Best of
Computers
2006
CLR via C# (Pro-Developer)
Jeffrey Richter - 2006
This guide is suitable for developers building various kinds of application - including Microsoft[registered] ASP.NET, Windows[registered] Forms, Microsoft[registered] SQL Server[registered], Web services, and console applications.
CSS: The Missing Manual
David Sawyer McFarland - 2006
You can tap into the real power of this tool with CSS: The Missing Manual. This second edition combines crystal-clear explanations, real-world examples, and dozens of step-by-step tutorials to show you how to design sites with CSS that work consistently across browsers. Witty and entertaining, this second edition gives you up-to-the-minute pro techniques. You'll learn how to: - Create HTML that's simpler, uses less code, is search-engine friendly, and works well with CSS- Style text by changing fonts, colors, font sizes, and adding borders- Turn simple HTML links into complex and attractive navigation bars -- complete with rollover effects- Create effective photo galleries and special effects, including drop shadows- Get up to speed on CSS 3 properties that work in the latest browser versions- Build complex layouts using CSS, including multi-column designs Style web pages for printing With CSS: The Missing Manual, Second Edition, you'll find all-new online tutorial pages, expanded CSS 3 coverage, and broad support for Firebox, Safari, and other major web browsers, including Internet Explorer 8. Learn how to use CSS effectively to build new websites, or refurbish old sites that are due for an upgrade.
Computer Architecture: A Quantitative Approach
John L. Hennessy - 2006
Today, Intel and other semiconductor firms are abandoning the single fast processor model in favor of multi-core microprocessors--chips that combine two or more processors in a single package. In the fourth edition of "Computer Architecture," the authors focus on this historic shift, increasing their coverage of multiprocessors and exploring the most effective ways of achieving parallelism as the key to unlocking the power of multiple processor architectures. Additionally, the new edition has expanded and updated coverage of design topics beyond processor performance, including power, reliability, availability, and dependability. CD System Requirements"PDF Viewer"The CD material includes PDF documents that you can read with a PDF viewer such as Adobe, Acrobat or Adobe Reader. Recent versions of Adobe Reader for some platforms are included on the CD. "HTML Browser"The navigation framework on this CD is delivered in HTML and JavaScript. It is recommended that you install the latest version of your favorite HTML browser to view this CD. The content has been verified under Windows XP with the following browsers: Internet Explorer 6.0, Firefox 1.5; under Mac OS X (Panther) with the following browsers: Internet Explorer 5.2, Firefox 1.0.6, Safari 1.3; and under Mandriva Linux 2006 with the following browsers: Firefox 1.0.6, Konqueror 3.4.2, Mozilla 1.7.11. The content is designed to be viewed in a browser window that is at least 720 pixels wide. You may find the content does not display well if your display is not set to at least 1024x768 pixel resolution. "Operating System"This CD can be used under any operating system that includes an HTML browser and a PDF viewer. This includes Windows, Mac OS, and most Linux and Unix systems. Increased coverage on achieving parallelism with multiprocessors. Case studies of latest technology from industry including the Sun Niagara Multiprocessor, AMD Opteron, and Pentium 4. Three review appendices, included in the printed volume, review the basic and intermediate principles the main text relies upon. Eight reference appendices, collected on the CD, cover a range of topics including specific architectures, embedded systems, application specific processors--some guest authored by subject experts.
CSS Mastery: Advanced Web Standards Solutions
Andy Budd - 2006
You'll learn how to: - Plan, organize, and maintain your stylesheets more effectively- Apply the secrets of liquid, elastic, and hybrid layouts- Create flickr-style image maps, remote rollovers, and other advanced CSS features- Lay out forms using pure CSS- Recognize common browser bugs, and how to fix themWhile CSS is a relatively simple technology to learn, it is a difficult one to master. When you first start developing sites using CSS, you will come across all kinds of infuriating browser bugs and inconsistencies. It sometimes feels like there are a million and one different techniques to master, spread across a bewildering array of websites. The range of possibilities seems endless and makes for a steep and daunting learning curve. By bringing all of the latest tips, tricks, and techniques together in one handy reference, this book demystifies the secrets of CSS and makes the journey to CSS mastery as simple and painless as possible. While most books concentrate on basic skills, this one is different, assuming that you already know the basics and why you should be using CSS in your work, and concentrating mainly on advanced techniques. It begins with a brief recap of CSS fundamentals such as the importance of meaningful markup, how to structure and maintain your code, and how the CSS layout model really works. With the basics out of the way, each subsequent chapter details a particular aspect of CSS-based design. Through a series of easy-to-follow tutorials, you will learn practical CSS techniques you can immediately start using in your daily work. Browser inconsistencies are the thorn in most CSS developers' sides, so we have dedicated two whole chapters to CSS hacks, filters, and bug fixing, as well as looking at image replacement; professional link, form, and list styling; pure CSS layouts; and much more. All of these techniques are then put into practice in two beautifully designed case studies, written by two of the world's best CSS designers, Simon Collison and Cameron Moll. Summary of Contents: - Chapter 1: Setting the Foundations- Chapter 2: Visual Formatting Model Recap- Chapter 3: Background Images and Image Replacement- Chapter 4: Styling Links- Chapter 5: Styling Lists and Creating Nav Bars- Chapter 6: Styling Forms and Data Tables- Chapter 7: Layout- Chapter 8: Hacks and Filters- Chapter 9: Bugs and Bug Fixing- Case Study 1: More Than Doodles- Case Study 2: Tuscany Luxury Resorts
Learn to Program
Chris Pine - 2006
Now everyone can learn to write programs for themselves--no previous experience is necessary. Chris Pine takes a thorough, but light-hearted approach that teaches you how to program with a minimum of fuss or bother. Starting with small, simple one-line programs to calculate your age in seconds, you'll see how to have your webpage send you email, to shuffle your music more intelligently, to rename your photos from your digital camera, and more. You'll learn the same technology used to drive modern dynamic websites and large, professional applications.
Inside the Machine
Jon Stokes - 2006
Once you understand how the microprocessor-or central processing unit (CPU)-works, you'll have a firm grasp of the fundamental concepts at the heart of all modern computing.Inside the Machine, from the co-founder of the highly respected Ars Technica website, explains how microprocessors operate-what they do and how they do it. The book uses analogies, full-color diagrams, and clear language to convey the ideas that form the basis of modern computing. After discussing computers in the abstract, the book examines specific microprocessors from Intel, IBM, and Motorola, from the original models up through today's leading processors. It contains the most comprehensive and up-to-date information available (online or in print) on Intel's latest processors: the Pentium M, Core, and Core 2 Duo. Inside the Machine also explains technology terms and concepts that readers often hear but may not fully understand, such as "pipelining," "L1 cache," "main memory," "superscalar processing," and "out-of-order execution."Includes discussion of:Parts of the computer and microprocessor Programming fundamentals (arithmetic instructions, memory accesses, control flow instructions, and data types) Intermediate and advanced microprocessor concepts (branch prediction and speculative execution) Intermediate and advanced microprocessor concepts (branch prediction and speculative execution) Intermediate and advanced computing concepts (instruction set architectures, RISC and CISC, the memory hierarchy, and encoding and decoding machine language instructions) 64-bit computing vs. 32-bit computing Caching and performance Inside the Machine is perfect for students of science and engineering, IT and business professionals, and the growing community of hardware tinkerers who like to dig into the guts of their machines.
Mac OS X Internals: A Systems Approach
Amit Singh - 2006
Understanding the design, implementation, and workings of Mac OS X requires examination of several technologies that differ in their age, origins, philosophies, and roles. Mac OS X Internals: A Systems Approach is the first book that dissects the internals of the system, presenting a detailed picture that grows incrementally as you read. For example, you will learn the roles of the firmware, the bootloader, the Mach and BSD kernel components (including the process, virtual memory, IPC, and file system layers), the object-oriented I/O Kit driver framework, user libraries, and other core pieces of software. You will learn how these pieces connect and work internally, where they originated, and how they evolved. The book also covers several key areas of the Intel-based Macintosh computers.A solid understanding of system internals is immensely useful in design, development, and debugging for programmers of various skill levels. System programmers can use the book as a reference and to construct a better picture of how the core system works. Application programmers can gain a deeper understanding of how their applications interact with the system. System administrators and power users can use the book to harness the power of the rich environment offered by Mac OS X. Finally, members of the Windows, Linux, BSD, and other Unix communities will find the book valuable in comparing and contrasting Mac OS X with their respective systems. Mac OS X Internals focuses on the technical aspects of OS X and is so full of extremely useful information and programming examples that it will definitely become a mandatory tool for every Mac OS X programmer.
Software Estimation: Demystifying the Black Art
Steve McConnell - 2006
In fact, generating accurate estimates is straightforward—once you understand the art of creating them.In his highly anticipated book, acclaimed author Steve McConnell unravels the mystery to successful software estimation—distilling academic information and real-world experience into a practical guide for working software professionals. Instead of arcane treatises and rigid modeling techniques, this guide highlights a proven set of procedures, understandable formulas, and heuristics that individuals and development teams can apply to their projects to help achieve estimation proficiency.
Inside Microsoft SQL Server 2005: T-SQL Programming
Itzik Ben-Gan - 2006
Database developers and administrators get best practices, expert techniques, and code samples to master the intricacies of the programming language—solving complex problems with real-world solutions. Discover how to:Understand when to apply set-based programming techniquesDesign and implement date and time-related XML and CLR datatypesUse temporary objects, including temporary tables, table variables, and table expressionsWork with T-SQL and CLR user-defined functions, stored procedures, and triggersSupport user input-based queries and variable data with dynamic executionWork with transactions and new exception handling constructsApply a concurrency model to support simultaneous usersUse Service Broker for controlled asynchronous processing in database applications This book includes code samples on the Web.
Digital Restoration from Start to Finish: How to Repair Old and Damaged Photographs
Ctein - 2006
Nothing is left out, from choosing the right hardware and software and getting the photographs into the computer, to getting the finished photo out of the computer and preserving it for posterity.LEARN HOW TO: Scan faded and damaged prints or films Improve snapshots with Shadow/Highlight adjustmentCorrect uneven exposureFix color and skin tones quickly with Curves, plug-ins, and Hue/Saturation adjustment layersCorrect uneven exposure and do dodging and burning-in with adjustment layersHand-tint your photographs easilyCorrect skin tones with airbrush layersClean up dust and scratches speedily and effectivelyRepair small and large cracks with masks and filtersEliminate tarnish and silvered-out spots from a photograph in just a few stepsMinimize unwanted print surface texturesErase mildew spotsEliminate dots from newspaper photographsIncrease sharpness and fine detailandMaximize print quality
The Art of Computer Programming, Volume 4, Fascicle 4: Generating All Trees--History of Combinatorial Generation
Donald Ervin Knuth - 2006
Check out the boxed set that brings together Volumes 1 - 4A in one elegant case, and offers the purchaser a $50 discount off the price of buying the four volumes individually. The Art of Computer Programming, Volumes 1-4A Boxed Set, 3/e ISBN: 0321751043 Art of Computer Programming, Volume 4, Fascicle 4, The: Generating All Trees--History of Combinatorial Generation: Generating All Trees--History of Combinatorial Generation This multivolume work on the analysis of algorithms has long been recognized as the definitive description of classical computer science.The three complete volumes published to date already comprise a unique and invaluable resource in programming theory and practice. Countless readers have spoken about the profound personal influence of Knuth's writings. Scientists have marveled at the beauty and elegance of his analysis, while practicing programmers have successfully applied his cookbook solutions to their day-to-day problems. All have admired Knuth for the breadth, clarity, accuracy, and good humor found in his books. To begin the fourth and later volumes of the set, and to update parts of the existing three, Knuth has created a series of small books called fascicles, which will be published at regular intervals. Each fascicle will encompass a section or more of wholly new or revised material. Ultimately, the content of these fascicles will be rolled up into the comprehensive, final versions of each volume, and the enormous undertaking that began in 1962 will be complete. Volume 4, Fascicle 4 This latest fascicle covers the generation of all trees, a basic topic that has surprisingly rich ties to the first three volumes of "The Art of Computer Programming." In thoroughly discussing this well-known subject, while providing 124 new exercises, Knuth continues to build a firm foundation for programming. To that same end, this fascicle also covers the history of combinatorial generation. Spanning many centuries, across many parts of the world, Knuth tells a fascinating story of interest and relevance to every artful programmer, much of it never before told. The story even includes a touch of suspense: two problems that no one has yet been able to solve. "
Programming in Haskell
Graham Hutton - 2006
This introduction is ideal for beginners: it requires no previous programming experience and all concepts are explained from first principles via carefully chosen examples. Each chapter includes exercises that range from the straightforward to extended projects, plus suggestions for further reading on more advanced topics. The author is a leading Haskell researcher and instructor, well-known for his teaching skills. The presentation is clear and simple, and benefits from having been refined and class-tested over several years. The result is a text that can be used with courses, or for self-learning. Features include freely accessible Powerpoint slides for each chapter, solutions to exercises and examination questions (with solutions) available to instructors, and a downloadable code that's fully compliant with the latest Haskell release.
Foundations of Multidimensional and Metric Data Structures
Hanan Samet - 2006
Each section includes a large number of exercises and solutions to self-test and confirm the reader's understanding and suggest future directions.The book is an excellent and valuable reference tool for professionals in many areas, including computer graphics, databases, geographic information systems (GIS), game programming, image processing, pattern recognition, solid modeling, similarity retrieval, and VLSI design.
Solaris Internals: Solaris 10 and Opensolaris Kernel Architecture
Richard McDougall - 2006
Any person using Solaris--in any capacity--would be remiss not to include these two new volumes in their personal library. With advanced observability tools in Solaris (likeDTrace), you will more often find yourself in what was previously unchartable territory. Solaris(TM) Internals, Second Edition, provides us a fantastic means to be able to quickly understand these systems and further explore the Solaris architecture--especially when coupled with OpenSolaris source availability."--Jarod Jenson, chief systems architect, Aeysis"The Solaris(TM) Internals volumes by Jim Mauro and Richard McDougall must be on your bookshelf if you are interested in in-depth knowledge of Solaris operating system internals and architecture. As a senior Unix engineer for many years, I found the first edition of Solaris(TM) Internals the only fully comprehensive source for kernel developers, systems programmers, and systems administrators. The new second edition, with the companion performance and debugging book, is an indispensable reference set, containing many useful and practical explanations of Solaris and its underlying subsystems, including tools and methods for observing and analyzing any system running Solaris 10 or OpenSolaris."--Marc Strahl, senior UNIX engineer Solaris(TM) Internals, Second Edition, describes the algorithms and data structures of all the major subsystems in the Solaris 10 and OpenSolaris kernels. The text has been extensively revised since the first edition, with more than 600 pages of new material. Integrated Solaris tools and utilities, including DTrace, MDB, kstat, and the process tools, are used throughout to illustrate how the reader can observe the Solaris kernel in action. The companion volume, Solaris(TM) Performance and Tools, extends the examples contained here, and expands the scope to performance and behavior analysis. Coverage includes: Virtual and physical memory Processes, threads, and scheduling File system framework and UFS implementation Networking: TCP/IP implementation Resource management facilities and zones The Solaris(TM) Internals volumes make a superb reference for anyone using Solaris 10 and OpenSolaris.
Routers and Routing Basics CCNA 2 Companion Guide (Cisco Networking Academy) (Cisco Networking Academy Program)
Wendell Odom - 2006
Book by Odom, Wendell, McDonald, Rick
CWNA Certified Wireless Network Administrator Official Study Guide: Exam PW0-104
David D. Coleman - 2006
This valuable guide covers all objectives for the newest version of the PW0-104 exam, including radio technologies; antenna concepts; wireless LAN hardware and software; network design, installation and management; wireless standards and organizations; 802.11 network architecture; wireless LAN security; performing site surveys; and troubleshooting. Also included are hands-on exercises, chapter review questions, a detailed glossary, and a pre-assessment test. The CD-ROM features two bonus exams, over 150 flashcards, and numerous White Papers and demo software.
Note: CD-ROM materials for eBook purchases can be downloaded from CWNP’s website at www.cwnp.com/sybex.
Advanced ActionScript 3 with Design Patterns
Joey Lott - 2006
ActionsScript provides the capability of developing patterns, and this handbook starts with the basics but moves beyond class syntax to help developers determine what should be part of a class and explains the relatio
Wardriving & Wireless Penetration Testing
Chris Hurley - 2006
This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.
70-270 Installing, Configuring, and Administering Microsoft Windows XP Professional Package
Dave Field - 2006
In addition, this textbook will help students to prepare for Microsoft Certified Professional (MCP) Exam 70-270: Installing, Configuring, and Administering Microsoft Windows XP Professional. A complete set of instructor resources supports the book.
Inside Microsoft SQL Server 2005: The Storage Engine
Kalen Delaney - 2006
Database developers and administrators get best practices, pragmatic advice, and code samples to help master the intricacies of creating and maintaining enterprise relational databases. Discover how to:Upgrade or migrate to SQL Server 2005 and choose configuration options Control space allocation for databases and files manually or automatically Manage transaction logs to maximize efficient restore operations and data consistency Observe the internal structures of clustered and nonclustered indexes Build and partition relational indexes and tables Explore internal storage issues and compare fixed- and variable-length datatypes Detect and correct index fragmentation Implement and manage an appropriate concurrency model using locking or row versioning PLUS—Get code samples on the Web.
PPK on JavaScript
Peter-Paul Koch - 2006
In contrast, Peter-Paul Koch's book uses eight real-world scripts he created for real-world clients in order to earn real-world money. That means the scripts are guaranteed to do something useful (and sellable ) that enhances the usability of the page they're used on.The book's example scripts include one that sorts a data table according to the user's search queries, a form validation script, a script that shows form fields only when the user needs them, a drop-down menu, and a data retrieval script that uses simple Ajax and shows the data in an animation.After an overview of JavaScript's purpose, Peter-Paul provides theoretical chapters on the context (jobs for JavaScript, CSS vs. JavaScript), the browsers (debugging, the arcana of the browser string), and script preparation. Then follow practical chapters on Core, BOM, Events, DOM, CSS Modification, and Data Retrieval, all of which are explained through a combination of theoretical instruction and the taking apart of the relevant sections of the example scripts.
Colossus: The Secrets of Bletchley Park's Codebreaking Computers
B. Jack Copeland - 2006
This book rewrites the history of computer science, arguing that in reality Colossus--the giant computer built by the British secret service during World War II--predates ENIAC by two years.Colossus was built during the Second World War at the Government Code and Cypher School at Bletchley Park. Until very recently, much about the Colossus machine was shrouded in secrecy, largely because the code-breaking algorithms that were employed during World War II remained in use by the British security services until a short time ago. In addition, the United States has recently declassified a considerable volume of wartime documents relating to Colossus. Jack Copeland has brought together memoirs of veterans of Bletchley Park--the top-secret headquarters of Britain's secret service--and others who draw on the wealth of declassified information to illuminate the crucial role Colossus played during World War II. Included here are pieces by the former WRENS who actually worked the machine, the scientist who pioneered the use of vacuum tubes in data processing, and leading authorities on code-breaking and computer science.A must read for anyone curious about code-breaking or World War II espionage, Colossus offers a fascinating insider's account of the world first giant computer, the great great grandfather of the massive computers used today by the CIA and the National Security Agency.
CWSP Certified Wireless Security Professional Official Study Guide: Exam PWO-200
Grant Moerschel - 2006
This study guide offers an integrated study system including marginal notes that reinforce and teach practical skills, step-by-step exercises, 150 practice exam questions and chapter self tests.
The Art of Software Security Testing: Identifying Software Security Flaws
Chris Wysopal - 2006
This book takes the basic idea several steps forward. Written by masters of software exploit, this book describes in very basic terms how security testing differs from standard software testing as practiced by QA groups everywhere. It unifies in one place ideas from Michael Howard, David Litchfield, Greg Hoglund, and me into a concise introductory package. Improve your security testing by reading this book today." -Gary McGraw, Ph.D., CTO, Cigital; Author, Software Security, Exploiting Software, Building Secure Software, and Software Fault Injection; www.cigital.com/ gem "As 2006 closes out, we will see over 5,000 software vulnerabilities announced to the public. Many of these vulnerabilities were, or will be, found in enterprise applications from companies who are staffed with large, professional, QA teams. How then can it be that these flaws consistently continue to escape even well-structured diligent testing? The answer, in part, is that testing still by and large only scratches the surface when validating the presence of security flaws. Books such as this hopefully will start to bring a more thorough level of understanding to the arena of security testing and make us all a little safer over time." -Alfred Huger, Senior Director, Development, Symantec Corporation "Software security testing may indeed be an art, but this book provides the paint-by-numbers to perform good, solid, and appropriately destructive security testing: proof that an ounce of creative destruction is worth a pound of patching later. If understanding how software can be broken is step one in every programmers' twelve-step program to defensible, secure, robust software, then knowledgeable security testing comprises at least steps two through six." -Mary Ann Davidson, Chief Security Officer, Oracle "Over the past few years, several excellent books have come out teaching developers how to write more secure software by describing common security failure patterns. However, none of these books have targeted the tester whose job it is to find the security problems before they make it out of the R&D lab and into customer hands. Into this void comes The Art of Software Security Testing: Identifying Software Security Flaws. The authors, all of whom have extensive experience in security testing, explain how to use free tools to find the problems in software, giving plenty of examples of what a software flaw looks like when it shows up in the test tool. The reader learns why security flaws are different from other types of bugs (we want to know not only that 'the program does what it's supposed to, ' but also that 'the program doesn't do that which it's not supposed to'), and how to use the tools to find them. Examples are primarily based on C code, but some description of Java, C#, and scripting languages help for those environments. The authors cover both Windows and UNIX-based test tools, with plenty of screenshots to see what to expect. Anyone who's doing QA testing on software should read this book, whether as a refresher for finding security problems, or as a starting point for QA people who have focused on testing functionality." -Jeremy Epstein, WebMethods State-of-the-Art Software Security Testing: Expert, Up to Date, and Comprehensive The Art of Software Security Testing delivers in-depth, up-to-date, battle-tested techniques for anticipating and identifying software security problems before the "bad guys" do. Drawing on decades of experience in application and penetration testing, this book's authors can help you transform your approach from mere "verification" to proactive "attack." The authors begin by systematically reviewing the design and coding vulnerabilities that can arise in software, and offering realistic guidance in avoiding them. Next, they show you ways to customize software debugging tools to test the unique aspects of any program and then analyze the results to identify exploitable vulnerabilities. Coverage includesTips on how to think the way software attackers think to strengthen your defense strategy Cost-effectively integrating security testing into your development lifecycle Using threat modeling to prioritize testing based on your top areas of risk Building testing labs for performing white-, grey-, and black-box software testing Choosing and using the right tools for each testing project Executing today's leading attacks, from fault injection to buffer overflows Determining which flaws are most likely to be exploited by real-world attackers This book is indispensable for every technical professional responsible for software security: testers, QA specialists, security professionals, developers, and more. For IT managers and leaders, it offers a proven blueprint for implementing effective security testing or strengthening existing processes. Foreword xiii Preface xvii Acknowledgments xxix About the Authors xxxi Part I: Introduction Chapter 1: Case Your Own Joint: A Paradigm Shift from Traditional Software Testing 3 Chapter 2: How Vulnerabilities Get Into All Software 19 Chapter 3: The Secure Software Development Lifecycle 55 Chapter 4: Risk-Based Security Testing: Prioritizing Security Testing with Threat Modeling 73 Chapter 5: Shades of Analysis: White, Gray, and Black Box Testing 93 Part II: Performing the Attacks Chapter 6: Generic Network Fault Injection 107 Chapter 7: Web Applications: Session Attacks 125 Chapter 8: Web Applications: Common Issues 141 Chapter 9: Web Proxies: Using WebScarab 169 Chapter 10: Implementing a Custom Fuzz Utility 185 Chapter 11: Local Fault Injection 201 Part III: Analysis Chapter 12: Determining Exploitability 233 Index 251
Information Science
David G. Luenberger - 2006
Now, renowned scholar and author David Luenberger has produced Information Science, a text that distills and explains the most important concepts and insights at the core of this ongoing revolution. The book represents the material used in a widely acclaimed course offered at Stanford University.Drawing concepts from each of the constituent subfields that collectively comprise information science, Luenberger builds his book around the five "E's" of information: Entropy, Economics, Encryption, Extraction, and Emission. Each area directly impacts modern information products, services, and technology--everything from word processors to digital cash, database systems to decision making, marketing strategy to spread spectrum communication.To study these principles is to learn how English text, music, and pictures can be compressed, how it is possible to construct a digital signature that cannot simply be copied, how beautiful photographs can be sent from distant planets with a tiny battery, how communication networks expand, and how producers of information products can make a profit under difficult market conditions.The book contains vivid examples, illustrations, exercises, and points of historic interest, all of which bring to life the analytic methods presented: Presents a unified approach to the field of information science Emphasizes basic principles Includes a wide range of examples and applications Helps students develop important new skills Suggests exercises with solutions in an instructor's manual
MCSA / MCSE: Windows Server 2003 Network Infrastructure Implementation, Management, and Maintenance Study Guide: Exam 70-291
Steve Suehring - 2006
Now updated for the new version of the exam covering Windows Server 2003 R2 and revised with enhanced troubleshooting guidance and new case studies.
The CD-ROM includes the cutting-edge WinSim simulation program, plus hundreds of sample questions, an e-version of the book, and flashcards.
More and more companies have begun upgrading to Windows Server 2003, increasing demand for Microsoft certified administrators and engineers.
Mac OS X V10.4 System Administration Reference, Volume 2
Schoun Regan - 2006
Provides information on the design, management, and deployment of networks using Mac OS X and Mac OS X Server.
Small Form Factor PCs
Duane Wessels - 2006
They consume less power, have few or no moving parts, and are very quiet. Whether you plan to use one as a standalone PC or want to embed it in your next hacking project, a small form factor PC may be the next thing you build.Small Form Factor PCs is the only book available that shows you how to build small form factor PCs -- from kits and from scratch -- that are more interesting and more personalized than what a full-sized PC can give you. Included in the book are projects for building personal video recorders, versatile wireless access points, digital audio jukeboxes, portable firewalls, and much more. This book shows you how to build eight different systems, from the shoebox-sized Shuttle system down to the stick-of-gum sized gumstix. With thorough illustrations and step-by-step instructions, Small Form Factor PCs makes it easy for anyone who wants to get started building these tiny systems. Small form factor computing is taking off, and this guide is an absolute must for anyone who wants to get in on the launch.
Discrete Mathematics Using a Computer
John M. O'Donnell - 2006
They have to ?gure out for themselves how to apply the ideas of discrete mathematics to computing problems. It is not easy. Most students fail to experience broad success in this enterprise, which is not surprising, since many of the most important advances in science and engineeringhavebeen, precisely, applicationsofmathematicstospeci?cscience and engineering problems. Tobesure, mostdiscretemathtextbooksincorporatesomeaspectsapplying discrete math to computing, but it usually takes the form of asking students to write programs to compute the number of three-ball combinations there are in a set of ten balls or, at best, to implement a graph algorithm. Few texts ask students to use mathematical logic to analyze properties of digital circuits or computer programs or to apply the set theoretic model of functions to understand higher-order operations. A major aim of this text is to integrate, tightly, the study of discrete mathematics with the study of central problems of computer science
Introduction to Biosemiotics: The New Biological Synthesis
Marcello Barbieri - 2006
This has important implications and applications for issues ranging from natural selection to animal behavior and human psychology, leaving biosemiotics at the cutting edge of the research on the fundamentals of life.Drawing on an international expertise, the book details the history and study of biosemiotics, and provides a state-of-the-art summary of the current work in this new field. And, with relevance to a wide range of disciplines - from linguistics and semiotics to evolutionary phenomena and the philosophy of biology - the book provides an important text for both students and established researchers, while marking a vital step in the evolution of a new biological paradigm.
Windows Vista All-In-One Desk Reference for Dummies
Woody Leonhard - 2006
Many of the features that were old friends in Windows XP now look and act differently. And if you're thinking of upgrading to Vista but haven't done it yet, wow -- there are eight different versions! How do you know which one to choose? That's easy -- look in Book One of Windows Vista All-in-One Desk Reference For Dummies. Windows expert Woody Leonhard starts off this everything-you-want-to-know-about -Vista guide by helping you choose the version that fits your needs. He follows that with minibooks Two through Nine, each devoted to one specific area -- setting up, securing, and customizing Vista, going online, adding cool hardware, getting the most from multimedia, exploring Vista video, and setting up a network. You'll find out about:Ripping and burning discs of data, music, or movies Organizing desktop files and folders Collecting and editing your digital photos in the Photo Gallery Controlling users, making backups, and maintaining your system Locking down your system to deflect spam, scams, spyware, phishers, and viruses Exploring alternatives to Internet Explorer Adding hard drives, printers, key drives, USB hubs, and other hardware Making movies, adding music to your iPod, and setting up Media Center Covering almost anything you will ever need to know for a long and happy relationship with Vista, Windows Vista All-in-One Desk Reference For Dummies is a guide you'll refer to again and again.
MATLAB for Engineers
Holly Moore - 2006
With a hands-on approach and focus on problem solving, this introduction to the powerful MATLAB computing language is designed for students with only a basic college algebra background. Numerous examples are drawn from a range of engineering disciplines, demonstrating MATLAB s applications to a broad variety of problems. This book is included in Prentice Hall s ESource series. ESource allows professors to select the content appropriate for their freshman/first-year engineering course. Professors can adopt the published manuals as is or use ESource swebsite www.prenhall.com/esource to view and select the chapters they need, in the sequence they want.The option to add their own material or copyrighted material fromother publishers also exists.
How to Do Everything with Microsoft Office Access 2007
Virginia Andersen - 2006
Designed to help you get things done quickly and easily, this user-friendly guide is your all-access pass to Access 2007.Navigate the new user interface with easeDesign a well-organized database using pre-designed templatesEnter and edit data and ensure data validitySort, filter, and print recordsExtract specific information using queriesMaster form and report design basicsAdd charts and graphs to forms and reports easilyOptimize database performance and speedExchange database objects and text files between Access databases
Wi-Fi Hotspots: Setting Up Public Wireless Internet Access
Eric Geier - 2006
Book by Geier, Eric
Canon EOS 30D Guide to Digital SLR Photography
David D. Busch - 2006
It includes concise explanations of file formats, resolution, aperture/priority exposure, and special autofocus modes--summarized in well-organized chapters with plenty of illustrations showing what results will look like with various settings. You'll get a quick introduction to focus zones, Bokeh, flash synchronization options, how to choose zoom settings and exposure modes. Unlike the manual, this book cuts through the confusion and menu listings to provide exactly the information that is needed. It serves as a perfect product-specific book to using your Canon EOS 30D.
The Art of Rigging: Volume 2
Kiaran Ritchie - 2006
Whereas The Art of Rigging Volume I introduced the fundamental concepts used by professional technical directors, Volume II will take these concepts a step further by applying them to a truly production-quality example. Readers are guided through the creation of a battle robot, dubbed SP-23 (as seen on the cover). The majority of the book concentrates on the processes used to rig this gargantuan model. In the process, readers will learn how to handle such extremely large assets by implementing a multi-resolution pipeline. Mechanical rigging, dynamic simulations and plenty of MEL scripting are all covered in complete detail. In addition to following the creation of the SP-23 rig, The Art of Rigging Volume II includes several bonus sections, video lectures and many included scene files. Bonus sections include discussions of muscle rigging and smooth skinning for organic characters. The included DVD contains many hours of video lectures, all scene files and plenty of custom MEL scripts. The Art of Rigging Volume I solidified CG Toolkit as the premiere training provider for discriminating technical artists. This sequel both compliments and extends these ideas while introducing many new scripts and techniques.
The Cambridge Handbook of Information and Computer Ethics
Luciano Floridi - 2006
They have had a radical and widespread impact on our moral lives and hence on contemporary ethical debates. The Cambridge Handbook of Information and Computer Ethics, first published in 2010, provides an ambitious and authoritative introduction to the field, with discussions of a range of topics including privacy, ownership, freedom of speech, responsibility, technological determinism, the digital divide, cyber warfare, and online pornography. It offers an accessible and thoughtful survey of the transformations brought about by ICTs and their implications for the future of human life and society, for the evaluation of behaviour, and for the evolution of moral values and rights. It will be a valuable book for all who are interested in the ethical aspects of the information society in which we live.
Introduction to 3D Game Programming with DirectX 9.0c: A Shader Approach
Frank Luna - 2006
The book is divided into three parts that explain basic mathematical and 3D concepts, show how to describe 3D worlds and implement fundamental 3D rendering techniques, and demonstrate the application of Direct3D to create a variety of special effects. Features include: understand basic mathematical tools used in video game creation such as vectors, matrices, and transformations; discover how to describe and draw interactive 3D scenes using Direct3D and the D3DX library; learn how to implement lighting, texture mapping, alpha blending, and stencilling using shaders and the high-level shading language (HLSL); explore a variety of techniques for creating special effects, including vertex blending, character animation, terrain rendering, multi-texturing, particle systems, reflections, shadows, and normal mapping; find out how to work with meshes, load and render .X files, program terrain/camera collision detection, and implement 3D object picking; and review key ideas, gain programming experience, and explore new topics with th full source code for every sample application.
Software Engineering for Internet Applications
Eve Astrid Andersson - 2006
Unlike the desktop applications that most students have already learned to build, server-based applications have multiple simultaneous users. This fact, coupled with the unreliability of networks, gives rise to the problems of concurrency and transactions, which students learn to manage by using the relational database system.After working their way to the end of the book, students will have the skills to take vague and ambitious specifications and turn them into a system design that can be built and launched in a few months. They will be able to test prototypes with end-users and refine the application design. They will understand how to meet the challenge of extreme business requirements with automatic code generation and the use of open-source toolkits where appropriate. Students will understand HTTP, HTML, SQL, mobile browsers, VoiceXML, data modeling, page flow and interaction design, server-side scripting, and usability analysis.The book, which originated as the text for an MIT course, is suitable for classroom use and will be a useful reference for software professionals developing multi-user Internet applications. It will also help managers evaluate such commercial software as Microsoft Sharepoint of Microsoft Content Management Server.
Master Visually 3ds Max 8 [With CDROM]
Jon McFarland - 2006
* Navigating within the interface* Creating and editing 2D and 3D objects* Controlling animation with function curves* Integrating walls, doors and windows* Simulating water surfaces and fluttering flags* Adjusting color and brightness of lighting* Rendering scenes with Quick Render Valuable tools on CD-ROM * 3ds Max 8 evaluation version* Project files from the book System Requirements: Please see the "About the CD-ROM" Appendix for details and complete system requirements.* "Master It" sidebars answer questions and present shortcuts* High-resolution screen shots demonstrate each task* Succinct explanations walk you through step by step* Two-page lessons break big topics into bite-sized modules
ESRI Map Book: Volume 21
Nancy Sappington - 2006
The maps in this book provide evidence of how GIS applications are helping to successfully describe and model many aspects of geographic knowledge about our world. GIS professionals are increasingly sharing their databases as GIS services that can be viewed and combined. Over time, this will enable society to better address a host of complex problems dealing with environmental sustainability, better governance, and more efficient business by reducing costs and helping organizations make faster, better decisions. I want to thank the people who have made these maps and acknowledge the wonderful contributions these maps represent. These efforts are making a difference in the world."-Jack Dangermond
How to Build a Computer: Building Your Own PC - The Easy, Step-By-Step Guide to Building the Ultimate, Custom Made PC
B.N. Bennoach - 2006
You can learn a lot about computer hardware by building a computer. Aside from that, you get a totally personalized computer that no OEM (Original Equipment Manufacturer) could match, and there is also the opportunity to save a lot of money in the process. The only downside is that you won't have any technical support number to ring, or any centralized warranty service (each part will have its own warranty/return policy), so there may be a chance that you will have to pay more for service (if you don't repair yourself). So now you've been sold on the merits, read on to find out how...
Game Character Design Complete: Using 3Ds Max 8 and Adobe Photoshop CS2 [With CD-ROM]
David Franson - 2006
Game Character Design Complete demonstrates each step of modeling, texturing, animating, and exporting compelling characters for your games. You?ll learn how to model in 3ds Max from sketch references, texture in Adobe Photoshop, rig bones, and animate a character back in 3ds Max. Game Character Design Complete covers all aspects of character creation-from the technical to the artistic. Don?t worry if your artistic ability isn?t awe-inspiring. You?ll cover every aspect of the design process in easy-to-follow steps, including texturing and animating your character. If you have a working knowledge of 2D and 3D graphics, then you have all of the skills you need to begin creating cool characters for your games.
AutoCAD 2009 and AutoCAD LT 2009 All-In-One Desk Reference for Dummies
Lee Ambrosius - 2006
There's even a minibook devoted to increasing your options with AutoCAD LT! This one-stop guide to creating great technical drawings using AutoCAD 2009 shows you how to navigate the AutoCAD interface, set up drawings, use basic and precision tools, and use drawing objects. You'll learn how to annotate your drawings, use dimensioning and hatching, and work with AutoCAD's new Annotation Scaling feature. You'll also find out how to work with solids, texture surfaces, add lighting, and much more. Discover how toNavigate the AutoCAD interface Work with lines, shapes, and curves Add explanatory text Understand AutoCAD LT's limitations Render your drawings Create and manage blocks Use AutoCAD advanced drafting techniques Comply with CAD management and standards Share your work with others Customize the AutoCAD interface, tools, and more Complete with Web links to advanced information on navigating the AutoCAD programming interfaces, using custom programs, getting started with AutoLISP, and working with Visual Basic for AutoCAD, AutoCAD & AutoCAD LT 2009 All-In-One Desk Reference for Dummies is the only comprehensive AutoCAD guide you'll ever need.
Fundamentals Of Quantum Optics And Quantum Information
Peter Lambropoulos - 2006
A more descriptive title might be: A guided tour through basic qu- tum mechanics, quantum optics and quantum information . Even better, a few words on its origin and our motivation for undertaking the task might be useful to the potential reader in deciding whether to turn the pages beyond this preface. For more than ten years now, a graduate course on quantum optics has been taught in the physics department of the University of Crete. Spanning two semesters, it originally consisted of a collection of topics representative of what can be found in the numerous by now excellent books on quantum optics. Over the last four years or so, however, the course acquired a gradually increasing segment of what is broadly referred to as quantum information, whichatthispointisapproximatelyhalfofthematerial.Inevitably, thetopics on standard quantum optics had to be reduced or compressed accordingly."
Numerical Methods for Chemical Engineering: Applications in MATLAB
Kenneth J. Beers - 2006
Written in a pedagogic style, the book describes basic linear and nonlinear algebric systems all the way through to stochastic methods, Bayesian statistics and parameter estimation. These subjects are developed at a level of mathematics suitable for graduate engineering study without the exhaustive level of the theoretical mathematical detail. The implementation of numerical methods in MATLAB is integrated within each chapter and numerous examples in chemical engineering are provided, with a library of corresponding MATLAB programs. This book will provide the graduate student with essential tools required by industry and research alike. Supplementary material includes solutions to homework problems set in the text, MATLAB programs and tutorial, lecture slides, and complicated derivations for the more advanced reader. These are available online at www.cambridge.org/9780521859714.
Linux Bible 2006: Boot Up to Fedora, KNOPPIX, Debian, SUSE, Ubuntu and 7 Other Distributions [With CD-ROM and DVD]
Christopher Negus - 2006
This completely revamped edition covers the familiar Linux flavors as well as some exciting new distributions-Ubuntu, Mepis, Arch Linux, and four othersIdeal for users planning the transition to Linux who want to sample different distributions to see which one best meets their needsIncludes new sections on practical uses for Linux, cool multimedia apps, instant messaging, BitTorrent, and improved security techniquesValuable information for system administrators who need to set up secure, fully functioning Linux serversBonus DVD is the only one on the market to include ten Linux distributions readers can try
Microsoft® Office Outlook® 2007 Step by Step
J. Preppernau - 2006
With Step By Step, you set the pace—building and practicing the skills you need, just when you need them! Send e-mail, schedule meetings, and organize tasks for easy follow-up Manage your inbox with rules, folders, and search filters Share your calendar with anyone via e-mail or on the Web Manage RSS feeds and newsgroups—without leaving your inbox Learn ways to block spam and protect your sensitive messages Personalize the way Outlook 2007 looks and works Your all-in-one learning experience includes: Files for building skills and practicing the book’s lessons Fully searchable eBook Bonus quick reference to the Ribbon, the new Microsoft Office interface Windows Vista Product Guide eReference—plus other resources on CD A Note Regarding the CD or DVDThe print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.
The Spiraling Web
Ryan Somma - 2006
Flatline, a hacker with seemingly supernatural powers over information systems, has assumed leadership of the AI hive, overseeing their domination of the World Wide Web and plots conquest of the world outside it. Devin, handle “Omni,” straddles both the virtual and the physical. He sees a war, where one side’s victory, human or AI, means the end of the other.
Professional ASP.Net 2.0 Server Control and Component Development
Shahram Khosravy - 2006
Professional ASP.NET 2.0 Server Control and Component Development covers the breadth of server control functionality as well as the rest of the membership, role management, SchemaImporterExtension, and so on - the functionality referred to as components. Written for the experienced ASP.NET developer, Professional ASP.NET 2.0 Server Control and Component Development will show you how to write your first sever control or custom component. The step-by-step coverage drills down to the details of the extensible part of the ASP.NET 2.0 Framework that you need to extend to write the specified type of custom control or component. Rather than present the extensible part as a black box, it presents a detailed step-by-step approach to implement functional replica of the extensible part, discusses the replica's code in detail, and provides an in-depth coverage of the techniques, tools, and technologies used in the code. From there you get a detailed practical recipe for developing the specified type of custom control or component and book then uses the recipe to implement one or more real-world custom controls or components of the specified type that you can use in your own Web applications.Some of the many types of controls and components you'll learn to build are:Ajax-enabled controls and components: four chapters on Ajax discuss and use Ajax patterns, ASP.NET 2.0 client callback mechanism, CSS, DOM, XML, and JavaScript to implement a number of Ajax-enabled controls and components. Web Parts: four chapters on Web Parts in ASP.NET 2.0 develop a number of custom WebPart, EditorPart, CatalogPart, WebPartZone, WebPartChrome, WebPartVerb, WebPartManager, and data-bound WebPart controls. 5 chapters on ASP.NET 2.0 security, membership, and role management components 5 chapters on ASP.NET 2.0 tabular and hierarchical data source controls and custom Parameter components 4 chapters on ASP.NET 2.0 tabular data-bound controls and data control fields Developing controls and components that can access any type of data store and automate all their data operations such as Delete, Update, Insert, and Sort. XML Web service, WSDL, Google XML Web service API, SchemaImporterExtension, ISerializable, and CodeDom XmlReader, XmlWriter, XPathNavigator, DOM, and XmlResolver Provider-Based Services including how to implement a RSS service provider that can feed RSS from any type of data store such as SQL Server, file system, Web services, and so on HTTP modules, HTTP handler factories, HTTP handlers, and control builders including developing an HTTP module and an HTTP handler factory that perform URL rewriting and an HTTP handler that generates RSS feeds User controls and composite and templated custom controls State management and custom type converters. Events, IPostBackEventHandler, IPostBackDataHandler, and Page lifecycle This book is also available as part of the 5-book ASP.NET 2.0 Wrox Box (ISBN: 0-470-11757-5). This 5-book set includes:Professional ASP.NET 2.0 Special Edition (ISBN: 0-470-04178-1) ASP.NET 2.0 Website Programming: Problem - Design - Solution (ISBN: 0764584642 ) Professional ASP.NET 2.0 Security, Membership, and Role Management (ISBN: 0764596985) Professional ASP.NET 2.0 Server Control and Component Development (ISBN: 0471793507) ASP.NET 2.0 MVP Hacks and Tips (ISBN: 0764597663) CD-ROM with more than 1000 pages of bonus chapters from 15 other .NET 2.0 and SQL Server(TM) 2005 Wrox books DVD with 180-day trial version of Microsoft(r) Visual Studio(r) 2005 Professional Edition
Microsoft SQL Server 2005 Administrator's Companion
Edward Whalen - 2006
This comprehensive administrator’s reference details features and capabilities of SQL Server 2005—including how to implement business intelligence applications. It delivers the easy-to-follow procedures, practical workarounds, and key troubleshooting tactics you need for on-the-job-results.Discover how to:Perform an installation or upgrade, and configure it on the network Plan and configure the I/O subsystem and model system capacity Create and maintain databases, tables, views, and indexes Administer transactions, deadlocks, and isolation levels Manage users with logins, user IDs, schemas, permissions, and roles Implement failover clustering, log shipping, and database mirroring for high availability Manage and tune snapshot, transactional, and merge replication Administer SQL Server Analysis Services and Reporting Services Monitor, troubleshoot, and fine-tune performance Includes a CD with a fully searchable eBook.A Note Regarding the CD or DVDThe print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.
RFID Essentials (Theory in Practice (O'Reilly))
Bill Glover - 2006
From Wal-Mart and Tesco to the U.S. Department of Defense, early efforts are already showing benefits, but software, integration, and data processing for RFID still present a challenge. If you are a developer or an architect charged with developing an RFID system, this book is for you. Drawing on extensive experience, Bill Glover and Himanshu Bhatt provide you with essential information on this emerging technology. With the knowledge you gain in these pages, you will possess the information and understanding you need to start designing, building, or integrating with RFID systems. In RFID Essentials you will find information on: Tags and tag protocols, including the Electronic Product Code (EPC) Readers and reader protocols RFID middleware Security and privacy Managing RFID devices RFID's impact on your architecture Bill Glover has been writing software since 1981 and has worked as a programmer, lead developer, or architect on systems of all sizes, from small, automated systems controlling dams and feedmills up to a complete redesign and reimplementation of one of the world's busiest travel web sites. Bill first worked with RFID in 1995, tracking individual cattle using ear tags. He is currently a Senior Java Architect with Sun Microsystems, Inc., and works with Sun's RFID consulting practice and the RFID Test Center. Himanshu Bhatt heads the U.S. RFID Practice and Software Technology Lab for Sun Microsystems, Inc. Prior to assuming this role, Himanshu was responsible for business development and consulting in emerging areas of technology. Himanshu has over 16 years of experience in the architecture and development of distributed, multitier systems using a host of technologies for Fortune 1000 companies. Himanshu has spoken at industry conferences such as JavaOne and the LoneStar Symposium and has published articles on Java/J2EE technologies."The Information Age is over. We're entering an era where network connectivity is almost ubiquitous - it's participate or perish." --Jonathan Schwartz, President and COO, Sun Microsystems, Inc. "Unique competitive advantage erupts from enterprises that couple the RFID technologies laid out in RFID Essentials with modern business integration using service-oriented architectures. This is the book to read in order to understand this new landscape."--Mark Bauhaus, Senior Vice President, Sun Microsystems, Inc. "This is a must read for RFID Software and Solution architects and is highly recommended for anyone needing to gain more insight into the myriad of components, standards and technologies that make up an RFID solutions environment."--Bryan Tracey, Chief Architect, GlobeRanger Corporation "The authors have done a commendable job of covering a lot of ground in the RFID space, including the infrastructure needed to share the volumes of data RFID will likely generate."--Graham Gillen, Senior Product Manager, VeriSign
Text Mining Application Programming (Charles River Media Programming)
Manu Konchady - 2006
Text Mining Application Programming teaches developers about the problems of managing unstructured text, and describes how to build tools for text mining using standard statistical methods from Artificial Intelligence and Operations Research. These tools can be used for a variety of fields, including law, business, and medicine. Key topics covered include, information extraction, clustering, text categorization, searching the Web, summarization, and natural language query systems. The book explains the theory behind each topic and algorithm, and then provides a practical solution implementation with which developers and students can experiment. A wide variety of code is also included for developers to build their own custom solutions. After reading through this book developers will be able to tap into the bevy information available online in ways they never thought possible and students will have a thorough understanding of the theory and practical application of text mining.
Data Binding with Windows Forms 2.0: Programming Smart Client Data Applications with .Net
Brian Noyes - 2006
He has a refreshingly clear and crisp delivery as he starts each chapter with a simple tour of each topic, and then leads you into practical concerns for sound practices and extensibility opportunities. Most importantly, as Brian explains approaches to data-binding architecture, patterns of usage, the value of data sets, binding controls and the rest, he always describes how he reaches his recommendations on the topic. This book is perfect for newcomers to .NET 2.0, but also for those that have some experience. Anyone who cares about data in their applications (okay, that should be almost everyone) is guaranteed to learn something new and useful by reading Brian's book." --Michele Leroux Bustamante, IDesign chief architect, Microsoft regional director, and MVP "Brian has saved me a lot of time. I'm writing The Hitchhiker's Guide to Visual Studio and SQL Server 2005 (7th Edition) and I'm not going to have to cover data binding nearly as deeply because Brian has done it for me. His book gets right to the meat of the subject and makes data binding look easy. I was also pleased to see that the book focuses on the misunderstood and under-applied Windows Forms architecture. It's a must-read for anyone trying to make their application more interactive and to leverage the new Visual Studio 2005 technology. I'm planning to point my readers to this resource when they need an in-depth treatment of data binding." --William Vaughn, president, Beta V Corporation "Data binding has finally come of age in Windows applications. Back in the Visual Studio 6.0 days, I ignored data binding completely and wrote my own repetitive code to encapsulate my business logic. With Visual Studio 2005, we finally have a robust and compelling data-binding technology. To ignore it today would make you inefficient and put you behind the curve. Brian delivers a clear and concise discussion of a core topic of development for Windows today. A combination of an easy-to-follow conversational yet technical tone, excellent examples, and solid explanations make this a must-read for any developer writing for Windows or learning to write for Windows." --Stephen Forte, chief technical officer, Corzen Inc. "This book provides a clear, readable, and in-depth treatment of data binding, with detailed discussions of best practices in the presentation and use of data. Brian communicates his knowledge on the mechanics of data binding to give the low-level understanding that makes all the difference when building sophisticated applications and troubleshooting difficult problems. Effective data binding can enormously reduce the amount of code in your applications and will allow new levels of sophistication in your development. Read this book." --Jonathan Cogley, chief executive officer, Thycotic, ASPInsider, and C# MVP "The .NET Framework 2.0, Visual Studio .NET 2005, and Windows Forms 2.0 incorporate the most powerful data-binding platform yet, and absolutely need a book like this to expose it. Brian's extensive data-binding knowledge and experience shine through as he comprehensively explores its many facets, starting with the fundamentals before tackling a wide variety of real-world scenarios. I've always thought a data-binding book was necessary, and I'm glad Brian found the time to write his." --Michael Weinhardt, freelance author and application developer "
Data Binding with Windows Forms 2.0
earns a gold star and a prized place in my development book library. Brian is an exceptional teacher of technology, best practices, and technique. He continues to educate at every presentation I attend; his book carries that quality to paper. I found this book to be highly informative and full of all the important steps and examples necessary to learn this technology. In this book, Brian demonstrates a firm grasp on the concepts and I really enjoy his efforts to promote best practices at every chance. Definitively a cover-to-cover read." --Randy Hayes, president, Expert Network Solutions, Inc. "Brian's direct and well-organized presentation makes this much misunderstood topic finally understandable." --Sahil Malik, author of Pro ADO.NET 2.0 and C# MVP Data binding is the most important part of many business applications--and one of the most difficult things to understand.
Data Binding with Windows Forms 2.0
is the first book to focus on this crucial area of development. It will quickly get you up to speed on binding data sources to Windows Forms components. The book contains clear examples in C# that work with SQL Server 2000 and SQL Server 2005. Visual Basic .NET examples are available on the book's Web site.Brian Noyes, leading consultant and speaker on .NET programming, teaches you both the theory and practice of data binding and provides numerous samples ready to run in Visual Studio 2005.From his in-depth coverage, you'll learn how toUse Visual Studio 2005 to generate a data-bound application from a database Use the new Visual Studio 2005 typed data set designer, and how and why to use typed data sets and typed data adapters Perform simple and complex binding of data to controls, and how to use the .NET 2.0 BindingSource Use the Binding object for simple binding with automatic formatting, and how to handle binding events Generate bound controls with the Visual Studio Designer, and how to use Data Sources Present data with the new DataGridView control, and how to implement advanced features of the DataGridView Implement custom data-bound controls in Windows Forms Create custom business objects and collections that are suitable for use in data binding Implement validation and error handling at the Windows Forms and data-binding levels Implement data binding with ASP.NET 2.0 and the upcoming Windows Presentation Foundation (Avalon) technologies
The Illustrated Network: How Tcp/IP Works in a Modern Network
Walter Goralski - 2006
Richard Stevens and Addison-Wesley published a networking classic: TCP/IP Illustrated. The model for that book was a brilliant, unfettered approach to networking concepts that has proven itself over time to be popular with readers of beginning to intermediate networking knowledge. The Illustrated Network takes this time-honored approach and modernizes it by creating not only a much larger and more complicated network, but also by incorporating all the networking advancements that have taken place since the mid-1990s, which are many.This book takes the popular Stevens approach and modernizes it, employing 2008 equipment, operating systems, and router vendors. It presents an ?illustrated? explanation of how TCP/IP works with consistent examples from a real, working network configuration that includes servers, routers, and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to the title of the book, there are 330+ diagrams and screen shots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. A complete and modern network was assembled to write this book, with all the material coming from real objects connected and running on the network, not assumptions. Presents a real world networking scenario the way the reader sees them in a device-agnostic world. Doesn't preach one platform or the other.Here are ten key differences between the two: Stevens Goralski's Older operating systems (AIX, svr4, etc.) Newer OSs (XP, Linux, FreeBSD, etc.)Two routers (Cisco, Telebit (obsolete)) Two routers (M-series, J-series)Slow Ethernet and SLIP link Fast Ethernet, Gigabit Ethernet, and SONET/SDH links (modern)Tcpdump for traces Newer, better utility to capture traces (Ethereal, now has a new name!)No IPSec IPSecNo multicast MulticastNo router security discussed Firewall routers detailedNo Web Full Web browser HTML considerationNo IPv6 IPv6 overviewFew configuration details More configuration details (ie, SSH, SSL, MPLS, ATM/FR consideration, wireless LANS, OSPF and BGP routing protocols
High-Performance Embedded Computing: Architectures, Applications, and Methodologies
Wayne Wolf - 2006
'High-Performance Embedded Computing' take a quantitative approach to the design of embedded systems: it describes the design challenge in terms of achieving quantifiable goals for performance, power and energy consumption, and cost.
Engineering Analysis with ANSYS Software
Y. Nakasone - 2006
With an innovative and clear tutorial based approach, this powerful book provides readers with a comprehensive introduction to all of the fundamental areas of engineering analysis they are likely to require either as part of their studies or in getting up to speed fast with the use of ANSYS software in working life.Opening with an introduction to the principles of the finite element method, the book then presents an overview of ANSYS technologies before moving on to cover key applications areas in detail.Key topics covered:Introduction to the finite element methodGetting started with ANSYS softwarestress analysis dynamics of machines fluid dynamics problemsthermo mechanics contact and surface mechanicsexercises, tutorials, worked examplesWith its detailed step-by-step explanations, extensive worked examples and sample problems, this book will develop the reader's understanding of FEA and their ability to use ANSYS's software tools to solve their own particular analysis problems, not just the ones set in the book.