Best of
Computers

2005

The Elements of Computing Systems: Building a Modern Computer from First Principles


Noam Nisan - 2005
    The books also provides a companion web site that provides the toold and materials necessary to build the hardware and software.

Head First Java


Kathy Sierra - 2005
    You might think the problem is your brain. It seems to have a mind of its own, a mind that doesn't always want to take in the dry, technical stuff you're forced to study. The fact is your brain craves novelty. It's constantly searching, scanning, waiting for something unusual to happen. After all, that's the way it was built to help you stay alive. It takes all the routine, ordinary, dull stuff and filters it to the background so it won't interfere with your brain's real work--recording things that matter. How does your brain know what matters? It's like the creators of the Head First approach say, suppose you're out for a hike and a tiger jumps in front of you, what happens in your brain? Neurons fire. Emotions crank up. Chemicals surge. That's how your brain knows.And that's how your brain will learn Java. Head First Java combines puzzles, strong visuals, mysteries, and soul-searching interviews with famous Java objects to engage you in many different ways. It's fast, it's fun, and it's effective. And, despite its playful appearance, Head First Java is serious stuff: a complete introduction to object-oriented programming and Java. You'll learn everything from the fundamentals to advanced topics, including threads, network sockets, and distributed programming with RMI. And the new. second edition focuses on Java 5.0, the latest version of the Java language and development platform. Because Java 5.0 is a major update to the platform, with deep, code-level changes, even more careful study and implementation is required. So learning the Head First way is more important than ever. If you've read a Head First book, you know what to expect--a visually rich format designed for the way your brain works. If you haven't, you're in for a treat. You'll see why people say it's unlike any other Java book you've ever read.By exploiting how your brain works, Head First Java compresses the time it takes to learn and retain--complex information. Its unique approach not only shows you what you need to know about Java syntax, it teaches you to think like a Java programmer. If you want to be bored, buy some other book. But if you want to understand Java, this book's for you.

Time Management for System Administrators: Stop Working Late and Start Working Smart


Thomas A. Limoncelli - 2005
    No other job pulls people in so many directions at once. Users interrupt you constantly with requests, preventing you from getting anything done. Your managers want you to get long-term projects done but flood you with reques ... Available here:readmeaway.com/download?i=0596007833Time Management for System Administrators: Stop Working Late and Start Working Smart PDF by Thomas A. LimoncelliRead Time Management for System Administrators: Stop Working Late and Start Working Smart PDF from O'Reilly Media,Thomas A. LimoncelliDownload Thomas A. Limoncelli’s PDF E-book Time Management for System Administrators: Stop Working Late and Start Working Smart

Head First HTML with CSS & XHTML


Elisabeth Robson - 2005
    You want to learn HTML so you can finally create those web pages you've always wanted, so you can communicate more effectively with friends, family, fans, and fanatic customers. You also want to do it right so you can actually maintain and expand your Web pages over time, and so your web pages work in all the browsers and mobile devices out there. Oh, and if you've never heard of CSS, that's okay - we won't tell anyone you're still partying like it's 1999 - but if you're going to create Web pages in the 21st century then you'll want to know and understand CSS.Learn the real secrets of creating Web pages, and why everything your boss told you about HTML tables is probably wrong (and what to do instead). Most importantly, hold your own with your co-worker (and impress cocktail party guests) when he casually mentions how his HTML is now strict, and his CSS is in an external style sheet.With Head First HTML with CSS & XHTML, you'll avoid the embarrassment of thinking web-safe colors still matter, and the foolishness of slipping a font tag into your pages. Best of all, you'll learn HTML and CSS in a way that won't put you to sleep. If you've read a Head First book, you know what to expect: a visually-rich format designed for the way your brain works. Using the latest research in neurobiology, cognitive science, and learning theory, this book will load HTML, CSS, and XHTML into your brain in a way that sticks.So what are you waiting for? Leave those other dusty books behind and come join us in Webville. Your tour is about to begin."Elegant design is at the core of every chapter here, each concept conveyed with equal doses of pragmatism and wit." --Ken Goldstein, Executive Vice President, Disney Online"This book is a thoroughly modern introduction to forward-looking practices in web page markup and presentation." --Danny Goodman, author of Dynamic HTML: The Definitive Guide"What used to be a long trial and error learning process has now been reduced neatly into an engaging paperback." --Mike Davidson, CEO, Newsvine, Inc."I love Head First HTML with CSS & XHTML--it teaches you everything you need to learn in a 'fun coated' format!" --Sally Applin, UI Designer and Artist"I haven't had as much fun reading a book (other than Harry Potter) in years. And your book finally helped me break out of my hapless so-last-century way of creating web pages." --Professor David M. Arnow, Department of Computer and Information Science, Brooklyn College"If you've ever had a family member who wanted you to design a website for them, buy them Head First HTML with CSS and XHTML. If you've ever asked a family member to design you a web site, buy this book. If you've ever bought an HTML book and ended up using it to level your desk, or for kindling on a cold winter day, buy this book. This is the book you've been waiting for. This is the learning system you've been waiting for." --Warren Kelly, Blogcritics.org

On the Edge: The Spectacular Rise and Fall of Commodore


Brian Bagnall - 2005
    Before Apple, IBM, or Dell, Commodore was the first computer maker to market its machines to the public, selling an estimated 22 million Commodore 64s. These halcyon days were tumultuous, however, owing to the expectations and unsparing tactics of founder Jack Tramiel. Engineers and managers with the company between 1976 and 1994 share their experiences of the groundbreaking moments, soaring business highs, and stunning employee turnover that came along with being on top of the PC world in the early days.

Java Puzzlers: Traps, Pitfalls, and Corner Cases


Joshua Bloch - 2005
    This lively book reveals oddities of the Java programming language through entertaining and thought-provoking programming puzzles.--Guy Steele, Sun Fellow and coauthor of The Java(TM) Language SpecificationI laughed, I cried, I threw up (my hands in admiration).--Tim Peierls, president, Prior Artisans LLC, and member of the JSR 166 Expert GroupHow well do you really know Java? Are you a code sleuth? Have you ever spent days chasing a bug caused by a trap or pitfall in Java or its libraries? Do you like brainteasers? Then this is the book for you!In the tradition of Effective Java(TM), Bloch and Gafter dive deep into the subtleties of the Java programming language and its core libraries. Illustrated with visually stunning optical illusions, Java(TM) Puzzlers features 95 diabolical puzzles that educate and entertain. Anyone with a working knowledge of Java will understand the puzzles, but even the most seasoned veteran will find them challenging.Most of the puzzles take the form of a short program whose behavior isn't what it seems. Can you figure out what it does? Puzzles are grouped loosely according to the features they use, and detailed solutions follow each puzzle. The solutions go well beyond a simple explanation of the program's behavior--they show you how to avoid the underlying traps and pitfalls for good. A handy catalog of traps and pitfalls at the back of the book provides a concise taxonomy for future reference.Solve these puzzles and you'll never again fall prey to the counterintuitive or obscure behaviors that can fool even the most experienced programmers.

Professional JavaScript for Web Developers


Nicholas C. Zakas - 2005
    This 4-book set includes:Professional JavaScript for Web Developers (ISBN: 0764579088) Professional Ajax 2nd edition (ISBN: 0470109491) Professional Web 2.0 Programming (ISBN: 0470087889) Professional Rich Internet Applications: Ajax and Beyond (ISBN: 0470082801)

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks


Michal Zalewski - 2005
    Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.

Linux Bible


Christopher Negus - 2005
    Whether you're new to Linux or need a reliable update and reference, this is an excellent resource. Veteran bestselling author Christopher Negus provides a complete tutorial packed with major updates, revisions, and hands-on exercises so that you can confidently start using Linux today. Offers a complete restructure, complete with exercises, to make the book a better learning tool Places a strong focus on the Linux command line tools and can be used with all distributions and versions of Linux Features in-depth coverage of the tools that a power user and a Linux administrator need to get startedThis practical learning tool is ideal for anyone eager to set up a new Linux desktop system at home or curious to learn how to manage Linux server systems at work.

The Tcp/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference


Charles Kozierok - 2005
    It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet and much more. The author offers not only a detailed view of the TCP/IP protocol suite, but also describes networking fundamentals and the important OSI Reference Model.

Practical Common LISP


Peter Seibel - 2005
    This is the first book that introduces Lisp as a language for the real world.Practical Common Lisp presents a thorough introduction to Common Lisp, providing you with an overall understanding of the language features and how they work. Over a third of the book is devoted to practical examples, such as the core of a spam filter and a web application for browsing MP3s and streaming them via the Shoutcast protocol to any standard MP3 client software (e.g., iTunes, XMMS, or WinAmp). In other "practical" chapters, author Peter Seibel demonstrates how to build a simple but flexible in-memory database, how to parse binary files, and how to build a unit test framework in 26 lines of code.

Perl Best Practices: Standards and Styles for Developing Maintainable Code


Damian Conway - 2005
    They aren't conscious of all the choices they make, like how they format their source, the names they use for variables, or the kinds of loops they use. They're focused entirely on problems they're solving, solutions they're creating, and algorithms they're implementing. So they write code in the way that seems natural, that happens intuitively, and that feels good.But if you're serious about your profession, intuition isn't enough. Perl Best Practices author Damian Conway explains that rules, conventions, standards, and practices not only help programmers communicate and coordinate with one another, they also provide a reliable framework for thinking about problems, and a common language for expressing solutions. This is especially critical in Perl, because the language is designed to offer many ways to accomplish the same task, and consequently it supports many incompatible dialects.With a good dose of Aussie humor, Dr. Conway (familiar to many in the Perl community) offers 256 guidelines on the art of coding to help you write better Perl code--in fact, the best Perl code you possibly can. The guidelines cover code layout, naming conventions, choice of data and control structures, program decomposition, interface design and implementation, modularity, object orientation, error handling, testing, and debugging.They're designed to work together to produce code that is clear, robust, efficient, maintainable, and concise, but Dr. Conway doesn't pretend that this is the one true universal and unequivocal set of best practices. Instead, Perl Best Practices offers coherent and widely applicable suggestions based on real-world experience of how code is actually written, rather than on someone's ivory-tower theories on how software ought to be created.Most of all, Perl Best Practices offers guidelines that actually work, and that many developers around the world are already using. Much like Perl itself, these guidelines are about helping you to get your job done, without getting in the way.Praise for Perl Best Practices from Perl community members:"As a manager of a large Perl project, I'd ensure that every member of my team has a copy of Perl Best Practices on their desk, and use it as the basis for an in-house style guide." -- Randal Schwartz"There are no more excuses for writing bad Perl programs. All levels of Perl programmer will be more productive after reading this book." -- Peter Scott"Perl Best Practices will be the next big important book in the evolution of Perl. The ideas and practices Damian lays down will help bring Perl out from under the embarrassing heading of "scripting languages". Many of us have known Perl is a real programming language, worthy of all the tasks normally delegated to Java and C++. With Perl Best Practices, Damian shows specifically how and why, so everyone else can see, too." -- Andy Lester"Damian's done what many thought impossible: show how to build large, maintainable Perl applications, while still letting Perl be the powerful, expressive language that programmers have loved for years." -- Bill Odom"Finally, a means to bring lasting order to the process and product of real Perl development teams." -- Andrew Sundstrom"Perl Best Practices provides a valuable education in how to write robust, maintainable P

File System Forensic Analysis


Brian Carrier - 2005
    Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.

Reversing: Secrets of Reverse Engineering


Eldad Eilam - 2005
    The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into disassembly-code-level reverse engineering-and explaining how to decipher assembly language

iCon: Steve Jobs, the Greatest Second Act in the History of Business


Jeffrey S. Young - 2005
    Drawing on a wide range of sources, Jeffrey Young and William Simon provide new perspectives on the legendary creation of Apple, detail Jobs's meteoric rise, and the devastating plunge that left him not only out of Apple, but out of the computer-making business entirely. This unflinching and completely unauthorized portrait reveals both sides of Jobs's role in the remarkable rise of the Pixar animation studio, also re-creates the acrimony between Jobs and Disney's Michael Eisner, and examines Jobs's dramatic his rise from the ashes with his recapture of Apple. The authors examine the takeover and Jobs's reinvention of the company with the popular iMac and his transformation of the industry with the revolutionary iPod. iCon is must reading for anyone who wants to understand how the modern digital age has been formed, shaped, and refined by the most influential figure of the age-a master of three industries: movies, music, and computers.

Cost-Based Oracle Fundamentals


Jonathan Lewis - 2005
    Both groups will become better troubleshooters. — Thomas Kyte, VP (Public Sector), Oracle Corporation The question, "Why isn't Oracle using my index?" must be one of the most popular (or perhaps unpopular) questions ever asked on the Oracle help forums. You've picked exactly the right columns, you've got them in the ideal order, you've computed statistics, you've checked for null columns--and the optimizer flatly refuses to use your index unless you hint it. What could possibly be going wrong? If you've suffered the frustration of watching the optimizer do something completely bizarre when the best execution plan is totally obvious, or spent hours or days trying to make the optimizer do what you want it to do, then this is the book you need. You'll come to know how the optimizer "thinks," understand why it makes mistakes, and recognize the data patterns that make it go awry. With this information at your fingertips, you will save an enormous amount of time on designing and trouble-shooting your SQL. The cost-based optimizer is simply a piece of code that contains a model of how Oracle databases work. By applying this model to the statistics about your data, the optimizer tries to efficiently convert your query into an executable plan. Unfortunately, the model can't be perfect, your statistics can't be perfect, and the resulting execution plan may be far from perfect. In Cost-Based Oracle Fundamentals, the first book in a series of three, Jonathan Lewis--one of the foremost authorities in this field--describes the most commonly used parts of the model, what the optimizer does with your statistics, and why things go wrong. With this information, you'll be in a position to fix entire problem areas, not just single SQL statements, by adjusting the model or creating more truthful statistics.

The Art of Computer Programming, Volume 4, Fascicle 3: Generating All Combinations and Partitions


Donald Ervin Knuth - 2005
    At last, an answer to one of the most asked questions in computer science: When is Volume 4 of The Art of Computer Programming going to be published? A sneak peek at the eagerly anticipated Volume 4 of The Art of Computer Programming The definitive treatment of the widely misunderstood topic of combinations and partitions Future classic material from one of the most famous names in computer science!

The Art of Computer Programming, Volume 4, Fascicle 2: Generating All Tuples and Permutations


Donald Ervin Knuth - 2005
    The three complete volumes published to date already comprise a unique and invaluable resource in programming theory and practice. Countless readers have spoken about the profound personal influence of Knuth's writings. Scientists have marveled at the beauty and elegance of his analysis, while practicing programmers have successfully applied his "cookbook" solutions to their day-to-day problems. All have admired Knuth for the breadth, clarity, accuracy, and good humor found in his books. To begin the fourth and later volumes of the set, and to update parts of the existing three, Knuth has created a series of small books called fascicles, which will be published t regular intervals. Each fascicle will encompass a section or more of wholly new or evised material. Ultimately, the content of these fascicles will be rolled up into the comprehensive, final versions of each volume, and the enormous undertaking that began in 1962 will be complete. Volume 4, Fascicle 2 This fascicle inaugurates the eagerly awaited publication of Knuth's The Art of Computer Programming, Volume 4: Combinatorial Algorithms. Part of what will be a long chapter on combinatorial searching, the fascicle begins his treatment of how to generate all possibilities. Specifically, it discusses the generation of all n-tuples, then extends those ideas to all permutations. Such algorithms provide a natural motivation by means of which many of the key ideas of combinatorial mathematics can be introduced and explored. In this and other fascicles of Volume 4, Knuth illuminates important theories by discussing related games and puzzles. Even serious programming can be fun.

The Manga Guide to Databases


Mana Takahashi - 2005
    With the king and queen away, she has to manage the Kingdom of Kod's humongous fruit-selling empire. Overseas departments, scads of inventory, conflicting prices, and so many customers! It's all such a confusing mess. But a mysterious book and a helpful fairy promise to solve her organizational problems-with the practical magic of databases.In The Manga Guide to Databases, Tico the fairy teaches the Princess how to simplify her data management. We follow along as they design a relational database, understand the entity-relationship model, perform basic database operations, and delve into more advanced topics. Once the Princess is familiar with transactions and basic SQL statements, she can keep her data timely and accurate for the entire kingdom. Finally, Tico explains ways to make the database more efficient and secure, and they discuss methods for concurrency and replication.Examples and exercises (with answer keys) help you learn, and an appendix of frequently used SQL statements gives the tools you need to create and maintain full-featured databases.(Of course, it wouldn't be a royal kingdom without some drama, so read on to find out who gets the girl-the arrogant prince or the humble servant.)This EduManga book is a translation of a bestselling series in Japan, co-published with Ohmsha, Ltd., of Tokyo, Japan.

Extrusion Detection: Security Monitoring for Internal Intrusions


Richard Bejtlich - 2005
    Hardening your network perimeter won't solve this problem. You must systematically protect client software and monitor the traffic it generates. Extrusion Detection is a comprehensive guide to preventing, detecting, and mitigating security breaches from the inside out. Top security consultant Richard Bejtlich offers clear, easy-to-understand explanations of today's client-based threats and effective, step-by-step solutions, demonstrated against real traffic and data. You will learn how to assess threats from internal clients, instrument networks to detect anomalies in outgoing traffic, architect networks to resist internal attacks, and respond effectively when attacks occur.Bejtlich's The Tao of Network Security Monitoring earned acclaim as the definitive guide to overcoming external threats. Now, in Extrusion Detection , he brings the same level of insight to defending against today's rapidly emerging internal threats. Whether you're an architect, analyst, engineer, administrator, or IT manager, you face a new generation of security risks. Get this book and protect yourself.Coverage includesArchitecting defensible networks with pervasive awareness: theory, techniques, and tools Defending against malicious sites, Internet Explorer exploitations, bots, Trojans, worms, and more Dissecting session and full-content data to reveal unauthorized activity Implementing effective Layer 3 network access control Responding to internal attacks, including step-by-step network forensics Assessing your network's current ability to resist internal attacks Setting reasonable corporate access policies Detailed case studies, including the discovery of internal and IRC-based bot nets Advanced extrusion detection: from data collection to host and vulnerability enumeration About the Web Site Get book updates and network security news at Richard Bejtlich's popular blog, taosecurity.blogspot.com, and his Web site, www.bejtlich.net.

Why's (Poignant) Guide to Ruby


Why The Lucky Stiff - 2005
    It won’t crush you. It’s light as a feather (because I haven’t finished it yet—hehe). And there’s a reason this book will stay light: because Ruby is simple to learn.[Why’s (Poignant) Guide to Ruby is released under the Attribution-ShareAlike License. So, yes, please distribute it and print it and read it leisurely in your housecoat.]

Droidmaker: George Lucas and the Digital Revolution


Michael Rubin - 2005
    In the process they made computer history.

The Software Requirements Memory Jogger: A Pocket Guide to Help Software and Business Teams Develop and Manage Requirements


Ellen Gottesdiener - 2005
    The Software Requirements Memory Jogger provides every member of your project team with the tools and techniques to foster communication between business and technical teams on the necessary requirements for producing successful software. The Software Requirements Memory Jogger will benefit all stakeholders at any organizational level involved in software development projects management team, practitioners, QA/QC personnel. - Explore practical steps, tips, and examples to help you develop and manage requirements - Follow the User Requirements Roadmap a toolkit of techniques for discovering and analyzing user requirements - Streamline communications between all requirements stakeholders - Learn how to write clear, concise requirements documents

The Art of Computer Programming, Volume 1, Fascicle 1: MMIX -- A RISC Computer for the New Millennium


Donald Ervin Knuth - 2005
    Check out the boxed set that brings together Volumes 1 - 4A in one elegant case, and offers the purchaser a $50 discount off the price of buying the four volumes individually. The Art of Computer Programming, Volumes 1-4A Boxed Set, 3/e ISBN: 0321751043 Art of Computer Programming, Volume 1, Fascicle 1, The: MMIX -- A RISC Computer for the New Millennium This multivolume work on the analysis of algorithms has long been recognized as the definitive description of classical computer science. The three complete volumes published to date already comprise a unique and invaluable resource in programming theory and practice. Countless readers have spoken about the profound personal influence of Knuth's writings. Scientists have marveled at the beauty and elegance of his analysis, while practicing programmers have successfully applied his cookbook solutions to their day-to-day problems. All have admired Knuth for the breadth, clarity, accuracy, and good humor found in his books. To begin the fourth and later volumes of the set, and to update parts of the existing three, Knuth has created a series of small books called fascicles, which will be published t regular intervals. Each fascicle will encompass a section or more of wholly new or evised material. Ultimately, the content of these fascicles will be rolled up into the comprehensive, final versions of each volume, and the enormous undertaking that began in 1962 will be complete. Volume 1, Fascicle 1 This first fascicle updates The Art of Computer Programming, Volume 1, Third Edition: Fundamental Algorithms, and ultimately will become part of the fourth edition of that book. Specifically, it provides a programmer's introduction to the long-awaited MMIX, a RISC-based computer that replaces the original MIX, and describes the MMIX assembly language. The fascicle also presents new material on subroutines, coroutines, and interpretive routines. Ebook (PDF version) produced by Mathematical Sciences Publishers (MSP), http: //msp.org

Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

Total Workday Control Using Microsoft Outlook


Michael Linenberger - 2005
    Outlook 2007 and 2003 are also covered. This seminal guide presents the author's best practices of time, task, and e-mail management, drawing from time management theories and applying these best practices in Microsoft Outlook. Anyone who finds they are overburdened by e-mail or working too late each day will benefit from this book.

Problem Solving with Algorithms and Data Structures Using Python


Bradley N. Miller - 2005
    It is also about Python. However, there is much more. The study of algorithms and data structures is central to understanding what computer science is all about. Learning computer science is not unlike learning any other type of difficult subject matter. The only way to be successful is through deliberate and incremental exposure to the fundamental ideas. A beginning computer scientist needs practice so that there is a thorough understanding before continuing on to the more complex parts of the curriculum. In addition, a beginner needs to be given the opportunity to be successful and gain confidence. This textbook is designed to serve as a text for a first course on data structures and algorithms, typically taught as the second course in the computer science curriculum. Even though the second course is considered more advanced than the first course, this book assumes you are beginners at this level. You may still be struggling with some of the basic ideas and skills from a first computer science course and yet be ready to further explore the discipline and continue to practice problem solving. We cover abstract data types and data structures, writing algorithms, and solving problems. We look at a number of data structures and solve classic problems that arise. The tools and techniques that you learn here will be applied over and over as you continue your study of computer science.

Real Digital Forensics: Computer Security and Incident Response


Keith J. Jones - 2005
    The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and practice. From binary memory dumps to log files, this DVD's intrusion data was generated by attacking live systems using the same tools and methods real-world attackers use. The evidence was then captured and analyzed using the same tools the authors employ in their own investigations. This book relies heavily on open source tools, so you can perform virtually every task without investing in any commercial software. You'll investigate environments ranging from financial institutions to software companies and crimes ranging from intellectual property theft to SEC violations. As you move step by step through each investigation, you'll discover practical techniques for overcoming the challenges forensics professionals face most often.Inside, you will find in-depth information on the following areas: * Responding to live incidents in both Windows and Unix environments * Determining whether an attack has actually occurred * Assembling a toolkit you can take to the scene of a computer-related crime * Analyzing volatile data, nonvolatile data, and files of unknown origin * Safely performing and documenting forensic duplications * Collecting and analyzing network-based evidence in Windows and Unix environments * Reconstructing Web browsing, e-mail activity, and Windows Registry changes * Tracing domain name ownership and the source of e-mails * Duplicating and analyzing the contents of PDAs and flash memory devices The accompanying DVD contains several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to le

Wired for Speech: How Voice Activates and Advances the Human-Computer Relationship


Clifford Nass - 2005
    In Wired for Speech, Clifford Nass and Scott Brave reveal how interactive voice technologies can readily and effectively tap into the automatic responses all speech--whether from human or machine--evokes. Wired for Speech demonstrates that people are voice-activated: we respond to voice technologies as we respond to actual people and behave as we would in any social situation. By leveraging this powerful finding, voice interfaces can truly emerge as the next frontier for efficient, user-friendly technology.Wired for Speech presents new theories and experiments and applies them to critical issues concerning how people interact with technology-based voices. It considers how people respond to a female voice in e-commerce (does stereotyping matter?), how a car's voice can promote safer driving (are happy cars better cars?), whether synthetic voices have personality and emotion (is sounding like a person always good?), whether an automated call center should apologize when it cannot understand a spoken request (To Err is Interface; To Blame, Complex), and much more. Nass and Brave's deep understanding of both social science and design, drawn from ten years of research at Nass's Stanford laboratory, produces results that often challenge conventional wisdom and common design practices. These insights will help designers and marketers build better interfaces, scientists construct better theories, and everyone gain better understandings of the future of the machines that speak with us.

Information Security: Principles and Practice


Mark Stamp - 2005
    This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes: * Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis * Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems * Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM * Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems-ranging from basic to challenging-to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint(r) slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues. An Instructor's Manual presenting detailed solutions to all the problems in the book is available from the Wiley editorial department. An Instructor Support FTP site is also available.

Classic Shell Scripting: Hidden Commands that Unlock the Power of Unix


Arnold Robbins - 2005
    It's the shell that unlocks the real potential of Unix. Shell scripting is essential for Unix users and system administrators-a way to quickly harness and customize the full power of any Unix system. With shell scripts, you can combine the fundamental Unix text and file processing commands to crunch data and automate repetitive tasks. But beneath this simple promise lies a treacherous ocean of variations in Unix commands and standards. Classic Shell Scripting is written to help you reliably navigate these tricky waters.Writing shell scripts requires more than just a knowledge of the shell language, it also requires familiarity with the individual Unix programs: why each one is there, how to use them by themselves, and in combination with the other programs. The authors are intimately familiar with the tips and tricks that can be used to create excellent scripts, as well as the traps that can make your best effort a bad shell script. With Classic Shell Scripting you'll avoid hours of wasted effort. You'll learn not only write useful shell scripts, but how to do it properly and portably.The ability to program and customize the shell quickly, reliably, and portably to get the best out of any individual system is an important skill for anyone operating and maintaining Unix or Linux systems. Classic Shell Scripting gives you everything you need to master these essential skills.

Learn Excel from Mr. Excel: 277 Excel Mysteries Solved


Bill Jelen - 2005
    In addition to exemplary solutions, each case analysis considers alternate approaches and gotchas, and includes a summary of the necessary commands and functions. Excel files that can be downloaded and worked through step-by-step are included for each case.

Making Silicon Valley: Innovation and the Growth of High Tech, 1930-1970


Christophe Lécuyer - 2005
    Using the tools of science and technology studies, he explores the formation of Silicon Valley as an industrial district, from its beginnings as the home of a few radio enterprises that operated in the shadow of RCA and other East Coast firms through its establishment as a center of the electronics industry and a leading producer of power grid tubes, microwave tubes, and semiconductors. He traces the emergence of the innovative practices that made this growth possible by following key groups of engineers and entrepreneurs. He examines the forces outside Silicon Valley that shaped the industry -- in particular the effect of military patronage and procurement on the growth of the industry and on the development of technologies -- and considers the influence of Stanford University and other local institutions of higher learning.L'cuyer argues that Silicon Valley's emergence and its growth were made possible by the development of unique competencies in manufacturing, in product engineering, and in management. Entrepreneurs learned to integrate invention, design, manufacturing, and sales logistics, and they developed incentives to attract and retain a skilled and motivated workforce. The largest Silicon Valley firms -- including Eitel-McCullough (Eimac), Litton Industries, Varian Associates, Fairchild Semiconductor, and Intel -- dominated the American markets for advanced tubes and semiconductors and, because of their innovations in manufacturing, design, and management, served as models and incubators for other electronics ventures in the area.

Stealing the Network: How to Own an Identity


Raven Alder - 2005
    Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... Stealing the Network: How to Own an Identity is the 3rd book in the Stealing series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this STN collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.Cast upon a backdrop of Evasion, surviving characters from How to Own a Continent find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.

Success: Advice for Achieving Your Goals from Remarkably Accomplished People


Jena Pincott - 2005
    Here are quotes and passages from J.K. Rowling and Federico Fellini on getting started, and Steve Jobs and Tiger Woods on passion. Here, too, are George Lucas and Bill Clinton on goals, Katie Couric and George Foreman on competition, and Edmund Hillary and Carly Fiorina on leadership.The high achievers quoted here share one crucial belief: Success is possible as long as there's passion. If you know where you want to be but not how to get there, use Success as your guide.

Adobe Photoshop Cs2 for Photographers: A Professional Image Editor's Guide to the Creative Use of Photoshop for the Macintosh and PC


Martin Evening - 2005
    Inside Advantage: Written for photographers by a photographer! Martin shares his expert knowledge to help you combine photography and Photoshop to develop memorable images. Complete updates: 704 pages of fully updated content plus 30 pages of Photoshop Shortcuts on the free CD-ROM. Master Photoshop CS2: More than 300 pages of information show you how to make tonal corrections, sharpen images, use filters, create montages, simulate darkroom effects and automate Photoshop. Conquer color obstacles: Over 100 pages devoted to explaining the basic principles of color management, how to calibrate your equipment and how to achieve consistent color and produce perfect prints. Expanded areas: Provides more detailed examples, diagrams, simple step-by-step explanations, improving accessibility for the advanced beginner The latest edition to join Martin Evening's bestselling 'Adobe Photoshop for Photographers' titles, gives you completely updated and revised coverage providing a professional photographer's insight into Photoshop CS2. Inside you'll find invaluable information on Bridge, the new file browser that is set to become a very useful image management tool for photographers. Other new developments covered include the new Digital Negative (DNG) file format, improvements in Camera Raw file processing and High Dynamic Range imaging. Packed full of all the latest features and instructive information on key elements from color management to printing, Martin Evening passes on his famous techniques and professional experience in this commanding and authoritative resource.

Essential PHP Security


Chris Shiflett - 2005
    It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book.In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks.Topics covered include:Preventing cross-site scripting (XSS) vulnerabilitiesProtecting against SQL injection attacksComplicating session hijacking attemptsYou are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.

Blocking Spam and Spyware for Dummies


Peter H. Gregory - 2005
    Two veterans of the spam wars help you analyze your situation, choose the right solutions, set up and maintain them, and even show the bean-counters why such defenses are essential. Discover how to* Understand how spammers get addresses* Calculate the cost of spam and spyware* Re-engineer your business processes* Select spam and spyware filters* Manage implementation and maintenance

Unix for the Beginning Mage


Joe Topjian - 2005
    Everything from typing your first command to learning about Symbolic Links is covered.

Building a PC in easy steps


Stuart Yarnold - 2005
    For those who are looking for something more than the standard PC, one solution is to build it from the ground up — a solution that, with the help of this book, is surprisingly simple. Written in concise, jargon-free English, Building a PC in Easy Steps walks the reader through every stage of building and setting up a computer: buying parts and avoiding sales scams; mastering and installing the CPU, memory, video, and other components; altering default settings in the BIOS for optimum performance; and installing and configuring device drivers. Graphics clearly illustrate every step in the process, and an invaluable troubleshooting chapter helps pinpoint any problems that may crop up. In the end, the reader has a computer system tailored to their exact requirements, built from components specifically chosen for reliability, price, and performance.

The Art of Rigging: Volume 1


Kiaran Ritchie - 2005
    The text presents what is often considered to be a confusing topic in a clear and concise manner that will truly benefit both students and professionals. Because each chapter is designed to become progressively more advanced, readers can quickly find the information they need regardless of whether they are at a novice or professional level. Included with the book is a DVD-based training course with over 30 video lectures spanning every major topic from the book. This DVD is an unprecedented value giving readers over 9 hours of quality training material at no extra cost. The DVD features many Maya scene files, including many original creatures (and their rigs) that were designed especially for this book. To help prospective technical directors learn how to harness the power of Maya's Embedded Language or 'MEL', every chapter in The Art Of Rigging includes full coverage of the creation of a custom script. Line-by-line breakdowns help to demystify complex script creation and will inspire readers to get started writing their own Maya programs. Seasoned MEL scripters will benefit from getting an inside look at alternative programming techniques. No current MEL texts include in-depth discussion of advanced techniques like file I/O, recursion, multi-dimensional arrays and matrices.

Professional Assembly Language


Richard Blum - 2005
    Unlike high-level languages such as Java and C++, assembly language is much closer to the machine code that actually runs computers; it's used to create programs or modules that are very fast and efficient, as well as in hacking exploits and reverse engineering Covering assembly language in the Pentium microprocessor environment, this code-intensive guide shows programmers how to create stand-alone assembly language programs as well as how to incorporate assembly language libraries or routines into existing high-level applications Demonstrates how to manipulate data, incorporate advanced functions and libraries, and maximize application performance Examples use C as a high-level language, Linux as the development environment, and GNU tools for assembling, compiling, linking, and debugging

SQL Cookbook


Anthony Molinaro - 2005
    You'd like to learn how to do more work with SQL inside the database before pushing data across the network to your applications. You'd like to take your SQL skills to the next level.Let's face it, SQL is a deceptively simple language to learn, and many database developers never go far beyond the simple statement: SELECT columns FROM table WHERE conditions. But there is so much more you can do with the language. In the SQL Cookbook, experienced SQL developer Anthony Molinaro shares his favorite SQL techniques and features. You'll learn about:Window functions, arguably the most significant enhancement to SQL in the past decade. If you're not using these, you're missing outPowerful, database-specific features such as SQL Server's PIVOT and UNPIVOT operators, Oracle's MODEL clause, and PostgreSQL's very useful GENERATE_SERIES functionPivoting rows into columns, reverse-pivoting columns into rows, using pivoting to facilitate inter-row calculations, and double-pivoting a result setBucketization, and why you should never use that term in Brooklyn.How to create histograms, summarize data into buckets, perform aggregations over a moving range of values, generate running-totals and subtotals, and other advanced, data warehousing techniquesThe technique of walking a string, which allows you to use SQL to parse through the characters, words, or delimited elements of a stringWritten in O'Reilly's popular Problem/Solution/Discussion style, the SQL Cookbook is sure to please. Anthony's credo is: When it comes down to it, we all go to work, we all have bills to pay, and we all want to go home at a reasonable time and enjoy what's still available of our days. The SQL Cookbook moves quickly from problem to solution, saving you time each step of the way.

The Addiction Counselor's Documentation Sourcebook: The Complete Paperwork Resource for Treating Clients with Addictions


James R. Finley - 2005
    Government and private grant funding, insurance and benefits programs, regulatory compliance, and the need for data on treatment effectiveness (evidence-based treatment) all require proper documentation. If these forms are missing, the results can range from bureaucratic headaches to problems serious enough to close a practice.Now fully updated and revised, The Addiction Counselor's Documentation Sourcebook: The Complete Paperwork Resource for Treating Clients with Addictions, Second Edition provides the most useful and current forms for accurate and comprehensive documentation and record keeping. These ready-to-use forms will save you and your practice hours that would otherwise be spent creating and collating them, freeing you to devote more energy to the important matters of treatment. A companion CD-ROM includes all documents in Word? format so you can customize them according to the unique needs of your practice.Covering every aspect of mental health practice for addiction treatment, this fully revised Second Edition also includes: Critical forms updated to help providers achieve HIPAA, JCAHO, and CARF compliance Unique handouts, exercises, and facilitator guides for use in individual and group therapy A comprehensive CD-ROM featuring all forms in Word format, as well as PowerPoint slideshows for every psychoeducational presentation in the book The Addiction Counselor's Documentation Sourcebook, Second Edition is an essential timesaving resource that allows any professional practicing or working in the field of addiction treatment the freedom to give more of their time and energy to the people they serve.

John Walkenbach's Favorite Excel 2007 Tips & Tricks


John Walkenbach - 2005
    For starters, we've got a new user interface, new open file formats, a larger worksheet grid, better use of memory and CPUs, new functions, and more templates. Dig a bit deeper and you'll find worksheet tables, 100 levels of undo, easier formula construction, better-looking charts, unlimited color choices, SmartArt, a handy page layout view, new conditional formatting options, new collaboration features, a very useful compatibility checker, workbook themes--and even 'skins' so you can change the look of the entire program." John Walkenbach's Favorite Excel 2007 Tips & Tricks consists of a series of non-trivial tips and tricks that cover all aspects of Excel. Tips are improved ways of maximizing the power of Excel to create robust applications. Tricks are shortcuts that will speed up application development with Excel.John's favorites include tips and tricks on dealing with function arguments, creating "impossible" charts, pivot tables, taming the new Ribbon, why use a UserForm, how to create add-ins in Excel 2007, absolute vs. relative references, changing data entry orientation, overcoming the 7-level nesting limit, dynamic chart data, sorting on more than three columns, entering fake data for testing purposes, custom functions, and much more.

How to Wow Photoshop CS2 for the Web [With CDROM]


Jan Kabili - 2005
    Two Photoshop and ImageReady powerhouses--Jan Kabili and Colin Smith--renowned authors, graphic designers, and trainers, have developed an effective way to help you reach your full creative potential. Jan and Colin guide you step by step through real-world projects, with an emphasis on uncompromising quality, last-minute flexibility, and go-home-at-night speed You'll learn tips and techniques for creating everything from stylish navigation to eye-catching animation using Photoshop CS2 and its companion program, ImageReady CS2. Whether it's speeding up your workflow or making a modular home page for a game site, you're given the tools at every stage of the creative process in order to learn How to Wow This book begins with the essentials of Web site navigation, teaching you skills for building, slicing, and optimizing navigation graphics. Then things really get moving with how-tos on creating scene-stealing animations. Next, you'll find out how to automate repetitive tasks and create conditional actions that can distinguish between graphic types. Finally, you¹ll learn how to build eye-popping home pages and sites designed to keep viewers coming back for more. The How to Wow: Photoshop CS2 for the Web companion CD at the back of this book is packed with everything you need to work through the projects in the book, along with some extra goodies to use as you create your own graphics for the Web. The CD includes: All the original designs by award-winning Photoshop guru Colin Smith that are used in the projects in this book. Use these files as you follow along with the lessons to dramatically improve your understanding of the innovative techniques explained in this book. Working along with the authors will stimulate your own design ideas and let you discover how you can apply these techniques to your own work. Styles, actions, and pattern presets developed to enhance the look of the projects you'll produce in the books lessons. PLUS extra style presets from the collection of over 1000 presets in Jack Davis' Adobe Photoshop One-Click Wow

Microsoft Access Data Analysis


Michael Alexander - 2005
    The site also includes templates and tools to get you started.

Macromedia Flash Professional 8 Beyond the Basics: Includes Exercise Files and Demo Movies


Shane Rebenschied - 2005
     Macromedia Flash 8 Beyond the Basics is all about stepping to that next level. This book expands your skill set and shows you how to integrate those skills with advanced ActionScript. Through a series of carefully developed, step-by-step exercises and demo movies, you'll learn how to build a professional, interactive Web site--using source files and designs supplied on the book's CD-ROM. Along the way, you'll learn about the new Flash 8 features: the improved text tool, new text rendering engine, new graphic filters, and more. 50+ Step-by-Step Tutorials: - Format dynamically loaded text using HTML, CSS, and nested images - Create an ActionScript-driven menu - Build a preloader with MovieClipLoader class - Add a progressively downloading, multi-track MP3 player - Create a video player that allows users to control playback - Build a slideshow that loads images and text dynamically - Utilize components to create a feedback form - Create a Flash plug-in detector

Firefox Secrets


Cheah Chu Yeow - 2005
    Firefox Secrets will teach you how to get the most from Mozilla, including how to find and use all the hidden features, extensions available to you. You'll learn:Ways to ease the transition from Internet ExplorerA way to setup multiple "homepages" when you launch your browserRead RSS feeds from within Firefox using a free extensionWhere to download a new and less obtrusive "Download Manager"The best "must-have" extensions to download as well as the "fun" onesTwo different ways to speed up Firefox downloads with prefetcher and pipeliningFirefox's secret features for Web DevelopersAnd much, much more!Firefox Secrets is the ultimate guide to the Web Browser that major magazines, newspapers and even Microsoft's own "Slate.com" website are recommending as the ultimate replacement to Internet Explorer.

Visual Basic 2005 Programmer's Reference


Rod Stephens - 2005
    This combined tutorial and reference describes VB 2005 from scratch, while also offering in-depth content for more advanced developers. Whether you're looking to learn the latest features of VB 2005 or you want a refresher of easily forgotten details, this book is an ideal resource.Well-known VB expert Rod Stephens features the basics of Visual Basic 2005 programming in the first half of the book. The second half serves as a reference that allows you to quickly locate information for specific language features. It's a comprehensive look at programming using the increased set of language options offered with the VB 2005 release, confirming that there has never been a better time to learn Visual Basic than now. What you will learn from this book: The fundamental concepts of object-oriented programming with Visual Basic, including classes and structures, inheritance and interfaces, and generics How an application can interact with its environment, save and load data in external sources, and use standard dialog controls The syntax for declaring subroutines, functions, generics, classes, and other important language concepts Who this book is for: This book is for programmers at all levels who are either looking to learn Visual Basic 2005 or have already mastered it and want some useful tips, tricks, and language details.Wrox Programmer's References are designed to give the experienced developer straight facts on a new technology, without hype or unnecessary explanations. They deliver hard information with plenty of practical examples to help you apply new tools to your development projects today.

Professional Excel Development: The Definitive Guide to Developing Applications Using Microsoft Excel and VBA


Stephen Bullen - 2005
    It has become adevelopment platform in it own right. Applications written using Excel are partof many corporations' core suites of business-critical applications. In spite ofthis, Excel is too often thought of as a hobbyist's platform. While there arenumerous titles on Excel and VBA, until now there have been none thatprovide an overall explanation of how to develop professional-quality Excel-basedapplications. All three authors are professional Excel developers who runtheir own companies developing Excel-based apps for clients ranging fromindividuals to the largest multinational corporations. In this book they showhow anyone from power users to professional developers can increase thespeed and usefulness of their Excel-based apps.

Penetration Tester's Open Source Toolkit [With CDROM]


Johnny Long - 2005
    A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools

Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses


Edward Skoudis - 2005
    I asked other people and they didn't seem to know how these things work, or at least they couldn't explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!" --Stephen Northcutt, CEO, SANS Institute "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It's technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field." --From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World "What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks." --Lenny Zeltser, coauthor of Malware: Fighting Malicious Code "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis's real strength is in his ability to show complex topics in an understandable form. By the time he's done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both." --William Stearns, network security expert, www.stearns.org "This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written." --Warwick Ford, coauthor of Secure Electronic Commerce For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.Important features of this new edition includeAll-new "anatomy-of-an-attack" scenarios and tools An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking" New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits

Microsoft® Windows® XP Professional Resource Kit


The Microsoft Windows Team - 2005
    This official RESOURCE KIT has been fully updated and revised—with coverage of Windows XP Service Pack 2, featuring Advanced Security Technologies, along with new chapters on managing software updates, the Windows Firewall, and wireless networking. You’ll also find 120+ timesaving administrative tools and scripts—plus additional content and eBooks—on the CD. It’s everything you need to help maximize the performance and reliability of your business desktops—and help reduce ownership and support costs.Get in-depth guidance on how to:Plan, customize, and troubleshoot your deployment Use Group Policy and IntelliMirror technologies to manage users and network resources Administer disks, file systems, devices, print services, and digital media Manage authentication, authorization, access control, and EFS Configure TCP/IP, IP addressing, name resolution, and remote networking services NEW—Configure wireless networking protocols and standards; apply best practices for support NEW—Implement the boot-time security feature and other Windows Firewall enhancements NEW—Design and deploy a software update management strategy Apply expert strategies to diagnose and resolve system problems faster CD inside Resource Kit tools and eBooks inside!CD features:120+ tools and utilities for administering Windows-based clients and servers Microsoft Windows Server 2003 Automating and Customizing Installations eBook Microsoft Encyclopedia of Networking, Second Edition eBook Microsoft Encyclopedia of Security eBook Fully searchable eBook of the complete RESOURCE KIT A Note Regarding the CD or DVDThe print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Running Mac OS X Tiger


Jason Deraleau - 2005
    It helps you understand the inner workings of the operating system so you can know how to get the most out of it. And it gives you countless ideas--and step-by-step instruction--for customizing and revving up Tiger to your specific needs and your liking.Completely revised and updated for Mac OS X Tiger, Running Mac OS X Tiger covers all the new features and functionality of Tiger. You can count on authors Jason Deraleau and James Duncan Davidson to give what you need--and not bother with what you don't. They don't spend time on Finder tips and keyboard shortcuts; they focus on showing you what makes a Mac tick and, more importantly, how you can make it tick just the way you want it to.Easy to follow and intuitively organized, Running Mac OS X Tiger is divided into three parts: "Getting Started" introduces Mac OS X and explains how it's put together and why it works; "Administration Essentials" gives you the tools you need to examine how your system is running and adjust all the knobs behind its operation; and "Networking and Network Services" covers the ways Mac OS X interfaces with the world around it, including wireless and spontaneous networking. Developer Tools for Mac OS X, including Xcode, are discussed throughout the book as appropriate.For the growing number of intermediate to advanced users who are ready and eager to customize Mac OS X, Running Mac OS X Tiger delivers everything you need to become master of your Mac.

Securing Im and P2P Applications for the Enterprise


Paul Piccard - 2005
    Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications.These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic.

How to Do Everything with Photoshop Elements


David Plotkin - 2005
    You'll learn to customize the program to suit your preferences, and then get started retouching, repairing, and enhancing digital images in no time. Step-by-step examples show you how to crop images, fix color, focus, and exposure problems, eliminate defects, manipulate images, add special effects, and much more. You'll also get tips for getting high-quality prints and creating a Web gallery.

Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers [With CD-ROM]


Fred Eady - 2005
    There are already over 50 million devices using the dominant IEEE 802.11 (essentially wireless Ethernet) standard, with astronomical growth predicted over the next 10 years. New applications are emerging every day, with wireless capability being embedded in everything from electric meters to hospital patient tracking systems to security devices. This practical reference guides readers through the wireless technology forest, giving them the knowledge, the hardware and the software necessary to design a wireless embedded device rapidly, inexpensively, and effectively. Using off-the-shelf microcontrollers from Microchip and Atmel, the author provides step-by-step instructions for designing the hardware and firmware for a fully operational wireless networking device. The book gives a thorough introduction to 802.11 technology and puts it into perspective against the other wireless standard options. Just enough theory and mathematics is provided to give the depth of understanding needed for practical design work. The book thoroughly covers: * Laptop wireless Ethernet card introduction and theory *Introduction to CompactFlash-to-microcontroller interfacing* Implementing the laptop wireless Ethernet card in an embedded environment In addition, the book includes a CDROM containing all of the code, schematics and programs necessary to implement embedded 802.11 wireless networking. * Covers the hottest new embedded market area- wireless networking * Shows designers how to save money and time by using microcontrollers in their embedded wireless designs instead of expensive, complex prefab boards * CD-ROM accompanying book contains all the code, schematics and programs necessary to get started now

Mathematica for Theoretical Physics: Electrodynamics, Quantum Mechanics, General Relativity, and Fractals


Gerd Baumann - 2005
    Class-tested textbook that shows readers how to solve physical problems and deal with their underlying theoretical concepts while using Mathematica(R) to derive numeric and symbolic solutions.Delivers dozens of fully interactive examples for learning and implementation, constants and formulae can readily be altered and adapted for the user's purposes.New edition offers enlarged two-volume format suitable to courses in mechanics and electrodynamics, while offering dozens of new examples and a more rewarding interactive learning environment.

Creative Recording, Vol 3: Recording on the Move


Paul White - 2005
    At the price of a bottom-of-the-range mic cable, this book is a bargain not to be missed.

Hacking con Google


Johnny Long - 2005
    

Oracle PL/SQL for DBAs


Arup Nanda - 2005
    Although primarily a tool for developers, PL/SQL has also become an essential tool for database administration, as DBAs take increasing responsibility for site performance and as the lines between developers and DBAs blur.Until now, there has not been a book focused squarely on the language topics of special concern to DBAs Oracle PL/SQL for DBAs fills the gap. Covering the latest Oracle version, Oracle Database 10g Release 2 and packed with code and usage examples, it contains:A quick tour of the PL/SQL language, providing enough basic information about language fundamentals to get DBAs up and running Extensive coverage of security topics for DBAs: Encryption (including both traditional methods and Oracle's new Transparent Data Encryption, TDE); Row-Level Security (RLS), Fine-Grained Auditing (FGA); and random value generation Methods for DBAs to improve query and database performance with cursors and table functions Coverage of Oracle scheduling, which allows jobs such as database monitoring and statistics gathering to be scheduled for regular executionUsing Oracle's built-in packages (DBMS_CRYPTO, DBMS_RLS, DBMS_FGA, DBMS_RANDOM, DBMS_SCHEDULING) as a base, the book describes ways of building on top of these packages to suit particular organizational needs. Authors are Arup Nanda, Oracle Magazine 2003 DBA of the Year, and Steven Feuerstein, the world's foremost PL/SQL expert and coauthor of the classic reference, Oracle PL/SQL Programming.DBAs who have not yet discovered how helpful PL/SQL can be will find this book a superb introduction to the language and its special database administration features. Even if you have used PL/SQL for years, you'll find the detailed coverage in this book to be an invaluable resource.

Beginning ASP.Net 2.0


Chris Hart - 2005
    This updated bestseller gets readers involved immediately with task-oriented examples that can help them build their own sites Each chapter is designed to complete a part of the sample Web site, introducing technology topics as required Makes extensive use of Microsoft's new visual ASP.NET development tool, showing readers how to save time and write less code to achieve more results faster The book provides examples in Visual Basic - the easiest language for beginning ASP.NET developers to learn

Programming Languages: Principles and Paradigms


Maurizio Gabbrielli - 2005
    I accepted for at least two reasons. The ?rst is that the request came to me from two colleagues for whom I have always had the greatest regard, starting from the time when I ?rst knew and appreciated them as students and as young researchers. The second reason is that the text by Gabbrielli and Martini is very near to the book that I would have liked to have written but, for various reasons, never have. In particular, theapproachadoptedinthisbookistheonewhichImyselfhavefollowed when organising the various courses on programming languages I have taught for almost thirty years at different levels under various titles. The approach, summarised in 2 words, is that of introducing the general concepts (either using linguistic mechanisms or the implementation structures corresponding to them) in a manner that is independent of any speci?c language; once this is done, "real languages" are introduced. This is the only approach that allows one to - veal similarities between apparently quite different languages (and also between paradigms). At the same time, it makes the task of learning different languages e- ier. In my experience as a lecturer, ex-students recall the principles learned in the course even after many years; they still appreciate the approach which allowed them to adapt to technological developments without too much dif?culty.

Electronic Brains: Stories from the Dawn of the Computer Age


Mike Hally - 2005
    Within a relatively short period of time, we've managed to put enormous computing power in offices and homes around the globe. But before there was an IBM computer, before there were laptops and personal PCs, there were small independent teams of pioneers working on the development of the very first computer. Scattered around the globe and ranging in temperament and talent, they forged the future in basement labs, backyard, workshops, and old horse barns.Tracing the period just after World War II when the first truly modern computers were developed, Electronic Brains chronicles the escapades of the world's first techies. Some of the initial projects are quite famous and well known, such as LEO, the Lyons Electronic Office, which was developed by the catering company J. Lyons & Co. in London in the 1940s. Others are a bit more arcane, such as the ABC, which was built in a basement at Iowa State College and was abandoned to obscurity at the beginning of WWII. And then - like the tale of the Rand 409 which wss constructed in a barn in Connecticut under the watchful eye of a stuffed moose - there are the stories that are virtually unknown. All combine to create a fascinating history of a now-ubiquitous technology.Relying on extensive interviews from surviving members of the original teams of hardware jockeys, author Mike Hally recreates the atmosphere of the early days of computing. Rich with provocative and entertaining descriptions, we are introduced go the many eccentric, obsessive, and fiercely loyal men and women who laid the foundations for the computerized world in which we now live. As the acronyms fly fast and furious - UNIVAC, CSIRAC, and MESM, to name just a few - Electronic Brains provides a vivid sense of time, place, and science.

MySQL Crash Course


Ben Forta - 2005
    And this book will teach you all you need to know to be immediately productive with MySQL. By working through 30 highly focused hands-on lessons, your MySQL Crash Course will be both easier and more effective than you'd have thought possible. Learn how to: Retrieve and sort data Filter data using comparisons, regular expressions, full text search, and much more Join relational data Create and alter tables Insert, update, and delete data Leverage the power of stored procedures and triggers Use views and Cursors Manage transactional processing Create user accounts and manage security via access control Ben Forta is Macromedia's Senior Technical Evangelist, and has almost 20 years of experience in the computer industry in product development, support, training, and product marketing. Ben is the author of the best-selling Sams Teach Yourself SQL in 10 Minutes (now in its third edition, and translated into over a dozen languages), ColdFusion Web Application Construction Kit, and Advanced ColdFusion Development (both published by Que Publishing), Sams Teach Yourself Regular Expressions in 10 Minutes, as well as books on SQL, Flash, JSP, HomeSite, WAP, Windows 2000, and other subjects.

Finite Model Theory and Its Applications


Erich Grädel - 2005
    One of the fundamental insights of mathematical logic is that our understanding of mathematical phenomena is enriched by elevating the languages we use to describe mathematical structures to objects of explicit study. If mathematics is the science of patterns, then the media through which we discern patterns, as well as the structures in which we discern them, command our attention. It isthis aspect oflogicwhichis mostprominentin model theory,"thebranchof mathematical logic which deals with the relation between a formal language and its interpretations." No wonder, then, that mathematical logic, and ?nite model theory in particular, should ?nd manifold applications in computer science: from specifying programs to querying databases, computer science is rife with phenomena whose understanding requires close attention to the interaction between language and structure. This volume gives a broadoverviewof some central themes of ?nite model theory: expressive power, descriptive complexity, and zero-one laws, together with selected applications to database theory and arti?cial intelligence, es- cially constraint databases and constraint satisfaction problems. The ?nal chapter provides a concise modern introduction to modal logic, which emp- sizes the continuity in spirit and technique with ?nite model theory.

Windows Server Cookbook: For Windows Server 2003 & Windows 2000


Robbie Allen - 2005
    Through concise, on-the-job solutions to common problems, Windows Server Cookbook for Windows Server 2003 & Windows 2000 is certain to save you hours of time searching for answers.Now, instead of dredging reams of Microsoft documentation or browsing its unstructured knowledge base to figure out a particular issue--such as how to compare registry values between two hosts--you can simply reference the index of Windows Server Cookbook for Windows Server 2003 & Windows 2000. From there, you'll be directed to the exact trouble-shooting recipe they need.As the newest title in O'Reilly's popular Cookbook series, this book covers a wide range of issues that you are likely to face in your daily management of the Windows Server operating system. This includes how to deal with:filesevent logsDNSDHCPsecuritythe registrybackup/restoreOne of the book's key benefits is the presentation of solutions in three different recipe formats. Depending on preference, you can solve most problems with the graphical user interface, the command line, or by using scripts. Where appropriate, all three solutions are presented for each recipe in this book. Each recipe also includes a detailed discussion that explains how and why it works.Windows Server Cookbook for Windows Server 2003 & Windows 2000 is written for all levels of system administrators on Windows servers. If you're a relatively new user with only a rudimentary understanding of the job, the book can open your eyes to the many possibilities that await. And if you're an advanced user, it can serve as a useful reference and memory-jogger.Download the code examples from this book. The complete set of examples is available at: http://www.rallenhome.com/books/​wins....

DNA Computing: New Computing Paradigms


Gheorghe Păun - 2005
    The book starts with an introduction to DNA computing, exploring the power of complementarity, the basics of biochemistry, and language and computation theory. It then brings the reader to the most advanced theories develop thus far in this emerging research area.

Professional VB 2005


Bill Evjen - 2005
    Visual Basic .NET has changed dramatically from its predecessor, and this book shows developers how to build traditional console applications, ASP.NET applications, XML Web Services, and more The top-notch author team shares their years of experience in VB programming and helps readers take their skills to new heights Addresses issues such as security, data access (ADO.NET), and the latest Visual Studio .NET IDE Explores Common Language Runtime, variables and data types, object syntax, inheritance and interfaces, Windows forms, error handling and debugging, XML, namespaces, and advanced features of the latest version of ASP.NET

Finite Element Analysis with Error Estimators: An Introduction to the Fem and Adaptive Error Analysis for Engineering Students


J.E. Akin - 2005
    It delivers a complete introduction to finite element methods and to automatic adaptation (error estimation) that will enable students to understand and use FEA as a true engineering tool. It has been specifically developed to be accessible to non-mathematics students and provides the only complete text for FEA with error estimators for non-mathematicians. Error estimation is taught on nearly half of all FEM courses for engineers at senior undergraduate and postgraduate level; no other existing textbook for this market covers this topic.

Adobe Premiere Elements 2 in a Snap


Steve Grisetti - 2005
    Organized into a series of tasks, it covers techniques that improve your editing skills. It also provides guidance on imitating the editing styles of the masters. It includes chapters such as working with stills and graphics; using transitions; adding spice to your video; special effects; and, more.

Mathematica for Theoretical Physics: Classical Mechanics and Nonlinear Dynamics


Gerd Baumann - 2005
    Class-tested textbook that shows readers how to solve physical problems and deal with their underlying theoretical concepts while using Mathematica(R) to derive numeric and symbolic solutions.Delivers dozens of fully interactive examples for learning and implementation, constants and formulae can readily be altered and adapted for the user's purposes.New edition offers enlarged two-volume format suitable to courses in mechanics and electrodynamics, while offering dozens of new examples and a more rewarding interactive learning environment.Notebooks for problem solving and learning.

Yahoo! Hacks: Tips & Tools for Living on the Web Frontier


Paul Bausch - 2005
    But ten years later, it has expanded into a department store overflowing with useful and innovative tools and services-from email, blogging, social networking, and instant messaging, to news, financial markets, shopping, movie and TV listings, and much more. Today's Yahoo! keeps you connected with every aspect of your life and every corner of the Web.Yahoo! Hacks shows you how to use, expand, personalize, and tweak Yahoo! in ways you never dreamed possible. You'll learn how to:Fine-tune search queries with keyword shortcuts and advanced syntaxManage and customize Yahoo! Mail, using it as your universal email client to access all your other accountsExplore your social networks with Yahoo! 360, blogging your life, keeping up with friends, and making new contactsStore, sort, blog, feed, track, and otherwise share photos with Flickr and RSSMake My Yahoo! your Yahoo!, and personalize Yahoo!'s many propertiesRoll your own Yahoo! applications with Yahoo! new Web Services API and Perl, PHP, Java, Python, Ruby, or the programming language of your choiceVisualize search results and topics, mash up images from around the Web, and remix other web contentList (or hide) your site with Yahoo!, and integrate Yahoo! Groups, Messenger, contextual search (Y!Q), or other Yahoo! featuresWhether you want to become a power searcher, news monger, super shopper, or innovative web developer, Yahoo! Hacks provides the tools to take you further than you ever thought possible.

Skype Hacks


Andrew Sheppard - 2005
    Skype Hacks tells you what all the Skype hype is about, explains the basics, and shows you more than 100 clever tips and tricks for tweaking and tuning Skype to make it do just what you want and more.Millions of people (48 million and counting, in fact) have opted for Skype, which uses peer-to-peer (P2P) technology to turn any PC, Mac, or Pocket PC into a telephone. Skype offers free calls between computers and extremely cheap calls to "old-fashioned" phone numbers (landlines and mobile phones). The sound quality is excellent, and end-to-end encryption means the connection is private and secure.But if you really know what you're doing, Skype can accomplish a whole lot more than that. Software developer and author Andrew Sheppard recently converted his entire house to Skype and uses it for all his personal and business calls, even when he's traveling. In Skype Hacks, he shows you how to do things with the technology that even the engineers at Skype probably never intended.Skype Hacks shows you how to:Get started with SkypeFigure out how much money you're saving and maximize your savingsCut the ties to your old phone companyOptimize your Skype configurationIntegrate Skype with desktop tools like Microsoft Office and your web browserSet up a Skype-based call centerThe book offers ideas for creating and organizing a contacts list, using Skype to transfer files, taking advantage of chat and voicemail capabilities, turning a PDA into a mobile phone, and automating Skype for even greater efficiency. So whether you'd simply like to give Skype a trial run, you want new Skype ring tones and fun on-hold music, or you're considering wiring your home with Skype to get rid of "regular" phone service altogether, Skype Hacks is your ideal guide.

Rss and Atom: Understanding and Implementing Content Feeds and Syndication


Heinz Wittenbrink - 2005
    The feed formats and vocabularies are covered in depth, and the book does require some familiarity with XML, but no scripting or development expertise is necessary. The book starts by analyzing the need to distribute content that RSS emerged to meet. It outlines in development of the various formats as way of understanding how the technology map of today came about. The current status of the leading formats is summarized succinctly. Then RSS is examined in detail. The XML vocabulary and document structure is examined and explained clearly. Each element is illustrated with carefully chosen examples. The changes through RSS 0.9x to 2.0 are covered in depth as are extensions and modules such as BitTorrent, EasyNews and others. The book then goes on to examine the richness and complexity of RSS 1.0 and 1.1, again covering both how design decisions were made, then covering the XML structure in depth. The same in depth treatment is then given to Atom, comparing and contrasting the formats where appropriate.

Apple Pro Training Series: Soundtrack Pro (Apple Pro Training)


Mary Plummer - 2005
    In this Apple-certified book/DVD combo, readers will find a complete, self-paced course in all aspects of Soundtrack Pro. Author Mary Plummer guides you through the secrets of editing, repairing, mixing, and arranging multi-track audio files, as well as how to create original soundtracks, score to video, add effects, and more. Step-by-step exercises and lesson files will have readers taking advantage of Soundtrack' s thousands of audio loops to create perfectly synched scores in no time. Also included are dozens of advanced sound editing tips for professional users who want to take their video, DVD, and Web projects to the next level.

Encyclopedia of Cryptography and Security


Henk C.A. van Tilborg - 2005
    With an A-Z format of over 460 entries, 100 plus international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this preeminent work include useful literature references, providing more than 2500 references in total. Topics for the encyclopedia were selected by a distinguished advisory board consisting of 18 of the world's leading scholars and practitioners. The main subject areas in this book include: authentication and identification; block ciphers and stream ciphers; computational issues; copy protection; cryptanalysis and security; cryptographic protocols; electronic payment and digital certificates; elliptic curve cryptography; factorization algorithms and primality tests;

Microsoft Small Business Specialist Primer & 70-282 Exam Preparation Guide (featuring Windows Small Business Server 2003) (Harry Brelsford's SMB)


Beatrice Mulzer - 2005
    This book tells you all you need to know to become a Small Business Specialist All of the prerequisite certification exams and the sales assessment are covered in an "exam cram" format to help you "FAST PASS" your testing requirements. Special emphasis is placed on the 70-282 "Designing, Deploying, and Managing a Network Solution for a Small- and Medium-Sized Business." Don?t delay ? use this SMB and SBS networking book to increase your financial net worth TODAY

Photoshop CS2 Essential Skills [With CDROM]


Mark Galer - 2005
    You will build a useful and essential set of skills for creative and professional image editing and, whether you simply want to retouch an image, create a glamour makeover or create a highly sophisticated montage - this book will give you the essential skills to complete the work to a professional standard. The accompanying CD-ROM and website, www.photoshopessentialskills.com, offer additional teaching and learning support materials which form a library of indispensable supporting resources including: All of the images used in the text * Over four hours of QuickTime movie tutorials to support the practical projects * A range of presets (including layer styles, curves, shapes and gradients) * Camera RAW files * Free extra chapters in e-book form. * Packed with beautiful color images and covering Photoshop 7.0 up to CS2* Includes practical projects to put theoretical knowledge into a creative context* CD-ROM and website, www.photoshopessentialskills.com, offer additional teaching and learning support materials

Computer Networking: Internet Protocols in Action


Jeanna Matthews - 2005
    They give computer science students realistic hands-on experience working with network protocols, without requiring all the routers, switches, hubs, and PCs of an actual network. Using the latest version of the open source program Ethereal, the reader opens packet trace files from the CD and follows the text to perform the exercises, gaining a thorough understanding of the material in the best way possible--by seeing it in action. This approach also benefits the instructor, who is spared the time-consuming tasks of maintaining a laboratory and taking traces. It can even relieve the anxiety system administrators have about students collecting traces on campus networks!

Apple Training Series: Mac OS X System Administration Reference, Volume 1


Schoun Regan - 2005
    It will teach the reader how to install and configure machines; architect and maintain networks; enable, customize, tune, and troubleshoot a wide range of services; and integrate Mac OS X, Mac OS X Server, and other Apple technologies within a networked environment.

Minimal Perl: For Unix and Linux People


Tim Maher - 2005
    A joy to read."" -Dan Sanderson, Software Developer, Amazon.com ""Shows style, not just facts-valuable."" -Brian Downs, former Training Director, Lucent Technologies ""Brilliant, never tedious-highly recommended!"" -Jon Allen, Maintainer of perldoc.perl.org ""You could have chosen no better primer than this book."" -Damian Conway, from the Foreword Perl is a complex language that can be difficult to master. Perl advocates boast that ""There's More Than One Way To Do It,"" but do you really want to learn several ways of saying the same thing to a computer? To make Perl more accessible, Dr. Tim Maher has over the years designed and taught an essential subset of the language that is smaller, yet practical and powerful. With this engaging book you can now benefit from ""Minimal Perl,"" even if all you know about Unix is grep. You will learn how to write simple Perl commands-many just one-liners-that go far beyond the limitations of Unix utilities, and those of Linux, MacOS/X, etc. And you'll acquire the more advanced Perl skills used in scripts by capitalizing on your knowledge of related Shell resources. Sprinkled throughout are many Unix-specific Perl tips. This book is especially suitable for system administrators, webmasters, and software developers.

Secure Coding in C and C++


Robert C. Seacord - 2005
    To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append it as an afterthought. That's the point of" Secure Coding in C and C++. "In careful detail, this book shows software developers how to build high-quality systems that are less vulnerable to costly and even catastrophic attack. It's a book that every developer should read before the start of any serious project."--Frank Abagnale, author, lecturer, and leading consultant on fraud prevention and secure documents" Learn the Root Causes of Software Vulnerabilities and How to Avoid ThemCommonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed nearly 18,000 vulnerability reports over the past ten years, the CERT/Coordination Center (CERT/CC) has determined that a relatively small number of root causes account for most of them. This book identifies and explains these causes and shows the steps that can be taken to prevent exploitation. Moreover, this book encourages programmers to adopt security best practices and develop a security mindset that can help protect software from tomorrow's attacks, not just today's.Drawing on the CERT/CC's reports and conclusions, Robert Seacord systematically identifies the program errors most likely to lead to security breaches, shows how they can be exploited, reviews the potential consequences, and presents secure alternatives.Coverage includes technical detail on how to Improve the overall security of any C/C++ applicationThwart buffer overflows and stack-smashing attacks that exploit insecure string manipulation logicAvoid vulnerabilities and security flaws resulting from the incorrect use of dynamic memory management functionsEliminate integer-related problems: integer overflows, sign errors, and truncation errorsCorrectly use formatted output functions without introducing format-string vulnerabilitiesAvoid I/O vulnerabilities, including race conditionsSecure Coding in C and C++ presents hundreds of examples of secure code, insecure code, and exploits, implemented for Windows and Linux. If you're responsible for creating secure C or C++ software--or for keeping it safe--no other book offers you this much detailed, expert assistance.

Professional C++


Nicholas A. Solter - 2005
    Geared to experienced C++ developers who may not be familiar with the more advanced features of the language, and therefore are not using it to its full capabilities Teaches programmers how to think in C++-that is, how to design effective solutions that maximize the power of the language The authors drill down into this notoriously complex language, explaining poorly understood elements of the C++ feature set as well as common pitfalls to avoid Contains several in-depth case studies with working code that's been tested on Windows, Linux, and Solaris platforms

A Practical Guide to Linux Commands, Editors, and Shell Programming


Mark G. Sobell - 2005
    The book is a complete revision of the commands section of Sobell's Practical Guide to Linux - a proven best-seller. The book is Linux distribution and release agnostic. It will appeal to users of ALL Linux distributions. Superior examples make this book the the best option on the market! System administrators, software developers, quality assurance engineers and others working on a Linux system need to work from the command line in order to be effective. Linux is famous for its huge number of command line utility programs, and the programs themselves are famous for their large numbers of options, switches, and configuration files. But the truth is that users will only use a limited (but still significant) number of these utilities on a recurring basis, and then only with a subset of the most important and useful options, switches and configuration files. This book cuts through all the noise and shows them which utilities are most useful, and which options most important. And it contains examples, lot's and lot's of examples. programmability. Utilities are designed, by default, to work wtih other utilities within shell programs as a way of automating system tasks. This book contains a superb introduction to Linux shell programming. And since shell programmers need to write their programs in text editors, this book covers the two most popular ones: vi and emacs.

Software Testing: Principles and Practices


Srinivasan Desikan - 2005
    The book covers the principles of testing, life cycle models for software development, test management metrics and automation, and the different types of testing. Popular testing methods like Performance Testing, System and Acceptance Testing, White Box, Black Box, and Ad Hoc Testing are included. Apart from this, it also provides in-depth knowledge on specialized testing methods such as Object-Oriented Systems and Usability Testing and Accessibility Testing. A key feature of this book is that it recognises common issues faced by companies in terms of people management, geographically dispersed teams, and varying company business models, and addresses these problems in a unit titled, 'People and Organisational Issues in Testing'.