Best of
Computers

2003

Linux Kernel Development


Robert Love - 2003
    The book details the major subsystems and features of the Linux kernel, including its design, implementation, and interfaces. It covers the Linux kernel with both a practical and theoretical eye, which should appeal to readers with a variety of interests and needs. The author, a core kernel developer, shares valuable knowledge and experience on the 2.6 Linux kernel. Specific topics covered include process management, scheduling, time management and timers, the system call interface, memory addressing, memory management, the page cache, the VFS, kernel synchronization, portability concerns, and debugging techniques. This book covers the most interesting features of the Linux 2.6 kernel, including the CFS scheduler, preemptive kernel, block I/O layer, and I/O schedulers. The third edition of Linux Kernel Development includes new and updated material throughout the book:An all-new chapter on kernel data structuresDetails on interrupt handlers and bottom halvesExtended coverage of virtual memory and memory allocationTips on debugging the Linux kernelIn-depth coverage of kernel synchronization and lockingUseful insight into submitting kernel patches and working with the Linux kernel community

Hacking: The Art of Exploitation


Jon Erickson - 2003
    This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

The Art of UNIX Programming


Eric S. Raymond - 2003
    This book attempts to capture the engineering wisdom and design philosophy of the UNIX, Linux, and Open Source software development community as it has evolved over the past three decades, and as it is applied today by the most experienced programmers. Eric Raymond offers the next generation of hackers the unique opportunity to learn the connection between UNIX philosophy and practice through careful case studies of the very best UNIX/Linux programs.

Designing with Web Standards


Jeffrey Zeldman - 2003
    And code. And code. You build only to rebuild. You focus on making your site compatible with almost every browser or wireless device ever put out there. Then along comes a new device or a new browser, and you start all over again.You can get off the merry-go-round.It's time to stop living in the past and get away from the days of spaghetti code, insanely nested table layouts, tags, and other redundancies that double and triple the bandwidth of even the simplest sites. Instead, it's time for forward compatibility.Isn't it high time you started designing with web standards?Standards aren't about leaving users behind or adhering to inflexible rules. Standards are about building sophisticated, beautiful sites that will work as well tomorrow as they do today. You can't afford to design tomorrow's sites with yesterday's piecemeal methods.Jeffrey teaches you to:- Slash design, development, and quality assurance costs (or do great work in spite of constrained budgets)- Deliver superb design and sophisticated functionality without worrying about browser incompatibilities- Set up your site to work as well five years from now as it does today- Redesign in hours instead of days or weeks- Welcome new visitors and make your content more visible to search engines- Stay on the right side of accessibility laws and guidelines- Support wireless and PDA users without the hassle and expense of multiple versions- Improve user experience with faster load times and fewer compatibility headaches- Separate presentation from structure and behavior, facilitating advanced publishing workflows

Practical Cryptography


Niels Ferguson - 2003
    The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies. Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers. Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).

Effective Oracle by Design


Thomas Kyte - 2003
    The book covers schema design, SQL and PL/SQL, tables and indexes, and much more. From the exclusive publisher of Oracle Press books, this is a must-have resource for all Oracle developers and DBAs.

Absolute OpenBSD: Unix for the Practical Paranoid


Michael W. Lucas - 2003
    The author assumes a knowledge of basic UNIX commands, design, and permissions. The book takes you through the intricacies of the platform and teaches how to manage your system, offering friendly explanations, background information, troubleshooting suggestions, and copious examples throughout.

Thinking in C++, Vol. 2: Practical Programming


Bruce Eckel - 2003
    Learn practical programming and best practices. Meet the difficult challenges of C++ development. Build reliable and robust programs. Design Patterns chapter shows sophisticated use of objects, composition and polymorphism. Provides a gentle introduction to multithreaded programming, a feature being considered for the next version of Standard C++. Defensive Programming chapter includes a simple unit-testing framework and debugging techniques. In-depth treatment of Standard C++ Library facilities including strings, iostreams, and the "STL" algorithms and containers. Modern usage of templates, including template metaprogramming. Unravels the perplexities of multiple inheritance. Shows practical uses for RTTI. Explores exception handling in depth and clearly explains exception-safe design. Compliant with the official ISO C++ Standard. Presents results of current research being considered for inclusion in the next revision of Standard C++. All code examples freely downloadable, tested on multiple platforms and compilers including the free GNU C++ compiler on Windows/Mac/Linux. On www.BruceEckel.com: Annotated Solutions Guide Seminars and consulting Free Download—Volume I of this book Annotation Thinking in C++ is ideal for anyone already familiar with C who now wants to learn C++. Eckel has synthesized more than five years of C++ teaching and programming experience into a well-structured course that moves step-by-step through each important C++ concept. He highlights poorly-understood C++ features like virtual functions, which can improve productivity. Editorial Reviews The Barnes & Noble Review Bruce Eckel, one of the world's best programming trainers, has thoroughly updated his classic THINKING IN C++—the book that won the Software Development Magazine Jolt Cola award in its first iteration. The new version is better than ever—which is to say, it's

Addiction Treatment Homework Planner


James R. Finley - 2003
    Addiction Treatment Homework Planner (PracticePlanners?) published in the year 2009 was published by John Wiley & Sons. View 121844 more books by John Wiley & Sons. The author of this book is Brenda S. Lenz . James R. Finley . This is the Paperback version of the title "Addiction Treatment Homework Planner (PracticePlanners?) ". Addiction Treatment Homework Planner (PracticePlanners?) is currently Available with us.

Hacking the Xbox: An Introduction to Reverse Engineering


Andrew Huang - 2003
    The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide.Hacking the Xbox also confronts the social and political issues facing today's hacker by looking forward and discussing the impact of today's legal challenges on legitimate reverse engineering activities. The book includes a chapter written by the Electronic Frontier Foundation (EFF) about the rights and responsibilities of hackers, and concludes by discussing the latest trends and vulnerabilities in secure PC platforms.

Cissp (Isc)2 Certified Information Systems Security Professional Official Study Guide


James Michael Stewart - 2003
    This comprehensive book will guide readers through CISSP exam topics, including: Access ControlApplication Development SecurityBusiness Continuity and Disaster Recovery PlanningCryptographyInformation Security Governance and Risk Management Legal, Regulations, Investigations and ComplianceOperations SecurityPhysical (Environmental) SecuritySecurity Architecture and DesignTelecommunications and Network SecurityThis study guide will be complete with 100% coverage of the exam objectives, real world scenarios, hands-on exercises, and challenging review questions, both in the book as well via the exclusive Sybex Test Engine.

FoxTales: Behind the Scenes at Fox Software


Kerry Nietz - 2003
    Recounted are the triumphs and struggles that the development team went through as they learned how to build personal computer database software that eventually became best-of-breed and trounced the competition. Former employee Kerry Nietz describes his interview at Fox, his job offer, his first days as a rookie programmer, and the tumultuous events of the late 1980s and early 1990s, including the lawsuit filed by Ashton-Tate and the merger/acquisition by Microsoft. Recounted are the varied personalities on the team, including the sometimes off-the-wall management team, and how the outside world appeared to a group of developers who spent their lives staring at computer screens, trying to ship another batch of code.

Python Programming: An Introduction to Computer Science


John Zelle - 2003
    It takes a fairly traditional approach, emphasizing problem solving, design, and programming as the core skills of computer science. However, these ideas are illustrated using a non-traditional language, namely Python. Although I use Python as the language, teaching Python is not the main point of this book. Rather, Python is used to illustrate fundamental principles of design and programming that apply in any language or computing environment. In some places, I have purposely avoided certain Python features and idioms that are not generally found in other languages. There are already many good books about Python on the market; this book is intended as an introduction to computing. Features include the following: *Extensive use of computer graphics. *Interesting examples. *Readable prose. *Flexible spiral coverage. *Just-in-time object coverage. *Extensive end-of-chapter problems.

Mastering Windows Server 2003


Mark Minasi - 2003
    This book shows you how to plan, configure and install your network, keep it running its best, and fix it if it breaks. And you still get all the coverage you need for the Windows 2000 Server installations that remain part of your environment. Coverage includes: * Configuring IP, DHCP, DNS, and WINS to achieve the right foundation for your network * DNS explained in everyday English, from basics to advanced design * Designing, running, and maintaining Active Directory-based domains with Server 2003 and 2000 Server * Running your own Web, FTP, and e-mail server with 2003 * Controlling hundreds, even thousands, of workstations with group policies and security templates * Tuning and monitoring your network * Securing your network from split-brain DNS to AD delegation to group policies, logs, IPSec, PKI and more * Using Windows Server 2003 to share Internet connections * Complete coverage of all new 2003 features Real Solutions to Real Challenges If improving the real-world performance of your network is the bottom line, this book delivers the goods. It shows you how to design and manage a multiple-platform network, build a Windows-based intranet, find the right data backup strategy, prevent and recover from disasters, and much more. There's no end to what you'll accomplish with practical, step-by-step instruction from the expert who has actually done it all on live networks!

Outrageous Women of Civil War Times


Mary Rodd Furbee - 2003
    They became America's first women nurses, doctors, preachers, and voters. These Outrageous Women of Civil War Times braved the battlefield, fought for their rights, wrote inspiring works-and became heroines! Among the outrageous women you'll meet are: Belle Boyd-a spy for the confederacy who dodged a hail of bullets to deliver key information to General Stonewall Jackson Susan B. Anthony-the pioneering women's rights crusader who broke the law in order to vote for Ulysses S. Grant for president Clara Barton-who cared for Civil War soldiers on the battlefield and founded the American Red Cross Harriet Tubman-the runaway slave who led hundreds to freedom on the Underground Railroad

Beyond Fear: Thinking Sensibly about Security in an Uncertain World


Bruce Schneier - 2003
    Security is near the top of government and corporate agendas around the globe. Security-related stories appear on the front page everyday. How well though, do any of us truly understand what achieving real security involves?In Beyond Fear, Bruce Schneier invites us to take a critical look at not just the threats to our security, but the ways in which we're encouraged to think about security by law enforcement agencies, businesses of all shapes and sizes, and our national governments and militaries. Schneier believes we all can and should be better security consumers, and that the trade-offs we make in the name of security - in terms of cash outlays, taxes, inconvenience, and diminished freedoms - should be part of an ongoing negotiation in our personal, professional, and civic lives, and the subject of an open and informed national discussion.With a well-deserved reputation for original and sometimes iconoclastic thought, Schneier has a lot to say that is provocative, counter-intuitive, and just plain good sense. He explains in detail, for example, why we need to design security systems that don't just work well, but fail well, and why secrecy on the part of government often undermines security. He also believes, for instance, that national ID cards are an exceptionally bad idea: technically unsound, and even destructive of security. And, contrary to a lot of current nay-sayers, he thinks online shopping is fundamentally safe, and that many of the new airline security measure (though by no means all) are actually quite effective. A skeptic of much that's promised by highly touted technologies like biometrics, Schneier is also a refreshingly positive, problem-solving force in the often self-dramatizing and fear-mongering world of security pundits.Schneier helps the reader to understand the issues at stake, and how to best come to one's own conclusions, including the vast infrastructure we already have in place, and the vaster systems--some useful, others useless or worse--that we're being asked to submit to and pay for.Bruce Schneier is the author of seven books, including Applied Cryptography (which Wired called "the one book the National Security Agency wanted never to be published") and Secrets and Lies (described in Fortune as "startlingly lively...][a] jewel box of little surprises you can actually use."). He is also Founder and Chief Technology Officer of Counterpane Internet Security, Inc., and publishes Crypto-Gram, one of the most widely read newsletters in the field of online security.

The Photoshop Book for Digital Photographers


Scott Kelby - 2003
    Coverage is aimed squarely at the professional photographer who is making the switch from traditional to digital photography.

Stealing the Network: How to Own the Box


Ryan Russell - 2003
    So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the -street fighting- tactics used to attack networks and systems. Not just another -hacker- book, it plays on -edgy- market success of Steal this Computer Book with first hand, eyewitness accountsA highly provocative expose of advanced security exploitsWritten by some of the most high profile -White Hats-, -Black Hats- and -Gray Hats-Gives readers a -first ever- look inside some of the most notorious network intrusions

Engineering a Compiler


Keith D. Cooper - 2003
    No longer is execution speed the sole criterion for judging compiled code. Today, code might be judged on how small it is, how much power it consumes, how well it compresses, or how many page faults it generates. In this evolving environment, the task of building a successful compiler relies upon the compiler writer's ability to balance and blend algorithms, engineering insights, and careful planning. Today's compiler writer must choose a path through a design space that is filled with diverse alternatives, each with distinct costs, advantages, and complexities.Engineering a Compiler explores this design space by presenting some of the ways these problems have been solved, and the constraints that made each of those solutions attractive. By understanding the parameters of the problem and their impact on compiler design, the authors hope to convey both the depth of the problems and the breadth of possible solutions. Their goal is to cover a broad enough selection of material to show readers that real tradeoffs exist, and that the impact of those choices can be both subtle and far-reaching.Authors Keith Cooper and Linda Torczon convey both the art and the science of compiler construction and show best practice algorithms for the major passes of a compiler. Their text re-balances the curriculum for an introductory course in compiler construction to reflect the issues that arise in current practice.

Data Structures Using Java


D.S. Malik - 2003
    Clearly written with the student in mind, the book focuses on data structures, and includes advanced topics in Java such as Linked Lists and the Standard Template Library (STL). Students should find the author's use of complete programming code and clear display of syntax, explanation and example both easy to read and conducive to learning.

Data Structure Through C


Yashavant P. Kanetkar - 2003
    It adopts a novel approach, by using the programming language c to teach data structures. The book discusses concepts like arrays, algorithm analysis, strings, queues, trees and graphs. Well-designed animations related to these concepts are provided in the cd-rom which accompanies the book. This enables the reader to get a better understanding of the complex procedures described in the book through a visual demonstration of the same. Data structure through c is a comprehensive book which can be used as a reference book by students as well as computer professionals. It is written in a clear, easy-to-understood manner and it includes several programs and examples to explain clearly the complicated concepts related to data structures. The book was published by bpb publications in 2003 and is available in paperback. Key features: the book contains example programs that elucidate the concepts. It comes with a cd that visually demonstrates the theory presented in the book.

Ethical Hacking


EC-Council - 2003
    A useful tool for those involved in securing networks from outside tampering, this guide to CEH 312-50 certification provides a vendor-neutral perspective for security officers, auditors, security professionals, site admistrators, and others concerned with the integrity of network infrastructures. Complete coverage of footprinting, trojans and backdoors, sniffers, viruses and worms, and hacking Novell and Linux exposes common vulnerabilities and reveals the tools and methods used by security professionals when implementing countermeasures.

Active Directory Cookbook for Windows Server 2003 and Windows 2000


Robbie Allen - 2003
    You also know what a bear it can be. The newer version included with Windows Server 2003 has over 100 new and updated features to simplify deployment, but once it's in place many system administrators still find Active Directory challenging. If you're among those looking for practical hands-on support, help is here with our new Active Directory Cookbook for Windows Server 2003 & Windows 2000, a unique problem-solving guide that offers quick answers for both versions of the directory. The book contains hundreds of step-by-step solutions for both common and uncommon problems that you might encounter with Active Directory on a daily basis--including recipes to deal with the Lightweight Directory Access Protocol (LDAP), multi-master replication, Domain Name System (DNS), Group Policy, the Active Directory Schema, and many other features. Author Robbie Allen, a Senior Systems Architect at Cisco Systems and co-author of our Active Directory tutorial, based this collection of troubleshooting recipes on his own experience, along with input from Windows administrators throughout the industry. Each recipe includes a discussion to explain how and why the solution works, so you can adapt the problem-solving techniques to similar situations. If your company is considering an upgrade from Windows NT or 2000 to Windows Server 2003, the Active Directory Cookbook for Windows Server 2003 & Windows 2000 will help reduce the time and trouble it takes to configure and deploy Active Directory for your network. This Cookbook is also a perfect companion to Active Directory, the tutorial that experts hail as the best source for understanding Microsoft's network directory service. While Active Directory provides the big picture, Active Directory Cookbook for Windows Server 2003 & Windows 2000 gives you the quick solutions you need to cope with day-to-day dilemmas. Together, these books supply the knowledge and tools so you can get the most out of Active Directory to manage users, groups, computers, domains, organizational units, and security policies on your network.

Debugging Applications for Microsoft .NET and Microsoft Windows


John Robbins - 2003
    Learn lethally effective, real-world application debugging techniques for .NET Framework 1.1 and Windows with this fully updated programming guide. Debugging expert John Robbins expands the first edition of his classic debugging book with all-new scenarios and bug-killing tools, tips, and techniques. You’ll see every .NET and Windows debugging scenario here—from XML Web services and Microsoft ASP.NET to Windows services and exceptions. Along with John’s expert guidance, you get more than 6 MB of his battle-tested source code—for the tools and tactics you need to ship better software faster!Topics covered include:Where bugs come from and how to think about solving them Debugging during coding Operating system debugging support and how Win32 debuggers work Advanced debugger usage and .NET debugging with Visual Studio .NET Advanced native code techniques with Visual Studio .NET and WinDBG Extending the Visual Studio .NET integrated development environment Managed exception monitoring Flow tracing and performance Finding source and line information with just a crash address Crash handlers Debugging Windows services and DLLs that load into services Multithreaded deadlocks Automated testing The Debug C run-time library A high-performance tracing tool for server applications Smoothing the working set Appendixes: Reading Dr. Watson log files, plus resources for .NET and Windows developers CD-ROM features:6+ MB of professional-level source code samples written in Microsoft Visual C++®, Visual C#®, and Visual Basic® .NET Debugging Tools for Windows Microsoft .NET Framework 1.1 SDK Windows Application Compatibility Toolkit (ACT) A Note Regarding the CD or DVDThe print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Security+ Certification All-in-One Exam Guide


Gregory B. White - 2003
    Youâ��ll find exam objectives at the beginning of each chapter, helpful exam tips, end-of-chapter practice questions, and photographs and illustrations. The bonus CD-ROM contains a testing engine with questions found only on the CD. This comprehensive guide not only helps you pass this challenging exam, but will also serve as an invaluable on-the-job reference.

Data Structures Using C++


D.S. Malik - 2003
    D.S. Malik is ideal for a one-semester course focused on data structures. Clearly written with the student in mind, this text focuses on Data Structures and includes advanced topics in C++ such as Linked Lists and the Standard Template Library (STL). This student-friendly text features abundant Programming Examples and extensive use of visual diagrams to reinforce difficult topics. Students will find Dr. Malik's use of complete programming code and clear display of syntax, explanation, and example easy to read and conducive to learning.

Microsoft Windows Vista Help Desk


Andy Walker - 2003
    Designed for home users, cubicle dwellers and students everywhere, this book allows the reader to troubleshoot a Vista PC every inch of the way - from internet problems, to printing problems, from network problems to user interface problems.

Absolute Beginner's Guide to Ebay


Michael miller - 2003
    Both first time bidders and experienced sellers will find useful information that will help them make more money from their online auction activities.

Elliptic Curves: Number Theory and Cryptography


Lawrence C. Washington - 2003
    With additional exercises, this edition offers more comprehensive coverage of the fundamental theory, techniques, and applications of elliptic curves. New to the Second EditionChapters on isogenies and hyperelliptic curves A discussion of alternative coordinate systems, such as projective, Jacobian, and Edwards coordinates, along with related computational issues A more complete treatment of the Weil and Tate-Lichtenbaum pairings Doud's analytic method for computing torsion on elliptic curves over Q An explanation of how to perform calculations with elliptic curves in several popular computer algebra systems Taking a basic approach to elliptic curves, this accessible book prepares readers to tackle more advanced problems in the field. It introduces elliptic curves over finite fields early in the text, before moving on to interesting applications, such as cryptography, factoring, and primality testing. The book also discusses the use of elliptic curves in Fermat's Last Theorem. Relevant abstract algebra material on group theory and fields can be found in the appendices.

Encyclopedia of Computer Science and Technology


Harry Henderson - 2003
    With more than 150 black-and-white photographs and illustrations, this title provides an examination of this fascinating field for students and general readers. It covers major corporations and organizations in the computer field.

Graph Algorithms (Algorithms in Java, Part 5)


Robert Sedgewick - 2003
    This important work on computer algorithms has been completely revised, greatly expanded, and completely up-to-date.

Core CSS


Keith Schengili-Roberts - 2003
    Cascading Styles Sheets provide both casual Web authors and professional Web developers with the tools necessary to precisely control such things as the size and appearance of fonts, positioning elements at exact locations on a page--even how a page should be printed or "sound" when played through a compatible browser. This new edition of the book incorporates the latest browser-specific extensions to CSS, as well as the CSS3 specification, providing the most up-to-date information on CSS currently available. Core CSS delivers practical techniques for integrating CSS into Web site development and expert insight into choosing the best style sheet code. Like all Core series books it features hundreds of professional-level code examples.

Finite Element Method: A Practical Course


G.R. Liu - 2003
    Written for engineers and students alike, the aim of the book is to provide the necessary theories and techniques of the FEM for readers to be able to use a commercial FEM package to solve primarily linear problems in mechanical and civil engineering with the main focus on structural mechanics and heat transfer. Fundamental theories are introduced in a straightforward way, and state-of-the-art techniques for designing and analysing engineering systems, including microstructural systems are explained in detail. Case studies are used to demonstrate these theories, methods, techniques and practical applications, and numerous diagrams and tables are used throughout. The case studies and examples use the commercial software package ABAQUS, but the techniques explained are equally applicable for readers using other applications including NASTRAN, ANSYS, MARC, and more. Full sets of PowerPoint slides developed by the authors for their course on FEM are available as a free download from a companion website.

Openoffice.Org for Dummies [With CDROM]


Gurdy Leete - 2003
    Uses the straightforward For Dummies style to show Linux and Windows users how to use the OpenOffice.org desktop productivity suiteOpenOffice.org has a user interface and feature set similar to that of other office suites and works transparently with a variety of file formats, including those of Microsoft OfficeExplains how to download, install, and set up both the Linux and Windows versions of OpenOffice.orgOrganized by the four key desktop applications provided in the OpenOffice.org suite: Writer (word processing), Calc (spreadsheets), Impress (presentations), and Draw (graphics)Other topics covered include creating and formatting documents with Writer, using templates and styles, creating spreadsheets with Calc, manipulating spreadsheet data, creating a presentation with Impress, and creating and editing images with Draw

COM Programming with Microsoft® .NET


John Paul Mueller - 2003
    This in-depth programming guide explains how and where COM and COM+ fit into the new .NET world, demonstrates the new technologies that are available in .NET, and shows how to interoperate between COM/COM+ and .NET. It explains how to use Microsoft Visual Studio® .NET to write traditional COM objects, how to use COM objects in .NET code, and how to use .NET objects as COM objects. It also discusses COM+ topics such as disconnected applications and subscriptions. The authors show you both theoretical and practical approaches—explaining how the mechanisms work and also providing practical advice with sample code to show how to handle interoperability.Topics covered include:The .NET view of COM and COM+COM, COM+, and .NETUsing COM components in .NET codeUsing .NET components in COM applicationsOverview of COM+ coding for .NETWriting COM codeAttributed programmingActive Template Library (ATL) and ATL ServerWriting COM+ codeA simple COM+ exampleWorking with disconnected applicationsCreating subscriptionsWeb application scenariosInteroperabilityInteracting with unmanaged codeAdvanced interactionWorking with predefined interfacesIncludes sample code on the Web

Lego Mindstorm Masterpieces: Building and Programming Advanced Robots


Mario Ferrari - 2003
    The unique style of this book will allow it to cover an incredibly broad range of topics in unparalleled detail. Chapters within the book will include detailed discussions of the mechanics that drive the robot - and also provide step-by-step construction diagrams for each of the robots. This is perfect book for LEGO hobbyists looking to take their skills to the next level whether they build world-class competitive robots or just like to mess around for the fun of it. For experienced users of LEGO Mindstorms, LEGO Mindstorms Masterpiece is composed of three fundamental sections: .Part One: A review of the advanced robot building concepts and theories..Part Two: Step-by-step building instructions for a series of complex models. The companion programming code is included, along with in-depth explanations of concepts needed for the specific models. Robots include Line Followers, Bipeds, Stair and Wall Climbers, a Joystick Controlled Cannon, a Robotic Game Player, Plant Waterer, and a Drink Mixer. .Part Three: Ideas for modifying the building instructions by expanding the pieces and kits. Topics covered: 1.Behavior: This section includes robots designed to interact with the environment, or with other robots. Behavior is the key word as the robots are designed to behave in some specific way, and all the technical details and implementations are secondary to this main goal. 2.Motion: The projects in this category are aimed at solving some specific motion problem. The focus of these robots is on the mechanical techniques rather than on software.3.Interaction: These projects allow the reader to build robots for the purpose of interacting with the user by playing games or responding to user commands in real time.4.Automation: Opposite of the previous category, this one hosts robots designed to perform totally automated operations. These projects will build robots able to complete tasks without human intervention. 5.Calculus: The most abstract of the sections contain robots with minimum knowledge of the external world. Pneumatic ALUs, and Turning machines are fully explained. OAdvanced users need inspiration too! Advanced projects with suggestions for enhancements and improvements make the explanations of the theories and physics of the robots as well as the complete building instructions, make this book extremely useful to readers long after the building of the robots has been completed.OWritten by the "DaVincis of LEGO" and other highly regarded LEGO personalities. This experienced authoring team is assembled of highly respected and visible superstars in the LEGO community.OProven success in the LEGO MINDSTORMS market. Syngress has already had a hit with the bestselling book, Building Robots with LEGO MINDSTORMS"

Oracle PL/SQL by Example


Benjamin Rosenzweig - 2003
    One step at a time, you'll walk through every key task, discovering the most important PL/SQL programming techniques on your own. Building on your hands-on learning, the authors share solutions that offer deeper insights and proven best practices. End-of-chapter projects bring together all the techniques you've learned, strengthening your understanding through real-world practice. This book's approach fully reflects the authors' award-winning experience teaching PL/SQL programming to professionals at Columbia University. New database developers and DBAs can use its step-by-step instructions to get productive fast; experienced PL/SQL programmers can use this book as a practical solutions reference. Coverage includes - Mastering basic PL/SQL concepts and general programming language fundamentals, and understanding SQL's role in PL/SQL - Using conditional and iterative program control techniques, including the new CONTINUE and CONTINUE WHEN statements - Efficiently handling errors and exceptions - Working with cursors and triggers, including Oracle 11g's powerful new compound triggers - Using stored procedures, functions, and packages to write modular code that other programs can execute - Working with collections, object-relational features, native dynamic SQL, bulk SQL, and other advanced PL/SQL capabilities - Handy reference appendices: PL/SQL formatting guide, sample database schema, ANSI SQL standards reference, and more

Dating Design Patterns


Solveig Haugland - 2003
    Their success with women was famous throughout the state. As Christopher said at the time, "Do you have any idea how unusual that is, for guys who read Knuth for fun?" Then the sweet smell of success turned bitter. They realized that their grades were slipping, they were no longer as interested in computer science, and that they had more than once considered careers in marketing. They realized that while it is extremely pleasurable to have the dating world by the tail, that there were Higher Considerations. The scientific advancement and the economy of the world would be destroyed if all geeks were out dancing on Saturday nights instead of debugging. So they suppressed their work and, to distract those who had heard of their remarkable book on patterns, they produced Design Patterns instead. The dating work remained suppressed until the Fifth member of the Gang of Four could keep silent no longer and brought forth the original WordStar manuscripts, additional notes still penciled in the margins. He asked the Gang of Females to edit and publish the work.

UNIX Concepts and Applications


Sumitabha Das - 2003
    

MCSE Self-Paced Training Kit (Exam 70-297): Designing a Microsoft® Windows Server� 2003 Active Directory® and Network Infrastructure: (Exam 70-297); ... Active Directory and Network Infrastructure


Walter Glenn - 2003
    Work at your own pace through a system of lessons, case-study scenarios, and review questions.The Readiness Review Suite on CD, featuring advanced technology from MeasureUp, provides 300 challenging questions for in-depth self-assessment and practice. You can choose timed or untimed testing mode, generate random tests, or focus on specific objectives. You get detailed explanations for right and wrong answers—including a customized learning path that describes how and where to focus your studies.Maximize your performance on the exam by learning how to:Analyze existing business and technical infrastructure Define forest, domain, and OU structure; plan Group Policy implementation Develop Active Directory replication and migration strategies Design DNS, WINS, DHCP, and remote access infrastructure Plan TCP/IP infrastructure and network and routing topology Design Internet connectivity and security services Readiness Review Suite on CD Powered by MeasureUpYour kit includes:NEW—Fully reengineered self-paced study guide with expert exam tips. NEW—Readiness Review Suite featuring 300 questions and multiple testing options. NEW—Case scenarios for real-world design expertise. NEW—180-day evaluation version of Windows Server 2003, Enterprise Edition. NEW—fully searchable eBook. Microsoft Encyclopedia of Networking, Second Edition eBook. NEW—Microsoft Encyclopedia of Security eBook. A Note Regarding the CD or DVDThe print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Web, Graphics & Perl/Tk Programming: Best of the Perl Journal


Jon Orwant - 2003
    Every serious Perl programmer subscribed to it, and every notable Perl guru jumped at the opportunity to write for it. TPJ explained critical Perl topics and demonstrated Perl's utility for fields as diverse as astronomy, biology, economics, AI, and games. Back issues were hoarded, or swapped like trading cards. No longer in print format, The Perl Journal remains a proud and timeless achievement of Perl during one of its most exciting periods of development.Web, Graphics & Perl/Tk is the second volume of The Best of the Perl Journal, compiled and re-edited by the original editor and publisher of The Perl Journal, Jon Orwant. In this series, we've taken the very best (and still relevant) articles published in TPJ over its five years of publication and immortalized them into three volumes.The forty articles included in this volume are simply some of the best Perl articles ever written on the subjects of graphics, the Web, and Perl/Tk, by some of the best Perl authors and coders.Much of Perl's success is due to its capabilities for developing web sites; the Web section covers popular topics such as CGI programs, mod_perl, spidering, HTML parsing, security, and content management. The Graphics section is a grab bag of techniques, ranging from simple graph generation to ray tracing and real-time video digitizing. The Perl/Tk section shows you how to use the popular Perl/Tk toolkit for developing graphical applications that work on both Unix/Linux and Windows without a single change.Written by twenty-three of the most prominent and prolific members of the closely-knit Perl community, including Lincoln Stein, Mark-Jason Dominus, Alligator Descartes, and Dan Brian, this anthology does what no other book can, giving unique insight into the real-life applications and powerful techniques made possible by Perl.

Protocols for Authentication and Key Establishment


Colin Boyd - 2003
    The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.This is the first comprehensive and integrated treatment of these protocols. It allows researchers and practitioners to quickly access a protocol for their needs and become aware of existing protocols which have been broken in the literature.As well as a clear and uniform presentation of the protocols this book includes a description of all the main attack types and classifies most protocols in terms of their properties and resource requirements. It also includes tutorial material suitable for graduate students.

Excel Pocket Guide


Curtis D. Frye - 2003
    Chances are good that you use Excel. And no matter what your level of expertise, you'll want a copy of the Excel Pocket Guide close by.Packed with information, the Excel Pocket Guide is a compact reference that covers such basics as creating workbooks, entering data, printing, cell formatting, and spell checking. For more advanced users, the book provides handy information on formulas, pivot tables, collaboration, and customization. This helpful guide is easy to use anywhere -- it's the perfect quick reference for all users who want to complete tasks faster without having to wade through a five hundred-page tutorial.If you're new to Excel, this book will get you up to speed quickly. If you consider yourself an advanced user, you'll be surprised and pleased with some of the new Excel tricks this book will teach you. The Excel Pocket Guide will help users at all levels of expertise become Excel experts.

C# Programmer's Handbook


Gregory S. MacBeth - 2003
    All I really wanted was a book that defined the language and showed me simple examples of how to use the .NET Framework. I hope that you will find this book helpful and useful in learning C#. As you read this book, please keep in mind that my goal was to provide you with simple samples showing you how to use this language to do common tasks. I stripped out all but the essential code. Specifically, I removed safeguards such as exception handling that would normally be present in all good code. I advise you strongly to use exception handling in your own code. I have also included in this book material that will be in the next major release of C#, such as generics, anonymous methods, iterators, and more. I wish you the best of luck in your coding. xix Part One C# Language Basics CHAPTER 1 Common Type System - Identifiers and Naming Conventions - Variables - Value Types - Reference Type Variables - Constant and Static Values - Scopes - Casting and Class Conversion 3 Chapter 1 Identifiers and Naming Conventions Identifiers are used to describe allocated memory types such as integer, longs, classes, and other types defined by C# or by you, as the developer. The rules for identifiers are simple: - Identifiers can start with any Unicode letter or an underscore.

The Concise Penguin Dictionary of Computing


Dick Pountain - 2003
    Covering terms from A20 to Zip drive, The Concise Penguin Dictionary of Computing uses straightforward prose to explain fundamental computing concepts in detail. Clarifying jargon, software packages, hardware, and cyberspace, this volume is as up-to-date as it is thorough. Written with both Mac addicts and PC-owners in mind, this is an invaluable tool for novices, programmers, and engineers alike.

Professional PHP Web Services


James Fuller - 2003
    With successful demonstration of proof of concept, Web Services are gradually moving towards occupying an important space in enterprise computing. In this book, we will discuss the consumption, development and deployment, description, discovery and security of Web Services in conjunction with the PHP programming model for Web services.This book is developed keeping in mind two main audiences: The first and major audience consists of programmers that would like to learn how to consume and deploy Web Services using PHP, HTTP as a transport mechanism, and SOAP as the messaging format The second audience consists of readers that want to learn how to integrate and interoperate PHP applications with existing and new applications written on other platforms. These platforms consist of .NET (MS .NET, Rotor and Mono), Perl, Python and JavaAuthor Biography: Ken Egervari is a 22-year-old entrepreneur and author from Windsor, Ontario Canada who is a technology enthusiast and software architect. He has written several types of applications ranging from networking to entertainment and the enterprise. He has used various languages such as Assembly, C, C++, Java, SQL, PHP, DHTML, and others. Ken is co-author of Professional PHP4 and Professional PHP4 XML from Wrox Press.James Fuller has 15 yrs commercial programming experience in a variety of languages. He has been technical director of some large Internet companies and currentlyholds this position at on-IDLE Ltd. He is a regular contributor to the XSL-List. He would like to play chess more and learn the Czech language.

Introduction to Bioinformatics: A Theoretical and Practical Approach


Stephen A. Krawetz - 2003
    Krawetz, PhD Wayne State University School of Medicine, Detroit MI and David D. Womble, PhD Wayne State University School of Medicine, Detroit, MI Springer Science+ Business Media, LLC (c) 2003 Springer Science+Business Media New York Originally published by Humana Press !ne. in 2003 Softcover reprint of the hardcover 1 st edition 2003 humanapress.com Ali rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, microfilming, recording, or otherwise without written permission from the Publisher. Ali papers, comments, opinions, conclusions, or recommendations are those of the author(s), and do not necessarily reflect the views of the publisher. This publication is printed on acid-free paper. G) ANSI Z39.48-1984 (American Standards Institute) Permanence of Paper for Printed Library Materials. Production Editor: Mark J. Breaugh. Cover design by Patricia F. Cleary and Paul A. Thiessen. Cover illustration by Paul A. Thiessen, chemicalgraphics.com.

Literacy In The Information Age: Inquiries Into Meaning Making With New Technologies


Bertram C. Bruce - 2003
    The pieces build on specific examples from classrooms, Web use, and other experiences with new digital information and communication environments.

Principles and Practices of Interconnection Networks


William James Dally - 2003
    Interconnection networks offer an attractive and economical solution to this communication crisis and are fast becoming pervasive in digital systems. Current trends suggest that this communication bottleneck will be even more problematic when designing future generations of machines. Consequently, the anatomy of an interconnection network router and science of interconnection network design will only grow in importance in the coming years.This book offers a detailed and comprehensive presentation of the basic principles of interconnection network design, clearly illustrating them with numerous examples, chapter exercises, and case studies. It incorporates hardware-level descriptions of concepts, allowing a designer to see all the steps of the process from abstract design to concrete implementation.

SAP Authorization System: Design and Implementation of Authorization concepts for SAP R/3 and SAP Enterprise Portals


IBM Business Consulting GmbH - 2003
    Take advantage of a proven Phase Model to help you navigate through all of the stages leading up to the implementation and deployment of an authorization concept, from the procedural steps required to design the concept, to the production phase, and lastly, to the supervision phase. In addition, you'll quickly learn how to set up authorization via the SAP R/3 Profile Generator. This book provides in-depth coverage of the special security requirements of the SAP Enterprise Portal as well as the SAP R/3 standards and infrastructure, which serve as a framework to develop and support SAP Authorization concepts. Highlights include: - Special features of the SAP Authorization System - Fundamental principles of the SAP Authorization concept - Internal Control System (ICS) - Best practices for the design phase - Best practices for the production phase - Testing of Authorization concepts - Audit Information System (AIS) - SAP Enterprise Portal: components, access control and administration, integration, and more!

MCSE Self-Paced Training Kit (Exam 70-294): Planning, Implementing, and Maintaining a Microsoft(r) Windows Server(tm) 2003 Active Directory(r) Infrastruct


Jill Spealman - 2003
    MCSE SELF PACED KT EXAM 70294 WIN SVR AD

Hacker Disassembling Uncovered


Kris Kaspersky - 2003
    Covered are the hacking methods used to analyze programs using a debugger and disassembler. These methods include virtual functions, local and global variables, branching, loops, objects and their hierarchy, and mathematical operators. Also covered are methods of fighting disassemblers, self-modifying code in operating systems, and executing code in the stack. Advanced disassembler topics such as optimizing compilers and movable code are discussed as well.

The Adobe Photoshop CS Book for Digital Photographers


Scott Kelby - 2003
    This book covers topics which include the secrets of how the pros retouch portraits; how to color correct any photo without breaking a sweat (you'll be amazed at how they do it!); how to unlock the power of Photoshop CS' new features for digital photo pros; and others.

Excel 2003 Bible [With CDROM]


John Walkenbach - 2003
    Spreadsheet," John Walkenbach, who has written more than thirty books and 300 articles on related topics and maintains the popular Spreadsheet Page at www.j-walk.com/ssThe definitive reference book for beginning to advanced users, featuring expert advice and hundreds of examples, tips, techniques, shortcuts, work-arounds, and moreCovers expanded use of XML and Web services to facilitate data reporting, analysis, importing, and exporting informationExplores Excel programming for those who want advanced informationCD-ROM includes all templates and worksheets used in the book, as well as sample chapters from all Wiley Office "X" related Bibles and useful third party software, including John Walkenbach's Power Utility PakNote: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Windows XP Killer Tips


Kleber Stephenson - 2003
    The Killer Tips series was developed because the author recognized how useful technology users find those cool "I didn't know THAT" sidebars that are peppered all over the other computer books out there. This title is all about speed; showing XP users how to get more work done faster, while actually increasing quality.

Programming for Linguists: Perl for Language Researchers


Michael Hammond - 2003
    It provides the general reader with an interest in language with the most usable and relevant aspects of Perl for writing programs that deal with language. Exposes the general reader with an interest in language to the most usable and relevant aspects of Perl for writing programs that deal with language. Contains simple examples and exercises that gradually introduce the reader to the essentials of good programming. Assumes no prior programming experience. Accompanied by exercises at the end of each chapter and offers all the code on the companion website: http: //www.u.arizona.edu/ hammond

Understanding FFT Applications


Anders E. Zonst - 2003
    (In fact, it assumes only a high school mathematics education.) Zonst (credentials not noted) uses practical puzzles to develop many of the fundamental theorems, stressing the nature and significance of convolution throughout the book. Supporting material appears on the accompanying compact disk. Annotation ©2004 Book News, Inc., Portland, OR

Windows XP Hacks & Mods for Dummies


Woody Leonhard - 2003
    Make it run YOUR way. Get rid of the stuff that doesn't help you do what you want to do. Soup up security so you're better protected against spyware and other nasties. Find things faster with more efficient searches. Woody Leonhard shows you exactly how to do it in Windows XP Hacks & Mods For Dummies. Don't let the word "hack" intimidate you. Woody walks you through every suggested adjustment step by step. He even provides plenty of explanation about what's involved and what tools you need. Windows XP Hacks & Mods For Dummies even gives you a convenient list of common hacks you should avoid because they don't accomplish much. You'll discover how to:Eliminate the annoying features that came pre-installed on your PC Speed up your system performance Pin programs, folders, files, and Web pages so they appear on your Start menu Launch applications more quickly Boost the performance of your favorite games Get the most from your iPod and Windows Media Player Navigate peer-to-peer file sharing safely Find free virus protection In the fun and friendly Dummies style, Woody Leonhard gives you tons of helpful advice to make your relationship with Windows XP a lot more rewarding.

Data Mining Techniques With Mastering Data Mining Set


Michael J.A. Berry - 2003
    Packed with more than forty percent new and updated material, this edition shows business managers, marketing analysts, and data mining specialists how to harness fundamental data mining methods and techniques to solve common types of business problems Each chapter covers a new data mining technique, and then shows readers how to apply the technique for improved marketing, sales, and customer support The authors build on their reputation for concise, clear, and practical explanations of complex concepts, making this book the perfect introduction to data mining More advanced chapters cover such topics as how to prepare data for analysis and how to create the necessary infrastructure for data mining Covers core data mining techniques, including decision trees, neural networks, collaborative filtering, association rules, link analysis, clustering, and survival analysis

Storage Networks


Robert Spalding - 2003
    A comprehensive, hands-on guide to storage networking technologies including SAN, NAS, Fibre Channel, file systems, virtualisation, database storage, snapshots, and emerging technology standards including iSCSI, InfiniBand, and storage provisioning.

Computational Homology


Tomasz Kaczynski - 2003
    This book uses a computer to develop a combinatorial computational approach to the subject. The core of the book deals with homology theory and its computation. Following this is a section containing extensions to further developments in algebraic topology, applications to computational dynamics, and applications to image processing. Included are exercises and software that can be used to compute homology groups and maps. The book will appeal to researchers and graduate students in mathematics, computer science, engineering, and nonlinear dynamics.

Introduction to Microprocessors and Microcontrollers


John Crisp - 2003
    Practical work and knowledge-check questions contribute to building a thorough understanding with a practical focus. The book concludes with a step-by-step walk through a project based on the PIC microcontroller. The concise but clearly written text makes this an ideal book for electronics and IT students and a wide range of technicians and engineers, including IT systems support staff, and maintenance / service engineers.

Digital Calligraphy: How to Create Perfect Lettering from Your Desktop


George Lawrie Thomson - 2003
    Adobe Illustrator and CorelDRAW are featured. Color examples of modified art and completely digital works are provided. Annotation ©2004 Book News, Inc., Portland, OR

Finite-State Morphology


Kenneth R. Beesley - 2003
    This volume is a practical guide to finite-state theory and the affiliated programming languages lexc and xfst. Readers will learn how to write tokenizers, spelling checkers, and especially morphological analyzer/generators for words in English, French, Finnish, Hungarian, and other languages.Included are graded introductions, examples, and exercises suitable for individual study as well as formal courses. These take advantage of widely-tested lexc and xfst applications that are just becoming available for noncommercial use via the Internet.

Managing Information Technology Projects: Applying Project Management Strategies to Software, Hardware, and Integration Initiatives


James Taylor - 2003
    Computerworld magazine recently reported several surveys showing that project failure is overwhelmingly traceable to poorly defined project organization, a lack of training, weak executive support, inconsistent methods and policies, and other readily addressed factors.Managing Information Technology Projects gives systems project managers field-proven tools and step-by-step methodologies to start and complete every project -- hardware, software, or integration -- within prescribed parameters. Coverage includes:* Organizing information technology project teams and developing project plans* Risk management issues for IT projects* Systems engineering* Customer requirements and service* Project monitoring, control, closeout, and assessment"

E Learning Tools and Technologies: A Consumer's Guide for Trainers, Teachers, Educators, and Instructional Designers


William Horton - 2003
    But in order to implement an E-Learning program, you'll have to wade through hundreds of learning management systems, learning content management systems, authoring schools, and collaboration environments to determine what solution will work best for your situation. In this in-depth book, recognized E-Learning experts William and Katherine Horton survey the entire field of E-Learning tools for you. They provide you with a systematic way to identify, evaluate, and choose products and services based on different E-Learning scenarios. In this no-holds barred look at E-Learning tools, the authors: * Arm you with a complete list of questions to ask vendors before you commit to a product * Describe product limitations throughout each chapter and include special Rant sections that you must read * Present tips and tricks as well as common mistakes to avoid * List potential vendors and contact information by tool category The companion Web site contains design forms, checklists of features to look for in the various tool categories, spreadsheets, and lists of specific tools and vendors.

Windows XP Professional: The Missing Manual: The Missing Manual


David Pogue - 2003
    In its first year, XP became the fastest-selling Windows OS ever. But one major failing remains unaddressed: XP Pro comes without a single page of printed instructions. This superbly written guide fills the gap. Coauthored by David Pogue, New York Times technology columnist and Missing Manuals creator, Windows XP Pro: The Missing Manual uses wit, technical insight, and scrupulous objectivity to light the way for first-time and intermediate PC fans. The book reveals which features work well and which don't, such as the Remote Desktop software that enables people to connect to the office from home, the encryption file system that protects sensitive information, and the Windows Messenger that enables real-time text, voice and video communication. Contents include:Getting started. The book's early chapters cover using menus, finding lost files, reducing window clutter, and taming the new, multi-column Start menu. Mastering the network. Special chapters help you navigate the corporate network, dial in from the road, and even set up your own small-office (peer-to-peer) network, step by step. Understanding security. User accounts, file encryption, and the NTFS file system keep your private files private, while still offering network access to coworkers you specify. Flying the Net. This book demystifies Outlook Express 6 for email, Internet Explorer 6 for Web browsing, and the new Windows Messenger for voice, chat, and video conferencing.Windows XP Pro: The Missing Manual isn't for system administrators or OS theory geeks; it's for the novice or budding power user who wants to master the machine and get down to work. Yet, anyone who uses XP Pro (including hardcore techies) will find this new system much easier -- and more fun -- to digest with this new Missing Manual. This is the crystal-clear, jargon-free book that should have been in the box.

Microsoft Visual Basic .NET Programmers Cookbook


Matthew McDonald - 2003
    This PROGRAMMER’S COOKBOOK provides at-a-glance reference to hundreds of Visual Basic .NET programming scenarios using a concise, problem/solution format. The book’s organized so you can quickly zero in on the topics and answers you need—with practical examples, code snippets, best practices, and undocumented secrets that get the job done. No half-baked solutions. Get expert code from expert developers.Get hundreds of recipes covering every application type—from Microsoft Windows to Web pages, Web services, remote components, and Windows services. Learn when to use lower-level Win32 APIs and COM components vs. the Microsoft .NET Framework Discover practical ways to deal with XML data and handle data binding with Microsoft ADO.NET. Build object-oriented components from scratch to access FTP sites, contact POP mail servers, and work with vectors, fractions, and complex numbers. Extend the reach of your Windows applications with WMI and use JavaScript to enhance Web pages. Tackle advanced techniques for multithreading, .NET Remoting, reflection, and cryptography. Uncover free third-party components to read zip files, write PDF documents, show menus in Microsoft ASP.NET, and more. Get all the book’s code recipes on line.

The Government Machine: A Revolutionary History of the Computer


Jon Agar - 2003
    He argues that this transformation has been tied to the rise of "expert movements," groups whose authority has rested on their expertise. The deployment of machines was an attempt to gain control over state action -- a revolutionary move. Agar shows how mechanization followed the popular depiction of government as machine-like, with British civil servants cast as components of a general purpose "government machine"; indeed, he argues that today's general purpose computer is the apotheosis of the civil servant.Over the course of two centuries, government has become the major repository and user of information; the Civil Service itself can be seen as an information-processing entity. Agar argues that the changing capacities of government have depended on the implementation of new technologies, and that the adoption of new technologies has depended on a vision of government and a fundamental model of organization. Thus, to study the history of technology is to study the state, and vice versa.

Heterogeneous Computing with OpenCL


Benedict Gaster - 2003
    Designed to work on multiple platforms and with wide industry support, OpenCL will help you more effectively program for a heterogeneous future.Written by leaders in the parallel computing and OpenCL communities, this book will give you hands-on OpenCL experience to address a range of fundamental parallel algorithms. The authors explore memory spaces, optimization techniques, graphics interoperability, extensions, and debugging and profiling. Intended to support a parallel programming course, Heterogeneous Computing with OpenCL includes detailed examples throughout, plus additional online exercises and other supporting materials.Explains principles and strategies to learn parallel programming with OpenCL, from understanding the four abstraction models to thoroughly testing and debugging complete applications.Covers image processing, web plugins, particle simulations, video editing, performance optimization, and more.Shows how OpenCL maps to an example target architecture and explains some of the tradeoffs associated with mapping to various architecturesAddresses a range of fundamental programming techniques, with multiple examples and case studies that demonstrate OpenCL extensions for a variety of hardware platforms

The Art of 3D Computer Animation and Effects


Isaac Victor Kerlow - 2003
    Along with helpful insights into the newest techniques available in the latest software programs and hardware, this new edition provides solid conceptual and critical basics through a combination of technical explanations and creative techniques. Creative vision can be brought to life on the screen through an easy-to-understand, step-by-step approach supported by full-color sample work by such leading companies as Pixar Animation Studios, Square, DreamWorks SKG, Fox, Disney, and many independent artists and studios. Isaac Victor Kerlow (Los Angeles, CA) is Director of Digital Production at the Walt Disney Company and a longtime active member of SIGGRAPH and the Visual Effects Society.

The Complete FreeBSD: Documentation from the Source


Greg Lehey - 2003
    Originally a community effort by the University of California at Berkeley, FreeBSD was aimed at making Unix a little friendlier and easier to use. By the time other free operating systems came along, BSD was firmly established and very reliable. And it continues to be today.For seven years, the FreeBSD community has relied on Greg Lehey's classic, "The Complete FreeBSD," to guide them through its configuration and administration. The 4th edition, covering version 5 of FreeBSD, is now available through O'Reilly Community Press."The Complete FreeBSD" is an eminently practical guidebook that explains not only how to get a computer up and running with the FreeBSD operating system, but also how to turn it into a highly functional and secure server that can host large numbers of users and disks, support remote access, and provide web service, mail service, and other key parts of the Internet infrastructure. The book provides in-depth information on installation and updates, back-ups, printers, RAID, various Internet services, firewalls, the graphical X Window system, and much more. Author Greg Lehey is a member of the FreeBSD core team and has been developing, documenting, and advocating for FreeBSD for nearly ten years. Whether you're an experienced Unix user or just interested in learning more about this free operating system and how you can put it to work for you, this do-it-yourself BSD documentation will provide the information you need."The Complete FreeBSD" is the second release in the O'Reilly Community Press Series. Unlike classic O'Reilly animal books, which are created to fill an information void, the Community Press titles provide convenient printed copies of documentation that is already available online. O'Reilly's role in the series is limited to providing manufacturing and distribution services rather than editorial development, so that each Community Press title reflects the editorial voice and organization of the community that has created it.

The New Media Reader [With CDROM]


Noah Wardrip-Fruin - 2003
    General introductions by Janet Murray and Lev Manovich, along with short introductions to each of the texts, place the works in their historical context and explain their significance. The texts were originally published between World War II--when digital computing, cybernetic feedback, and early notions of hypertext and the Internet first appeared--and the emergence of the World Wide Web--when they entered the mainstream of public life.The texts are by computer scientists, artists, architects, literary writers, interface designers, cultural critics, and individuals working across disciplines. The contributors include (chronologically) Jorge Luis Borges, Vannevar Bush, Alan Turing, Ivan Sutherland, William S. Burroughs, Ted Nelson, Italo Calvino, Marshall McLuhan, Billy Kl?Jean Baudrillard, Nicholas Negroponte, Alan Kay, Bill Viola, Sherry Turkle, Richard Stallman, Brenda Laurel, Langdon Winner, Robert Coover, and Tim Berners-Lee. The CD accompanying the book contains examples of early games, digital art, independent literary efforts, software created at universities, and home-computer commercial software. Also on the CD is digitized video, documenting new media programs and artwork for which no operational version exists. One example is a video record of Douglas Engelbart's first presentation of the mouse, word processor, hyperlink, computer-supported cooperative work, video conferencing, and the dividing up of the screen we now call non-overlapping windows; another is documentation of Lynn Hershman's Lorna, the first interactive video art installation.

Intermediate Perl


Randal L. Schwartz - 2003
    One slogan of Perl is that it makes easy things easy and hard things possible. "Intermediate Perl" is about making the leap from the easy things to the hard ones.Originally released in 2003 as "Learning Perl Objects, References, and Modules" and revised and updated for Perl 5.8, this book offers a gentle but thorough introduction to intermediate programming in Perl. Written by the authors of the best-selling "Learning Perl," it picks up where that book left off. Topics include: Packages and namespacesReferences and scopingManipulating complex data structuresObject-oriented programmingWriting and using modulesTesting Perl codeContributing to CPANFollowing the successful format of "Learning Perl," we designed each chapter in the book to be small enough to be read in just an hour or two, ending with a series of exercises to help you practice what you've learned. To use the book, you just need to be familiar with the material in "Learning Perl" and have ambition to go further.Perl is a different language to different people. It is a quick scripting tool for some, and a fully-featured object-oriented language for others. It is used for everything from performing quick global replacements on text files, to crunching huge, complex sets of scientific data that take weeks to process. Perl is what you make of it. But regardless of what you use Perl for, this book helps you do it more effectively, efficiently, and elegantly."Intermediate Perl" is about learning to use Perl as a programming language, and not just a scripting language. This is the book that turns the Perl dabbler into the Perl programmer.

Game Coding Complete


Mike McShaffry - 2003
    The best description of the first edition comes from two Amazon reviewers; the first proclaiming, "I got the same feeling of enlightenment when reading this one as I did all those years ago when I read the classic book "Code Complete" and the second stating "This is the first game book I have read that I was sorry when I got to the end because there wasn't any more."For Game Coding Complete, Second Edition, McShaffry returns with many more of his highly popular, shoot-from the hips war stories and expert game programming insight that only a real insider could provide. McShaffry uses his experience as a leading programmer for Origin Systems, Microsoft, and Ion Storm a division of Eidos, to illustrate real-world techniques and solutions, including examples from his recent work on the major game, Thief Deadly Shadows. Game Coding Complete, Second Edition takes programmers through the complete process of developing a professional quality game using hundreds of insider tricks and techniques developed and perfect by the author from over a decade of game development experience. It covers a range of topics that will appeal to the most discriminating programmers such as key "gotcha" issues that could trip up even veteran programmers. The new edition features expanded coverage of 3D programming, several new chapters on game interface design, game audio, game scripting, game engine technology, code optimization, production and scheduling, plus it now includes a CD-ROM packed with valuable source code and game development tools. The appendix offers solid advice on starting your own game company. The C++ language is used to explain specific programming concepts with added discussion of development with C# and Managed DirectX programming.

The Official Samba-3 Howto and Reference Guide


Jelmer Vernooij - 2003
    It begins with the information published by the Samba Team and volunteers around the world. This book includes: essential Samba-3 information that leverages your Windows networking knowledge; detailed coverage of Samba-3's powerful new user/machine account management, network browsing, and more.