Sunday, February 22, 2009

Lawyers Guide to Adobe Acrobat 80 Third Edition or C Programming

Lawyer's Guide to Adobe Acrobat 8.0, Third Edition

Author: David L Masters

"The transition from paper-based information to digital information has begun. The Lawyer's Guide to Adobe Acrobat Third Edition will help lawyers increase productivity, decrease costs, and improve client services by moving from paper-based files to digital records." This updated and revised edition focuses on the ways lawyers can benefit from using Adobe Acrobat 8.0, the most current Adobe software for creating and working with Portable Document Format (PDF) files. The format is so reliable that both the federal courts' Case Management/Electronic Case Files (CM/ECF) program and state courts that use LexisNexis File & Serve have adopted PDF as the standard.



Read also How We Live Our Yoga Pa or How Not to Be My Patient

C++ Programming: Program Design Including Data Structures, Fourth Edition

Author: D S Malik

Now in its fourth edition, C++ Programming: Program Design Including Data Structures remains the definitive text for a course sequence covering CS1 and CS2 topics. Best-selling author D.S. Malik employs a student-focused approach, using complete programming examples to teach fundamental programming concepts. This fourth edition has been enhanced to further demonstrate the use of OOD methodology, to introduce sorting algorithms (bubble sort and insertion sort), and to present additional material on abstract classes. In addition, the exercise sets at the end of each chapter have been expanded to include calculus and engineering-related exercises.



Saturday, February 21, 2009

Exchange Server Cookbook or Introduction to Computing and Programming with Java

Exchange Server Cookbook

Author: Paul Robichaux

Ask network administrators what their most critical computerapplication is, and most will say "email" without a moment'shesitation. If you run a network powered by Windows 2000 orWindows Server 2003, Microsoft Exchange occupies much ofyour time. According to Microsoft, 110 million Exchangeseats have been deployed, but 60% of you are still runningExchange 5.5. That's a problem, because the differencebetween version 5.5 and the more efficient Exchange 2000 andExchange Server 2003 is profound.

Don't fret. Exchange Server Cookbook offers you acomprehensive how-to guide to these newer versions ofExchange. You'll find quick solutions for the most commontasks you need to perform—everything from installation andmaintenance to configuration and optimization, with provenrecipes for the most useful tools and utilities. The bookalso has solutions to some uncommon tasks (that you may notknow are possible) and advanced procedures that aren't partof day-to-day operations. These include tasks for criticalsituations, such as using a recovery storage group.

Our reliable desktop reference even shows you how to writescripts for Exchange management and deployment tasks. That'sright. While not every Exchange job can be scripted, manycan, and we provide lots of working VBScript examples foraccomplishing particular goals. Whatever your particularneed, you'll find it quickly, because chapters in thisCookbook are laid out by recipe, with cross references toother pertinent solutions in the book. With this guide,you'll learn:
The relationship between Exchange and Active Directory
When to use the GUI, the command line, or scripting
How to prepare forests, domains, and servers
How touse Group Policy to control Exchange
Diagnostic logging, measure performance, and administrativeprivileges
Recipient management: user accounts, mailboxes, mail-enabledgroups
Mailbox and public folder database management
Message routing and transport functions
Security, backup, restore, and recovery operations

For every question you have about Exchange 2000 or ExchangeServer 2003, our Cookbook has the answer—one that you canfind and implement without a moment's hesitation.



Table of Contents:
1Getting started1
2Installation and infrastructure11
3Active directory integration49
4Exchange server and organization management75
5Recipient management105
6Mailbox and public folder database management169
7Transport, routing, and SMTP204
8Client connectivity262
9Public folder management317
10Exchange security353
11Backup, restore, and recovery389

Introduction to Computing and Programming with Java: A Multimedia Approach

Author: Mark Guzdial

New computer science students are far more motivated when they are creating programs they care about. Reflecting that insight, this complete first course in Java introduces each new concept in the context of programs that manipulate students’own sounds, pictures, web pages, and video: programs that help them communicate.

 

Mark Guzdial and Barbara Ericson draw on their innovative work at Georgia Tech, work that has significantly improved student success, and earned the recognition of the National Science Foundation. This book presents new techniques only after demonstrating why students need them to solve meaningful problems. Students can then run their digital media programs get immediate feedback that helps them stay on the right track.

 

Open-ended assignments are designed to motivate, promote creativity, and encourage collaboration and friendly competition, using the simple, intuitive, lightweight DrJava development environment. At the same time, students learn to create robust, efficient Java code for any IDE or platform. 

 

Skills include:

  • fundamentals of object development 
  • loops, arrays, and matrices 
  • drawing with Java’s Graphics and Graphics2D classes
  • generating HTML databases and using basic SQL queries 
  • understanding and modifying algorithms 
  • program performance and reliability

 

A dual-platform CD-ROM (for Macintosh® and Windows®) includes raw media materials and programming source code for the book’s exercises andall necessary software, including Sun Microsystems’ Java 2 Platform, Standard Edition and more.



Friday, February 20, 2009

Professional Excel Development or Ajax Security

Professional Excel Development: The Defenitive Guide to Developing Applications Using Microsoft Excel and VBA

Author: Stephen Bullen

Finally, there's a book that treats Excel as the powerful development platform it really is, and covers every facet of developing commercial-quality Excel applications.

This is not a book for beginners. Writing for professional developers and true Excel experts, the authors share insider's knowledge they've acquired building Excel applications for many of the world's largest companies—including Microsoft. Professional Excel Development demonstrates how to get the utmost from Excel, addressing everything from application architectures through worksheet and userform design, charting, debugging, error handling and optimizing performance. Along the way, the authors offer best practices for every type of Excel development, from building add-ins through interacting with XML Web services. Coverage includes

  • Building add-ins to provide new Excel functions

  • Designing effective worksheets, userforms and other user interface elements

  • Leveraging Excel's powerful data analysis features

  • Creating sophisticated custom charts

  • Handling errors, debugging applications and optimizing performance

  • Using class modules and interfaces to create custom objects

  • Understanding Windows API calls: when to use them, and how to modify them

  • Adding worksheet functions with

  • C-based XLLs

  • Programming with databases

  • Controlling external applications from Excel

  • Integrating with Visual Basic 6, VB.NET and Visual Studio Tools for Office

  • Using XML to import and export data and communicate with Web services

  • Providing help, securing, packaging anddistributing

The accompanying CD-ROM contains the book's sample timesheet application at every stage of construction, with detailed code comments. It also includes many examples of the concepts introduced in each chapter and a collection of the authors' Excel development utilities.

Slashdot.org

Gives you the tools to build applications that are much more than automated spreadsheets. Almost any program your imagination can devise can be created using the techniques given, which is a testimony to the power of Excel. Bash Microsoft if you want, but they do sometimes come up with a winner, and Professional Excel Development allows you to take full advantage of its capabilities.



Books about: Citizenship Papers or Spinoza

Ajax Security

Author: Billy Hoffman

The hands-on, practical primer for professionals who want to prevent Ajax-related security vulnerabilities

Ajax has the potential to revolutionize the Internet as we know it, but with this potential comes equally dangerous new security threats. Ajax Security exposes the minefield of security vulnerabilities inherent in the Ajax framework and provides a guide for developers to safely navigate through it and create a secure application.

Each chapter begins with a myth about Ajax security which is then debunked. Throughout the book, you will find case studies of actual exploited Ajax vulnerabilities to illustrate key points. The authors also include specific recommendations for securing Ajax applications for each of the major Web programming languages (.NET, Java, and PHP) as well as for the popular new language, Ruby on Rails.

With this book, you will learn to

  • Become familiar with security issue in the Web 2.0 world
  • Create secure Mashup websites
  • Identify vulnerabilities that may have crept in your code
  • Keep new vulnerabilities out of your code

Geared towards software developers who want to create Ajax Web applications that are secure from attack, Ajax Security will also benefit QA testers and pen-testers who want to find vulnerabilities in the Ajax applications that they test.












Table of Contents:
 Preface xvii

 Preface (The Real One) xvix

Chapter 1 Introduction to Ajax Security 1

 An Ajax Primer 2

  What Is Ajax? 2

  Asynchronous 3

  JavaScript 6

  XML 11

  Dynamic HTML (DHTML) 11

 The Ajax Architecture Shift 11

  Thick-Client Architecture 12

  Thin-Client Architecture 13

  Ajax: The Goldilocks of Architecture 15

  A Security Perspective: Thick-Client Applications 16

  A Security Perspective: Thin-Client Applications 17

  A Security Perspective: Ajax Applications 18

 A Perfect Storm of Vulnerabilities 19

  Increased Complexity, Transparency, and Size 19

  Sociological Issues 22

  Ajax Applications: Attractive and Strategic Targets 23

 Conclusions 24

Chapter 2 The Heist 25

 Eve 25

  Hacking HighTechVacations.net 26

  Hacking the Coupon System 26

  Attacking Client-Side Data Binding 32

  Attacking the Ajax API 36

 A Theft in the Night 42

Chapter 3 Web Attacks 45

 The Basic Attack Categories 45

  Resource Enumeration 46

  Parameter Manipulation 50

 Other Attacks 75

  Cross-Site Request Forgery (CSRF) 75

  Phishing 76

  Denial-of-Service (DoS) 77

 Protecting Web Applications from Resource Enumeration and Parameter

  Manipulation 77

  Secure Sockets Layer 78

 Conclusions 78

Chapter 4  Ajax Attack Surface 81

 Understanding the Attack Surface 81

 Traditional Web Application Attack Surface 83

  Form Inputs 83

  Cookies 84

  Headers 85

  Hidden Form Inputs 86

  Query Parameters 86

  Uploaded Files 89

 Traditional Web Application Attacks: A Report Card 90

 Web Service Attack Surface 92

  Web Service Methods 92

  Web Service Definitions 94

 Ajax Application Attack Surface 94

  The Origin of the Ajax Application Attack Surface 96

  Best of Both Worlds–for the Hacker 98

 Proper Input Validation 98

  The Problem with Blacklisting and Other Specific Fixes 99

  Treating the Symptoms Instead of the Disease 102

  Whitelist Input Validation 105

  Regular Expressions 109

  Additional Thoughts on Input Validation 109

 Validating Rich User Input 111

  Validating Markup Languages 111

  Validating Binary Files 113

  Validating JavaScript Source Code 114

  Validating Serialized Data 120

 The Myth of User-Supplied Content 122

 Conclusion 123

Chapter 5 Ajax Code Complexity 125

 Multiple Languages and Architectures 125

  Array Indexing 126

  String Operations 128

  Code Comments 129

  Someone Else’s Problem 130

 JavaScript Quirks 132

  Interpreted, Not Compiled 132

  Weakly Typed 133

 Asynchronicity 135

  Race Conditions 135

  Deadlocks and the Dining Philosophers Problem 139

  Client-Side Synchronization 144

 Be Careful Whose Advice You Take 144

 Conclusions 145

Chapter 6 Transparency in Ajax Applications 147

 Black Boxes Versus White Boxes 147

  Example: MyLocalWeatherForecast.com 150

  Example: MyLocalWeatherForecast.com “Ajaxified” 152

  Comparison Conclusions 156

 The Web Application as an API 156

  Data Types and Method Signatures 158

 Specific Security Mistakes 158

  Improper Authorization 159

  Overly Granular Server API 161

  Session State Stored in JavaScript 164

  Sensitive Data Revealed to Users 165

  Comments and Documentation Included in Client-Side Code 166

  Data Transformation Performed on the Client 167

 Security through Obscurity 172

  Obfuscation 173

 Conclusions 174

Chapter 7 Hijacking Ajax Applications 175

 Hijacking Ajax Frameworks 176

  Accidental Function Clobbering 176

  Function Clobbering for Fun and Profit 178

 Hijacking On-Demand Ajax 184

 Hijacking JSON APIs 190

  Hijacking Object Literals 195

  Root of JSON Hijacking 195

  Defending Against JSON Hijacking 196

 Conclusions 199

Chapter 8 Attacking Client-Side Storage 201

 Overview of Client-Side Storage Systems 201

  General Client-Side Storage Security 202

 HTTP Cookies 204

  Cookie Access Control Rules 206

  Storage Capacity of HTTP Cookies 211

  Lifetime of Cookies 215

  Additional Cookie Storage Security Notes 216

  Cookie Storage Summary 216

 Flash Local Shared Objects 218

  Flash Local Shared Objects Summary 225

 DOM Storage 226

  Session Storage 227

  Global Storage 229

  The Devilish Details of DOM Storage 231

  DOM Storage Security 233

  DOM Storage Summary 234

 Internet Explorer userData 235

  Security Summary 240

 General Client-Side Storage Attacks and Defenses 240

  Cross-Domain Attacks 241

  Cross-Directory Attacks 242

  Cross-Port Attacks 243

 Conclusions 243

Chapter 9 Offline Ajax Applications 245

 Offline Ajax Applications 245

 Google Gears 247

  Native Security Features and Shortcomings of Google Gears 248

  Exploiting WorkerPool 251

  LocalServer Data Disclosure and Poisoning 253

  Directly Accessing the Google Gears Database 257

  SQL Injection and Google Gears 258

  How Dangerous Is Client-Side SQL Injection? 262

 Dojo.Offline 264

  Keeping the Key Safe 265

  Keeping the Data Safe 266

  Good Passwords Make for Good Keys 267

 Client-Side Input Validation Becomes Relevant 268

 Other Approaches to Offline Applications 270

 Conclusions 270

Chapter 10 Request Origin Issues 273

 Robots, Spiders, Browsers, and Other Creepy Crawlers 273

  “Hello! My Name Is Firefox. I Enjoy Chunked Encoding, PDFs, and

  Long Walks on the Beach.” 275

 Request Origin Uncertainty and JavaScript 276

  Ajax Requests from the Web Server’s Point of View 276

  Yourself, or Someone Like You 280

  Sending HTTP Requests with JavaScript 282

  JavaScript HTTP Attacks in a Pre-Ajax World 284

  Hunting Content with XMLHttpRequest 286

  Combination XSS/XHR Attacks in Action 290

 Defenses 292

 Conclusions 294

Chapter 11 Web Mashups and Aggregators 295

 Machine-Consumable Data on the Internet 296

  Early 90’s: Dawn of the Human Web 296

  Mid 90s: The Birth of the Machine Web 297

  2000s: The Machine Web Matures 298

  Publicly Available Web Services 299

 Mashups: Frankenstein on the Web 301

  ChicagoCrime.org 302

  HousingMaps.com 303

  Other Mashups 304

 Constructing Mashups 304

  Mashups and Ajax 306

 Bridges, Proxies, and Gateways–Oh My! 308

  Ajax Proxy Alternatives 309

 Attacking Ajax Proxies 310

  Et Tu, HousingMaps.com? 312

 Input Validation in Mashups 314

  Aggregate Sites 317

 Degraded Security and Trust 324

 Conclusions 327

Chapter 12 Attacking the Presentation Layer 329

 A Pinch of Presentation Makes the Content Go Down 329

 Attacking the Presentation Layer 333

 Data Mining Cascading Style Sheets 334

 Look and Feel Hacks 337

  Advanced Look and Feel Hacks 341

 Embedded Program Logic 345

 Cascading Style Sheets Vectors 347

  Modifying the Browser Cache 348

 Preventing Presentation Layer Attacks 352

 Conclusion 353

Chapter 13 JavaScript Worms 355

 Overview of JavaScript Worms 355

  Traditional Computer Viruses 356

 JavaScript Worms 359

  JavaScript Worm Construction 361

  JavaScript Limitations 363

  Propagating JavaScript Worms 364

  JavaScript Worm Payloads 364

  Putting It All Together 372

 Case Study: Samy Worm 373

  How It Worked 374

  The Virus’ Payload 377

  Conclusions About the Samy Worm 379

 Case Study: Yamanner Worm (JS/Yamanner-A) 380

  How It Worked 380

  The Virus’ Payload 383

  Conclusions About the Yamanner Worm 384

 Lessons Learned from Real JavaScript Worms 387

 Conclusions 389

Chapter 14 Testing Ajax Applications 391

 Black Magic 391

 Not Everyone Uses a Web Browser to Browse the Web 396

  Catch-22 398

 Security Testing Tools–or Why Real Life Is Not Like Hollywood 399

  Site Cataloging 400

  Vulnerability Detection 401

  Analysis Tool: Sprajax 403

  Analysis Tool: Paros Proxy 406

  Analysis Tool: LAPSE (Lightweight Analysis for Program Security in Eclipse) 408

  Analysis Tool:WebInspect™ 409

 Additional Thoughts on Security Testing 411

Chapter 15 Analysis of Ajax Frameworks 413

 ASP.NET 413

  ASP.NET AJAX (formerly Atlas) 414

  ScriptService 417

  Security Showdown: UpdatePanel Versus ScriptService 419

  ASP.NET AJAX and WSDL 420

  ValidateRequest 424

  ViewStateUserKey 425

  ASP.NET Configuration and Debugging 426

 PHP 427

  Sajax 427

  Sajax and Cross-Site Request Forgery 430

 Java EE 431

  Direct Web Remoting (DWR) 432

 JavaScript Frameworks 434

  A Warning About Client-Side Code 435

  Prototype 435

 Conclusions 437

Appendix A Samy Source Code 439

Appendix B Source Code for Yamanner Worm 447

Index 453

Thursday, February 19, 2009

Javascript or Microsoft Visual C NET Step by Step 2003

Javascript: A Beginner's Guide, Second Edition

Author: John Pollock

Step-by-step instruction teaches beginning JavaScript programmers and Web designers to create windows, display moving text, and generate sound or other multimedia elements with ease. Uses the successful Beginner's Guide teaching system, which countless new users have praised for giving them a solid foundation in technology.



Table of Contents:
Acknowledgments
Introduction
1Introduction to JavaScript1
2Placing JavaScript in an HTML File15
3Using Variables35
4Using Functions65
5JavaScript Operators95
6Conditional Statements and Loops127
7Event Handlers161
8Objects189
9The Documents Object223
10Window Object267
11JavaScript Arrays307
12Math, Number, and Date Objects341
13Handling Strings379
14JavaScript and Forms411
15JavaScript and Frames445
16An Introduction to Advanced Techniques477
AAnswers to Mastery Checks523
Index541

Read also Sew Easy as Pie or Hostess

Microsoft Visual C# .NET Step by Step 2003

Author: John Sharp

Teach yourself Visual C# .NET version 2003--and begin developing Microsoft .NET--connected applications--one step at a time. This practical, hands-on tutorial expertly guides you through the fundamentals--from learning Visual C# syntax to writing and running your first components, Web services, and applications. Work at your own pace through easy-to-follow lessons and hands-on exercises to teach yourself essential techniques. And stay ahead of the curve by working with real-world examples and best practices for Visual C# .NET version 2003 development. Topics include object-oriented techniques, such as inheritance and encapsulation; exception-handling; resource management and the garbage collector; building components; creating GUI components and user controls; manipulating XML documents; Microsoft ADO.NET; Web Forms; Microsoft ASP.NET controls; integration with Microsoft Windows .NET Server 2003; testing; deployment; and more.



Tuesday, February 17, 2009

Gurus Guide to SQL Server Boxed Set or Digital Holography and Three Dimensional Display

Guru's Guide to SQL Server Boxed Set

Author: Ken Henderson

Ken Henderson's three guides to SQL Server have been widely praised by readers and reviewers alike. Now all three of them are available in an attractive, sturdy, specially priced boxed set. The three books included are The Guru's Guide to Transact-SQL, The Guru's Guide to SQL Server Stored Procedures, XML, and HTML, and The Guru's Guide to SQL Server Architecture and Internals. This set is an invaluable reference for SQL Server administrators and developers of all levels.



See also: Mastering CSS with Dreamweaver CS4 or Stephen Johnson on Digital Photography

Digital Holography and Three-Dimensional Display: Principles and Applications

Author: Ting Chung Poon

Digital (or electronic) holography and its application to 3-D display is one of the formidable problems of evolving areas of high technology that has been receiving great attention in recent years. Indeed, the "Holy Grail" for 3-D display is the realization of life-size interactive 3-D displays. Obviously, we are not there yet, but advances in 3-D display allow us to make important steps towards the Holy Grail. The theme of this book is to organize a collection of key chapters that covers digital holography and 3-D display techniques so as to provide the reader with the state-of-the-art developments in these important areas around the world.



Monday, February 16, 2009

Mastering CSS with Dreamweaver CS4 or Stephen Johnson on Digital Photography

Mastering CSS with Dreamweaver CS4

Author: Stephanie Sullivan

Millions of Web designers use Dreamweaver and most of them think creating CSS-based, standards-compliant sites is a challenge. In Mastering CSS with Dreamweaver CS3, authors Stephanie Sullivan and Greg Rewis bridge the gaps between the worlds of CSS design and Dreamweaver by demonstrating how to use Dreamweaver CS3 and CSS together to create individualized, standards-based layouts. Through hands-on projects with lots of visuals, the book enables every user of Dreamweaver to learn CSS effectively and easily.



Interesting textbook: For the Love of Potatoes or Compendium of Nosh

Stephen Johnson on Digital Photography

Author: Stephen Johnson

Something for everyone in this beautiful and definitive guide for digital photography enthusiasts, from cutting edge camera and software techniques to engaging discourse on the history and future of digital photographyProvides an in-depth, visually reinforced introduction to the fundamentals of digital photography. Provides cutting edge techniques for producing and reproducing images of the highest quality, regardless of the equipment you are using, including: composition, colour management, colour editing, printing, restoration, and more.



Sunday, February 15, 2009

Professional Widgets with CSS DOM and AJAX or Mcitp

Professional Widgets with CSS, DOM and AJAX: Google Web Toolkit, Yahoo Konfabulator, Microsoft Web Gadgets, and SilverLight with PopFly

Author: Rajesh Lal

Wrox's Professional Widgets with CSS, DOM and Ajax is the first guide to building web widgets - tiny applications that can be embedded in a web page or on the desktop and have exploded in popularity in recent months. Inside, award-winning programmer Rajesh Lal provides readers with a methodology for building widgets using standards like CSS and DOM to create widgets that work anywhere. Next he guides readers though the creation of widgets using several popular toolkits and frameworks including Yahoo! Widgets, Silverlight with PopFly, Google Web Toolkit, Microsoft Web Gadgets and more Professional Widgets with CSS, DOM and Ajax is heavy on step-by step examples enabling readers to get up to speed and begin building widgets quickly and easily.
Topics include:
* Understanding the architecture, design considerations and implementation of Web Widgets
* Working with Data Providers XML Web Services
* Using Ajax to provide the backbone and medium for widgets
* Presentation with CSS
* Browser compatibility
* Programming with Ajax Libraries and Frameworks
* Security, Yes Security



Read also Robert Rose Book of Classic Pasta or Fabulous Cookies

MCITP: Windows Server 2008 Enterprise Administrator Study Guide (Exam 70-647)

Author: Steven Johnson

This comprehensive book will guide readers through Microsoft's brand new MCITP: Windows Server 2008 Enterprise Administrator exam. Enterprise Administrators are responsible for the overall IT environment and architecture. They translate business goals into technology decisions and plan mid-range to long-term strategies  

The Enterprise Administrator makes key decisions and recommendations on:


  • Network infrastructure
  • Directory Services, Identity management, and Authentication
  • Security policies
  • Business continuity (disaster recovery, personnel/equipment/data)
  • Resource allocation and Budgeting
  • Design of IT administrative structure (delegation models)
  • Best practices, standards, and SLAs



This study guide will be complete with 100overage of the exam objectives, real world scenarios, hands-on exercises, and challenging review questions, both in the book and on the CD.

In addition, there will be a complete instructor support package made available to training centers and schools who will use this book in their classroom.



Thursday, February 12, 2009

The Savvy Way to Successful Website Promotion or How to Do Everything with PhotoShop 7

The Savvy Way to Successful Website Promotion: Secrets of Successful Websites: Attracting on-Line Traffic: The Most up to Date Guide to Top Positioning on Search Engines

Author: Derek Galon

Secrets of successful Websites
Attracting on-line traffic
Guide to top positioning on search engines

This comprehensive guide to do-it-yourself Web promotion and successful on-line business, can be your most valuable assistant on the difficult way to real Web success on a small budget.

This is a book on Web promotion, not on A-B-C of Website building. It is intended both for people who already have a Website and who, by introducing certain special adjustments to it, will be able to ensure it reaches a wider public, as well as for those just about to build their Website: it will tell them what elements to build into it so that it will ultimately generate top promotion.

Below, I present you a short excerpt from THE SAVVY WAY TO SUCCESSFUL WEBSITE PROMOTION. It can give you better idea what to expect inside. However - real secrets, most valuable tips and working methods you can find in the book itself. By adopting them, you would gain serious advantage over average webmasters, and push your site well ahead of your competitors.

Thank you for your interest!



Interesting book: Tabla de calor as or Handbook of Psychiatry in Palliative Medicine

How to Do Everything with PhotoShop 7

Author: Laurie McCanna

Harness the power of Photoshop to create beautiful looking images effortlessly. Tackle common problems and technical issues, edit and enhance existing artwork -- plus experiment with new ideas and methods to create entirely new visual scenes and schemas. Familiarize yourself with the Photoshop interface and tool palette, then follow along as author Laurie McCanna expertly guides you, in friendly, easy-to-understand language, through all the major functions of this amazing graphics application. Includes helpful advice on keyboard shortcuts, Photoshop Actions, and the history palette. How to Do Everything with Photoshop 7 will help you discover new worlds of artistic splendor and Web-ready visual wizardry.

Library Journal

It seems to be the year for launching new versions of old standards. Photoshop 7 introduces a number of new features that should drive demand for manuals. Everything addresses Photoshop beginners, with two chapters on resources and solving common problems that should be especially helpful; appropriate for public libraries. Teach Yourself, for beginning to intermediate users, is more thorough, covering the channels, masks, and other techniques that Everything omits, in addition to the basics. Chapter Q&As, quizzes, and exercises help users learn on their own; a valuable purchase for all public libraries. A full-color guide for intermediate users, Down & Dirty explains step by step "cool tricks," showing how to achieve easily impressive special effects, from wrapping type around a circle to creating backlit photo backgrounds. Sidebar tips offer additional information, and images in the book are available for free online. Magic also instructs intermediate to advanced users on creating cool, full-color effects but contains longer projects that each combine several techniques. The CD includes project files and demonstration software. Larger public libraries should consider either title. Copyright 2002 Cahners Business Information.



Wednesday, February 11, 2009

AutoCAD 2009 or How to do Everything with Your Digital Video Camera

AutoCAD 2009: One Step at a Time

Author: Timothy Sean Sykes

AutoCAD 2009 innovations include the introduction of the task-based ribbon which will soon dominate the computer software industry, a new menu browser, Quick tools (Properties, Drawings, Views), and the phenomenal View Cube and Steering Wheels which will make 3-dimensional creation as easy as 2D! The AutoCAD: One Step at a Time series is going into its 8th Edition with its 2009 books, and it continues to deliver the easiest, hands-on, step-by-step instructions available in CAD textbooks worldwide. And it's the only text that makes the author available to its readers via the internet!



Interesting textbook: Evita or Bridging the Divide

How to do Everything with Your Digital Video Camera

Author: Dave Johnson

Wow! This great guide is packed with juicy tidbits on cameras and video techniques. Get updates on new camera models, new software, new imaging technology, and new buying recommendations. Learn tips and techniques for taking great pictures whether you’re a beginner or a pro. Includes new projects, special effects and techniques for editing and using digital photos.

Chad Fahs is the co-author of MacWorld DVD Studio Pro Bible and a contributor of several chapters for Flash for TV and Video. In 1998 he began Avid Editing Studio in Chicago, working with established artists and producers to create exciting video and interactive forms of art and entertainment. Chad has also worked as a producer at one of the top Internet sites, training and working with clients from companies in the U.S., Japan, and the U.K. Currently, Chad writes, directs and produces for a variety of projects, including an Apple certified training course, an e-learning project for Adobe, instructional material for Ulead, and video projects for a band on Geffen/Interscope.



Table of Contents:
Ch. 1Getting started in digital video3
Ch. 2Preparing your PC or Macintosh for digital video23
Ch. 3Using your camcorder43
Ch. 4Getting video into your computer75
Ch. 5Editing your masterpiece on a PC99
Ch. 6Editing on a Mac131
Ch. 7Creating slideshows169
Ch. 8Working with sound207
Ch. 9Sound on the Mac243
Ch. 10Titling your movie267
Ch. 11Making DVD titles on a PC291
Ch. 12Sharing your PC-based movies313
Ch. 13Making tapes and DVDs with your Mac335
Ch. 14Sharing QuickTime movies353
App. ADigital video glossary375
App. BVideography quick tips381

Monday, February 9, 2009

Virtual Vintage or Statistical Computing with R

Virtual Vintage: The Insider's Guide to Buying and Selling Fashion Online

Author: Linda Lindroth

Vintage clothing has never been more chic, with everyone from celebrity trendsetters to style-conscious professionals searching for wearable treasures from the past. Virtual Vintage is the first and only guide that helps both the novice and the fashion connoisseur evaluate and confidently participate in the thriving vintage marketplace that exists online. No other book explains how to get it, sell it, fix it, or wear it with flair. Authors Linda Lindroth and Deborah Newell Tornello equip readers from head to toe with
• more than 100 chic sites—rated and evaluated
• instructions on contacting sellers
• smart strategies for bidding in online auctions
• advice about evaluating the size, quality, and colors of a garment
• tips for cleaning and repairing vintage items
Whether you’re looking for a 1960s Rudi Gernreich knit, Gucci hipster trousers, a Claire McCardell for Townley shirtwaist, or a Chanel suit in pink wool with black patent-leather trim, Virtual Vintage will help you build a unique and sensational wardrobe.



Read also Sistemas de InformaciĂ³n de Empresa:un Acercamiento basado en el Modelo

Statistical Computing with R

Author: Maria L Rizzo

Focusing on implementation rather than theory, Statistical Computing with R serves as a valuable tutorial, providing examples that illustrate programming concepts in the context of practical computational problems. This book presents an overview of computational statistics with an introduction to the R computing environment. Reviewing basic concepts in probability and classical statistical inference, the text demonstrates every algorithm through fully implemented examples coded in R. Chapters cover topics such as Monte Carlo methods, clustering, bootstrap, nonparametric regression, density estimation, and goodness-of-fit. Many exercises are included for the students while a solutions manual is included for the instructor.



Table of Contents:

Preface xv

1 Introduction 1

1.1 Computational Statistics and Statistical Computing 1

1.2 The R Environment 3

1.3 Getting Started with R 4

1.4 Using the R Online Help System 7

1.5 Functions 8

1.6 Arrays, Data Frames, and Lists 9

1.7 Workspace and Files 15

1.8 Using Scripts 17

1.9 Using Packages 18

1.10 Graphics 19

2 Probability and Statistics Review 21

2.1 Random Variables and Probability 21

2.2 Some Discrete Distributions 25

2.3 Some Continuous Distributions 29

2.4 Multivariate Normal Distribution 33

2.5 Limit Theorems 35

2.6 Statistics 35

2.7 Bayes' Theorem and Bayesian Statistics 40

2.8 Markov Chains 42

3 Methods for Generating Random Variables 47

3.1 Introduction 47

3.2 The Inverse Transform Method 49

3.3 The Acceptance-Rejection Method 55

3.4 Transformation Methods 58

3.5 Sums and Mixtures 61

3.6 Multivariate Distributions 69

3.7 Stochastic Processes 82

Exercises 94

4 Visualization of Multivariate Data 97

4.1 Introduction 97

4.2 Panel Displays 97

4.3 Surface Plots and 3D Scatter Plots 100

4.4 Contour Plots 106

4.5 Other 2D Representations of Data 110

4.6 Other Approaches to Data Visualization 115

Exercises 116

5 Monte Carlo Integration and Variance Reduction 119

5.1 Introduction 119

5.2 Monte Carlo Integration 119

5.3 Variance Reduction 126

5.4 Antithetic Variables 128

5.5 Control Variates 132

5.6 Importance Sampling 139

5.7 Stratified Sampling 144

5.8 Stratified Importance Sampling 147

Exercises 149

R Code 152

6 Monte Carlo Methods in Inference 153

6.1 Introduction 153

6.2 Monte Carlo Methods for Estimation 154

6.3 Monte Carlo Methods for Hypothesis Tests 162

6.4 Application174

Exercises 180

7 Bootstrap and Jackknife 183

7.1 The Bootstrap 183

7.2 The Jackknife 190

7.3 Jackknife-after-Bootstrap 195

7.4 Bootstrap Confidence Intervals 197

7.5 Better Bootstrap Confidence Intervals 203

7.6 Application 207

Exercises 212

8 Permutation Tests 215

8.1 Introduction 215

8.2 Tests for Equal Distributions 219

8.3 Multivariate Tests for Equal Distributions 222

8.4 Application 235

Exercises 242

9 Markov Chain Monte Carlo Methods 245

9.1 Introduction 245

9.2 The Metropolis-Hastings Algorithm 247

9.3 The Gibbs Sampler 263

9.4 Monitoring Convergence 266

9.5 Application 271

Exercises 277

R Code 279

10 Probability Density Estimation 281

10.1 Univariate Density Estimation 281

10.2 Kernel Density Estimation 296

10.3 Bivariate and Multivariate Density Estimation 305

10.4 Other Methods of Density Estimation 314

Exercises 314

R Code 317

11 Numerical Methods in R 319

11.1 Introduction 319

11.2 Root-finding in One Dimension 326

11.3 Numerical Integration 330

11.4 Maximum Likelihood Problems 335

11.5 One-dimensional Optimization 338

11.6 Two-dimensional Optimization 342

11.7 The EM Algorithm 345

11.8 Linear Programming - The Simplex Method 348

11.9 Application 349

Exercises 353

A Notation 355

B Working with Data Frames and Arrays 357

B.1 Resampling and Data Partitioning 357

B.2 Subsetting and Reshaping Data 360

B.3 Data Entry and Data Analysis 364

References 375

Index 395

Sunday, February 8, 2009

Spies among Us or Invisible Engines

Spies among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day

Author: Ira Winkler

Ira Winkler has been dubbed "A Modern Day James Bond" by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the riveting, true stories and case studies of how he did it-and how people and companies can avoid falling victim to the spies among us.

American corporations now lose as much as $300 billion a year to hacking, cracking, physical security breaches, and other criminal activity. Millions of people a year have their identities stolen or fall victim to other scams. In Spies Among Us, Ira Winkler reveals his security secrets, disclosing how companies and individuals can protect themselves from even the most diabolical criminals. He goes into the mindset of everyone from small-time hackers to foreign intelligence agencies to disclose cost-effective countermeasures for all types of attacks.

In Spies Among Us, readers learn:
* Why James Bond and Sydney Bristow are terrible spies
* How a team was able to infiltrate an airport in a post-9/11 world and plant a bomb
* How Ira and his team were able to steal nuclear reactor designs in three hours
* The real risks that individuals face from the spies that they unknowingly meet on a daily basis
* Recommendations for how companies and individuals can secure themselves against the spies, criminals, and terrorists who regularly cross their path

Publishers Weekly

Those who are already paranoid about information theft, both personal and professional, should take a muscle relaxant before reading this eye-opening survey of the many holes that exist in our security and intelligence systems. Author Winkler (Corporate Espionage) began his career at the National Security Agency, and his exploits in the private sector, testing security systems by breaking into banks and high-profile companies, have earned him a place in the Information Systems Security Association Hall of Fame. Winkler s background not only lends his book an authoritative voice, but embellishes his nuts-and-bolts material with rich references to intriguing cases in which he s been involved. The book kicks off provocatively, explaining why James Bond and Sydney Bristow from the TV show Alias suck as spies and detailing what spies at various levels actually do. He then goes on to explain how spies and/or their friends (i.e., hackers, identity thieves, spammers, etc.) can get at an organization. Although the book will interest security professionals more than consumers, there s some choice bits here for readers captivated by cloak-and-dagger endeavors. Winkler s chapter on How to Be a Spy shines as a concise tutorial on how genuine spooks operate, and his case studies, which make up the middle of the book, fascinate as examples of how easy it can be to compromise the security systems of high visibility companies even post 9/11. Overall, this is a thorough, at times absorbing, cautionary tale for any company or person who subscribes to the Boy Scout motto: Be prepared. (Apr.) Copyright 2005 Reed Business Information.



Table of Contents:
Pt. IEspionage concepts1
1How to be a spy3
2Why you can never be secure30
3Death by 1,000 cuts40
4Spies and their friends52
5How the spies really get you106
Pt. IICase studies153
6Spy vs. spy155
7Nuclear meltdown171
8Fill 'er up!180
9The entrepreneur189
10The criminal face of the Internet age200
11Crimes against individuals214
Pt. IIIStopping the spies229
12Taking control231
13Taking action294

New interesting book: Blood and Marrow Transplantation or Understanding Dietary Supplements

Invisible Engines: How Software Platforms Drive Innovation and Transform Industries

Author: David S Evans

Winner of the Business, Management & Accounting category in the 2006 Professional/Scholarly Publishing Annual Awards Competition presented by the Association of American Publishers, Inc.

Software platforms are the invisible engines that have created, touched, or transformed nearly every major industry for the past quarter century. They power everything from mobile phones and automobile navigation systems to search engines and web portals. They have been the source of enormous value to consumers and helped some entrepreneurs build great fortunes. And they are likely to drive change that will dwarf the business and technology revolution we have seen to this point. Invisible Engines examines the business dynamics and strategies used by firms that recognize the transformative power unleashed by this new revolution--a revolution that will change both new and old industries.

The authors argue that in order to understand the successes of software platforms, we must first understand their role as a technological meeting ground where application developers and end users converge. Apple, Microsoft, and Google, for example, charge developers little or nothing for using their platforms and make most of their money from end users; Sony PlayStation and other game consoles, by contrast, subsidize users and make more money from developers, who pay royalties for access to the code they need to write games. More applications attract more users, and more users attract more applications. And more applications and more users lead to more profits.

Invisible Engines explores this story through the lens of the companies that have mastered this platform-balancingact. It offers detailed studies of the personal computer, video game console, personal digital assistant, smart mobile phone, and digital media software platform industries, focusing on the business decisions made by industry players to drive profits and stay a step ahead of the competition. Shorter discussions of Internet-based software platforms provide an important glimpse into a future in which the way we buy, pay, watch, listen, learn, and communicate will change forever. An electronic version of this book is available under a Creative Commons license.

What People Are Saying


"As the power behind every kind of digital device, software platforms truly are the invisible engines of the information age. In their absorbing and comprehensive account of the evolution and economics of platform technologies, Evans, Hagiu, and Schmalensee essentially map out the still-evolving history of the third industrial revolution."
--Craig Mundie, Chief Technical Officer, Microsoft

"Most high-tech markets today revolve around software and are 'two-sided'--they require end-users as well as producers of complementary products such as software applications or digital content to support one platform over another. Invisible Engines is by far the broadest study of this subject to date. The authors probe expertly into the economics and technology underlying these markets as well as what business models and pricing strategies seem most likely to work. A very impressive book."
--Michael A. Cusumano, author of The Business of Software and coauthor of Platform Leadership

" Invisible Engines describes the economics of operating systems, those fiendishly complex pieces of software that provide the nervous system for computers, cell phones, game consoles, and a host of other devices. It is a must-read for anyone who wants to understand the economic forces that drive high-tech industries."
--Hal Varian, Haas School of Business and Department of Economics, University of California, Berkeley

"Invisible Engines is a highly sophisticated yet readable exploration of how companies do, can, and should deliver great value through software platforms. By combining economics and management, the authors deliver deep insights into the multifaceted world of software." --David B. Yoffie, Max and Doris Starr Professor of International Business Administration, Harvard Business School

"Google, eBay, mobile phones, and the Xbox have a lot more in common that you might suspect. Invisible Engines builds on recent thinking about two-sided platforms, including the authors' substantial contributions to it. Evans, Hagiu and Schmalensee beautifully blend economics, history, and business analysis to shed light on how businesses and policy makers should design their strategies. This exciting book will be a key resource for practitioners and academics interested in knowing how software platforms work and where information technologies are heading."
--Jean Tirole, Institut d'Economie Industrielle, University of Toulouse




Saturday, February 7, 2009

Digital Filmmaking or iPod Fully Loaded

Digital Filmmaking

Author: Mike Figgis

Now there is no reason to prevent anybody from making a film. The technology exists, the equipment is much cheaper than it was, the post-production facilities are on a laptop computer, the entire equipment to make a film can go in a couple of cases and be carried as hand luggage on a plane. —Mike Figgis

In this indispensable guide, Academy Award nominee Mike Figgis offers the reader a step-by-step tutorial in how to use digital filmmaking technology so as to get the very best from it. He outlines the equipment and its uses, and provides an authoritative guide to the shooting process—from working with actors to lighting, framing, and camera movement. He dispenses further wisdom on the editing process and the use of sound and music, all while establishing a sound aesthetic basis for the digital format.

Offering everything that you could wish to know on the subject, this is a handbook that will become an essential backpocket eference for the digital film enthusiast—whether your goal is to make no-budget movies or simply to put your video camera to more use than just holidays and weddings.



New interesting textbook: ActionScript 30 Game Programming University or Real World Camera Raw with Adobe PhotoShop CS3

iPod Fully Loaded: If You've Got It, You Can iPod It

Author: Andy Ihnatko

Let Mac guru Andy Ihnatko shows you how to put everything but the kitchen sink on your iPod -- from old LPs, radio programs, television shows, and movies to spreadsheets, presentations, and PC rescue files. You'll quickly discover that music is only a small part of the picture as you learn how to record TV shows for an iPod, record radio broadcasts and automatically convert them into podcasts, convert Web pages into formats that can be read or listened to on an iPod, and even translate Microsoft Word, Excel, or PowerPoint documents for the iPod screen. Whether you're a PC or a Mac user, or have a past, present, or even future iPod, Inhantko's advice works perfectly.



Friday, February 6, 2009

Database Design and Development or Cyber threats Information Warfare and Critical Infrastructure Protection

Database Design and Development: A Visual Approach

Author: Raymond Frost

For students in the introductory course in database who want to learn how to design rather than just manipulate relational databases.The book that balances database theory, business problem solving, and hands-on-practice.  This book prepares student for the workplace without sacrificing rigorous academic theory. 



Book review: Kostenmanagement: Eine Strategische Betonung

Cyber-threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland

Author: Anthony H H Cordesman

Information warfare is upon us. In the last two decades, the U.S. economy's infrastructure has undergone a fundamental set of changes, relying increasingly on its service sector and high technology economy. The U.S. depends on computers, electronic data storage and transfers, and highly integrated communications networks. Its rapidly developing new form of critical infrastructure is exceedingly vulnerable to an emerging host of threats. This detailed volume examines the dangers of, and the evolving U.S. policy response to, cyberterrorism.



Table of Contents:
Acknowledgmentsix
Chapter 1The Changing Nature of Critical Infrastructure Protection1
The Problem of Evolving Technology2
The Uncertain Balance of Risks and Non-risks in Cyber-attacks2
The Disconnect between Cyber-defense and Cyber-offense3
The Lack of Credible Risk and Vulnerability Assessments4
Governmental and Private Sector Efforts to Respond5
Chapter 2Threat Assessment11
The President's Commission on Critical Infrastructure Protection Characterization of the Threat13
The National Infrastructure Protection Center's (NIPC) View of the Threat14
Intelligence Community Assessments of the Threat23
CIA Testimony on the Threat23
National Intelligence Council's Estimate of the Threat30
Incidents of "Cyber-warfare": The Kosovo Crisis34
Serbia's Role in Information Warfare36
NATO's Role in Information Warfare37
Is Information Warfare and Retaliation Legal and Worth Its Costs?38
Lower-Level Incidents of "Cyber-warfare"39
Moonlight Maze39
Solar Sunrise40
Rome Labs Incident41
The Computer Security Institute's Survey of the Threat43
Computer Emergency Response Team's (CERT) Assessment of Threat47
Challenges in Improving the Assessment of the Threat49
Chapter 3Evolving U.S. Policy and Response53
The Beginnings: The Computer Security Act and Clinger-Cohen Act54
The Federal Government Redefines Critical Infrastructure and Agency Responsibilities55
Executive Order 1301056
The President's Commission on Critical Infrastructure Protection57
Presidential Decision Directive-63 (PDD-63)59
Lead Agencies for Sector Liaison61
Lead Agencies for Special Functions62
A New Structure for Interagency Coordination63
National Infrastructure Protection Center (NIPC)64
Information Sharing and Analysis Center (ISAC)65
National Infrastructure Assurance Council66
National Infrastructure Assurance Plan67
Studies and Research68
Cooperation with the Private and Civil Sectors69
Annual Report on Implementation70
National Plan for Information Systems Protection71
National Plan for Information Systems Protection, Version One71
GAO Comments on the National Plan for Information Systems Protection73
Oplan 360082
The Success of the Federal Government Effort to Date82
Chapter 4Analyzing Federal Critical Infrastructure Programs by Department and Agency85
The National Plan for Information Systems Estimate85
The OMB Analysis88
Annual Report to Congress on Combating Terrorism89
Government-wide Spending on CIP91
Efforts by Federal Agencies92
Department of Agriculture94
Department of Commerce96
Critical Infrastructure Assurance Office106
Department of Energy106
Environmental Protection Agency and GAO Audits107
Health and Human Services107
Department of Interior108
Department of Justice108
NASA108
GAO Assessments of NASA Information Security108
National Science Foundation110
National Security Community111
The Role of the Department of Defense112
Patterns of Attack and Response114
Major DoD Cyber-defense Programs116
GAO Critiques of DoD Efforts: The 1996 Study120
The GAO's 1999 Recommendations122
DoD Progress in Addressing Security Weakness127
Cyber and Information Warfare and the Role of the Intelligence Community128
Total Spending on National Security Activity131
Department of State131
Department of Transportation131
Department of Treasury132
Department of Veterans Affairs132
Chapter 5Assessments of Effectiveness133
Independent U.S. Government Efforts to Assess Risk, Cost, and Benefits: GAO Testimony of October 6, 1999133
Management Recommendations Within Brock's Testimony136
Independent U.S. Government Efforts to Assess Risk, Cost, and Benefits: GAO Testimony of March 29, 2000141
Weaknesses in Controls141
Raise Awareness143
Implement Software Patches144
Routinely Use Automated Tools to Monitor Security144
Identify and Propagate Pockets of Excellence145
Focus on the Most Common Vulnerabilities First145
Enforce a Strong Management Approach145
Preliminary Analysis of GAO Findings146
Other Efforts to Assess Risk, Cost, and Benefits147
Technical Risks, Test, and Evaluations of IW Programs149
Chapter 6Role of State and Local Governments151
Chapter 7Role of Private Industry153
Chapter 8Lessons from Other Nations: International Vulnerability157
Chapter 9Conclusions and Recommendations167
Notes181

Thursday, February 5, 2009

Exploring C or Contextual Design

Exploring C++: The Programmer

Author: Ray Lischner

Exploring C++ uses a series of self-directed lessons to divide C++ into bite-sized chunks that you can digest as rapidly as you can swallow them. The book assumes only a basic understanding of fundamental programming concepts (variables, functions, expressions, statements) and requires no prior knowledge of C or any other particular language. It reduces the usually considerable complexity of C++.

The included lessons allow you to learn by doing, as a participant of an interactive education session. You'll master each step in a one sitting before you proceed to the next. Author Ray Lischner has designed questions to promote learning new material. And by responding to questions throughout the text, you'll be engaged every step of the way.



Book about: New Perspectives on Microsoft Office Access 2003 Comprehensive Second Edi or Excel

Contextual Design: Defining Customer-Centered Systems

Author: Hugh Beyer

This is a practical, hands-on guide for anyone trying to design systems that reflect the way customers want to do their work. The authors developed Contextual Design, the method discussed here, through their work with teams struggling to design products and internal systems. In this book, you'll find the underlying principles of the method and how to apply them to different problems, constraints, and organizational situations.

Contextual Design enables you to:
* gather detailed data about how people work and use systems
* develop a coherent picture of a whole customer population
* generate system designs from a knowledge of customer work
* diagram a set of existing systems, showing their relationships, inconsistencies, redundancies, and omissions

"The foremost experts on contextual inquiry have packed what they know into a book of substance and intelligence. It lucidly shows how to capture the real requirements of customers adn fit designs to their needs. If you care about your customers and want to understand what they need, then you need this book."
--Larry Constantine, Principal Consultant, Constantine & Locwood, Ltd., Professor of Computing Sciences, University of Technology, Sydney (Australia), Author of Constantine on Peopleware and Software for User

"This book conveys the understanding and wisdom that they [the authors] have gained from their experience in contextual design in a form that is accessible to students and design practitioners. It will serve as a guide and handbook for the next generation of interaction designers, and as a result we can expect the usability and appropriateness of computer systems to be greatlyimproved."
--Terry Winograd, Stanford University



Table of Contents:
Foreword
Preface
Ch. 1Introduction1
Ch. 2Gathering Customer Data29
Ch. 3Principles of Contextual Inquiry41
Ch. 4Contextual Inquiry in Practice67
Ch. 5A Language of Work81
Ch. 6Work Models89
Ch. 7The Interpretation Session125
Ch. 8Consolidation139
Ch. 9Creating One View of the Customer151
Ch. 10Communicating to the Organization199
Ch. 11Work Redesign215
Ch. 12Using Data to Drive Design229
Ch. 13Design from Data273
Ch. 14System Design295
Ch. 15The User Environment Design317
Ch. 16Project Planning and Strategy347
Ch. 17Prototyping as a Design Tool367
Ch. 18From Structure to User Interface379
Ch. 19Iterating with a Prototype393
Ch. 20Putting It into Practice415
Afterword439
Readings and Resources443
References449
Index459
About the Authors471

Wednesday, February 4, 2009

Programming Role Games with DirectX or E Business and ERP

Programming Role Games with DirectX

Author: Jim Adams

No game draws a player into its world in quite the same way as a role-playing game does. In role-playing games, players break through the barrier that exists between their actions and the fantastic world that they're navigating through and instead become an inhabitant of that world. Get ready to put your creative ideas in motion and try your hand at creating your own role-playing game! "Programming Role Playing Games with DirectX, 2nd Edition" will show you how to do it as you create cool graphics and combat engines, handle players in your game, use scripts and items, and make your game multiplayer-capable. This book breaks a role-playing game down into its essential components, examining the details of each and showing you how to use them in your game project. Learn how to draw with DirectX Graphics, play audio with DirectX Audio, network with DirectPlay, and process input with DirectInput. By the time you finish, you'll have the skills you need to create a complete role-playing game.



Table of Contents:
Ch. 1Preparing for the book3
Ch. 2Drawing with DirectX graphics45
Ch. 3Interacting with DirectInput141
Ch. 4Playing sound and music with DirectX audio and direct show171
Ch. 5Networking with DirectPlay233
Ch. 6Creating the game core275
Ch. 7Using 2-D graphics339
Ch. 8Creating 3-D graphics engines371
Ch. 9Mixing 2-D and 3-D graphics engines433
Ch. 10Implementing scripts449
Ch. 11Defining and using objects483
Ch. 12Controlling players and characters521
Ch. 13Working with maps and levels621
Ch. 14Creating combat sequences675
Ch. 15Getting online with multiplayer gaming697
Ch. 16Putting together a full game755

Interesting book: DinĂ¡mica Comercial:Pensamiento de Sistemas y Modelado para un Mundo Complejo con CD-ROM

E-Business and ERP: Transforming the Enterprise

Author: Grant Norris

Is Your Company Getting the Most from Its Investment in Change?

Many companies have already invested heavily in infrastructure change, some are making that investment now, and all are contemplating the costs of becoming or evolving as an e-business. Is your company a "greenfield" organization with no back-end systems, or one whose infrastructure support systems are integrated across the enterprise? Are you just beginning to think about e-business capabilities, or are you on the leading edge of convergence? Whatever your company's position on the ERP/E-Business Matrix, E-Business and ERP: Transforming the Enterprise provides the proven techniques you need to know to meld enterprise resource planning capabilities with the communications power of the Internet.

Is Your Company Positioned for E-Business Success?

The Internet has revolutionized twenty-first century business. Organizations today can communicate with customers, suppliers, and sellers at e-speed with the click of a mouse. Yet, with all of the excitement about the external possibilities of the Internet, companies still need efficient internal processes to make and move products, manage finances, recruit and motivate employees, and excel.

E-Business and ERP: Transforming the Enterprise covers the skills and tools you will need to combine existing ERP software and capabilities with emerging Web-based technologies. In this forward-thinking outline for a new business structure, executives and managers will discover:

  • Strategies for established companies to penetrate the Internet marketplace
  • Procedures that lower costs across the supply and demand chain
  • Techniques that help you meet—and master—the dot.com challenge
The companies best positioned to succeed in the near future are those that can balance existing ERP-based infrastructures and capabilities with exciting new e-business innovations. E-Business and ERP: Transforming the Enterprise examines the changing but essential role of ERP, places it in the context of the Web-based technologies defining today's e-business environment, and reveals how to blend the best aspects of both to create a strong and flexible twenty-first century business enterprise.

Internet Works"

It's full of diagrams and is written in a direct and concise style.

Booknews

Provides techniques for melding enterprise resource planning (ERP) capabilities with the communications power of the Internet. Shows how start-up and established companies can link their existing ERP systems with the information capabilities of their customers, and offers a framework for understanding e-business opportunities within the context of a traditional enterprise and its infrastructure. Explains how the Internet impacts supply chain management, customer relationship management, and shared services, and looks at the future of Web-based technologies. Norris is a partner in PricewaterhouseCooper's management consulting services practice. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Monday, February 2, 2009

Workflow Modeling or 10 Cool LEGO MINDSTORMS Ultimate Builders Projects

Workflow Modeling: Tools for Process Improvement and Application Development

Author: Alec Sharp

If you're looking to create new workflow systems or redesign existing business processes for your enterprise, look no further than this concise, new hands-on book. Providing proven techniques for identifying, modeling, and redesigning business processes, and explaining how to implement workflow improvement, this book helps you define requirements for systems development or systems acquisition. By showing you how to build visual models for illustrating workflow, the authors help you to assess your current business processes and see where process improvement and systems development can take place.

This book brings the two distinct disciplines of management and information technology together especially for high-tech professionals who need to improve the way work gets done to maintain a competitive edge. Addressing such hot topics as enterprise resource planning (ERP) applications and enterprise application integration (EAI), you learn how to manage these complex, new schemes not as technology-based changes, but as the process redesign projects they truly are. Plus, understanding process workflow modeling allows you to get a better handle on implementing a complete business process for successful e-commerce initiatives.

Filled with real-world examples and practical techniques, you get a seamless methodology for process redesign and information systems development that integrates use-case analysis and process workflow modeling to easily span the gap between management and IT. What's more, the visual modeling you learn from this book shows you not only how to improve your enterprise, but where trouble spots might occur and how to avoid common pitfalls.

What'smore, because the book is structured as an on-the-job guide, you don't have to read it all before getting started. It features clear summaries, project checklists, and other aids that make it a logical guide to keep on your reference shelf and put to use every day.

Booknews

"Start with the end<-->the result<-->in mind." That is the message driving this visual models approach to improving the work flow process for organizational success. Experts in management and information technology provide use case scenarios for defining system requirements, real-world examples, project checklists, and other aids for sharpening the competitive edge. Sharp is the founder of a consulting firm in West Vancouver, BC, Canada, and past president of the Brith Columbia Data Management Association chapter. McDermott is the president of McDermott Computer Decisions Inc. in Oakland, CA, and has served as director of the Data Management Association. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Book about: Ecksteine der Betriebsbuchhaltung

10 Cool LEGO MINDSTORMS Ultimate Builders Projects

Author: Syngress

LEGO MINDSTORMS lets you design and program robots that can do just about anything!
You've just purchased the LEGO MINDSTORMS Ultimate Builder Kit. Now what? Overwhelmed by the creative possibilities? The Builder Kit is targeted towards those who want to become "master LEGO builders."

10 Cool LEGO MINDSTORM Ultimate Builder Projects: Amazing Projects You Can Build in Under an Hour provides step-by-step instructions and detailed illustrations for users of all skill levels and proficiencies. This MINDSTORMS kit features many rare parts, a spare motor, a turntable, special gears, transparent beams, and even a pneumatics system-parts that can be confusing and that will be new to many LEGO builders. 10 Cool LEGO MINDSTORM Ultimate Builder Projects teaches readers how to incorporate these new features into their creations as they build 10 unique robots.

From out of the box to up and running in less than an hour. This book teaches users how to create 10 amazing projects in under an hour.
8-page color insert. An eight-page color insert will illustrates the complete projects in full-detail.
Specifically targeted to both new users of the LEGO MINDSTORMS and experienced MINDSTORMS fans.



Table of Contents:
Robot 1 WideBot

Sunday, February 1, 2009

Cisco Field Manual or Beginning Excel Services

Cisco Field Manual: Router Configuration

Author: David Hucaby

Cisco Field Manual: Router Configuration is the ultimate command reference that shows readers how to configure routers and switches with Cisco IOS software. Complete with shaded tab sections for different IOS software feature families for easy reference. Each section provides a succinct background of the group, configuration information and example components. With information on the most recent IOS releases as well as on previous releases in simple to read tables, Cisco Field Manual: Router Configuration is designed to be an invaluable workplace tool.

  • Presents the common elements of complex configurations for Cisco routers, switches, and firewalls in an intuitive, easy-to-reference format.
  • Each feature includes concise background information, configuration notes, port numbers, and examples.
  • Describes actual configuration commands and options in the order they should be used.
  • Saves time spent searching for pertinent information in the Cisco IOS documentation.
  • Useful as a hands-on command reference in the field or as a part of any candidate's Cisco Career Certifications preparation.



Book review: Organizaciones Comerciales para Paralegals

Beginning Excel Services

Author: Craig Thomas

Written by Microsoft’s lead developers of Excel Services, this book shares their insights into the benefits and usage of Excel’s new server technology so that you can solve business problems. You’ll learn what Excel Services is for and how it is used, how to deploy an evaluation copy of the server and effectively administer it, and gain an understanding of how the server works. You’ll also get step-by-step guidelines for using the server in each of the scenarios for which it was designed.



Table of Contents:
Acknowledgments.

Introduction.

Part I: Overview of Excel Services.

Chapter 1: Introduction to Excel Services.

Chapter 2: Getting Started with Excel Services.

Chapter 3: Architecture.

Part II: Working with Excel Services.

Chapter 4: Workbook Support.

Chapter 5: External Data.

Chapter 6: Capacity and Deployment Planning.

Chapter 7: Administration of Excel Services.

Chapter 8: Security.

Part III: How-To Scenarios.

Chapter 9: Sharing Workbooks with the Browser.

Chapter 10: Interacting with Workbooks in the Browser.

Chapter 11: Controlling Workbook Distribution.

Chapter 12: Business Intelligence Solutions.

Chapter 13: Offloading Workbook Calculation to the Server.

Chapter 14: Building Custom Solutions.

Appendix: Troubleshooting.

Index.