Best of
Technical

2004

Head First Design Patterns


Eric Freeman - 2004
     At any given moment, somewhere in the world someone struggles with the same software design problems you have. You know you don't want to reinvent the wheel (or worse, a flat tire), so you look to Design Patterns--the lessons learned by those who've faced the same problems. With Design Patterns, you get to take advantage of the best practices and experience of others, so that you can spend your time on...something else. Something more challenging. Something more complex. Something more fun. You want to learn about the patterns that matter--why to use them, when to use them, how to use them (and when NOT to use them). But you don't just want to see how patterns look in a book, you want to know how they look "in the wild". In their native environment. In other words, in real world applications. You also want to learn how patterns are used in the Java API, and how to exploit Java's built-in pattern support in your own code. You want to learn the real OO design principles and why everything your boss told you about inheritance might be wrong (and what to do instead). You want to learn how those principles will help the next time you're up a creek without a design pattern. Most importantly, you want to learn the "secret language" of Design Patterns so that you can hold your own with your co-worker (and impress cocktail party guests) when he casually mentions his stunningly clever use of Command, Facade, Proxy, and Factory in between sips of a martini. You'll easily counter with your deep understanding of why Singleton isn't as simple as it sounds, how the Factory is so often misunderstood, or on the real relationship between Decorator, Facade and Adapter. With Head First Design Patterns, you'll avoid the embarrassment of thinking Decorator is something from the "Trading Spaces" show. Best of all, in a way that won't put you to sleep! We think your time is too important (and too short) to spend it struggling with academic texts. If you've read a Head First book, you know what to expect--a visually rich format designed for the way your brain works. Using the latest research in neurobiology, cognitive science, and learning theory, Head First Design Patterns will load patterns into your brain in a way that sticks. In a way that lets you put them to work immediately. In a way that makes you better at solving software design problems, and better at speaking the language of patterns with others on your team.

Physically Based Rendering: From Theory to Implementation


Matt Pharr - 2004
    The result is a stunning achievement in graphics education. Through the ideas and software in this book, you will learn to design and employ a full-featured rendering system for creating stunning imagery.This new edition greatly refines its best-selling predecessor by streamlining all obsolete code as well as adding sections on parallel rendering and system design; animating transformations; multispectral rendering; realistic lens systems; blue noise and adaptive sampling patterns and reconstruction; measured BRDFs; and instant global illumination, as well as subsurface and multiple-scattering integrators.These updates reflect the current state-of-the-art technology, and along with the lucid pairing of text and code, ensure the book's leading position as a reference text for those working with images, whether it is for film, video, photography, digital design, visualization, or gaming.

Java: The Complete Reference


Herbert Schildt - 2004
    Updated for Java Platform, Standard Edition 7 (Java SE 7), this comprehensive volume covers the entire Java language, including its syntax, keywords, and fundamental programming principles. You'll also find information on key elements of the Java API library. JavaBeans, servlets, applets, and Swing are examined and real-world examples demonstrate Java in action. In addition, new Java SE 7 features such as try-with-resources, strings in switch, type inference with the diamond operator, NIO.2, and the Fork/Join Framework are discussed in detail.Coverage includes: Data types and operatorsControl statementsClasses and objectsConstructors and methodsMethod overloading and overridingInterfaces and packagesInheritanceException handlingGenericsAutoboxingEnumerationsAnnotationsThe try-with-resources statementVarargsMultithreadingThe I/O classesNetworkingThe Collections FrameworkApplets and servletsJavaBeansAWT and SwingThe Concurrent APIMuch, much more

High Performance MySQL: Optimization, Backups, Replication & Load Balancing


Jeremy D. Zawodny - 2004
    This book is an insider's guide to these little understood topics.Author Jeremy Zawodny has managed large numbers of MySQL servers for mission-critical work at Yahoo!, maintained years of contacts with the MySQL AB team, and presents regularly at conferences. Jeremy and Derek have spent months experimenting, interviewing major users of MySQL, talking to MySQL AB, benchmarking, and writing some of their own tools in order to produce the information in this book.In "High Performance MySQL" you will learn about MySQL indexing and optimization in depth so you can make better use of these key features. You will learn practical replication, backup, and load-balancing strategies with information that goes beyond available tools to discuss their effects in real-life environments. And you'll learn the supporting techniques you need to carry out these tasks, including advanced configuration, benchmarking, and investigating logs.Topics include: A review of configuration and setup optionsStorage engines and table typesBenchmarkingIndexesQuery OptimizationApplication DesignServer PerformanceReplicationLoad-balancingBackup and RecoverySecurity

Fluid Mechanics: Fundamentals and Applications [with Student Resources DVD]


Yunus A. Cengel - 2004
    The text covers the basic principles and equations of fluid mechanics in the context of numerous and diverse real-world engineering examples. The text helps students develop an intuitive understanding of fluid mechanics by emphasizing the physics, and by supplying attractive figures, numerous photographs and visual aids to reinforce the physics.

Working Effectively with Legacy Code


Michael C. Feathers - 2004
    This book draws on material Michael created for his renowned Object Mentor seminars, techniques Michael has used in mentoring to help hundreds of developers, technical managers, and testers bring their legacy systems under control. The topics covered include: Understanding the mechanics of software change, adding features, fixing bugs, improving design, optimizing performance Getting legacy code into a test harness Writing tests that protect you against introducing new problems Techniques that can be used with any language or platform, with examples in Java, C++, C, and C# Accurately identifying where code changes need to be made Coping with legacy systems that aren't object-oriented Handling applications that don't seem to have any structureThis book also includes a catalog of twenty-four dependency-breaking techniques that help you work with program elements in isolation and make safer changes.

C++ Coding Standards: 101 Rules, Guidelines, and Best Practices


Herb Sutter - 2004
    This happens automatically when following agood, simple set of guidelines.*They improve development speed, because the programmer doesn't need toalways make decisions starting from first principles.*They enhance teamwork by eliminating needless debates on inconsequentialissues and by making it easy for teammates to read and maintain each other'scode.The coding standards introduced by this book are a collection of guidelines forwriting high-quality C++ code.***They are the distilled conclusions of a rich collective experience of the C++community. Until now, this body of knowledge has been available only asfolklore or spread in bits and pieces throughout books.

Real-Time Collision Detection (The Morgan Kaufmann Series in Interactive 3d Technology)


Christer Ericson - 2004
    It provides the tools and know-how needed to implement industrial-strength collision detection for the detailed dynamic environments of applications such as 3D games, virtual reality applications, and physical simulators. Full description

Head First Servlets and JSP: Passing the Sun Certified Web Component Developer Exam


Bryan Basham - 2004
    Isn't it time you learned the latest (J2EE 1.4) versions of Servlets & JSPs? This book will get you way up to speed on the technology you'll know it so well, in fact, that you can pass the Sun Certified Web Component Developer (SCWCD) 1.4 exam. If that's what you want to do, that is. Maybe you don't care about the exam, but need to use Servlets & JSPs in your next project. You're working on a deadline. You're over the legal limit for caffeine. You can't waste your time with a book that makes sense only AFTER you're an expert (or worse one that puts you to sleep). No problem. Head First Servlets and JSP's brain-friendly approach drives the knowledge straight into your head (without sharp instruments). You'll interact with servlets and JSPs in ways that help you learn quickly and deeply. It may not be The Da Vinci Code, but quickly see why so many reviewers call it "a page turner". Most importantly, this book will help you use what you learn. It won't get you through the exam only to have you forget everything the next day. Learn to write servlets and JSPs, what makes the Container tick (and what ticks it off), how to use the new JSP Expression Language (EL), what you should NOT write in a JSP, how to write deployment descriptors, secure applications, and even use some server-side design patterns. Can't talk about Struts at a cocktail party? That'll change. You won't just pass the exam, you will truly understand this stuff, and you'll be able to put it to work right away. This new exam is tough--much tougher than the previous version of the SCWCD. The authors of Head First Servlets and JSP know: they created it. (Not that it EVER occurred to them that if they made the exam really hard you'd have to buy a study guide to pass it.) The least they could do is give you a stimulating, fun way to pass the thing. If you're one of the thousands who used Head First EJB to pass the SCWCD exam, you know what to expect!

How Linux Works: What Every Superuser Should Know


Brian Ward - 2004
    Some books try to give you copy-and-paste instructions for how to deal with every single system issue that may arise, but How Linux Works actually shows you how the Linux system functions so that you can come up with your own solutions. After a guided tour of filesystems, the boot sequence, system management basics, and networking, author Brian Ward delves into open-ended topics such as development tools, custom kernels, and buying hardware, all from an administrator's point of view. With a mixture of background theory and real-world examples, this book shows both "how" to administer Linux, and "why" each particular technique works, so that you will know how to make Linux work for you.

The Tao of Network Security Monitoring: Beyond Intrusion Detection


Richard Bejtlich - 2004
    This book reducesthe investigative workload of computer security incident response teams(CSIRT) by posturing organizations for incident response success.Firewalls can fail. Intrusion-detection systems can be bypassed. Networkmonitors can be overloaded. These are the alarming but true facts aboutnetwork security. In fact, too often, security administrators' tools can serve asgateways into the very networks they are defending.Now, a novel approach to network monitoring seeks to overcome theselimitations by providing dynamic information about the vulnerability of allparts of a network. Called network security monitoring (NSM), it draws on acombination of auditing, vulnerability assessment, intrusion detection andprevention, and incident response for the most comprehensive approach tonetwork security yet. By focusing on case studies and the application of opensourcetools, the author helps readers gain hands-on knowledge of how tobetter defend networks and how to mitigate damage from security incidents.

The Data Warehouse ETL Toolkit: Practical Techniques for Extracting, Cleaning, Conforming, and Delivering Data


Ralph Kimball - 2004
    Delivers real-world solutions for the most time- and labor-intensive portion of data warehousing-data staging, or the extract, transform, load (ETL) process. Delineates best practices for extracting data from scattered sources, removing redundant and inaccurate data, transforming the remaining data into correctly formatted data structures, and then loading the end product into the data warehouse. Offers proven time-saving ETL techniques, comprehensive guidance on building dimensional structures, and crucial advice on ensuring data quality.

Joel on Software


Joel Spolsky - 2004
    For years, Joel Spolsky has done exactly this at www.joelonsoftware.com. Now, for the first time, you can own a collection of the most important essays from his site in one book, with exclusive commentary and new insights from joel.

Beginning Web Programming with HTML, XHTML and CSS


Jon Duckett - 2004
    It follows standards-based principles, but also teaches readers ways around problems they are likely to face using (X)HTML.While XHTML is the "current" standard, the book still covers HTML because many people do not yet understand that XHTML is the official successor to HTML, and many readers will still stick with HTML for backward compatibility and simpler/informal Web pages that don't require XHTML compliance.The book teaches basic principles of usability and accessibility along the way, to get users into the mode of developing Web pages that will be available to as many viewers as possible from the start. The book also covers the most commonly used programming/scripting language -- JavaScript -- and provides readers with a roadmap of other Web technologies to learn after mastering this book to add more functionality to their sites.

CCNA


Todd Lammle - 2004
    This new edition of the best-selling CCNA Study Guide provides: In-depth coverage of every CCNA exam objectivePractical information on Cisco internetworking solutionsHundreds of challenging review questionsLeading-edge exam preparation software, including a test engine, sample simulation questions, and electronic flashcardsAuthoritative coverage of all exam objectives, including: Network planning & designingImplementation & operationLAN and WAN troubleshootingNote: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Digital Retro: The Evolution and Design of the Personal Computer


Gordon J. Laing - 2004
    Long before Microsoft and Intel ruled the PC world, a disparate variety of home computers, from an unlikely array of suppliers, were engaging in a battle that would shape the industry for years to come. Products from established electronics giants clashed with machines which often appeared to have been (or actually were) assembled in a backyard shed by an eccentric inventor. University professors were competing head to head with students in their parents' garages. Compatibility? Forget it! Each of these computers was its own machine and had no intention of talking to anything else. The same could be said of their owners, in fact, who passionately defended their machines with a belief that verged on the religious. This book tells the story behind 40 classic home computers of an infamous decade, from the dreams and inspiration, through passionate inventors and corporate power struggles, to their final inevitable demise. It takes a detailed look at every important computer from the start of the home computer revolution with the MITS Altair, to the NeXT cube, pehaps the last serious challenger in the personal computer marketplace. In the thirteen years between the launch of those systems, there has never been a more frenetic period of technical advance, refinement, and marketing, and this book covers all the important steps made on both sides of the Atlantic. Whether it's the miniaturization of the Sinclair machines, the gaming prowess of the Amiga, or the fermenting war between Apple Computer, "Big Blue," and "the cloners," we've got it covered. Digital Retro is an essential read for anyone who owned a home computer in the Eighties.

Alpine Climbing: Techniques to Take You Higher


Mark Houston - 2004
    The technical protection systems are covered, of course. But 30 years of alpine climbing experience has convinced the authors that mastery-and safety-lie in the far more difficult task of knowing exactly which techniques to use, where and when. Therefore, they teach step-by-step decision-making skills, providing scenarios, checklists, and self-posed questions to inform the decision process.Alpine Climbing assumes some prior knowledge, primarily in rock climbing skills and techniques. Basic knots, belaying, rappelling, building rock anchors, leading, placing rock protection, and movement skills on rock: variations of these skills that are of particular value in the alpine environment are addressed in this book.Kathy Cosley and Mark Houston have been guides and climbing instructors for more than 20 years. In 1988, Kathy was the first American woman to climb the Eiger's North Face. Mark was among the first guides certified by the International Federation of Mountain Guides Association. Together, they made a lightweight and fast ascent of the South Face of Aconcagua.Part of the Mountaineers Outdoor Expert series.

The Anatomy Of Corporate Law: A Comparative And Functional Approach


Reinier H. Kraakman - 2004
    The authors start from the premise that corporate (or company) law across jurisdictions addresses the same three basic agency problems: (1) the opportunism of managers vis-�-vis shareholders; (2) the opportunism of controlling shareholders vis-�-vis minority shareholders; and (3) the opportunism of shareholders as a class vis-�-vis other corporate constituencies, such as corporate creditors and employees.

The Shellcoder's Handbook: Discovering and Exploiting Security Holes


Jack Koziol - 2004
    This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable code files

The Mathematica Guidebook for Programming


Michael Trott - 2004
    It gives users a deeper understanding of Mathematica by instructive implementations, explanations, and examples from a range of disciplines at varying levels of complexity. The three volumes -- Programming, Graphics, and Mathematics, total 3,000 pages and contain more than 15,000 Mathematica inputs, over 1,500 graphics, 4,000+ references, and more than 500 exercises.This first volume begins with the structure of Mathematica expressions, the syntax of Mathematica, its programming, graphic, numeric and symbolic capabilities. It then covers the hierarchical construction of objects out of symbolic expressions, the definition of functions, the recognition of patterns and their efficient application, program flows and program structuring, and the manipulation of lists.An indispensible resource for students, researchers and professionals in mathematics, the sciences, and engineering.

Creating Level Pull: A Lean Production System Improvement Guide For Production Control, Operations, And Engineering Professionals


Art Smalley - 2004
    The workbook gives a step-by-step case study on how to implement a level, pull-based production control system.

Selections from The Principle of Relativity


Albert Einstein - 2004
    In his introduction to this seminal work, the renowned physicist Stephen Hawking cuts through Einstein’s mathematical complexities to explain this revolutionary concept in language that excites and informs the reader. This book features selections from a translation of the original essay, The Principle of Relativity, as well as an insightful biography of Einstein and Hawking’s informative summary.

A Relativist's Toolkit: The Mathematics of Black-Hole Mechanics


Eric Poisson - 2004
    The context is provided by the mathematical theory of black holes, one of the most successful and relevant applications of general relativity. Topics covered include congruences of timelike and null geodesics, the embedding of spacelike, timelike and null hypersurfaces in spacetime, and the Lagrangian and Hamiltonian formulations of general relativity.

Exceptional C++ Style: 40 New Engineering Puzzles, Programming Problems, and Solutions


Herb Sutter - 2004
    This book follows in the tradition of the first two: It delivers new material, organized in bite-sized Items and grouped into themed sections. Readers of the first two books will find some familiar section themes, now including new material, such as exception safety, generic programming, and optimization and memory management techniques. The books overlap in structure and theme, not in content. This book continues the strong emphasis on generic programming and on using the C++ standard library effectively, including coverage of important template and generic programming techniques. Sutter's goal for this third and final book in his set is to present case studies that pull together themes from the previous books. This book also covers important points presented at the C++ Standard Committee where corrections to the Standard have been discussed and accepted.

Jazz Arranging Techniques From Quartet To Big Band (With Cd)


Gary Lindsay - 2004
    The book, which can be studied either individually or in a classroom environment, includes a CD (Mac/PC) with sixty-one audio examples corresponding to scores in the book and separate files of all the assignments.

The Latex Companionst: A Complete Guide and Reference for Preparing, Illustrating, and Publishing Technical Documents, Revised Boxed Set


Michel Goossens - 2004
    This book shows you how to begin using LaTeX, and also serves as a handy reference. The other books provide information on tools and techniques available for publishing technical text on the Web.

ASM Handbook Volume 9: Metallography and Microstructures


George F. Vander Voort - 2004
    The 1985 edition is probably tattered with use, so it's time to step up to this new edition; and even if the old handbook still has life in its binding, the new one offers updates and new information reflecting changes in automation, equipment, consumable products, and preparation methodology, as well as new metals, alloys, and manufacturing techno

Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices


George Varghese - 2004
    Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other design goals.Author George Varghese begins by laying out the implementation bottlenecks that are most often encountered at four disparate levels of implementation: protocol, OS, hardware, and architecture. He then derives 15 solid principles--ranging from the commonly recognized to the groundbreaking--that are key to breaking these bottlenecks.The rest of the book is devoted to a systematic application of these principles to bottlenecks found specifically in endnodes, interconnect devices, and specialty functions such as security and measurement that can be located anywhere along the network. This immensely practical, clearly presented information will benefit anyone involved with network implementation, as well as students who have made this work their goal.FOR INSTRUCTORS: To obtain access to the solutions manual for this title simply register on our textbook website (textbooks.elsevier.com)and request access to the Computer Science subject area. Once approved (usually within one business day) you will be able to access all of the instructor-only materials through the Instructor Manual link on this book's academic web page at textbooks.elsevier.com.

Inverse Problem Theory and Methods for Model Parameter Estimation


Albert Tarantola - 2004
    This book proposes a general approach that is valid for linear as well as for nonlinear problems. The philosophy is essentially probabilistic and allows the reader to understand the basic difficulties appearing in the resolution of inverse problems. The book attempts to explain how a method of acquisition of information can be applied to actual real-world problems, including many heuristic arguments. Prompted by recent developments in inverse theory, this text is a completely rewritten version of a 1987 book by the same author, and includes many algorithmic details for Monte Carlo methods, least-squares discrete problems, and least-squares problems involving functions. In addition, some notions are clarified, the role of optimization techniques is underplayed, and Monte Carlo methods are taken much more seriously.

Multivariable Mathematics: Linear Algebra, Multivariable Calculus, and Manifolds


Theodore Shifrin - 2004
    The material is integrated to emphasize the role of linearity in all of calculus and the recurring theme of implicit versus explicit that persists in linear algebra and analysis. In the text, the author addresses all of the standard computational material found in the usual linear algebra and multivariable calculus courses, and more, interweaving the material as effectively as possible and also including complete proofs. By emphasizing the theoretical aspects and reviewing the linear algebra material quickly, the book can also be used as a text for an advanced calculus or multivariable analysis course culminating in a treatment of manifolds, differential forms, and the generalized Stokes's Theorem.

Google Hacking for Penetration Testers, Volume 2


Johnny Long - 2004
    But, Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system administrators to find this sensitive information and "self-police" their own organizations.Readers will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can mash up Google with MySpace, LinkedIn, and more for passive reconaissance.

Advance! The Full Licence Book


Alan Betts - 2004
    

VBA and Macros for Microsoft Excel


Bill Jelen - 2004
    That can be hard to do for businesses that have complex needs, such as custom software applications. However, VBA and Macros for Microsoft Excel can teach you ways to customize pre-existing software to meet your specific needs. A variety of topics are covered that are sure to give you a solid knowledge of the VBA language. Event programming, user forms, carts, pivot tables, multi-dimensional arrays and Web queries are just a few of the areas you will learn about in this book. Written by the principal behind the leading Excel Web site, www.mrexcel.com, this book is sure to save you time and money!

Layer 2 VPN Architectures


Wei Luo - 2004
    This costly proposition, however, is no longer necessary. next-generation Layer 2 VPN services like Layer 2 Tunneling Protocol version 3 (L2TPv3) and Any Transport over MPLS (AToM) that enable service providers to offer Frame Relay, ATM, Ethernet, and leased-line services over a common IP/MPLS core network. By unifying multiple network layers and providing an integrated set of software services and management tools over this infrastructure, the Cisco Layer 2 VPN solution enables established carriers, IP-oriented ISP/CLECs, and large enterprise customers (LECs) to reach a broader set of potential VPN customers and offer truly global VPNs. Layer 2 VPN Architectures is a comprehensive guide to consolidating network infrastruc-tures and extending VPN services. The book opens by discussing Layer 2 VPN applications utilizing both AToM and L2TPv3 protocols and comparing Layer 3 versus Layer 2 provider-provisioned VPNs. In addition to describing the concepts related to Layer 2 VPNs, this book provides an extensive collection of case studies that show you how these technologies and architectures work. provider and enterprise design problems and solutions with hands-on configuration examples and implementation details. The case studies include all Layer 2 technologies transported using AToM and L2TPv3 pseudowires, including Ethernet, Ethernet VLAN, HDLC, PPP, Frame Relay, ATM AAL5 and ATM cells, and advanced topics relevant to Layer 2 VPN deployment, such as QoS and scalability. Layer 2 VPN Architectures is your practical guide to understanding, designing, and deploying Layer 2 VPNs. Wei Luo, CCIE No. 13,291, is a technical leader for Cisco Systems. He is the principle designer and developer for Cisco Layer 2 VPN products including AToM and VPLS. Wei actively participates in IETF standarization processes. Carlos Pignataro, CCIE No. 4619, is a senior engineer in the Escalation Team for Cisco Systems. In this role he is responsible for handling difficult and complex escalations, working on critical or stalled software defects, and participating in the new product and development process. Dmitry Bokotey, CCIE No. ISP Dial, Security, and Service Provider. He is a network consulting engineer with the Central Engineering and Metro Ethernet team of Cisco Systems. Anthony Chan, CCIE No. 10,266, is a network consulting engineer for the Cisco System Advanced Services Central Engineering organization. Anthony participates in MPLS and routing technology teams, which provide focused design and proactive support to service provider and enterprise customers. Includes a FREE 45-Day Online Edition This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

The Mathematica Guidebook for Graphics [With DVD-ROM]


Michael Trott - 2004
    It gives users a deeper understanding of Mathematica by instructive implementations, explanations, and examples from a range of disciplines at varying levels of complexity. The three volumes - Programming, Graphics, and Mathematics - each with a CD, total 3,000 pages and contain more than 15,000 Mathematica inputs, over 1,500 graphics, 4,000+ references, and more than 500 exercises. This second volume covers 2 and 3D graphics, providing a detailed treatment of creating images from graphic primitives such as points, lines, and polygons. It also shows how to graphically display functions that are given either analytically or in discrete form and a number of images from the Mathamatica graphics gallery. The use of Mathematicas graphics capabilities provides a very efficient and instructive way to learn how to deal with the structures arising in solving complicated problems.

Programming from the Ground Up


Jonathan Bartlett - 2004
    It takes you a step at a time through these concepts: * How the processor views memory * How the processor operates * How programs interact with the operating system * How computers represent data internally * How to do low-level and high-level optimization Most beginning-level programming books attempt to shield the reader from how their computer really works. Programming from the Ground Up starts by teaching how the computer works under the hood, so that the programmer will have a sufficient background to be successful in all areas of programming. This book is being used by Princeton University in their COS 217 "Introduction to Programming Systems" course.

Inversion of Control Containers and the Dependency Injection pattern


Martin Fowler - 2004
    Underlying these containers is a common pattern to how they perform the wiring, a concept they refer under the very generic name of "Inversion of Control". In this article I dig into how this pattern works, under the more specific name of "Dependency Injection", and contrast it with the Service Locator alternative. The choice between them is less important than the principle of separating configuration from use.

Murach's Mainframe COBOL


Mike Murach - 2004
    So if you want to learn how to write COBOL programs the way they're written in the best enterprise COBOL shops, this is the book for you. And when you're done learning from this book, it becomes the best reference you'll ever find for use on the job. Throughout the book, you will learn how to use COBOL on IBM mainframes because that's where 90 per cent or more of all COBOL is running. But to work on a mainframe, you need to know more than just the COBOL language. That's why this book also shows you: how to use the ISPF editor for entering programs; how to use TSO/E and JCL to compile and test programs; how to use the AMS utility to work with VSAM files; how to use CICS for developing interactive COBOL programs; how to use DB2 for developing COBOL programs that handle database data; how to maintain legacy programs. If you want to learn COBOL for other platforms, this book will get you off to a good start because COBOL is a standard language. In fact, all of the COBOL that's presented in this book will also run on any other platform that has a COBOL compiler. Remember, though, that billions of lines of mainframe COBOL are currently in use, and those programs will keep programmers busy for many years to come.

Consciousness: Creeping Up on the Hard Problem


Jeffrey Gray - 2004
    Despite vast knowledge of the relationship between brain and behaviour, and rapid advances in our knowledge of how brain activity correlates with conscious experience, the answers to all three questions remain controversial, even mysterious. This important new book analyses these core issues and reviews the evidence from both introspection and experiment. To many its conclusions will be surprising and even unsettling: The entire perceived world is constructed by the brain. The relationship between the world we perceive and the underlying physical reality is not as close as we might think. conscious experience. Our conscious experience of our behaviour lags the behaviour itself by around a fifth of a second - we become aware of what we do only after we have done it. The lag in conscious experience applies also to the decision to act - we only become aware of our decisions after they have been formed. The self is as much a creation of the brain as is the rest of the perceived world. Written by a leading scientist, this analysis of how conscious experience relates to brain and behaviour is accessible and compelling. It will have major implications for our understanding of human nature.

Flash Math Creativity


David Hirmes - 2004
    It's a book for designers who code, and coders who design, and it's a book for people who do neither. And with ActionScript 2.0, Macromedia has yet again upped the standard for creating immersive digital experiences. With Flash, the possibilities for artistic expression are limited only by your imagination." Inside you'll find everything from the simplest rotating square to a full multifunction graph plotter, all programmed in ActionScript 2.0. Ever noticed how the shape of a fern repeats itself again and again in each tiny frond? Almost as though someone took a basic piece of code and made a few iterations. And the results is something unexpectedly simple, but, inexplicably beautiful. In Flash Math Creativity, you'll explore the harmony of nature and math to produce some truly unique design experiments.

Microsoft Log Parser Toolkit


Gabriele Giuseppini - 2004
    The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find invaluable for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products.System administrators running Windows, Unix, and Linux networks manage anywhere from 1 to thousands of operating systems (Windows, Unix, etc.), Applications (Exchange, Snort, IIS, etc.), and hardware devices (firewalls, routers, etc.) that generate incredibly long and detailed log files of all activity on the particular application or device. This book will teach administrators how to use Microsoft's Log Parser to data mine all of the information available within these countless logs. The book teaches readers how all queries within Log Parser work (for example: a Log Parser query to an Exchange log may provide information on the origin of spam, viruses, etc.). Also, Log Parser is completely scriptable and customizable so the book will provide the reader with hundreds of original, working scripts that will automate these tasks and provide formatted charts and reports detailing the results of the queries.Written by Microsoft's sole developer of Log Parser, this is the first book available on the powerful yet completely undocumented product that ships with Microsoft's IIS, Windows Advanced Server 2003, and is available as a free download from the Microsoft Web siteThis book and accompanying scripts will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks

Applied Time Series Econometrics


Helmut Lütkepohl - 2004
    A model has to be constructed, accordingly, to describe the data generation process and to estimate its parameters. Modern tools to accomplish these tasks are provided in this volume, which also demonstrates by example how the tools can be applied.

Op Amp Applications Handbook


Walt Jung - 2004
    The latest op amps have powerful new features, making them more suitable for use in many products requiring weak signal amplification, such as medical devices, communications technology, optical networks, and sensor interfacing.The Op Amp Applications Handbook may well be the ultimate op amp reference book available. This book is brimming with up-to-date application circuits, valuable design tips, and in-depth coverage of the latest techniques to simplify op amp circuit designs, and improve their performance. As an added bonus, a selection on the history of op amp development provides an extensive and expertly researched overview, of interest to anyone involved in this important area of electronics.

Fuzzy Logic with Engineering Applications


Timothy J. Ross - 2004
    Fuzzy logic is a reasoning system based on a foundation of fuzzy set theory, itself an extension of classical set theory, where set membership can be partial as opposed to all or none, as in the binary features of classical logic. Fuzzy logic is a relatively new discipline in which major advances have been made over the last decade or so with regard to theory and applications. Following on from the successful first edition, this fully updated new edition is therefore very timely and much anticipated. Concentration on the topics of fuzzy logic combined with an abundance of worked examples, chapter problems and commercial case studies is designed to help motivate a mainstream engineering audience, and the book is further strengthened by the inclusion of an online solutions manual as well as dedicated software codes.Senior undergraduate and postgraduate students in most engineering disciplines, academics and practicing engineers, plus some working in economics, control theory, operational research etc, will all find this a valuable addition to their bookshelves.

Guerrilla Home Recording: How to Get Great Sound from Any Studio {No Matter How Weird or Cheap Your Gear Is}


Karl Coryat - 2004
    The revised edition is updated with a greater focus on digital recording techniques, the most powerful tools available to the home recordist. There are chapters devoted to instrument recording, humanizing drum patterns, mixing with plug-ins and virtual consoles, and a new section on using digital audio skills. And since, many true "Guerrillas" still record to analog tape, we have retained the best of that world. This edition features many more graphics than in the original edition, further enforcing Guerrilla Home Recording's reputation as the most readable, user-frienly recording title on the market.

Excel Add-In Development in C / C++: Applications in Finance


Steve Dalton - 2004
    C/C++. Excel Add-in Development in C/C++ - Applications for Finance is a how-to guide and reference book for the creation of high performance add-ins for Excel in C and C++ for users in the finance industry. Author Steve Dalton explains how to apply Excel add-ins to financial applications with many examples given throughout the book. It covers the relative strengths and weaknesses of developing add-ins for Excel in VB versus C/C++. "This book is for anyone who wants to do any application development in Excel. Even for an old hand at Excel development such as myself, a brief skim through reveals valuable nuggets of information. Delving deeper into the text, richer veins are easily found. This book is destined to become an essential reference on Excel development." Dr. Les Clewlow, Principal, Lacima Group Ltd."Programming Excel add-ins using the C API can be complex and difficult. Steve has done a masterful job of demystifying the process. After reading this book you'll be creating XLLs for all purposes with complete confidence. Highly recommended." Rob Bovey, MCSE, MCSD, Excel MVP, President, Application Professionals

Parameter Estimation and Inverse Problems


Brian Borchers - 2004
    It promotes a fundamental understanding of parameter estimation and inverse problem philosophy and methodology.It introduces readers to Classical and Bayesian approaches to linear and nonlinear problems, with particular attention to computational, mathematical, and statistical issues related to their application to geophysical problems. Four appendices review foundational concepts in linear algebra, statistics, vector calculus, and notation. Pedagogy includes hundreds of highlighted equations, examples, and definitions; introductory chapter synopses; end-of-chapter exercises, both programming and theoretical; and suggestions for further reading.The text is designed to be accessible to graduate students and professionals in physical sciences without an extensive mathematical background.

Jeff Duntemann's Wi-Fi Guide


Jeff Duntemann - 2004
    Master technical author, Jeff Duntemann, makes tangled Wi-Fi technological issues very comprehensible. Jeff explains the blizzard of Wi-Fi concepts and standards, including the new 802.11g, the complex and fluky security issues, and shows users how to protect themselves from both obvious and non-obvious threats. He also covers the human element in the Wi-Fi movement, including hacker threats and Wi-Fi communities. Jeff's coverage of wardriving has been highly praised by many Wi-Fi experts and the top Wi-Fi Web sites. Many technical drawings clarify difficult concepts, with abundant Web pointers to further information. The book features numerous hands-on projects that can dramatically increase the performance of home and small business Wi-Fi systems. Some of the important and new topics covered in the book include: Money-saving Wi-Fi network design and implementation techniques Wi-Fi communities Access points and gateways Security and privacy Wireless security auditing with WarLinux and Kismet The art of wardriving How to create powerful low-cost antennas How to protect yourself against clever hackers

Making Transcendence Transparent: An Intuitive Approach to Classical Transcendental Number Theory


Edward B. Burger - 2004
    Thus transcendental numbers are an enigmatic species of number: We know they are all around us and yet it requires enormous effort to catch one. More often than not, they slip through our fingers and dissappear back into the dense jungle of numbers. Here we will venture to tame a few of these incredible creatures. In the pages ahead we offer an approach to transcendence that not only includes the intricate analysis but also the beautiful ideas behind the technical details. The phrase "classical transcendental number theory" in the title of this book refers to the most widely known results that were obtained in the nineteenth and early twentieth centuries. The reason for this focus is threefold. Firstly, this body of work requires only the mathematical techniques and tools familiar to advanced undergraduate mathematics students, and thus this area can be appreciated by a wide range of readers. Secondly, the ideas behind modem transcendence results are almost always an elaboration of the classical arguments we will explore here. And finally, and perhaps more importantly, this early work yields the transcendence of such admired and well-known numbers as e, rr, and even 2v'2.

Manufacturing Planning and Control for Supply Chain Management


Thomas E. Vollmann - 2004
    This major revision contains four new chapters and four thoroughly upgraded to nearly original content. ERP systems coverage and the impact of them in the field is covered now in a new introductory chapter as well as being integrated heavily into many others. The organization is flexible, with the basic coverage in chapters 1-12, followed by advanced material that could be covered along with the basics, or skipped. Each chapter gives a managerial issues overview, then the detailed technical presentation, then examples of company implementations, then concluding principles.

Network Security Assessment


Chris McNab - 2004
    Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack.Network Security Assessment demonstrates how a determined attacker scours Internet-based networks in search of vulnerable components, from the network to the application level. This new edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks at the bigger picture by grouping and analyzing threats at a high-level. By grouping threats in this way, you learn to create defensive strategies against entire attack categories, providing protection now and into the future.Network Security Assessment helps you assess:Web services, including Microsoft IIS, Apache, Tomcat, and subsystems such as OpenSSL, Microsoft FrontPage, and Outlook Web Access (OWA)Web application technologies, including ASP, JSP, PHP, middleware, and backend databases such as MySQL, Oracle, and Microsoft SQL ServerMicrosoft Windows networking components, including RPC, NetBIOS, and CIFS servicesSMTP, POP3, and IMAP email servicesIP services that provide secure inbound network access, including IPsec, Microsoft PPTP, and SSL VPNsUnix RPC services on Linux, Solaris, IRIX, and other platformsVarious types of application-level vulnerabilities that hacker tools and scripts exploitAssessment is the first step any organization should take to start managing information risks correctly. With techniques to identify and assess risks in line with CESG CHECK and NSA IAM government standards, Network Security Assessment gives you a precise method to do just that.

IT Administrator's Top 10 Introductory Scripts for Windows


Jeff Fellinge - 2004
    It teaches readers scripting basics by explaining and breaking down real-world examples, and focuses on harnessing scripting power for IT systems administrators and systems engineers. The book is built around 10 fully-functional scripts that will help IT administrators manage their environment right "out of the box." Administrators also learn the strategies and tactics surrounding the development and implementation of these real-world scripts. Additionally, the chapters cover hypothetical, real-world business needs and explain how to map a script-based solution, including a discussion of the preferred language, tools, and technologies.

Audel Carpenter's and Builder's Layout, Foundation & Framing


Mark Richard Miller - 2004
    This handy how-to guide has been totally revised and updated to cover new building materials and the latest techniques in construction and framing. It's where to find answers and solutions, from the first stake to the last roofing nail. * Choose an appropriate site and lay out the structure * Construct a foundation that meets structural needs and weather conditions * Work with block building materials * Understand balloon frame, post-and-beam, and platform frame construction * Calculate rafter length and choose the right roofing materials * Install skylights, cornices, doors, windows, and various types of siding

The Sperm Whale Engineering Manual, Or, Building A Big Whale Skeleton


Lee Post - 2004
    

Planar Graph Drawing


Takao Nishizeki - 2004
    Extensively illustrated and with exercises included at the end of each chapter, it is suitable for use in advanced undergraduate and graduate level courses on algorithms, graph theory, graph drawing, information visualization and computational geometry. The book will also serve as a useful reference source for researchers in the field of graph drawing and software developers in information visualization, VLSI design and CAD.

Effective Maintenance Management


Vee Narayan - 2004
    this book has the depth and content to really help maintenance organizations change and improve reliability. This is a book with true content, without having to own numerous other books to provide information one might need. Great book...Ricky Smith, Executive Director, Maintenance Solutions. Providing a clear explanation of the value and benefits of maintenance, this unique guide is written in a language and style that practicing engineers and managers can understand and apply easily. Effective Maintenance Management examines the role of maintenance in minimizing the risk of safety or environmental incidents, adverse publicity, and loss of profitability. In addition to discussing risk reduction tools, it explains their applicability to specific situations, thereby enabling you to select the tool that best fits your requirements. Intended to bridge the gap between designers/maintainers and reliability engineers, this guide is sure to help businesses utilize their assets more effectively, safely, and profitably.Addresses the philosophical question of why we need to do maintenance and what is the value added by doing it.Shows readers how to determine what tasks are required and when they need to be done to achieve optimum performance.Provides a risk reduction model which links maintenance to these risks.Enables readers to make the link between maintenance on one hand and safety, profitability, and asset life on the other.Examines risks faced during the life cycle of a process plant.Discusses how to manage risks faced during a high cost, high downtime maintenance activity, namely plant shutdowns.Provides an in-depth look at qualitative and quantitative risks.Includes a table of fixed format codes that can be used directly or adapted for use in most maintenance management systems.Keeps mathematics to a minimum.Includes chapter previews and summaries, a list of acronyms, and a glossary of terms.

Airship Design


Charles P. Burgess - 2004
    The design of airships, particularly of the rigid type, is mainly a structural problem; and theoretical aerodynamics has nothing like the relative importance which it bears in airplane design. This is to be expected when we consider that the gross lift of an airship depends solely on the specific gravity of the gas and the bulk of the gas container, and not at all on shape or other aerodynamic characteristics which determine the lift of airplanes.

The Chord Master: How to Choose and Play the Right Guitar Chords


Rikky Rooksby - 2004
    Chord Master includes: Over 1000 chords and their v

Adobe Photoshop CS One-On-One


Deke McClelland - 2004
    Adobe Photoshop CS One-on-One clears the fog, taking you from graphics newbie to Photoshop warrior, under the watchful, easygoing guidance of Photoshop master Deke McClelland. This full-color book, accompanied by nearly two hours of video tutorials on CD, is an up close and personal training experience. Deke's classroom approach takes you step by step through real-world projects that help you gain Photoshop proficiency. Along the way, you'll get a good dose of graphics theory, best practices, and tips for avoiding Photoshop disasters.This one-of-a-kind approach fills a gap in the available literature and delivers a unique learning experience.

GNU C Library System & Network Applications


Sandra Loosemore - 2004
    It lists functions for manipulating files, interprocess communication, changing the attributes of a terminal device, starting a new process, and managing process groups, and describes services for looking up names in the system database, how to access hardware and software configuration information, and the basic concepts of signal handling and POSIX threads. Annotation ©2004 Book News, Inc., Portland, OR

Group Theory for Chemists: Fundamental Theory and Applications


Kieran Molloy - 2004
    Concise and student- friendly, the book adopts a diagrammatic rather than a rigorous mathematic approach, providing support for lecture courses in chemical group theory offering students opportunities to test their understanding. Problem solving is stressed with numerous self-assessment questions and problem exercises, along with tutorial hints and solutions to selected problems. Part 1 covers the essentials of symmetry and group theory, including symmetry elements and operations, point groups and representations. Part 2 focuses on the application of group theory to vibrational spectroscop building step-wise to show how group theory guides the analysis of vibrational spectra. A brief overview of infrared and Raman spectroscopy techniques is followed by a complete worked example to reiterate key points from earlier sections. Part 3 describes the application of group theory to a molecular orbital approach to chemical bonding. After laying a foundation of the basic rules for forming molecular orbitals using H, and H as examples, the book addresses more complex problems by comparing angular and linear structures for water and planar and pyramidal structures for ammonia. A description of the application of group theory to the bonding in octahedral main group and transitional metal complexes then follows, including an analysis of the influencing crystal field splitting energies. The book concludes with a description of the bonding in ferrocene, bringing together all the ideas presented in earlier sections.

The Complete Sandbag Training Course


Brian Jones - 2004
    It's simple, economical, and effective, and even offers significant safety benefits. Brian Jones has taken things beyond the basic lifts and carries for training head to toe with a sandbag.

The Elements of C++ Style


Trevor Misfeldt - 2004
    Just as Strunk and White's The Elements of Style provides rules of usage for writing in the English language, this text furnishes a set of rules for writing in C++. The authors offer a collection of standards and guidelines for creating solid C++ code that will be easy to understand, enhance and maintain. The book provides conventions for formatting, naming, documentation, programming, and packaging for the latest ANSI standard of C++, and also includes discussion of advanced topics such as templates. Trevor Misfeldt is co-author of Elements of Java Style (Cambridge, 2000) and CEO of CenterSpace Software. Gregory Bumgardner is a Freelance Consultant with twenty-five years of experience in software design and implementation. He is co-author of Elements of Java Style (Cambridge, 2000). Andrew Gray is Director of Engineering for Intellichem, Inc. He was previously Software Engineering Manager and Technology Evangelist at Rogue Wave Software, where he led the development of XML infrastructure solutions.

Data Conversion Handbook


Analog Devices, Inc. - 2004
    Covering data converter fundamentals, techniques, applications, and beginning with the basic theoretical elements necessary for a complete understanding of data converters, this reference covers all the latest advances in the field.This text describes in depth the theory behind and the practical design of data conversion circuits as well as describing the different architectures used in A/D and D/A converters. Details are provided on the design of high-speed ADCs, high accuracy DACs and ADCs, and sample-and-hold amplifiers. Also, this reference covers voltage sources and current reference, noise-shaping coding, and sigma-delta converters, and much more. The book's 900-plus pages are packed with design information and application circuits, including guidelines on selecting the most suitable converters for particular applications.You'll find the very latest information on: -Data converter fundamentals, such as key specifications, noise, sampling, and testing-Architectures and processes, including SAR, flash, pipelined, folding, and more-Practical hardware design techniques for mixed-signal systems, such as driving ADCs, buffering DAC outputs, sampling clocks, layout, interfacing, support circuits, and tools.-Data converter applications dealing with precision measurement, data acquisition, audio, display, DDS, software radio and many more.The accompanying CD-ROM provides software tools for testing and analyzing data converters as well as a searchable pdf version of the text.* Brings together a huge amount of information impossible to locate elsewhere.* Many recent advances in converter technology simply aren't covered in any other book.* A must-have design reference for any electronics design engineer or technician.

The Theory and Practice of Revenue Management


Kalyan T. Talluri - 2004
    Revenue management (RM) has emerged as one of the most important new business practices in recent times.This book is the first comprehensive reference book to be published in the field of RM.It unifies the field, drawing from industry sources as well as relevant research from disparate disciplines, as well as documenting industry practices and implementation details.Successful hardcover version published in April 2004.

End-To-End QoS Network Design


Tim Szigeti - 2004
    This book considers detailed design examples that illustrate where, when, and how to deploy various QoS features to provide validated and tested solutions for voice, video, and critical data over the LAN, WAN, and VPN.

A Modern Introduction to Quantum Field Theory


Michele Maggiore - 2004
    This book introduces thereader to the modern developments in a manner which assumes no previous knowledge of quantum field theory. Along with standard topics like Feynman diagrams, the book discusses effective lagrangians, renormalization group equations, the path integral formulation, spontaneous symmetry breaking andnon-abelian gauge theories. The inclusion of more advanced topics will also make this a most useful book for graduate students and researchers.

Notes from the Metalevel: Introduction to Algorithmic Music Composition [With CDROM]


Heinrich Taube - 2004
    It is primarily intended for student composers interested in learning how computation can provide them with a new paradigm for musical composition. Notes from the Metalevel explains through a practical, example-based approach the essential concepts and techniques of computer-based composition, and demonstrates how these techniques can be integrated into the composer's own creative work. One of the most exciting aspects of computer-based composition is that it is an essentially empirical activity that does not require years of formal music theory training to understand. For this reason, Notes from the Metalevel will be of interest to any reader with a high-school mathematics background interested in experimenting with music composition using MIDI and audio synthesis programs. The book will also be of use to computer science and engineering students who are interested in artistic applications of object-oriented programming techniques and music software design. The Aeolian Harp, a composition for piano and computer generated tape (see chapter 23) won the Eric Siday Musical Creativity Award as the top composition submitted to the 2003 International Computer Music Conference.

Network Security Fundamentals


Gert De Laet - 2004
    The newest in the series of Fundamentals titles from Cisco Press, this title is designed to provide a baseline understanding of the various components of a network security architecture and to show how each component can be implemented to maximum effect.

Fundamentals of Seismic Wave Propagation


Chris Chapman - 2004
    The book is a text for graduate courses in theoretical seismology, and a reference for all academic and industrial seismologists using numerical modelling methods. Exercises and suggestions for further reading are included in each chapter.

Best Practices in Software Measurement: How to Use Metrics to Improve Project and Process Performance


Christof Ebert - 2004
    Not everything that is counted counts. Albert Einstein This is a book about software measurement from the practitioner s point of view and it is a book for practitioners. Software measurement needs a lot of practical guidance to build upon experiences and to avoid repeating errors. This book t- gets exactly this need, namely to share experiences in a constructive way that can be followed. It tries to summarize experiences and knowledge about software measurement so that it is applicable and repeatable. It extracts experiences and lessons learned from the narrow context of the specific industrial situation, thus facilitating transfer to other contexts. Software measurement is not at a standstill. With the speed software engine- ing is evolving, software measurement has to keep pace. While the underlying theory and basic principles remain invariant in the true sense (after all, they are not specific to software engineering), the application of measurement to specific contexts and situations is continuously extended. The book thus serves as a ref- ence on these invariant principles as well as a practical guidance on how to make software measurement a success."

Jncis =Juniper Networks Certified Internet Specialist: Study Guide


Joseph M. Soricelli - 2004
    Written by the Juniper Network trainer who helped develop the exam, this Study Guide provides the information and insights you need to approach the JNCIS with confidence. Authoritative coverage of all test objectives, including: * Evaluating the outcome of a policy using a subroutine * Identifying the configuration of OSPF route summarization * Describing ISO network addressing as it applies to IS-IS * Configuring BGP route flap damping * Defining the methods available to scope multicast traffic * Identifying the differences between a Layer 2 and a Layer 3 VPN * Identifying firewall filter capabilities and applications for securing a network * Configuring IPv6 on a Juniper Networks router

An Introduction to Biomechanics: Solids and Fluids, Analysis and Design


Jay D. Humphrey - 2004
    With an eye toward practicality without loss of depth of instruction, this book seeks to explain the fundamental concepts of biomechanics. With the accompanying web site providing models, sample problems, review questions and more, Introduction to Biomechanics provides students with the full range of instructional material for this complex and dynamic field.

Fault-Tolerant IP and Mpls Networks


Iftekhar Hussain - 2004
    Multiprotocol Label Switching (MPLS) is the enabling technology for the widespread deployment of IP networks in core and Metro Ethernet applications. Many service providers need to move their legacy Layer 2 and Layer 3 services onto converged MPLS and IP-enabled networks, but high availability is a prerequisite for offering profitable carrier-class services. Although most carrier-class routers do provide an adequate level of hardware redundancy, control-plane software is still vulnerable to and, in many cases, the cause of router failures."Fault-Tolerant IP and MPLS Networks" provides you with an in-depth analysis of the mechanisms that improve the reliability and availability of IP and MPLS control plane components. The IP/MPLS control-plane architecture and all its restart mechanisms are explained with examples and deployment considerations.This explanation of IP/MPLS control-plane architecture begins with a service view of the network, moves on to the node-level view by partitioning the network into its constituent network elements, and then advances to the component-level view to explore various techniques that can be used to improve the reliability and availability of each component. The top-down and example-oriented approach facilitates a solid understanding of the constituent components before moving on to more advanced MPLS applications involving multiple components."Fault-Tolerant IP and MPLS Networks" is your practical guide for understanding, designing, and deploying carrier class IP/MPLS networks.This book is part of the Networking Technology Series from Cisco Press which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

The Electrical Engineering Handbook


Wai-Kai Chen - 2004
    Encompassing 79 chapters, this book is intended to enlighten and refresh knowledge of the practicing engineer or to help educate engineering students. This text will most likely be the engineer s first choice in looking for a solution; extensive, complete references to other sources are provided throughout. No other book has the breadth and depth of coverage available here. This is a must-have for all practitioners and students! The Electrical Engineer's Handbook provides the most up-to-date information in: Circuits and Networks, Electric Power Systems, Electronics, Computer-Aided Design and Optimization, VLSI Systems, Signal Processing, Digital Systems and Computer Engineering, Digital Communication and Communication Networks, Electromagnetics and Control and Systems. About the Editor-in-Chief Wai-Kai Chen is Professor and Head Emeritus of the Department of Electrical Engineering and Computer Science at the University of Illinois at Chicago. He has extensive experience in education and industry and is very active professionally in the fields of circuits and systems. He was Editor-in-Chief of the IEEE Transactions on Circuits and Systems, Series I and II, President of the IEEE Circuits and Systems Society and is the Founding Editor and Editor-in-Chief of the Journal of Circuits, Systems and Computers. He is the recipient of the Golden Jubilee Medal, the Education Award, and the Meritorious Service Award from the IEEE Circuits and Systems Society, and the Third Millennium Medal from the IEEE. Professor Chen is a fellow of the IEEE and the American Association for the Advancement of Science. * 77 chapters encompass the entire field of electrical engineering.* THOUSANDS of valuable figures, tables, formulas, and definitions.* Extensive bibliographic references."

SMS and Mms Interworking in Mobile Networks


Arnaud Henry-Labordere - 2004
    This comprehensive book offers wireless engineers and managers practical guidance in the planning and implementation of SMS and MMS services with interworking (the ability to successfully send a message when the origin and destination cellular phones do not use the same wireless operator). The book offers professionals various solutions to the common problem of number portability (a situation when a cellular phone has been portedout to another operator while keeping the same number) and provides methods for blocking spam from inbound SMS. Including numerous solved examples, this authoritative reference helps practitioners master of the key concepts they need to understand for their work in the field.

Building The Tesla Turbine


Vincent R. Gingery - 2004
    Read along as Tesla describes in his own words the principles and incredible capabilities of his turbine. Examine the original Turbine patent descriptions and drawings for yourself and gain an even greater perspective of this amazing invention. Also included in this book are step by step instructions in the form of detailed photos and drawings showing how to construct your very own Tesla turbine. Not an exact replica of the original, but one that has been simplified, thus making it much easier to build than the original. The result is an impressive model measuring 3-1/2” wide x 6” long x 4” high. Although it comes in a small package this turbine generates impressive power. The model as detailed rotates at speeds in excess of 5000 rpm at 80 psi of air pressure. And it has the capability of running either clockwise or counterclockwise at these speeds. Building the turbine requires basic metal working ability including the cutting, grinding and shaping of metal. You will need a small metal lathe capable of turning at least a 3-1/4” diameter, a drill press and/or milling machine, a hacksaw or bandsaw and an assortment of hand tools including metal cutting snips, screwdrivers, wrenches etc. This is an amazing project and one you are sure to enjoy. But be careful. Once you start you won’t be able to get enough of Tesla and his amazing inventions. The more you learn the more you will realize that Nikola Tesla was truly a genius light years ahead of his time.

Information Sharing on the Semantic Web


Heiner Stuckenschmidt - 2004
    Producing, storing, and transporting information in large quantities are no longer signi?cant problems. Producing on-line, digitized information is no longer a problem. Ever more of our commercial, scienti?c and personal information exchanges happen on-line in digital form. In the professional domain, near 100% of all o?ce documents areproducedindigitalform(evenifafterwardstheyaredistributedinpaper form), large parts of the scienti?c discourse are now taking place in digital form (with physics, computer science and astronomy taking a leading role). In the public domain, newspapers are available on-line, an increasing number of radio and television stations o?er their material on-line in streaming form and e-government is an important theme for public administration. Even in the personal area, information is rapidly moving on-line: sales of digital cameras are now higher then for analogue cameras, e-mail and on-line chat have become important channels for maintaining social relations and for personal entertainment the digital DVD is rapidly replacing the analogue video tape. Compact disk (itself already digital) is under serious pressure from on-line music in MP3 format from a variety of sources. In short: p- ductionofon-lineinformationisnowthenorminvirtuallyallareasofourlife. Storing such information in the required volumes is also no longer a problem."

Introduction to Quantum Mechanics: In Chemistry, Materials Science, and Biology


Sy M. Blinder - 2004
    It shows how the fundamental concepts of quantum theory arose from classic experiments in physics and chemistry, and presents the quantum-mechanical foundations of modern techniques including molecular spectroscopy, lasers and NMR.Blinder also discusses recent conceptual developments in quantum theory, including Schr�dinger's Cat, the Einstein-Podolsky-Rosen experiment, Bell's theorem and quantum computing.

Pro Msmq: Microsoft Message Queue Programming


Scot Boyd - 2004
    Distributed applications, however, present a large set of unique challenges, like, what do I do when the network is disconnected? How do I coordinate the actions of two separate applications? How do I handle peak times? How do I guarantee delivery? How do I upgrade my application without breaking the communication? We at the Microsoft Message Queue (MSMQ) team have worked hardto provide an elegant solution to these questions and many others. This book will help you leverage this work by using MSMQ in your distributed applications so that you will be able to concentrate on the business logic rather than network problems. What is MSMQ? MSMQ is message-oriented middleware (MOM) that comes as a standard component ofWindows and allows applications to exchange messages among them using queues-outgoing queues for Iilessages waiting to be sent, and incoming queues for messages waiting to be received. Queues-like dams-guarantee nice and controlled flow of information, even when the network is congested or suffers frequent disconnects. Moreover, queues are a very natural programming metaphor. Most people would agree that working from a queue of to-do tasks is more effective than responding to requests on the spot. The same is true for computer programs. Programs that process queues of incoming messages tend to be simpler and more efficient than programs acting on interrupts.