). Within any of the ArcGIS® Desktop products—ArcInfo™, ArcEditor™, and ArcView®—you can perform geoprocessing tasks on your data. Geoprocessing provides a way to create new information by processing existing data. Any alteration or information extraction performed on data involves a geoprocessing task. You can perform such tasks as converting geographic data to various formats, clipping one dataset by another, or intersecting datasets together to create a new dataset. These operations can be leveraged individually via dialog boxes or in sequence by creating models or scripts that consume multiple tools.

You'll learn how to:
Use tools through dialog boxes or at the command line.
Build, execute, and manage models that perform a sequence of geoprocessing tools.
Create and run a script that uses geoprocessing tools.
Use system batch processing scripts for repetitive tasks, such as those that carry out the same tool on multiple inputs, or create your own scripts that execute geoprocessing tools.

Begin by following the quick-start tutorial to get an overview of how to perform geoprocessing tasks with ArcGIS. If you prefer, jump right in and experiment on your own. When you have questions, you’ll find concise, step-by-step answers that are fully illustrated to help you complete a task.



Wednesday, November 25, 2009

Innovative Fabric Imagery for Quilts or Retouching Photos in Photoshop Elements 4

Innovative Fabric Imagery for Quilts: Must-Have Guide to Transforming and Printing Your Favorite Images on Fabric

Author: Cyndy Lyle Rymer

Everyone has a favorite picture of children, pets, houses, dogs, cats, goldfish, whatever! With Innovative Fabric Imagery for Quilts, crafters can turn those photos into stunning quilts that will be cherished for generations to come. Thirteen skill-building projects with step-by-step instructions show exactly how to create these heirlooms, and the getting-started chapter is perfect for beginners. An inspiring gallery of beautiful work from some of today's most innovative quilters gives even more great ideas for capturing old memories and making new ones.

* 13 skill-building projects

* Step-by-step directions and a getting-started chapter

* Inspiring gallery of more than 40 innovative fabric imagery quilts



Book about: Fundamentals of Meal Management or Just Me Cookin in Germany

Retouching Photos in Photoshop Elements 4: Visual QuickProject Guide

Author: Nolan Hester

If you want to get great-looking photos fast but don't want to get bogged down with the details, then you need a Visual QuickProject Guide!

You took some photos and they could use a little finessing. All you want to do is correct an image's lighting, fix a little red eye, or even out the tones in a photograph-without learning the ins and outs of Photoshop Elements. For just $12.99, this compact guide shows you how! Using big, bold full-color pictures and streamlined instructions, it covers just the need-to-know essentials that will have you perfecting your photos in a matter of minutes. You'll learn how to easily fix common problems such as flash-induced red eye, blown-out highlights and murky shadows, inaccurate skin tones, distracting background objects, and more. End-of-chapter tips point out other useful Photoshop Elements retouching tricks. You'll also learn key new features and how to share your newly polished photos with friends and family through email, the Web, via online print labs, and more!

Table of Contents:
1Getting ready1
2Make quick fixes17
3Correct exposures37
4Adjust colors61
5Repair & transform photos81
6Share photos115

Sunday, February 22, 2009

Lawyers Guide to Adobe Acrobat 80 Third Edition or C Programming

Lawyer's Guide to Adobe Acrobat 8.0, Third Edition

Author: David L Masters

"The transition from paper-based information to digital information has begun. The Lawyer's Guide to Adobe Acrobat Third Edition will help lawyers increase productivity, decrease costs, and improve client services by moving from paper-based files to digital records." This updated and revised edition focuses on the ways lawyers can benefit from using Adobe Acrobat 8.0, the most current Adobe software for creating and working with Portable Document Format (PDF) files. The format is so reliable that both the federal courts' Case Management/Electronic Case Files (CM/ECF) program and state courts that use LexisNexis File & Serve have adopted PDF as the standard.



Read also How We Live Our Yoga Pa or How Not to Be My Patient

C++ Programming: Program Design Including Data Structures, Fourth Edition

Author: D S Malik

Now in its fourth edition, C++ Programming: Program Design Including Data Structures remains the definitive text for a course sequence covering CS1 and CS2 topics. Best-selling author D.S. Malik employs a student-focused approach, using complete programming examples to teach fundamental programming concepts. This fourth edition has been enhanced to further demonstrate the use of OOD methodology, to introduce sorting algorithms (bubble sort and insertion sort), and to present additional material on abstract classes. In addition, the exercise sets at the end of each chapter have been expanded to include calculus and engineering-related exercises.



Saturday, February 21, 2009

Exchange Server Cookbook or Introduction to Computing and Programming with Java

Exchange Server Cookbook

Author: Paul Robichaux

Ask network administrators what their most critical computerapplication is, and most will say "email" without a moment'shesitation. If you run a network powered by Windows 2000 orWindows Server 2003, Microsoft Exchange occupies much ofyour time. According to Microsoft, 110 million Exchangeseats have been deployed, but 60% of you are still runningExchange 5.5. That's a problem, because the differencebetween version 5.5 and the more efficient Exchange 2000 andExchange Server 2003 is profound.

Don't fret. Exchange Server Cookbook offers you acomprehensive how-to guide to these newer versions ofExchange. You'll find quick solutions for the most commontasks you need to perform—everything from installation andmaintenance to configuration and optimization, with provenrecipes for the most useful tools and utilities. The bookalso has solutions to some uncommon tasks (that you may notknow are possible) and advanced procedures that aren't partof day-to-day operations. These include tasks for criticalsituations, such as using a recovery storage group.

Our reliable desktop reference even shows you how to writescripts for Exchange management and deployment tasks. That'sright. While not every Exchange job can be scripted, manycan, and we provide lots of working VBScript examples foraccomplishing particular goals. Whatever your particularneed, you'll find it quickly, because chapters in thisCookbook are laid out by recipe, with cross references toother pertinent solutions in the book. With this guide,you'll learn:
The relationship between Exchange and Active Directory
When to use the GUI, the command line, or scripting
How to prepare forests, domains, and servers
How touse Group Policy to control Exchange
Diagnostic logging, measure performance, and administrativeprivileges
Recipient management: user accounts, mailboxes, mail-enabledgroups
Mailbox and public folder database management
Message routing and transport functions
Security, backup, restore, and recovery operations

For every question you have about Exchange 2000 or ExchangeServer 2003, our Cookbook has the answer—one that you canfind and implement without a moment's hesitation.



Table of Contents:
1Getting started1
2Installation and infrastructure11
3Active directory integration49
4Exchange server and organization management75
5Recipient management105
6Mailbox and public folder database management169
7Transport, routing, and SMTP204
8Client connectivity262
9Public folder management317
10Exchange security353
11Backup, restore, and recovery389

Introduction to Computing and Programming with Java: A Multimedia Approach

Author: Mark Guzdial

New computer science students are far more motivated when they are creating programs they care about. Reflecting that insight, this complete first course in Java introduces each new concept in the context of programs that manipulate students’own sounds, pictures, web pages, and video: programs that help them communicate.

 

Mark Guzdial and Barbara Ericson draw on their innovative work at Georgia Tech, work that has significantly improved student success, and earned the recognition of the National Science Foundation. This book presents new techniques only after demonstrating why students need them to solve meaningful problems. Students can then run their digital media programs get immediate feedback that helps them stay on the right track.

 

Open-ended assignments are designed to motivate, promote creativity, and encourage collaboration and friendly competition, using the simple, intuitive, lightweight DrJava development environment. At the same time, students learn to create robust, efficient Java code for any IDE or platform. 

 

Skills include:

  • fundamentals of object development 
  • loops, arrays, and matrices 
  • drawing with Java’s Graphics and Graphics2D classes
  • generating HTML databases and using basic SQL queries 
  • understanding and modifying algorithms 
  • program performance and reliability

 

A dual-platform CD-ROM (for Macintosh® and Windows®) includes raw media materials and programming source code for the book’s exercises andall necessary software, including Sun Microsystems’ Java 2 Platform, Standard Edition and more.



Friday, February 20, 2009

Professional Excel Development or Ajax Security

Professional Excel Development: The Defenitive Guide to Developing Applications Using Microsoft Excel and VBA

Author: Stephen Bullen

Finally, there's a book that treats Excel as the powerful development platform it really is, and covers every facet of developing commercial-quality Excel applications.

This is not a book for beginners. Writing for professional developers and true Excel experts, the authors share insider's knowledge they've acquired building Excel applications for many of the world's largest companies—including Microsoft. Professional Excel Development demonstrates how to get the utmost from Excel, addressing everything from application architectures through worksheet and userform design, charting, debugging, error handling and optimizing performance. Along the way, the authors offer best practices for every type of Excel development, from building add-ins through interacting with XML Web services. Coverage includes

  • Building add-ins to provide new Excel functions

  • Designing effective worksheets, userforms and other user interface elements

  • Leveraging Excel's powerful data analysis features

  • Creating sophisticated custom charts

  • Handling errors, debugging applications and optimizing performance

  • Using class modules and interfaces to create custom objects

  • Understanding Windows API calls: when to use them, and how to modify them

  • Adding worksheet functions with

  • C-based XLLs

  • Programming with databases

  • Controlling external applications from Excel

  • Integrating with Visual Basic 6, VB.NET and Visual Studio Tools for Office

  • Using XML to import and export data and communicate with Web services

  • Providing help, securing, packaging anddistributing

The accompanying CD-ROM contains the book's sample timesheet application at every stage of construction, with detailed code comments. It also includes many examples of the concepts introduced in each chapter and a collection of the authors' Excel development utilities.

Slashdot.org

Gives you the tools to build applications that are much more than automated spreadsheets. Almost any program your imagination can devise can be created using the techniques given, which is a testimony to the power of Excel. Bash Microsoft if you want, but they do sometimes come up with a winner, and Professional Excel Development allows you to take full advantage of its capabilities.



Books about: Citizenship Papers or Spinoza

Ajax Security

Author: Billy Hoffman

The hands-on, practical primer for professionals who want to prevent Ajax-related security vulnerabilities

Ajax has the potential to revolutionize the Internet as we know it, but with this potential comes equally dangerous new security threats. Ajax Security exposes the minefield of security vulnerabilities inherent in the Ajax framework and provides a guide for developers to safely navigate through it and create a secure application.

Each chapter begins with a myth about Ajax security which is then debunked. Throughout the book, you will find case studies of actual exploited Ajax vulnerabilities to illustrate key points. The authors also include specific recommendations for securing Ajax applications for each of the major Web programming languages (.NET, Java, and PHP) as well as for the popular new language, Ruby on Rails.

With this book, you will learn to

  • Become familiar with security issue in the Web 2.0 world
  • Create secure Mashup websites
  • Identify vulnerabilities that may have crept in your code
  • Keep new vulnerabilities out of your code

Geared towards software developers who want to create Ajax Web applications that are secure from attack, Ajax Security will also benefit QA testers and pen-testers who want to find vulnerabilities in the Ajax applications that they test.












Table of Contents:
 Preface xvii

 Preface (The Real One) xvix

Chapter 1 Introduction to Ajax Security 1

 An Ajax Primer 2

  What Is Ajax? 2

  Asynchronous 3

  JavaScript 6

  XML 11

  Dynamic HTML (DHTML) 11

 The Ajax Architecture Shift 11

  Thick-Client Architecture 12

  Thin-Client Architecture 13

  Ajax: The Goldilocks of Architecture 15

  A Security Perspective: Thick-Client Applications 16

  A Security Perspective: Thin-Client Applications 17

  A Security Perspective: Ajax Applications 18

 A Perfect Storm of Vulnerabilities 19

  Increased Complexity, Transparency, and Size 19

  Sociological Issues 22

  Ajax Applications: Attractive and Strategic Targets 23

 Conclusions 24

Chapter 2 The Heist 25

 Eve 25

  Hacking HighTechVacations.net 26

  Hacking the Coupon System 26

  Attacking Client-Side Data Binding 32

  Attacking the Ajax API 36

 A Theft in the Night 42

Chapter 3 Web Attacks 45

 The Basic Attack Categories 45

  Resource Enumeration 46

  Parameter Manipulation 50

 Other Attacks 75

  Cross-Site Request Forgery (CSRF) 75

  Phishing 76

  Denial-of-Service (DoS) 77

 Protecting Web Applications from Resource Enumeration and Parameter

  Manipulation 77

  Secure Sockets Layer 78

 Conclusions 78

Chapter 4  Ajax Attack Surface 81

 Understanding the Attack Surface 81

 Traditional Web Application Attack Surface 83

  Form Inputs 83

  Cookies 84

  Headers 85

  Hidden Form Inputs 86

  Query Parameters 86

  Uploaded Files 89

 Traditional Web Application Attacks: A Report Card 90

 Web Service Attack Surface 92

  Web Service Methods 92

  Web Service Definitions 94

 Ajax Application Attack Surface 94

  The Origin of the Ajax Application Attack Surface 96

  Best of Both Worlds–for the Hacker 98

 Proper Input Validation 98

  The Problem with Blacklisting and Other Specific Fixes 99

  Treating the Symptoms Instead of the Disease 102

  Whitelist Input Validation 105

  Regular Expressions 109

  Additional Thoughts on Input Validation 109

 Validating Rich User Input 111

  Validating Markup Languages 111

  Validating Binary Files 113

  Validating JavaScript Source Code 114

  Validating Serialized Data 120

 The Myth of User-Supplied Content 122

 Conclusion 123

Chapter 5 Ajax Code Complexity 125

 Multiple Languages and Architectures 125

  Array Indexing 126

  String Operations 128

  Code Comments 129

  Someone Else’s Problem 130

 JavaScript Quirks 132

  Interpreted, Not Compiled 132

  Weakly Typed 133

 Asynchronicity 135

  Race Conditions 135

  Deadlocks and the Dining Philosophers Problem 139

  Client-Side Synchronization 144

 Be Careful Whose Advice You Take 144

 Conclusions 145

Chapter 6 Transparency in Ajax Applications 147

 Black Boxes Versus White Boxes 147

  Example: MyLocalWeatherForecast.com 150

  Example: MyLocalWeatherForecast.com “Ajaxified” 152

  Comparison Conclusions 156

 The Web Application as an API 156

  Data Types and Method Signatures 158

 Specific Security Mistakes 158

  Improper Authorization 159

  Overly Granular Server API 161

  Session State Stored in JavaScript 164

  Sensitive Data Revealed to Users 165

  Comments and Documentation Included in Client-Side Code 166

  Data Transformation Performed on the Client 167

 Security through Obscurity 172

  Obfuscation 173

 Conclusions 174

Chapter 7 Hijacking Ajax Applications 175

 Hijacking Ajax Frameworks 176

  Accidental Function Clobbering 176

  Function Clobbering for Fun and Profit 178

 Hijacking On-Demand Ajax 184

 Hijacking JSON APIs 190

  Hijacking Object Literals 195

  Root of JSON Hijacking 195

  Defending Against JSON Hijacking 196

 Conclusions 199

Chapter 8 Attacking Client-Side Storage 201

 Overview of Client-Side Storage Systems 201

  General Client-Side Storage Security 202

 HTTP Cookies 204

  Cookie Access Control Rules 206

  Storage Capacity of HTTP Cookies 211

  Lifetime of Cookies 215

  Additional Cookie Storage Security Notes 216

  Cookie Storage Summary 216

 Flash Local Shared Objects 218

  Flash Local Shared Objects Summary 225

 DOM Storage 226

  Session Storage 227

  Global Storage 229

  The Devilish Details of DOM Storage 231

  DOM Storage Security 233

  DOM Storage Summary 234

 Internet Explorer userData 235

  Security Summary 240

 General Client-Side Storage Attacks and Defenses 240

  Cross-Domain Attacks 241

  Cross-Directory Attacks 242

  Cross-Port Attacks 243

 Conclusions 243

Chapter 9 Offline Ajax Applications 245

 Offline Ajax Applications 245

 Google Gears 247

  Native Security Features and Shortcomings of Google Gears 248

  Exploiting WorkerPool 251

  LocalServer Data Disclosure and Poisoning 253

  Directly Accessing the Google Gears Database 257

  SQL Injection and Google Gears 258

  How Dangerous Is Client-Side SQL Injection? 262

 Dojo.Offline 264

  Keeping the Key Safe 265

  Keeping the Data Safe 266

  Good Passwords Make for Good Keys 267

 Client-Side Input Validation Becomes Relevant 268

 Other Approaches to Offline Applications 270

 Conclusions 270

Chapter 10 Request Origin Issues 273

 Robots, Spiders, Browsers, and Other Creepy Crawlers 273

  “Hello! My Name Is Firefox. I Enjoy Chunked Encoding, PDFs, and

  Long Walks on the Beach.” 275

 Request Origin Uncertainty and JavaScript 276

  Ajax Requests from the Web Server’s Point of View 276

  Yourself, or Someone Like You 280

  Sending HTTP Requests with JavaScript 282

  JavaScript HTTP Attacks in a Pre-Ajax World 284

  Hunting Content with XMLHttpRequest 286

  Combination XSS/XHR Attacks in Action 290

 Defenses 292

 Conclusions 294

Chapter 11 Web Mashups and Aggregators 295

 Machine-Consumable Data on the Internet 296

  Early 90’s: Dawn of the Human Web 296

  Mid 90s: The Birth of the Machine Web 297

  2000s: The Machine Web Matures 298

  Publicly Available Web Services 299

 Mashups: Frankenstein on the Web 301

  ChicagoCrime.org 302

  HousingMaps.com 303

  Other Mashups 304

 Constructing Mashups 304

  Mashups and Ajax 306

 Bridges, Proxies, and Gateways–Oh My! 308

  Ajax Proxy Alternatives 309

 Attacking Ajax Proxies 310

  Et Tu, HousingMaps.com? 312

 Input Validation in Mashups 314

  Aggregate Sites 317

 Degraded Security and Trust 324

 Conclusions 327

Chapter 12 Attacking the Presentation Layer 329

 A Pinch of Presentation Makes the Content Go Down 329

 Attacking the Presentation Layer 333

 Data Mining Cascading Style Sheets 334

 Look and Feel Hacks 337

  Advanced Look and Feel Hacks 341

 Embedded Program Logic 345

 Cascading Style Sheets Vectors 347

  Modifying the Browser Cache 348

 Preventing Presentation Layer Attacks 352

 Conclusion 353

Chapter 13 JavaScript Worms 355

 Overview of JavaScript Worms 355

  Traditional Computer Viruses 356

 JavaScript Worms 359

  JavaScript Worm Construction 361

  JavaScript Limitations 363

  Propagating JavaScript Worms 364

  JavaScript Worm Payloads 364

  Putting It All Together 372

 Case Study: Samy Worm 373

  How It Worked 374

  The Virus’ Payload 377

  Conclusions About the Samy Worm 379

 Case Study: Yamanner Worm (JS/Yamanner-A) 380

  How It Worked 380

  The Virus’ Payload 383

  Conclusions About the Yamanner Worm 384

 Lessons Learned from Real JavaScript Worms 387

 Conclusions 389

Chapter 14 Testing Ajax Applications 391

 Black Magic 391

 Not Everyone Uses a Web Browser to Browse the Web 396

  Catch-22 398

 Security Testing Tools–or Why Real Life Is Not Like Hollywood 399

  Site Cataloging 400

  Vulnerability Detection 401

  Analysis Tool: Sprajax 403

  Analysis Tool: Paros Proxy 406

  Analysis Tool: LAPSE (Lightweight Analysis for Program Security in Eclipse) 408

  Analysis Tool:WebInspect™ 409

 Additional Thoughts on Security Testing 411

Chapter 15 Analysis of Ajax Frameworks 413

 ASP.NET 413

  ASP.NET AJAX (formerly Atlas) 414

  ScriptService 417

  Security Showdown: UpdatePanel Versus ScriptService 419

  ASP.NET AJAX and WSDL 420

  ValidateRequest 424

  ViewStateUserKey 425

  ASP.NET Configuration and Debugging 426

 PHP 427

  Sajax 427

  Sajax and Cross-Site Request Forgery 430

 Java EE 431

  Direct Web Remoting (DWR) 432

 JavaScript Frameworks 434

  A Warning About Client-Side Code 435

  Prototype 435

 Conclusions 437

Appendix A Samy Source Code 439

Appendix B Source Code for Yamanner Worm 447

Index 453

Thursday, February 19, 2009

Javascript or Microsoft Visual C NET Step by Step 2003

Javascript: A Beginner's Guide, Second Edition

Author: John Pollock

Step-by-step instruction teaches beginning JavaScript programmers and Web designers to create windows, display moving text, and generate sound or other multimedia elements with ease. Uses the successful Beginner's Guide teaching system, which countless new users have praised for giving them a solid foundation in technology.



Table of Contents:
Acknowledgments
Introduction
1Introduction to JavaScript1
2Placing JavaScript in an HTML File15
3Using Variables35
4Using Functions65
5JavaScript Operators95
6Conditional Statements and Loops127
7Event Handlers161
8Objects189
9The Documents Object223
10Window Object267
11JavaScript Arrays307
12Math, Number, and Date Objects341
13Handling Strings379
14JavaScript and Forms411
15JavaScript and Frames445
16An Introduction to Advanced Techniques477
AAnswers to Mastery Checks523
Index541

Read also Sew Easy as Pie or Hostess

Microsoft Visual C# .NET Step by Step 2003

Author: John Sharp

Teach yourself Visual C# .NET version 2003--and begin developing Microsoft .NET--connected applications--one step at a time. This practical, hands-on tutorial expertly guides you through the fundamentals--from learning Visual C# syntax to writing and running your first components, Web services, and applications. Work at your own pace through easy-to-follow lessons and hands-on exercises to teach yourself essential techniques. And stay ahead of the curve by working with real-world examples and best practices for Visual C# .NET version 2003 development. Topics include object-oriented techniques, such as inheritance and encapsulation; exception-handling; resource management and the garbage collector; building components; creating GUI components and user controls; manipulating XML documents; Microsoft ADO.NET; Web Forms; Microsoft ASP.NET controls; integration with Microsoft Windows .NET Server 2003; testing; deployment; and more.



Tuesday, February 17, 2009

Gurus Guide to SQL Server Boxed Set or Digital Holography and Three Dimensional Display

Guru's Guide to SQL Server Boxed Set

Author: Ken Henderson

Ken Henderson's three guides to SQL Server have been widely praised by readers and reviewers alike. Now all three of them are available in an attractive, sturdy, specially priced boxed set. The three books included are The Guru's Guide to Transact-SQL, The Guru's Guide to SQL Server Stored Procedures, XML, and HTML, and The Guru's Guide to SQL Server Architecture and Internals. This set is an invaluable reference for SQL Server administrators and developers of all levels.



See also: Mastering CSS with Dreamweaver CS4 or Stephen Johnson on Digital Photography

Digital Holography and Three-Dimensional Display: Principles and Applications

Author: Ting Chung Poon

Digital (or electronic) holography and its application to 3-D display is one of the formidable problems of evolving areas of high technology that has been receiving great attention in recent years. Indeed, the "Holy Grail" for 3-D display is the realization of life-size interactive 3-D displays. Obviously, we are not there yet, but advances in 3-D display allow us to make important steps towards the Holy Grail. The theme of this book is to organize a collection of key chapters that covers digital holography and 3-D display techniques so as to provide the reader with the state-of-the-art developments in these important areas around the world.



Monday, February 16, 2009

Mastering CSS with Dreamweaver CS4 or Stephen Johnson on Digital Photography

Mastering CSS with Dreamweaver CS4

Author: Stephanie Sullivan

Millions of Web designers use Dreamweaver and most of them think creating CSS-based, standards-compliant sites is a challenge. In Mastering CSS with Dreamweaver CS3, authors Stephanie Sullivan and Greg Rewis bridge the gaps between the worlds of CSS design and Dreamweaver by demonstrating how to use Dreamweaver CS3 and CSS together to create individualized, standards-based layouts. Through hands-on projects with lots of visuals, the book enables every user of Dreamweaver to learn CSS effectively and easily.



Interesting textbook: For the Love of Potatoes or Compendium of Nosh

Stephen Johnson on Digital Photography

Author: Stephen Johnson

Something for everyone in this beautiful and definitive guide for digital photography enthusiasts, from cutting edge camera and software techniques to engaging discourse on the history and future of digital photographyProvides an in-depth, visually reinforced introduction to the fundamentals of digital photography. Provides cutting edge techniques for producing and reproducing images of the highest quality, regardless of the equipment you are using, including: composition, colour management, colour editing, printing, restoration, and more.



Sunday, February 15, 2009

Professional Widgets with CSS DOM and AJAX or Mcitp

Professional Widgets with CSS, DOM and AJAX: Google Web Toolkit, Yahoo Konfabulator, Microsoft Web Gadgets, and SilverLight with PopFly

Author: Rajesh Lal

Wrox's Professional Widgets with CSS, DOM and Ajax is the first guide to building web widgets - tiny applications that can be embedded in a web page or on the desktop and have exploded in popularity in recent months. Inside, award-winning programmer Rajesh Lal provides readers with a methodology for building widgets using standards like CSS and DOM to create widgets that work anywhere. Next he guides readers though the creation of widgets using several popular toolkits and frameworks including Yahoo! Widgets, Silverlight with PopFly, Google Web Toolkit, Microsoft Web Gadgets and more Professional Widgets with CSS, DOM and Ajax is heavy on step-by step examples enabling readers to get up to speed and begin building widgets quickly and easily.
Topics include:
* Understanding the architecture, design considerations and implementation of Web Widgets
* Working with Data Providers XML Web Services
* Using Ajax to provide the backbone and medium for widgets
* Presentation with CSS
* Browser compatibility
* Programming with Ajax Libraries and Frameworks
* Security, Yes Security



Read also Robert Rose Book of Classic Pasta or Fabulous Cookies

MCITP: Windows Server 2008 Enterprise Administrator Study Guide (Exam 70-647)

Author: Steven Johnson

This comprehensive book will guide readers through Microsoft's brand new MCITP: Windows Server 2008 Enterprise Administrator exam. Enterprise Administrators are responsible for the overall IT environment and architecture. They translate business goals into technology decisions and plan mid-range to long-term strategies  

The Enterprise Administrator makes key decisions and recommendations on:


  • Network infrastructure
  • Directory Services, Identity management, and Authentication
  • Security policies
  • Business continuity (disaster recovery, personnel/equipment/data)
  • Resource allocation and Budgeting
  • Design of IT administrative structure (delegation models)
  • Best practices, standards, and SLAs



This study guide will be complete with 100overage of the exam objectives, real world scenarios, hands-on exercises, and challenging review questions, both in the book and on the CD.

In addition, there will be a complete instructor support package made available to training centers and schools who will use this book in their classroom.



Thursday, February 12, 2009

The Savvy Way to Successful Website Promotion or How to Do Everything with PhotoShop 7

The Savvy Way to Successful Website Promotion: Secrets of Successful Websites: Attracting on-Line Traffic: The Most up to Date Guide to Top Positioning on Search Engines

Author: Derek Galon

Secrets of successful Websites
Attracting on-line traffic
Guide to top positioning on search engines

This comprehensive guide to do-it-yourself Web promotion and successful on-line business, can be your most valuable assistant on the difficult way to real Web success on a small budget.

This is a book on Web promotion, not on A-B-C of Website building. It is intended both for people who already have a Website and who, by introducing certain special adjustments to it, will be able to ensure it reaches a wider public, as well as for those just about to build their Website: it will tell them what elements to build into it so that it will ultimately generate top promotion.

Below, I present you a short excerpt from THE SAVVY WAY TO SUCCESSFUL WEBSITE PROMOTION. It can give you better idea what to expect inside. However - real secrets, most valuable tips and working methods you can find in the book itself. By adopting them, you would gain serious advantage over average webmasters, and push your site well ahead of your competitors.

Thank you for your interest!



Interesting book: Tabla de calor as or Handbook of Psychiatry in Palliative Medicine

How to Do Everything with PhotoShop 7

Author: Laurie McCanna

Harness the power of Photoshop to create beautiful looking images effortlessly. Tackle common problems and technical issues, edit and enhance existing artwork -- plus experiment with new ideas and methods to create entirely new visual scenes and schemas. Familiarize yourself with the Photoshop interface and tool palette, then follow along as author Laurie McCanna expertly guides you, in friendly, easy-to-understand language, through all the major functions of this amazing graphics application. Includes helpful advice on keyboard shortcuts, Photoshop Actions, and the history palette. How to Do Everything with Photoshop 7 will help you discover new worlds of artistic splendor and Web-ready visual wizardry.

Library Journal

It seems to be the year for launching new versions of old standards. Photoshop 7 introduces a number of new features that should drive demand for manuals. Everything addresses Photoshop beginners, with two chapters on resources and solving common problems that should be especially helpful; appropriate for public libraries. Teach Yourself, for beginning to intermediate users, is more thorough, covering the channels, masks, and other techniques that Everything omits, in addition to the basics. Chapter Q&As, quizzes, and exercises help users learn on their own; a valuable purchase for all public libraries. A full-color guide for intermediate users, Down & Dirty explains step by step "cool tricks," showing how to achieve easily impressive special effects, from wrapping type around a circle to creating backlit photo backgrounds. Sidebar tips offer additional information, and images in the book are available for free online. Magic also instructs intermediate to advanced users on creating cool, full-color effects but contains longer projects that each combine several techniques. The CD includes project files and demonstration software. Larger public libraries should consider either title. Copyright 2002 Cahners Business Information.



Wednesday, February 11, 2009

AutoCAD 2009 or How to do Everything with Your Digital Video Camera

AutoCAD 2009: One Step at a Time

Author: Timothy Sean Sykes

AutoCAD 2009 innovations include the introduction of the task-based ribbon which will soon dominate the computer software industry, a new menu browser, Quick tools (Properties, Drawings, Views), and the phenomenal View Cube and Steering Wheels which will make 3-dimensional creation as easy as 2D! The AutoCAD: One Step at a Time series is going into its 8th Edition with its 2009 books, and it continues to deliver the easiest, hands-on, step-by-step instructions available in CAD textbooks worldwide. And it's the only text that makes the author available to its readers via the internet!



Interesting textbook: Evita or Bridging the Divide

How to do Everything with Your Digital Video Camera

Author: Dave Johnson

Wow! This great guide is packed with juicy tidbits on cameras and video techniques. Get updates on new camera models, new software, new imaging technology, and new buying recommendations. Learn tips and techniques for taking great pictures whether you’re a beginner or a pro. Includes new projects, special effects and techniques for editing and using digital photos.

Chad Fahs is the co-author of MacWorld DVD Studio Pro Bible and a contributor of several chapters for Flash for TV and Video. In 1998 he began Avid Editing Studio in Chicago, working with established artists and producers to create exciting video and interactive forms of art and entertainment. Chad has also worked as a producer at one of the top Internet sites, training and working with clients from companies in the U.S., Japan, and the U.K. Currently, Chad writes, directs and produces for a variety of projects, including an Apple certified training course, an e-learning project for Adobe, instructional material for Ulead, and video projects for a band on Geffen/Interscope.



Table of Contents:
Ch. 1Getting started in digital video3
Ch. 2Preparing your PC or Macintosh for digital video23
Ch. 3Using your camcorder43
Ch. 4Getting video into your computer75
Ch. 5Editing your masterpiece on a PC99
Ch. 6Editing on a Mac131
Ch. 7Creating slideshows169
Ch. 8Working with sound207
Ch. 9Sound on the Mac243
Ch. 10Titling your movie267
Ch. 11Making DVD titles on a PC291
Ch. 12Sharing your PC-based movies313
Ch. 13Making tapes and DVDs with your Mac335
Ch. 14Sharing QuickTime movies353
App. ADigital video glossary375
App. BVideography quick tips381

Monday, February 9, 2009

Virtual Vintage or Statistical Computing with R

Virtual Vintage: The Insider's Guide to Buying and Selling Fashion Online

Author: Linda Lindroth

Vintage clothing has never been more chic, with everyone from celebrity trendsetters to style-conscious professionals searching for wearable treasures from the past. Virtual Vintage is the first and only guide that helps both the novice and the fashion connoisseur evaluate and confidently participate in the thriving vintage marketplace that exists online. No other book explains how to get it, sell it, fix it, or wear it with flair. Authors Linda Lindroth and Deborah Newell Tornello equip readers from head to toe with
• more than 100 chic sites—rated and evaluated
• instructions on contacting sellers
• smart strategies for bidding in online auctions
• advice about evaluating the size, quality, and colors of a garment
• tips for cleaning and repairing vintage items
Whether you’re looking for a 1960s Rudi Gernreich knit, Gucci hipster trousers, a Claire McCardell for Townley shirtwaist, or a Chanel suit in pink wool with black patent-leather trim, Virtual Vintage will help you build a unique and sensational wardrobe.



Read also Sistemas de InformaciĆ³n de Empresa:un Acercamiento basado en el Modelo

Statistical Computing with R

Author: Maria L Rizzo

Focusing on implementation rather than theory, Statistical Computing with R serves as a valuable tutorial, providing examples that illustrate programming concepts in the context of practical computational problems. This book presents an overview of computational statistics with an introduction to the R computing environment. Reviewing basic concepts in probability and classical statistical inference, the text demonstrates every algorithm through fully implemented examples coded in R. Chapters cover topics such as Monte Carlo methods, clustering, bootstrap, nonparametric regression, density estimation, and goodness-of-fit. Many exercises are included for the students while a solutions manual is included for the instructor.



Table of Contents:

Preface xv

1 Introduction 1

1.1 Computational Statistics and Statistical Computing 1

1.2 The R Environment 3

1.3 Getting Started with R 4

1.4 Using the R Online Help System 7

1.5 Functions 8

1.6 Arrays, Data Frames, and Lists 9

1.7 Workspace and Files 15

1.8 Using Scripts 17

1.9 Using Packages 18

1.10 Graphics 19

2 Probability and Statistics Review 21

2.1 Random Variables and Probability 21

2.2 Some Discrete Distributions 25

2.3 Some Continuous Distributions 29

2.4 Multivariate Normal Distribution 33

2.5 Limit Theorems 35

2.6 Statistics 35

2.7 Bayes' Theorem and Bayesian Statistics 40

2.8 Markov Chains 42

3 Methods for Generating Random Variables 47

3.1 Introduction 47

3.2 The Inverse Transform Method 49

3.3 The Acceptance-Rejection Method 55

3.4 Transformation Methods 58

3.5 Sums and Mixtures 61

3.6 Multivariate Distributions 69

3.7 Stochastic Processes 82

Exercises 94

4 Visualization of Multivariate Data 97

4.1 Introduction 97

4.2 Panel Displays 97

4.3 Surface Plots and 3D Scatter Plots 100

4.4 Contour Plots 106

4.5 Other 2D Representations of Data 110

4.6 Other Approaches to Data Visualization 115

Exercises 116

5 Monte Carlo Integration and Variance Reduction 119

5.1 Introduction 119

5.2 Monte Carlo Integration 119

5.3 Variance Reduction 126

5.4 Antithetic Variables 128

5.5 Control Variates 132

5.6 Importance Sampling 139

5.7 Stratified Sampling 144

5.8 Stratified Importance Sampling 147

Exercises 149

R Code 152

6 Monte Carlo Methods in Inference 153

6.1 Introduction 153

6.2 Monte Carlo Methods for Estimation 154

6.3 Monte Carlo Methods for Hypothesis Tests 162

6.4 Application174

Exercises 180

7 Bootstrap and Jackknife 183

7.1 The Bootstrap 183

7.2 The Jackknife 190

7.3 Jackknife-after-Bootstrap 195

7.4 Bootstrap Confidence Intervals 197

7.5 Better Bootstrap Confidence Intervals 203

7.6 Application 207

Exercises 212

8 Permutation Tests 215

8.1 Introduction 215

8.2 Tests for Equal Distributions 219

8.3 Multivariate Tests for Equal Distributions 222

8.4 Application 235

Exercises 242

9 Markov Chain Monte Carlo Methods 245

9.1 Introduction 245

9.2 The Metropolis-Hastings Algorithm 247

9.3 The Gibbs Sampler 263

9.4 Monitoring Convergence 266

9.5 Application 271

Exercises 277

R Code 279

10 Probability Density Estimation 281

10.1 Univariate Density Estimation 281

10.2 Kernel Density Estimation 296

10.3 Bivariate and Multivariate Density Estimation 305

10.4 Other Methods of Density Estimation 314

Exercises 314

R Code 317

11 Numerical Methods in R 319

11.1 Introduction 319

11.2 Root-finding in One Dimension 326

11.3 Numerical Integration 330

11.4 Maximum Likelihood Problems 335

11.5 One-dimensional Optimization 338

11.6 Two-dimensional Optimization 342

11.7 The EM Algorithm 345

11.8 Linear Programming - The Simplex Method 348

11.9 Application 349

Exercises 353

A Notation 355

B Working with Data Frames and Arrays 357

B.1 Resampling and Data Partitioning 357

B.2 Subsetting and Reshaping Data 360

B.3 Data Entry and Data Analysis 364

References 375

Index 395

Sunday, February 8, 2009

Spies among Us or Invisible Engines

Spies among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day

Author: Ira Winkler

Ira Winkler has been dubbed "A Modern Day James Bond" by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the riveting, true stories and case studies of how he did it-and how people and companies can avoid falling victim to the spies among us.

American corporations now lose as much as $300 billion a year to hacking, cracking, physical security breaches, and other criminal activity. Millions of people a year have their identities stolen or fall victim to other scams. In Spies Among Us, Ira Winkler reveals his security secrets, disclosing how companies and individuals can protect themselves from even the most diabolical criminals. He goes into the mindset of everyone from small-time hackers to foreign intelligence agencies to disclose cost-effective countermeasures for all types of attacks.

In Spies Among Us, readers learn:
* Why James Bond and Sydney Bristow are terrible spies
* How a team was able to infiltrate an airport in a post-9/11 world and plant a bomb
* How Ira and his team were able to steal nuclear reactor designs in three hours
* The real risks that individuals face from the spies that they unknowingly meet on a daily basis
* Recommendations for how companies and individuals can secure themselves against the spies, criminals, and terrorists who regularly cross their path

Publishers Weekly

Those who are already paranoid about information theft, both personal and professional, should take a muscle relaxant before reading this eye-opening survey of the many holes that exist in our security and intelligence systems. Author Winkler (Corporate Espionage) began his career at the National Security Agency, and his exploits in the private sector, testing security systems by breaking into banks and high-profile companies, have earned him a place in the Information Systems Security Association Hall of Fame. Winkler s background not only lends his book an authoritative voice, but embellishes his nuts-and-bolts material with rich references to intriguing cases in which he s been involved. The book kicks off provocatively, explaining why James Bond and Sydney Bristow from the TV show Alias suck as spies and detailing what spies at various levels actually do. He then goes on to explain how spies and/or their friends (i.e., hackers, identity thieves, spammers, etc.) can get at an organization. Although the book will interest security professionals more than consumers, there s some choice bits here for readers captivated by cloak-and-dagger endeavors. Winkler s chapter on How to Be a Spy shines as a concise tutorial on how genuine spooks operate, and his case studies, which make up the middle of the book, fascinate as examples of how easy it can be to compromise the security systems of high visibility companies even post 9/11. Overall, this is a thorough, at times absorbing, cautionary tale for any company or person who subscribes to the Boy Scout motto: Be prepared. (Apr.) Copyright 2005 Reed Business Information.



Table of Contents:
Pt. IEspionage concepts1
1How to be a spy3
2Why you can never be secure30
3Death by 1,000 cuts40
4Spies and their friends52
5How the spies really get you106
Pt. IICase studies153
6Spy vs. spy155
7Nuclear meltdown171
8Fill 'er up!180
9The entrepreneur189
10The criminal face of the Internet age200
11Crimes against individuals214
Pt. IIIStopping the spies229
12Taking control231
13Taking action294

New interesting book: Blood and Marrow Transplantation or Understanding Dietary Supplements

Invisible Engines: How Software Platforms Drive Innovation and Transform Industries

Author: David S Evans

Winner of the Business, Management & Accounting category in the 2006 Professional/Scholarly Publishing Annual Awards Competition presented by the Association of American Publishers, Inc.

Software platforms are the invisible engines that have created, touched, or transformed nearly every major industry for the past quarter century. They power everything from mobile phones and automobile navigation systems to search engines and web portals. They have been the source of enormous value to consumers and helped some entrepreneurs build great fortunes. And they are likely to drive change that will dwarf the business and technology revolution we have seen to this point. Invisible Engines examines the business dynamics and strategies used by firms that recognize the transformative power unleashed by this new revolution--a revolution that will change both new and old industries.

The authors argue that in order to understand the successes of software platforms, we must first understand their role as a technological meeting ground where application developers and end users converge. Apple, Microsoft, and Google, for example, charge developers little or nothing for using their platforms and make most of their money from end users; Sony PlayStation and other game consoles, by contrast, subsidize users and make more money from developers, who pay royalties for access to the code they need to write games. More applications attract more users, and more users attract more applications. And more applications and more users lead to more profits.

Invisible Engines explores this story through the lens of the companies that have mastered this platform-balancingact. It offers detailed studies of the personal computer, video game console, personal digital assistant, smart mobile phone, and digital media software platform industries, focusing on the business decisions made by industry players to drive profits and stay a step ahead of the competition. Shorter discussions of Internet-based software platforms provide an important glimpse into a future in which the way we buy, pay, watch, listen, learn, and communicate will change forever. An electronic version of this book is available under a Creative Commons license.

What People Are Saying


"As the power behind every kind of digital device, software platforms truly are the invisible engines of the information age. In their absorbing and comprehensive account of the evolution and economics of platform technologies, Evans, Hagiu, and Schmalensee essentially map out the still-evolving history of the third industrial revolution."
--Craig Mundie, Chief Technical Officer, Microsoft

"Most high-tech markets today revolve around software and are 'two-sided'--they require end-users as well as producers of complementary products such as software applications or digital content to support one platform over another. Invisible Engines is by far the broadest study of this subject to date. The authors probe expertly into the economics and technology underlying these markets as well as what business models and pricing strategies seem most likely to work. A very impressive book."
--Michael A. Cusumano, author of The Business of Software and coauthor of Platform Leadership

" Invisible Engines describes the economics of operating systems, those fiendishly complex pieces of software that provide the nervous system for computers, cell phones, game consoles, and a host of other devices. It is a must-read for anyone who wants to understand the economic forces that drive high-tech industries."
--Hal Varian, Haas School of Business and Department of Economics, University of California, Berkeley

"Invisible Engines is a highly sophisticated yet readable exploration of how companies do, can, and should deliver great value through software platforms. By combining economics and management, the authors deliver deep insights into the multifaceted world of software." --David B. Yoffie, Max and Doris Starr Professor of International Business Administration, Harvard Business School

"Google, eBay, mobile phones, and the Xbox have a lot more in common that you might suspect. Invisible Engines builds on recent thinking about two-sided platforms, including the authors' substantial contributions to it. Evans, Hagiu and Schmalensee beautifully blend economics, history, and business analysis to shed light on how businesses and policy makers should design their strategies. This exciting book will be a key resource for practitioners and academics interested in knowing how software platforms work and where information technologies are heading."
--Jean Tirole, Institut d'Economie Industrielle, University of Toulouse




Saturday, February 7, 2009

Digital Filmmaking or iPod Fully Loaded

Digital Filmmaking

Author: Mike Figgis

Now there is no reason to prevent anybody from making a film. The technology exists, the equipment is much cheaper than it was, the post-production facilities are on a laptop computer, the entire equipment to make a film can go in a couple of cases and be carried as hand luggage on a plane. —Mike Figgis

In this indispensable guide, Academy Award nominee Mike Figgis offers the reader a step-by-step tutorial in how to use digital filmmaking technology so as to get the very best from it. He outlines the equipment and its uses, and provides an authoritative guide to the shooting process—from working with actors to lighting, framing, and camera movement. He dispenses further wisdom on the editing process and the use of sound and music, all while establishing a sound aesthetic basis for the digital format.

Offering everything that you could wish to know on the subject, this is a handbook that will become an essential backpocket eference for the digital film enthusiast—whether your goal is to make no-budget movies or simply to put your video camera to more use than just holidays and weddings.



New interesting textbook: ActionScript 30 Game Programming University or Real World Camera Raw with Adobe PhotoShop CS3

iPod Fully Loaded: If You've Got It, You Can iPod It

Author: Andy Ihnatko

Let Mac guru Andy Ihnatko shows you how to put everything but the kitchen sink on your iPod -- from old LPs, radio programs, television shows, and movies to spreadsheets, presentations, and PC rescue files. You'll quickly discover that music is only a small part of the picture as you learn how to record TV shows for an iPod, record radio broadcasts and automatically convert them into podcasts, convert Web pages into formats that can be read or listened to on an iPod, and even translate Microsoft Word, Excel, or PowerPoint documents for the iPod screen. Whether you're a PC or a Mac user, or have a past, present, or even future iPod, Inhantko's advice works perfectly.



Friday, February 6, 2009

Database Design and Development or Cyber threats Information Warfare and Critical Infrastructure Protection

Database Design and Development: A Visual Approach

Author: Raymond Frost

For students in the introductory course in database who want to learn how to design rather than just manipulate relational databases.The book that balances database theory, business problem solving, and hands-on-practice.  This book prepares student for the workplace without sacrificing rigorous academic theory. 



Book review: Kostenmanagement: Eine Strategische Betonung

Cyber-threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland

Author: Anthony H H Cordesman

Information warfare is upon us. In the last two decades, the U.S. economy's infrastructure has undergone a fundamental set of changes, relying increasingly on its service sector and high technology economy. The U.S. depends on computers, electronic data storage and transfers, and highly integrated communications networks. Its rapidly developing new form of critical infrastructure is exceedingly vulnerable to an emerging host of threats. This detailed volume examines the dangers of, and the evolving U.S. policy response to, cyberterrorism.



Table of Contents:
Acknowledgmentsix
Chapter 1The Changing Nature of Critical Infrastructure Protection1
The Problem of Evolving Technology2
The Uncertain Balance of Risks and Non-risks in Cyber-attacks2
The Disconnect between Cyber-defense and Cyber-offense3
The Lack of Credible Risk and Vulnerability Assessments4
Governmental and Private Sector Efforts to Respond5
Chapter 2Threat Assessment11
The President's Commission on Critical Infrastructure Protection Characterization of the Threat13
The National Infrastructure Protection Center's (NIPC) View of the Threat14
Intelligence Community Assessments of the Threat23
CIA Testimony on the Threat23
National Intelligence Council's Estimate of the Threat30
Incidents of "Cyber-warfare": The Kosovo Crisis34
Serbia's Role in Information Warfare36
NATO's Role in Information Warfare37
Is Information Warfare and Retaliation Legal and Worth Its Costs?38
Lower-Level Incidents of "Cyber-warfare"39
Moonlight Maze39
Solar Sunrise40
Rome Labs Incident41
The Computer Security Institute's Survey of the Threat43
Computer Emergency Response Team's (CERT) Assessment of Threat47
Challenges in Improving the Assessment of the Threat49
Chapter 3Evolving U.S. Policy and Response53
The Beginnings: The Computer Security Act and Clinger-Cohen Act54
The Federal Government Redefines Critical Infrastructure and Agency Responsibilities55
Executive Order 1301056
The President's Commission on Critical Infrastructure Protection57
Presidential Decision Directive-63 (PDD-63)59
Lead Agencies for Sector Liaison61
Lead Agencies for Special Functions62
A New Structure for Interagency Coordination63
National Infrastructure Protection Center (NIPC)64
Information Sharing and Analysis Center (ISAC)65
National Infrastructure Assurance Council66
National Infrastructure Assurance Plan67
Studies and Research68
Cooperation with the Private and Civil Sectors69
Annual Report on Implementation70
National Plan for Information Systems Protection71
National Plan for Information Systems Protection, Version One71
GAO Comments on the National Plan for Information Systems Protection73
Oplan 360082
The Success of the Federal Government Effort to Date82
Chapter 4Analyzing Federal Critical Infrastructure Programs by Department and Agency85
The National Plan for Information Systems Estimate85
The OMB Analysis88
Annual Report to Congress on Combating Terrorism89
Government-wide Spending on CIP91
Efforts by Federal Agencies92
Department of Agriculture94
Department of Commerce96
Critical Infrastructure Assurance Office106
Department of Energy106
Environmental Protection Agency and GAO Audits107
Health and Human Services107
Department of Interior108
Department of Justice108
NASA108
GAO Assessments of NASA Information Security108
National Science Foundation110
National Security Community111
The Role of the Department of Defense112
Patterns of Attack and Response114
Major DoD Cyber-defense Programs116
GAO Critiques of DoD Efforts: The 1996 Study120
The GAO's 1999 Recommendations122
DoD Progress in Addressing Security Weakness127
Cyber and Information Warfare and the Role of the Intelligence Community128
Total Spending on National Security Activity131
Department of State131
Department of Transportation131
Department of Treasury132
Department of Veterans Affairs132
Chapter 5Assessments of Effectiveness133
Independent U.S. Government Efforts to Assess Risk, Cost, and Benefits: GAO Testimony of October 6, 1999133
Management Recommendations Within Brock's Testimony136
Independent U.S. Government Efforts to Assess Risk, Cost, and Benefits: GAO Testimony of March 29, 2000141
Weaknesses in Controls141
Raise Awareness143
Implement Software Patches144
Routinely Use Automated Tools to Monitor Security144
Identify and Propagate Pockets of Excellence145
Focus on the Most Common Vulnerabilities First145
Enforce a Strong Management Approach145
Preliminary Analysis of GAO Findings146
Other Efforts to Assess Risk, Cost, and Benefits147
Technical Risks, Test, and Evaluations of IW Programs149
Chapter 6Role of State and Local Governments151
Chapter 7Role of Private Industry153
Chapter 8Lessons from Other Nations: International Vulnerability157
Chapter 9Conclusions and Recommendations167
Notes181