Best of
Technical

2003

Linux Kernel Development


Robert Love - 2003
    The book details the major subsystems and features of the Linux kernel, including its design, implementation, and interfaces. It covers the Linux kernel with both a practical and theoretical eye, which should appeal to readers with a variety of interests and needs. The author, a core kernel developer, shares valuable knowledge and experience on the 2.6 Linux kernel. Specific topics covered include process management, scheduling, time management and timers, the system call interface, memory addressing, memory management, the page cache, the VFS, kernel synchronization, portability concerns, and debugging techniques. This book covers the most interesting features of the Linux 2.6 kernel, including the CFS scheduler, preemptive kernel, block I/O layer, and I/O schedulers. The third edition of Linux Kernel Development includes new and updated material throughout the book:An all-new chapter on kernel data structuresDetails on interrupt handlers and bottom halvesExtended coverage of virtual memory and memory allocationTips on debugging the Linux kernelIn-depth coverage of kernel synchronization and lockingUseful insight into submitting kernel patches and working with the Linux kernel community

Domain-Driven Design: Tackling Complexity in the Heart of Software


Eric Evans - 2003
    "His book is very compatible with XP. It is not about drawing pictures of a domain; it is about how you think of it, the language you use to talk about it, and how you organize your software to reflect your improving understanding of it. Eric thinks that learning about your problem domain is as likely to happen at the end of your project as at the beginning, and so refactoring is a big part of his technique. "The book is a fun read. Eric has lots of interesting stories, and he has a way with words. I see this book as essential reading for software developers--it is a future classic." --Ralph Johnson, author of Design Patterns "If you don't think you are getting value from your investment in object-oriented programming, this book will tell you what you've forgotten to do. "Eric Evans convincingly argues for the importance of domain modeling as the central focus of development and provides a solid framework and set of techniques for accomplishing it. This is timeless wisdom, and will hold up long after the methodologies du jour have gone out of fashion." --Dave Collins, author of Designing Object-Oriented User Interfaces "Eric weaves real-world experience modeling--and building--business applications into a practical, useful book. Written from the perspective of a trusted practitioner, Eric's descriptions of ubiquitous language, the benefits of sharing models with users, object life-cycle management, logical and physical application structuring, and the process and results of deep refactoring are major contributions to our field." --Luke Hohmann, author of Beyond Software Architecture "This book belongs on the shelf of every thoughtful software developer." --Kent Beck "What Eric has managed to capture is a part of the design process that experienced object designers have always used, but that we have been singularly unsuccessful as a group in conveying to the rest of the industry. We've given away bits and pieces of this knowledge...but we've never organized and systematized the principles of building domain logic. This book is important." --Kyle Brown, author of Enterprise Java(TM) Programming with IBM(R) WebSphere(R) The software development community widely acknowledges that domain modeling is central to software design. Through domain models, software developers are able to express rich functionality and translate it into a software implementation that truly serves the needs of its users. But despite its obvious importance, there are few practical resources that explain how to incorporate effective domain modeling into the software development process. Domain-Driven Design fills that need. This is not a book about specific technologies. It offers readers a systematic approach to domain-driven design, presenting an extensive set of design best practices, experience-based techniques, and fundamental principles that facilitate the development of software projects facing complex domains. Intertwining design and development practice, this book incorporates numerous examples based on actual projects to illustrate the application of domain-driven design to real-world software development. Readers learn how to use a domain model to make a complex development effort more focused and dynamic. A core of best practices and standard patterns provides a common language for the development team. A shift in emphasis--refactoring not just the code but the model underlying the code--in combination with the frequent iterations of Agile development leads to deeper insight into domains and enhanced communication between domain expert and programmer. Domain-Driven Design then builds on this foundation, and addresses modeling and design for complex systems and larger organizations.Specific topics covered include:Getting all team members to speak the same language Connecting model and implementation more deeply Sharpening key distinctions in a model Managing the lifecycle of a domain object Writing domain code that is safe to combine in elaborate ways Making complex code obvious and predictable Formulating a domain vision statement Distilling the core of a complex domain Digging out implicit concepts needed in the model Applying analysis patterns Relating design patterns to the model Maintaining model integrity in a large system Dealing with coexisting models on the same project Organizing systems with large-scale structures Recognizing and responding to modeling breakthroughs With this book in hand, object-oriented developers, system analysts, and designers will have the guidance they need to organize and focus their work, create rich and useful domain models, and leverage those models into quality, long-lasting software implementations.

The Art of UNIX Programming


Eric S. Raymond - 2003
    This book attempts to capture the engineering wisdom and design philosophy of the UNIX, Linux, and Open Source software development community as it has evolved over the past three decades, and as it is applied today by the most experienced programmers. Eric Raymond offers the next generation of hackers the unique opportunity to learn the connection between UNIX philosophy and practice through careful case studies of the very best UNIX/Linux programs.

Hacking: The Art of Exploitation


Jon Erickson - 2003
    This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

All of Statistics: A Concise Course in Statistical Inference


Larry Wasserman - 2003
    But in spirit, the title is apt, as the book does cover a much broader range of topics than a typical introductory book on mathematical statistics. This book is for people who want to learn probability and statistics quickly. It is suitable for graduate or advanced undergraduate students in computer science, mathematics, statistics, and related disciplines. The book includes modern topics like nonparametric curve estimation, bootstrapping, and clas- sification, topics that are usually relegated to follow-up courses. The reader is presumed to know calculus and a little linear algebra. No previous knowledge of probability and statistics is required. Statistics, data mining, and machine learning are all concerned with collecting and analyzing data. For some time, statistics research was con- ducted in statistics departments while data mining and machine learning re- search was conducted in computer science departments. Statisticians thought that computer scientists were reinventing the wheel. Computer scientists thought that statistical theory didn't apply to their problems. Things are changing. Statisticians now recognize that computer scientists are making novel contributions while computer scientists now recognize the generality of statistical theory and methodology. Clever data mining algo- rithms are more scalable than statisticians ever thought possible. Formal sta- tistical theory is more pervasive than computer scientists had realized.

Effective Oracle by Design


Thomas Kyte - 2003
    The book covers schema design, SQL and PL/SQL, tables and indexes, and much more. From the exclusive publisher of Oracle Press books, this is a must-have resource for all Oracle developers and DBAs.

Fourier Analysis: An Introduction


Elias M. Stein - 2003
    It begins with the simple conviction that Fourier arrived at in the early nineteenth century when studying problems in the physical sciences--that an arbitrary function can be written as an infinite sum of the most basic trigonometric functions.The first part implements this idea in terms of notions of convergence and summability of Fourier series, while highlighting applications such as the isoperimetric inequality and equidistribution. The second part deals with the Fourier transform and its applications to classical partial differential equations and the Radon transform; a clear introduction to the subject serves to avoid technical difficulties. The book closes with Fourier theory for finite abelian groups, which is applied to prime numbers in arithmetic progression.In organizing their exposition, the authors have carefully balanced an emphasis on key conceptual insights against the need to provide the technical underpinnings of rigorous analysis. Students of mathematics, physics, engineering and other sciences will find the theory and applications covered in this volume to be of real interest.The Princeton Lectures in Analysis represents a sustained effort to introduce the core areas of mathematical analysis while also illustrating the organic unity between them. Numerous examples and applications throughout its four planned volumes, of which Fourier Analysis is the first, highlight the far-reaching consequences of certain ideas in analysis to other fields of mathematics and a variety of sciences. Stein and Shakarchi move from an introduction addressing Fourier series and integrals to in-depth considerations of complex analysis; measure and integration theory, and Hilbert spaces; and, finally, further topics such as functional analysis, distributions and elements of probability theory.

Absolute OpenBSD: Unix for the Practical Paranoid


Michael W. Lucas - 2003
    The author assumes a knowledge of basic UNIX commands, design, and permissions. The book takes you through the intricacies of the platform and teaches how to manage your system, offering friendly explanations, background information, troubleshooting suggestions, and copious examples throughout.

Practical Cryptography


Niels Ferguson - 2003
    The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies. Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers. Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).

Experimental Methods in RF Design


Wes H. Hayward - 2003
    Explore wide dynamic range, low distortion radio equipment, the use of direct conversion and phasing methods, and digital signal processing. Use the models and discussion to design, build and measure equipment at both the circuit and the system level. Laced with unpublished projects and illustrated with CW and SSB gear. This work is successor to the widely popular Solid-State Design for the Radio Amateur (1977). CD-ROM included with design software, listings for DSP firmware, and supplementary articles.

The Guru's Guide to SQL Server Architecture and Internals [With CDROM]


Ken Henderson - 2003
    A basic knowledge of SQL Server is presumed.

Winning Pawn Structures


Alexander Baburin - 2003
    This modern guide to pawn structures, written by an experienced grandmaster, analyzes a variety of typical formations, and explains the approaches, patterns, and techniques used by professionals in all phases of the game. The know-how gained from the sample matches presented will give any player a practical advantage on the board.

Making Materials Flow: A Lean Material-Handling Guide for Operations, Production-Control, and Engineering Professionals


Rick Harris - 2003
    Book by Harris, Rick, Harris, Chris, Wilson, Earl

Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions


Gregor Hohpe - 2003
    The authors also include examples covering a variety of different integration technologies, such as JMS, MSMQ, TIBCO ActiveEnterprise, Microsoft BizTalk, SOAP, and XSL. A case study describing a bond trading system illustrates the patterns in practice, and the book offers a look at emerging standards, as well as insights into what the future of enterprise integration might hold. This book provides a consistent vocabulary and visual notation framework to describe large-scale integration solutions across many technologies. It also explores in detail the advantages and limitations of asynchronous messaging architectures. The authors present practical advice on designing code that connects an application to a messaging system, and provide extensive information to help you determine when to send a message, how to route it to the proper destination, and how to monitor the health of a messaging system. If you want to know how to manage, monitor, and maintain a messaging system once it is in use, get this book.

Advanced Global Illumination


Philip Dutre - 2003
    It discusses a broad class of algorithms for realistic image synthesis and introduces a theoretical basis for the algorithms presented. Topics include: physics of light transport, Monte Carlo methods, general strategies for solving the rendering equation, stochastic path-tracing algorithms such as ray tracing and light tracing, stochastic radiosity including photon density estimation and hierarchical Monte Carlo radiosity, hybrid algorithms, metropolis light transport, irradiance caching, photon mapping and instant radiosity, beyond the rendering equation, image display and human perception. If you want to design and implement a global illumination rendering system or need to use and modify an existing system for your specific purpose, this book will give you the tools and the understanding to do so.

Deepwater Petroleum Exploration & Production: A Nontechnical Guide


William L. Leffler - 2003
    New chapters on geology and geophysics, rigs, and service vehicles are included, and the engineering and scientific schemes used in deepwater are covered in greater detail. Case studies in several chapters give practical examples, while the final chapter presents the latest technology employed in a third wave of industry evolution.

Thinking in C++, Vol. 2: Practical Programming


Bruce Eckel - 2003
    Learn practical programming and best practices. Meet the difficult challenges of C++ development. Build reliable and robust programs. Design Patterns chapter shows sophisticated use of objects, composition and polymorphism. Provides a gentle introduction to multithreaded programming, a feature being considered for the next version of Standard C++. Defensive Programming chapter includes a simple unit-testing framework and debugging techniques. In-depth treatment of Standard C++ Library facilities including strings, iostreams, and the "STL" algorithms and containers. Modern usage of templates, including template metaprogramming. Unravels the perplexities of multiple inheritance. Shows practical uses for RTTI. Explores exception handling in depth and clearly explains exception-safe design. Compliant with the official ISO C++ Standard. Presents results of current research being considered for inclusion in the next revision of Standard C++. All code examples freely downloadable, tested on multiple platforms and compilers including the free GNU C++ compiler on Windows/Mac/Linux. On www.BruceEckel.com: Annotated Solutions Guide Seminars and consulting Free Download—Volume I of this book Annotation Thinking in C++ is ideal for anyone already familiar with C who now wants to learn C++. Eckel has synthesized more than five years of C++ teaching and programming experience into a well-structured course that moves step-by-step through each important C++ concept. He highlights poorly-understood C++ features like virtual functions, which can improve productivity. Editorial Reviews The Barnes & Noble Review Bruce Eckel, one of the world's best programming trainers, has thoroughly updated his classic THINKING IN C++—the book that won the Software Development Magazine Jolt Cola award in its first iteration. The new version is better than ever—which is to say, it's

University Physics with Modern Physics: Student Solutions Manual, Volume 1, 11th Edition


Hugh D. Young - 2003
    Includes all odd-numbered problems from the text.

Fourier Analysis: An Introduction


Elias Stein - 2003
    It begins with the simple conviction that Fourier arrived at in the early nineteenth century when studying problems in the physical sciences--that an arbitrary function can be written as an infinite sum of the most basic trigonometric functions.The first part implements this idea in terms of notions of convergence and summability of Fourier series, while highlighting applications such as the isoperimetric inequality and equidistribution. The second part deals with the Fourier transform and its applications to classical partial differential equations and the Radon transform; a clear introduction to the subject serves to avoid technical difficulties. The book closes with Fourier theory for finite abelian groups, which is applied to prime numbers in arithmetic progression.In organizing their exposition, the authors have carefully balanced an emphasis on key conceptual insights against the need to provide the technical underpinnings of rigorous analysis. Students of mathematics, physics, engineering and other sciences will find the theory and applications covered in this volume to be of real interest.The Princeton Lectures in Analysis represents a sustained effort to introduce the core areas of mathematical analysis while also illustrating the organic unity between them. Numerous examples and applications throughout its four planned volumes, of which Fourier Analysis is the first, highlight the far-reaching consequences of certain ideas in analysis to other fields of mathematics and a variety of sciences. Stein and Shakarchi move from an introduction addressing Fourier series and integrals to in-depth considerations of complex analysis; measure and integration theory, and Hilbert spaces; and, finally, further topics such as functional analysis, distributions and elements of probability theory.

Read Me First! a Style Guide for the Computer Industry


Sun Technical Publications - 2003
    Sun Microsystems technical writers and editors cover everything from grammar to clarity, illustrations to workflow. This revised second edition reflects dramatic changes in the production and delivery of technical documentation.

The Fun of Programming


Jeremy Gibbons - 2003
    In this textbook, the leading researchers of the field take you on a tour of the current hot topics in functional programming, with applications ranging from financial contracts to circuit design. There are also chapters on new idioms for structuring programs, such as monads and arrows. All new concepts are illustrated with many examples, and exercises appear throughout to further enliven the material. Several of the chapters describe a substantial piece of software, and most of these programs are collected on a website for free downloading.This book was edited in honour of Richard S.Bird, Professor of Computer Science at the University of Oxford, on his 60th birthday.

Chin Na in Ground Fighting: Principles, Theory and Submission Holds for All Martial Styles


Al Arsenault - 2003
    The application of Chin Na can be applied to any empty hand fighting discipline.Chin Na in Ground Fighting explores the use of joint locks, pressure points and bone displacement techniques for actual fighting encounters that have landed on the ground. The material in this book concentrates on: holding techniques which are capable of immobilizing an opponent with a limited danger of counter-attack, the principles and theory of these holds, the identification and use of pressure points for offensive and defensive purposes.Over the last twenty-two years as a street policeman (Vancouver, B.C.), I have come to realize the acute deficiencies of Karate as a defensive art, or more practically, as a controlling art; as my chosen vocation demands. For myself, Chin Na was like a snap-on tool, allowing me to adapt my martial arts ability to suit the highly balanced needs of personal self-protection with controlling those I was empowered to arrest. - from the Preface.General history of Chin Na and Ground fighting stylesPositional changes for ground fightingAn introduction to meridian theoryA systematic look at joint locks (arm, legs, neck and body)

Ice & Mixed Climbing: Modern Technique


Will Gadd - 2003
    It's the most fun because it has the fewest rules -- sort of like professional wrestling compared to boxing. So says Will Gadd, as profiled in the book Fifty Favorite Climbs. Here the champion ice climber presents the same techniques and veteran wisdom he imparts to those who attend his annual clinics. These include step-by-step instructions for the swing (ice axe), the kick (footwork), and putting it all together (tracking); how to read ice to select your line and follow it safely; and drytool techniques for mixed climbing. Training exercises and inspirational stories complete this seminal guide.Will Gadd won every major ice competition in the world in 1998 and 1999, as well as the 2000 Ice World Cup. A resident of Canmore, Alberta, he has written for Climbing and Rock & Ice, among other publications.

Active Directory Cookbook for Windows Server 2003 and Windows 2000


Robbie Allen - 2003
    You also know what a bear it can be. The newer version included with Windows Server 2003 has over 100 new and updated features to simplify deployment, but once it's in place many system administrators still find Active Directory challenging. If you're among those looking for practical hands-on support, help is here with our new Active Directory Cookbook for Windows Server 2003 & Windows 2000, a unique problem-solving guide that offers quick answers for both versions of the directory. The book contains hundreds of step-by-step solutions for both common and uncommon problems that you might encounter with Active Directory on a daily basis--including recipes to deal with the Lightweight Directory Access Protocol (LDAP), multi-master replication, Domain Name System (DNS), Group Policy, the Active Directory Schema, and many other features. Author Robbie Allen, a Senior Systems Architect at Cisco Systems and co-author of our Active Directory tutorial, based this collection of troubleshooting recipes on his own experience, along with input from Windows administrators throughout the industry. Each recipe includes a discussion to explain how and why the solution works, so you can adapt the problem-solving techniques to similar situations. If your company is considering an upgrade from Windows NT or 2000 to Windows Server 2003, the Active Directory Cookbook for Windows Server 2003 & Windows 2000 will help reduce the time and trouble it takes to configure and deploy Active Directory for your network. This Cookbook is also a perfect companion to Active Directory, the tutorial that experts hail as the best source for understanding Microsoft's network directory service. While Active Directory provides the big picture, Active Directory Cookbook for Windows Server 2003 & Windows 2000 gives you the quick solutions you need to cope with day-to-day dilemmas. Together, these books supply the knowledge and tools so you can get the most out of Active Directory to manage users, groups, computers, domains, organizational units, and security policies on your network.

Lectures on Partial Differential Equations


Vladimir I. Arnold - 2003
    A large number of problems are sprinkled throughout the book, and a full set of problems from examinations given in Moscow are included at the end. Some of these problems are quite challenging! What makes the book unique is Arnold's particular talent at holding a topic up for examination from a new and fresh perspective. He likes to blow away the fog of generality that obscures so much mathematical writing and reveal the essentially simple intuitive ideas underlying the subject. No other mathematical writer does this quite so well as Arnold.

Best Damn Firewall Book Period


Robert Shimonski - 2003
    Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more. All of the major important firewall products are covered including Microsoft Internet Security and Acceleration Server (ISA), ISS BlackICE, Symantec Firewall, Check Point NG, and PIX Firewall. Firewall configuration strategies and techniques are covered in depth. The book answers questions about firewalls, from How do I make Web/HTTP work through my firewall? To What is a DMZ, and why do I want one? And What are some common attacks, and how can I protect my system against them? The Internet's explosive growth over the last decade has forced IT professionals to work even harder to secure the private networks connected to it from erecting firewalls that keep out malicious intruders to building virtual private networks (VPNs) that permit protected, fully encrypted communications over the Internet's vulnerable public infrastructure. The Best Damn Firewalls Book Period covers the most popular Firewall products, from Cisco's PIX Firewall to Microsoft's ISA Server to CheckPoint NG, and all the components of an effective firewall set up. Anything needed to protect the perimeter of a network can be found in this book. - This book is all encompassing, covering general Firewall issues and protocols, as well as specific products.- Anyone studying for a security specific certification, such as SANS' GIAC Certified Firewall Analyst (GCFW) will find this book an invaluable resource.- The only book to cover all major firewall products from A to Z: CheckPoint, ISA Server, Symatec, BlackICE, PIX Firewall and Nokia.

Industrial Machinery Repair: Best Maintenance Practices Pocket Guide


Ricky Smith - 2003
    It focuses on the skills needed to select, install and maintain electro-mechanical equipment in a typical industrial plant or facility.The authors focuses on Best Maintenance Repair Practices necessary for maintenance personnel to keep equipment operating at peak reliability and companies functioning more profitably through reduced maintenance costs and increased productivity and capacity.A number of surveys conducted in industries throughout the United States have found that 70% of equipment failures are self-induced. If the principles and techniques in this book are followed, it will result in a serious reduction in self induced failures.In the pocketbook format, this reference material can be directly used on the plant floor to aid in effectively performing day-to-day duties. Data is presented in a concise, easily understandable format to facilitate use in the adverse conditions associated with the plant floor. Each subject is reduced to it simplest terms so that it will be suitable for the broadest range of users. Since this book is not specific to any one type of industrial plant and is useful in any type of facility.

Value At Risk: Theory And Practice


Glyn A. Holton - 2003
    This is the first advanced book published on VaR. It describes how to design, implement, and use scalable production VaR measures on actual trading floors. It takes readers from the basics of VaR to the most advanced techniques, many of which have never been published in book form. Practical, detailed examples are drawn from markets around the world, including: Euro deposits, Pacific Basin equities, physical coffees, and North American natural gas. Real-world challenges relating to market data, portfolio mappings, multicollinearity, and intra-horizon events are addressed in detail. Exercises reinforce concepts and walk readers step-by-step through computations. Sophisticated techniques are fully disclosed, including: quadratic ("delta-gamma") methods for nonlinear portfolios, variance reduction (control variates and stratified sampling) for Monte Carlo VaR measures, principal component remappings, techniques to "fix" estimated covariance matrices that are not positive-definite, the Cornish-Fisher expansion, and orthogonal GARCH. * First advanced text on Value-at-Risk * Practical, detailed examples drawn from markets around the world* Exercises reinforce concepts and walk readers step-by-step through computations

Econometric Theory and Methods


James G. MacKinnon - 2003
    The geometrical approach to least squares is emphasized, as is the method of moments, which is used to motivate a wide variety of estimators and tests. Simulation methods, including the bootstrap, are introduced early and used extensively.The book deals with a large number of modern topics. In addition to bootstrap and Monte Carlo tests, these include sandwich covariance matrix estimators, artificial regressions, estimating functions and the generalized method of moments, indirect inference, and kernel estimation. Every chapter incorporates numerous exercises, some theoretical, some empirical, and many involving simulation.Econometric Theory and Methods is designed for beginning graduate courses. The book is suitable for both one- and two-term courses at the Masters or Ph.D. level. It can also be used in a final-year undergraduate course for students with sufficient backgrounds in mathematics and statistics.FEATURES-Unified Approach: New concepts are linked to old ones whenever possible, and the notation is consistent both within and across chapters wherever possible.-Geometry of Ordinary Least Squares: Introduced in Chapter 2, this method provides students with valuable intuition and allows them to avoid a substantial amount of tedious algebra later in the text.-Modern Concepts Introduced Early: These include the bootstrap (Chapter 4), sandwich covariance matrices (Chapter 5), and artificial regressions (Chapter 6).-Inclusive Treatment of Mathematics: Mathematical and statistical concepts are introduced as they are needed, rather than isolated in appendices or introductory chapters not linked to the main body of the text.-Advanced Topics: Among these are models for duration and count data, estimating equations, the method of simulated moments, methods for unbalanced panel data, a variety of unit root and cointegration tests, conditional moment tests, nonnested hypothesis tests, kernel density regression, and kernel regression.-Chapter Exercises: Every chapter offers numerous exercises, all of which have been answered by the authors in the Instructor's Manual. Particularly challenging exercises are starred and their solutions are available at the authors' website, providing a way for instructors and interested students to cover advanced material.

Making reliable distributed systems in the presence of software errors


Joe Armstrong - 2003
    

How to Design Cars Like a Pro


Tony Lewin - 2003
    The interviews give a deep understanding of why we see what we see on the highways of the world. Author Tony Lewin has been a highly regarded magazine editor on the world stage for so long that some of the top young guns revealing all in this book were hanging on his words just a few years ago.

Mastering Windows Server 2003


Mark Minasi - 2003
    This book shows you how to plan, configure and install your network, keep it running its best, and fix it if it breaks. And you still get all the coverage you need for the Windows 2000 Server installations that remain part of your environment. Coverage includes: * Configuring IP, DHCP, DNS, and WINS to achieve the right foundation for your network * DNS explained in everyday English, from basics to advanced design * Designing, running, and maintaining Active Directory-based domains with Server 2003 and 2000 Server * Running your own Web, FTP, and e-mail server with 2003 * Controlling hundreds, even thousands, of workstations with group policies and security templates * Tuning and monitoring your network * Securing your network from split-brain DNS to AD delegation to group policies, logs, IPSec, PKI and more * Using Windows Server 2003 to share Internet connections * Complete coverage of all new 2003 features Real Solutions to Real Challenges If improving the real-world performance of your network is the bottom line, this book delivers the goods. It shows you how to design and manage a multiple-platform network, build a Windows-based intranet, find the right data backup strategy, prevent and recover from disasters, and much more. There's no end to what you'll accomplish with practical, step-by-step instruction from the expert who has actually done it all on live networks!

Cascading Style Sheets: The Designers Edge


Molly E. Holzschlag - 2003
    So where to begin? Where can you get design-focused instruction on CSS while learning the technical details? Cascading Style Sheets: The Designer's Edge is precisely the resource you've been looking for. Written by renowned web designer Molly Holzschlag, this book begins with an in-depth look at structured markup, both XHTML and CSS. It then explains how to use CSS to achieve specific design goals involving typography, color, layout, and more. Finally, it deconstructs a series of impressive designs, showing you how the authors used CSS to maximize their efficiency and get exactly the right effect. Key topics you'll learn about include: * Writing valid XHTML * Authoring effective CSS rules * Working with classes and IDs * Validating your CSS * Creating great typographical designs with CSS * Using CSS for backgrounds, borders, and color * Creating multiple link styles * Using absolute positioning * Working with relative positioning * Positioning with float * Creating great CSS layouts

Spacecraft Thermal Control Handbook, Volume 2: Cryogenics (Aerospace Press)


Martin Donabedian - 2003
    With so many engineers, scientists, and technicians working on cryogenic systems for the first time in their careers, the need for a single resource that touched on all the technologies relevant to cryogenics was apparent. The book includes 23 chapters--written by industry experts--that will help the reader in the design, analysis, integration, testing, and operation of a variety of instruments, sensors, and other devices that must be cooled to cryogenic temperatures. temperatures. Sections include: Stored Expandable Cooling Systems: Cryogenic Radiators and Radiant Coolers; Cryocoolers (Mechanical Refrigerators): Cryogenic Components, Transport, Storage, and Integration; Thermal Margins, Estimating Risks, and Lessons Learned; IR Sensor Thermal Modeling and Analysis; and Cooler Specifications and Material Properties.

C Projects


Yashavant P. Kanetkar - 2003
    

The Complete Log4j Manual


Ceki Gulcu - 2003
    In over 200 pages and dozens of concrete examples, it covers both basic and advanced log4j features: -the overall log4j architecture -discussion of best practices and anti-patterns -configuration scripts in properties format -configuration scripts in XML format -appenders -layouts -filter chains -diagnostic contexts -log4j default initialization -log4j in Servlet Containers -log4j in EJB Containers -extending log4j -changes between version 1.2 and 1.1 -frequently asked questions -trouble shooting guide The complete manual describes the log4j API in considerable detail, including its features and design rationale. Authored by Ceki Gülcü, one of log4j's key contributors, the manual is intended for developers already familiar with the Java language but new to log4j, as much as for experienced log4j users. With the aid of introductory material and many examples, new users should quickly come up to speed. Seasoned log4j users will also find fresh material not discussed anywhere else. Advanced topics are also covered in detail so that the reader can harness the full power of log4j.

Newton's Principia, the Central Argument: Translation, Notes, Expanded Proofs


Dana Densmore - 2003
    This title moves from Newton's definitions and axioms through the essential propositions, as Newton himself identified them, to the establishment of universal gravitation and elliptical orbits.

Ethical Hacking


EC-Council - 2003
    A useful tool for those involved in securing networks from outside tampering, this guide to CEH 312-50 certification provides a vendor-neutral perspective for security officers, auditors, security professionals, site admistrators, and others concerned with the integrity of network infrastructures. Complete coverage of footprinting, trojans and backdoors, sniffers, viruses and worms, and hacking Novell and Linux exposes common vulnerabilities and reveals the tools and methods used by security professionals when implementing countermeasures.

COM Programming with Microsoft® .NET


John Paul Mueller - 2003
    This in-depth programming guide explains how and where COM and COM+ fit into the new .NET world, demonstrates the new technologies that are available in .NET, and shows how to interoperate between COM/COM+ and .NET. It explains how to use Microsoft Visual Studio® .NET to write traditional COM objects, how to use COM objects in .NET code, and how to use .NET objects as COM objects. It also discusses COM+ topics such as disconnected applications and subscriptions. The authors show you both theoretical and practical approaches—explaining how the mechanisms work and also providing practical advice with sample code to show how to handle interoperability.Topics covered include:The .NET view of COM and COM+COM, COM+, and .NETUsing COM components in .NET codeUsing .NET components in COM applicationsOverview of COM+ coding for .NETWriting COM codeAttributed programmingActive Template Library (ATL) and ATL ServerWriting COM+ codeA simple COM+ exampleWorking with disconnected applicationsCreating subscriptionsWeb application scenariosInteroperabilityInteracting with unmanaged codeAdvanced interactionWorking with predefined interfacesIncludes sample code on the Web

Introduction to Banach Algebras, Operators, and Harmonic Analysis


H. Garth Dales - 2003
    The authors survey several areas of current interest, making this volume ideal preparatory reading for students embarking on graduate work as well as for mathematicians working in related areas.

Jabber Developer's Handbook


Dana Moore - 2003
    Peer-to-peer applications using the Jabber open source toolkit, and leverage its use with other readily available and open source software and middleware. It explains how to use Jabber peer-to-peer technologies to solve troublesome reliability and interoperability issues with distributed systems. While peer-to-peer computing and Jabber are considered fairly new technologies, the authors have extensive hands-on experience in applying a variety of system messaging technologies.Jabber Developer�s Handbook shows how to design, build, and integrate peer-to-peer applications using the Jabber open source toolkit, and leverage its use with other readily available and open source software and middleware. It explains how to use Jabber peer-to-peer technologies to solve troublesome reliability and interoperability issues with distributed systems. While peer-to-peer computing and Jabber are considered fairly new technologies, the authors have extensive hands-on experience in applying a variety of system messaging technologies.

Advanced Sheet Metal Fabrication


Timothy Remus - 2003
    This book is lavishly illustrated with quality photographs. Remus takes you through a number of start-to-finish sequences with the finest metal workers in the field. If you strive build a truly unique machine, Advanced Sheet Metal Fabrication is the book for you.

Grid Computing


Joshy Joseph - 2003
    Teaching how to start and which applications to start with, understand the technologies and standards, and eliminate administering disparate non-integrated systems, this guide brings together deployment practices, practical guidance on integrating existing resources, and case studies to drive business value from the grid computing revolution.

Secrets of Chess Defence


Mihail Marin - 2003
    The climax of the defense is the launch of a devastating counter-attack, a skill at which all the great chess champions have been adept. Of particular interest to club players is Marin's discussion of how to defend against unsound attacks, and the problem of how to parry the attack while retaining winning chances. Other topics include attack and defense in equal positions, where both sides must judge carefully how much of their resources to devote to the attack and the counter-attack. The main subject, though, is the case where the defender is fighting for his life, and must decide how to maximize his chances of survival. Marin considers psychological issues and explains the main options available to the defender: simplification, cold-blooded defense, a positional sacrifice, 'blackmailing' the attacker, or a counter-attack.

RTP: Audio and Video for the Internet


Colin Perkins - 2003
    Throughout the book, the author details implementation techniques and potential pitfalls that readers can apply and anticipate in their own systems.

Web, Graphics & Perl/Tk Programming: Best of the Perl Journal


Jon Orwant - 2003
    Every serious Perl programmer subscribed to it, and every notable Perl guru jumped at the opportunity to write for it. TPJ explained critical Perl topics and demonstrated Perl's utility for fields as diverse as astronomy, biology, economics, AI, and games. Back issues were hoarded, or swapped like trading cards. No longer in print format, The Perl Journal remains a proud and timeless achievement of Perl during one of its most exciting periods of development.Web, Graphics & Perl/Tk is the second volume of The Best of the Perl Journal, compiled and re-edited by the original editor and publisher of The Perl Journal, Jon Orwant. In this series, we've taken the very best (and still relevant) articles published in TPJ over its five years of publication and immortalized them into three volumes.The forty articles included in this volume are simply some of the best Perl articles ever written on the subjects of graphics, the Web, and Perl/Tk, by some of the best Perl authors and coders.Much of Perl's success is due to its capabilities for developing web sites; the Web section covers popular topics such as CGI programs, mod_perl, spidering, HTML parsing, security, and content management. The Graphics section is a grab bag of techniques, ranging from simple graph generation to ray tracing and real-time video digitizing. The Perl/Tk section shows you how to use the popular Perl/Tk toolkit for developing graphical applications that work on both Unix/Linux and Windows without a single change.Written by twenty-three of the most prominent and prolific members of the closely-knit Perl community, including Lincoln Stein, Mark-Jason Dominus, Alligator Descartes, and Dan Brian, this anthology does what no other book can, giving unique insight into the real-life applications and powerful techniques made possible by Perl.

Mpls and VPN Architectures, Volume II


Jim Guichard - 2003
    Extending into more advanced topics and deployment architectures, Volume II provides readers with the necessary tools they need to deploy and maintain a secure, highly available VPN."MPLS and VPN Architectures, Volume II," begins with a brief refresher of the MPLS VPN Architecture. Part II describes advanced MPLS VPN connectivity including the integration of service provider access technologies (dial, DSL, cable, Ethernet) and a variety of routing protocols (IS-IS, EIGRP, and OSPF), arming the reader with the knowledge of how to integrate these features into the VPN backbone. Part III details advanced deployment issues including security, outlining the necessary steps the service provider must take to protect the backbone and any attached VPN sites, and also detailing the latest security features to allow more advanced topologies and filtering. This part also covers multi-carrier MPLS VPN deployments. Finally, Part IV provides a methodology for advanced MPLS VPN troubleshooting."MPLS and VPN Architectures, Volume II," also introduces the latest advances in customer integration, security, and troubleshooting features essential to providing the advanced services based on MPLS VPN technology in a secure and scalable way.This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Selling To the VP of No


Dave Gray - 2003
    He is also one tough dude. He has to be. Every hour of every day, someone tries to sell him something. He has one way to deal with them: Say "NO." It's brutally simple, but it works, because most people are simply a waste of his time. Selling Stars know how to break through that tough exterior and get the VP of NO to listen to their story. In this short, visual book, you will learn the secrets of the Selling Stars: how to turn the VP of NO into the VP of GO!

Topics in Optimal Transportation


Cédric Villani - 2003
    Annotation (c)2003 Book News, Inc., Portland, OR

Scroll Saw Workbook: Learn to Use Your Scroll Saw in 25 Skill-Building Chapters


Joyce Nelson - 2003
    Beginning with the basics such as cutting straight, curved, and jagged lines, the book details progressively more advanced techniques including stack cutting; cutting metal, plastic, and paper; relief cutting; inlay; segmentation; and puzzle making. Project patterns include die-cut stationery, a fish silhouette, a butterfly with interior cuts, a hummingbird ornament, and a collapsible wooden basket. The content has been updated to include information on new scroll saw manufacturers. This replaces ISBN: 1565231171.

Managing Risk in Organizations: A Guide for Managers


J. Davidson Frame - 2003
    In this comprehensive resource, David Frame--a leading expert in risk management--examines the risks routinely encountered in business, offers prescriptions to assess the effects of various risks, and shows how to develop effective strategies to cope with risks. In addition, the book is filled with practical tools and techniques used by professional risk practitioners that can be readily applied by project managers, financial managers, and any manager or consultant who deals with risk within an organization. Managing Risk in Organizations is filled with illustrative case studies and Outlines the various types of risk--pure, operational, project, technical, business, and political Reveals what risk management can and cannot accomplish Shows how to organize risk management efforts to conduct risk assessments, manage crises, and recover from disasters Includes a systematic risk management processrisk management planning, risk identification, qualitative impact analysis, quantitative impact analysis, risk response planning, and monitoring control Provides quantitative and qualitative tools to identify and handle risks This much-needed book will enable organizations to take risk seriously and act proactively.

Articulations of a Porpoise Skeleton: A Step by Step Guide to Assembling Small Whale Skeletons


Lee Post - 2003
    It is based on the articulation of a harbor porpoise skeleton but is directly applicable to any whale skeleton less than 10-feet long. The manual includes a full set of illustrations of a harbor porpoise skeleton. This is a project that you too can do if you have access to a porpoise or dolphin skeleton.

Oracle Performance Troubleshooting: With Dictionary Internals SQL & Tuning Scripts


Robin Schumacher - 2003
    The intricacies of Oracle multi-master replication are described, and working code examples of complex multi-master replication are provided. Also included is information on Oracle replication tuning and monitoring.

MPLS and VPN Architectures, Volume II


Ivan Pepelnjak - 2003
    Extending into more advanced topics and deployment architectures, Volume II provides readers with the necessary tools they need to deploy and maintain a secure, highly available VPN.MPLS and VPN Architectures, Volume II, begins with a brief refresher of the MPLS VPN Architecture. Part II describes advanced MPLS VPN connectivity including the integration of service provider access technologies (dial, DSL, cable, Ethernet) and a variety of routing protocols (IS-IS, EIGRP, and OSPF), arming the reader with the knowledge of how to integrate these features into the VPN backbone. Part III details advanced deployment issues including security, outlining the necessary steps the service provider must take to protect the backbone and any attached VPN sites, and also detailing the latest security features to allow more advanced topologies and filtering. This part also covers multi-carrier MPLS VPN deployments. Finally, Part IV provides a methodology for advanced MPLS VPN troubleshooting.MPLS and VPN Architectures, Volume II, also introduces the latest advances in customer integration, security, and troubleshooting features essential to providing the advanced services based on MPLS VPN technology in a secure and scalable way.This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

C++ For Game Programmers (Game Development Series)


Noel Llopis - 2003
    Written to address this issue, C++ for Game Programmers provides practical suggestions for what C++ features to use in game development and why. Many of the misconceptions of C++ are clarified, and programmers learn the most effective methods for using the language to create games. This is primarily a book about ideas and concepts: it is not just a source of C++ code to use in your game project. Instead, C++ for Game Programmers covers how things work from a game-development perspective, and provides practical rules to follow. It points out the most effective C++ practices and steers developers away from the potentially dangerous ones. It describes common C++ techniques to solve specific problems faced by most developers, and focuses on techniques that have been proven in real games. Additionally, specific new technologies such as STL are covered in detail, along with the challenges specific to different platforms such as PCs or game consoles. The techniques presented apply to all aspects of game programming, including graphics, physics, and AI. C++ for Game Programmers is the perfect resource for game programmers looking to perfect their C++ skills, and experienced programmers interested in entering the game industry. Graphics, embedded systems, and real-time systems programmers facing the same challenges as game programmers will also benefit from the ideas and techniques covered.

Hints & Kinks For the Radio Amateur


Steve Ford - 2003
    Compendium of QST's monthly Hints & Kinks column for amateur radio enthusiasts.UPC 9780872595200

Programming C# .Net W/Student CD & 5-CD C# .Net Software


Julia Case Bradley - 2003
    This book teaches students how to program. It assumes no prior knowledge of programming and incorporates basic concepts of programming, problem solving, and programming logic and design techniques to teach students a mastery of C #.Net at an introductory level.

CCNP Bcran Exam Certification Guide (CCNP Self-Study, 642-821)


Brian Morgan - 2003
    The chapters incorporate pre- and post-chapter quizzes to determining concept retention, supported further by test-banks on the accompanying CD-ROM that also includes an electronic copy of the book.

Interest and Prices: Foundations of a Theory of Monetary Policy


Michael Woodford - 2003
    Yet since the 1980s, most central banks have abandoned money-growth targets as practical guidelines for monetary policy as well. How then can pure "fiat" currencies be managed so as to create confidence in the stability of national units of account?Interest and Prices seeks to provide theoretical foundations for a rule-based approach to monetary policy suitable for a world of instant communications and ever more efficient financial markets. In such a world, effective monetary policy requires that central banks construct a conscious and articulate account of what they are doing. Michael Woodford reexamines the foundations of monetary economics, and shows how interest-rate policy can be used to achieve an inflation target in the absence of either commodity backing or control of a monetary aggregate. The book further shows how the tools of modern macroeconomic theory can be used to design an optimal inflation-targeting regime--one that balances stabilization goals with the pursuit of price stability in a way that is grounded in an explicit welfare analysis, and that takes account of the "New Classical" critique of traditional policy evaluation exercises. It thus argues that rule-based policymaking need not mean adherence to a rigid framework unrelated to stabilization objectives for the sake of credibility, while at the same time showing the advantages of rule-based over purely discretionary policymaking.

ASM Handbook, Volume 13A: Fundamentals, Testing, and Protection


Stephen D. Cramer - 2003
    Chapters on fundamentals cover the theory of aqueous and gaseous corrosion from thermodynamic and kinetic perspectives, while chapters on