Best of
Technical

2005

Java Concurrency in Practice


Brian Goetz - 2005
    Now this same team provides the best explanation yet of these new features, and of concurrency in general. Concurrency is no longer a subject for advanced users only. Every Java developer should read this book."--Martin BuchholzJDK Concurrency Czar, Sun Microsystems"For the past 30 years, computer performance has been driven by Moore's Law; from now on, it will be driven by Amdahl's Law. Writing code that effectively exploits multiple processors can be very challenging. Java Concurrency in Practice provides you with the concepts and techniques needed to write safe and scalable Java programs for today's--and tomorrow's--systems."--Doron RajwanResearch Scientist, Intel Corp"This is the book you need if you're writing--or designing, or debugging, or maintaining, or contemplating--multithreaded Java programs. If you've ever had to synchronize a method and you weren't sure why, you owe it to yourself and your users to read this book, cover to cover."--Ted NewardAuthor of Effective Enterprise Java"Brian addresses the fundamental issues and complexities of concurrency with uncommon clarity. This book is a must-read for anyone who uses threads and cares about performance."--Kirk PepperdineCTO, JavaPerformanceTuning.com"This book covers a very deep and subtle topic in a very clear and concise way, making it the perfect Java Concurrency reference manual. Each page is filled with the problems (and solutions!) that programmers struggle with every day. Effectively exploiting concurrency is becoming more and more important now that Moore's Law is delivering more cores but not faster cores, and this book will show you how to do it."--Dr. Cliff ClickSenior Software Engineer, Azul Systems"I have a strong interest in concurrency, and have probably written more thread deadlocks and made more synchronization mistakes than most programmers. Brian's book is the most readable on the topic of threading and concurrency in Java, and deals with this difficult subject with a wonderful hands-on approach. This is a book I am recommending to all my readers of The Java Specialists' Newsletter, because it is interesting, useful, and relevant to the problems facing Java developers today."--Dr. Heinz KabutzThe Java Specialists' Newsletter"I've focused a career on simplifying simple problems, but this book ambitiously and effectively works to simplify a complex but critical subject: concurrency. Java Concurrency in Practice is revolutionary in its approach, smooth and easy in style, and timely in its delivery--it's destined to be a very important book."--Bruce TateAuthor of Beyond Java" Java Concurrency in Practice is an invaluable compilation of threading know-how for Java developers. I found reading this book intellectually exciting, in part because it is an excellent introduction to Java's concurrency API, but mostly because it captures in a thorough and accessible way expert knowledge on threading not easily found elsewhere."--Bill VennersAuthor of Inside the Java Virtual MachineThreads are a fundamental part of the Java platform. As multicore processors become the norm, using concurrency effectively becomes essential for building high-performance applications. Java SE 5 and 6 are a huge step forward for the development of concurrent applications, with improvements to the Java Virtual Machine to support high-performance, highly scalable concurrent classes and a rich set of new concurrency building blocks. In Java Concurrency in Practice , the creators of these new facilities explain not only how they work and how to use them, but also the motivation and design patterns behind them.However, developing, testing, and debugging multithreaded programs can still be very difficult; it is all too easy to create concurrent programs that appear to work, but fail when it matters most: in production, under heavy load. Java Concurrency in Practice arms readers with both the theoretical underpinnings and concrete techniques for building reliable, scalable, maintainable concurrent applications. Rather than simply offering an inventory of concurrency APIs and mechanisms, it provides design rules, patterns, and mental models that make it easier to build concurrent programs that are both correct and performant.This book covers:Basic concepts of concurrency and thread safety Techniques for building and composing thread-safe classes Using the concurrency building blocks in java.util.concurrent Performance optimization dos and don'ts Testing concurrent programs Advanced topics such as atomic variables, nonblocking algorithms, and the Java Memory Model

The Elements of Computing Systems: Building a Modern Computer from First Principles


Noam Nisan - 2005
    The books also provides a companion web site that provides the toold and materials necessary to build the hardware and software.

Head First Java


Kathy Sierra - 2005
    You might think the problem is your brain. It seems to have a mind of its own, a mind that doesn't always want to take in the dry, technical stuff you're forced to study. The fact is your brain craves novelty. It's constantly searching, scanning, waiting for something unusual to happen. After all, that's the way it was built to help you stay alive. It takes all the routine, ordinary, dull stuff and filters it to the background so it won't interfere with your brain's real work--recording things that matter. How does your brain know what matters? It's like the creators of the Head First approach say, suppose you're out for a hike and a tiger jumps in front of you, what happens in your brain? Neurons fire. Emotions crank up. Chemicals surge. That's how your brain knows.And that's how your brain will learn Java. Head First Java combines puzzles, strong visuals, mysteries, and soul-searching interviews with famous Java objects to engage you in many different ways. It's fast, it's fun, and it's effective. And, despite its playful appearance, Head First Java is serious stuff: a complete introduction to object-oriented programming and Java. You'll learn everything from the fundamentals to advanced topics, including threads, network sockets, and distributed programming with RMI. And the new. second edition focuses on Java 5.0, the latest version of the Java language and development platform. Because Java 5.0 is a major update to the platform, with deep, code-level changes, even more careful study and implementation is required. So learning the Head First way is more important than ever. If you've read a Head First book, you know what to expect--a visually rich format designed for the way your brain works. If you haven't, you're in for a treat. You'll see why people say it's unlike any other Java book you've ever read.By exploiting how your brain works, Head First Java compresses the time it takes to learn and retain--complex information. Its unique approach not only shows you what you need to know about Java syntax, it teaches you to think like a Java programmer. If you want to be bored, buy some other book. But if you want to understand Java, this book's for you.

Glacier Mountaineering: An Illustrated Guide to Glacier Travel and Crevasse Rescue


Andy Tyson - 2005
    This is the only book to clearly illustrate and systematically guide readers through glacier anatomy, equipment, route finding, and rescue techniques and, just like our other books that are illustrated by Mike Clelland, it is guaranteed to entertain the whole way through.

Time Management for System Administrators: Stop Working Late and Start Working Smart


Thomas A. Limoncelli - 2005
    No other job pulls people in so many directions at once. Users interrupt you constantly with requests, preventing you from getting anything done. Your managers want you to get long-term projects done but flood you with reques ... Available here:readmeaway.com/download?i=0596007833Time Management for System Administrators: Stop Working Late and Start Working Smart PDF by Thomas A. LimoncelliRead Time Management for System Administrators: Stop Working Late and Start Working Smart PDF from O'Reilly Media,Thomas A. LimoncelliDownload Thomas A. Limoncelli’s PDF E-book Time Management for System Administrators: Stop Working Late and Start Working Smart

The Tcp/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference


Charles Kozierok - 2005
    It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet and much more. The author offers not only a detailed view of the TCP/IP protocol suite, but also describes networking fundamentals and the important OSI Reference Model.

Java Puzzlers: Traps, Pitfalls, and Corner Cases


Joshua Bloch - 2005
    This lively book reveals oddities of the Java programming language through entertaining and thought-provoking programming puzzles.--Guy Steele, Sun Fellow and coauthor of The Java(TM) Language SpecificationI laughed, I cried, I threw up (my hands in admiration).--Tim Peierls, president, Prior Artisans LLC, and member of the JSR 166 Expert GroupHow well do you really know Java? Are you a code sleuth? Have you ever spent days chasing a bug caused by a trap or pitfall in Java or its libraries? Do you like brainteasers? Then this is the book for you!In the tradition of Effective Java(TM), Bloch and Gafter dive deep into the subtleties of the Java programming language and its core libraries. Illustrated with visually stunning optical illusions, Java(TM) Puzzlers features 95 diabolical puzzles that educate and entertain. Anyone with a working knowledge of Java will understand the puzzles, but even the most seasoned veteran will find them challenging.Most of the puzzles take the form of a short program whose behavior isn't what it seems. Can you figure out what it does? Puzzles are grouped loosely according to the features they use, and detailed solutions follow each puzzle. The solutions go well beyond a simple explanation of the program's behavior--they show you how to avoid the underlying traps and pitfalls for good. A handy catalog of traps and pitfalls at the back of the book provides a concise taxonomy for future reference.Solve these puzzles and you'll never again fall prey to the counterintuitive or obscure behaviors that can fool even the most experienced programmers.

The Smaller Majority: The Hidden World of the Animals That Dominate the Tropics


Piotr Naskrecki - 2005
    This is the 'smaller majority' that we meet eye-to-eye, often for the first time and certainly as never before, in Piotr Naskrecki's spectacular book. A large-format volume of over 400 exquisite, full-colour photographs, some depicting animals never before captured with a camera, The Smaller Majority takes us on a visual journey into the remote world of organisms that, however little known, overlooked, or even reviled, are critical to the bio-diversity of the tropics, and to the life of our planet. Here are the species who truly dominate the tropics, both in terms of their diversity and the ecological functions they play - invertebrates such as insects, arachnids, or flatworms, but also little-known vertebrates such as the pygmy chameleons of Madagascar or legless, underground frog kin known as caecilians; here is behaviour never before documented, as in katydids preying upon one another, photographed in places few have visited. creatures from their point of view, the book exposes the environment in which they live, the threats they face, and the devastating impact their disappearance may have. A unique introduction to the marvellous variety of the overlooked life under our feet, Naskrecki's book returns us to a child's sense of wonder with a fully informed, deeply felt understanding of the importance of so much of the world's smaller, teeming life.

Linux Bible


Christopher Negus - 2005
    Whether you're new to Linux or need a reliable update and reference, this is an excellent resource. Veteran bestselling author Christopher Negus provides a complete tutorial packed with major updates, revisions, and hands-on exercises so that you can confidently start using Linux today. Offers a complete restructure, complete with exercises, to make the book a better learning tool Places a strong focus on the Linux command line tools and can be used with all distributions and versions of Linux Features in-depth coverage of the tools that a power user and a Linux administrator need to get startedThis practical learning tool is ideal for anyone eager to set up a new Linux desktop system at home or curious to learn how to manage Linux server systems at work.

Perl Best Practices: Standards and Styles for Developing Maintainable Code


Damian Conway - 2005
    They aren't conscious of all the choices they make, like how they format their source, the names they use for variables, or the kinds of loops they use. They're focused entirely on problems they're solving, solutions they're creating, and algorithms they're implementing. So they write code in the way that seems natural, that happens intuitively, and that feels good.But if you're serious about your profession, intuition isn't enough. Perl Best Practices author Damian Conway explains that rules, conventions, standards, and practices not only help programmers communicate and coordinate with one another, they also provide a reliable framework for thinking about problems, and a common language for expressing solutions. This is especially critical in Perl, because the language is designed to offer many ways to accomplish the same task, and consequently it supports many incompatible dialects.With a good dose of Aussie humor, Dr. Conway (familiar to many in the Perl community) offers 256 guidelines on the art of coding to help you write better Perl code--in fact, the best Perl code you possibly can. The guidelines cover code layout, naming conventions, choice of data and control structures, program decomposition, interface design and implementation, modularity, object orientation, error handling, testing, and debugging.They're designed to work together to produce code that is clear, robust, efficient, maintainable, and concise, but Dr. Conway doesn't pretend that this is the one true universal and unequivocal set of best practices. Instead, Perl Best Practices offers coherent and widely applicable suggestions based on real-world experience of how code is actually written, rather than on someone's ivory-tower theories on how software ought to be created.Most of all, Perl Best Practices offers guidelines that actually work, and that many developers around the world are already using. Much like Perl itself, these guidelines are about helping you to get your job done, without getting in the way.Praise for Perl Best Practices from Perl community members:"As a manager of a large Perl project, I'd ensure that every member of my team has a copy of Perl Best Practices on their desk, and use it as the basis for an in-house style guide." -- Randal Schwartz"There are no more excuses for writing bad Perl programs. All levels of Perl programmer will be more productive after reading this book." -- Peter Scott"Perl Best Practices will be the next big important book in the evolution of Perl. The ideas and practices Damian lays down will help bring Perl out from under the embarrassing heading of "scripting languages". Many of us have known Perl is a real programming language, worthy of all the tasks normally delegated to Java and C++. With Perl Best Practices, Damian shows specifically how and why, so everyone else can see, too." -- Andy Lester"Damian's done what many thought impossible: show how to build large, maintainable Perl applications, while still letting Perl be the powerful, expressive language that programmers have loved for years." -- Bill Odom"Finally, a means to bring lasting order to the process and product of real Perl development teams." -- Andrew Sundstrom"Perl Best Practices provides a valuable education in how to write robust, maintainable P

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks


Michal Zalewski - 2005
    Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.

Head First HTML with CSS & XHTML


Elisabeth Robson - 2005
    You want to learn HTML so you can finally create those web pages you've always wanted, so you can communicate more effectively with friends, family, fans, and fanatic customers. You also want to do it right so you can actually maintain and expand your Web pages over time, and so your web pages work in all the browsers and mobile devices out there. Oh, and if you've never heard of CSS, that's okay - we won't tell anyone you're still partying like it's 1999 - but if you're going to create Web pages in the 21st century then you'll want to know and understand CSS.Learn the real secrets of creating Web pages, and why everything your boss told you about HTML tables is probably wrong (and what to do instead). Most importantly, hold your own with your co-worker (and impress cocktail party guests) when he casually mentions how his HTML is now strict, and his CSS is in an external style sheet.With Head First HTML with CSS & XHTML, you'll avoid the embarrassment of thinking web-safe colors still matter, and the foolishness of slipping a font tag into your pages. Best of all, you'll learn HTML and CSS in a way that won't put you to sleep. If you've read a Head First book, you know what to expect: a visually-rich format designed for the way your brain works. Using the latest research in neurobiology, cognitive science, and learning theory, this book will load HTML, CSS, and XHTML into your brain in a way that sticks.So what are you waiting for? Leave those other dusty books behind and come join us in Webville. Your tour is about to begin."Elegant design is at the core of every chapter here, each concept conveyed with equal doses of pragmatism and wit." --Ken Goldstein, Executive Vice President, Disney Online"This book is a thoroughly modern introduction to forward-looking practices in web page markup and presentation." --Danny Goodman, author of Dynamic HTML: The Definitive Guide"What used to be a long trial and error learning process has now been reduced neatly into an engaging paperback." --Mike Davidson, CEO, Newsvine, Inc."I love Head First HTML with CSS & XHTML--it teaches you everything you need to learn in a 'fun coated' format!" --Sally Applin, UI Designer and Artist"I haven't had as much fun reading a book (other than Harry Potter) in years. And your book finally helped me break out of my hapless so-last-century way of creating web pages." --Professor David M. Arnow, Department of Computer and Information Science, Brooklyn College"If you've ever had a family member who wanted you to design a website for them, buy them Head First HTML with CSS and XHTML. If you've ever asked a family member to design you a web site, buy this book. If you've ever bought an HTML book and ended up using it to level your desk, or for kindling on a cold winter day, buy this book. This is the book you've been waiting for. This is the learning system you've been waiting for." --Warren Kelly, Blogcritics.org

Professional JavaScript for Web Developers


Nicholas C. Zakas - 2005
    This 4-book set includes:Professional JavaScript for Web Developers (ISBN: 0764579088) Professional Ajax 2nd edition (ISBN: 0470109491) Professional Web 2.0 Programming (ISBN: 0470087889) Professional Rich Internet Applications: Ajax and Beyond (ISBN: 0470082801)

Framework Design Guidelines: Conventions, Idioms, and Patterns for Reusable .NET Libraries


Krzysztof Cwalina - 2005
    Expanded and updated for .NET 3.5, this new edition focuses on the design issues that directly affect the programmability of a class library, specifically its publicly accessible APIs. This book can improve the work of any .NET developer producing code that other developers will use. It includes copious annotations to the guidelines by thirty-five prominent architects and practitioners of the .NET Framework, providing a lively discussion of the reasons for the guidelines as well as examples of when to break those guidelines. Microsoft architects Krzysztof Cwalina and Brad Abrams teach framework design from the top down. From their significant combined experience and deep insight, you will learnThe general philosophy and fundamental principles of framework design Naming guidelines for the various parts of a framework Guidelines for the design and extending of types and members of types Issues affecting-and guidelines for ensuring-extensibility How (and how "not") to design exceptions Guidelines for-and examples of-common framework design patternsGuidelines in this book are presented in four major forms: Do, Consider, Avoid, and Do not. These directives help focus attention on practices that should "always" be used, those that should "generally" be used, those that should "rarely" be used, and those that should "never" be used. Every guideline includes a discussion of its applicability, and most include a code example to help illuminate the dialogue. "Framework Design Guidelines, Second Edition, " is the only definitive source of best practices for managed code API development, direct from the architects themselves. A companion DVD includes the Designing .NET Class Libraries video series, instructional presentations by the authors on design guidelines for developing classes and components that extend the .NET Framework. A sample API specification and other useful resources and tools are also included.

File System Forensic Analysis


Brian Carrier - 2005
    Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.

Agile Estimating and Planning


Mike Cohn - 2005
    In this book, Agile Alliance cofounder Mike Cohn discusses the philosophy of agile estimating and planning and shows you exactly how to get the job done, with real-world examples and case studies.Concepts are clearly illustrated and readers are guided, step by step, toward how to answer the following questions: What will we build? How big will it be? When must it be done? How much can I really complete by then? You will first learn what makes a good plan-and then what makes it agile.Using the techniques in Agile Estimating and Planning , you can stay agile from start to finish, saving time, conserving resources, and accomplishing more. Highlights include:Why conventional prescriptive planning fails and why agile planning works How to estimate feature size using story points and ideal days--and when to use each How and when to re-estimate How to prioritize features using both financial and nonfinancial approaches How to split large features into smaller, more manageable ones How to plan iterations and predict your team's initial rate of progress How to schedule projects that have unusually high uncertainty or schedule-related risk How to estimate projects that will be worked on by multiple teams Agile Estimating and Planning supports any agile, semiagile, or iterative process, including Scrum, XP, Feature-Driven Development, Crystal, Adaptive Software Development, DSDM, Unified Process, and many more. It will be an indispensable resource for every development manager, team leader, and team member.

Domino Guide To The Insects Of Britain And Western Europe


Michael Chinery - 2005
    The text summarises key identification points and characteristics.

Algorithm Design


Jon Kleinberg - 2005
    The book teaches a range of design and analysis techniques for problems that arise in computing applications. The text encourages an understanding of the algorithm design process and an appreciation of the role of algorithms in the broader field of computer science.

Higher-Order Perl: Transforming Programs with Programs


Mark Jason Dominus - 2005
    However, Perl incorporates many features that have their roots in other languages such as Lisp. These advanced features are not well understood and are rarely used by most Perl programmers, but they are very powerful. They can automate tasks in everyday programming that are difficult to solve in any other way. One of the most powerful of these techniques is writing functions that manufacture or modify other functions. For example, instead of writing ten similar functions, a programmer can write a general pattern or framework that can then create the functions as needed according to the pattern. For several years Mark Jason Dominus has worked to apply functional programming techniques to Perl. Now Mark brings these flexible programming methods that he has successfully taught in numerous tutorials and training sessions to a wider audience.• Introduces powerful programming methods—new to most Perl programmers—that were previously the domain of computer scientists• Gradually builds up confidence by describing techniques of progressive sophistication• Shows how to improve everyday programs and includes numerous engaging code examples to illustrate the methods

Cost-Based Oracle Fundamentals


Jonathan Lewis - 2005
    Both groups will become better troubleshooters. — Thomas Kyte, VP (Public Sector), Oracle Corporation The question, "Why isn't Oracle using my index?" must be one of the most popular (or perhaps unpopular) questions ever asked on the Oracle help forums. You've picked exactly the right columns, you've got them in the ideal order, you've computed statistics, you've checked for null columns--and the optimizer flatly refuses to use your index unless you hint it. What could possibly be going wrong? If you've suffered the frustration of watching the optimizer do something completely bizarre when the best execution plan is totally obvious, or spent hours or days trying to make the optimizer do what you want it to do, then this is the book you need. You'll come to know how the optimizer "thinks," understand why it makes mistakes, and recognize the data patterns that make it go awry. With this information at your fingertips, you will save an enormous amount of time on designing and trouble-shooting your SQL. The cost-based optimizer is simply a piece of code that contains a model of how Oracle databases work. By applying this model to the statistics about your data, the optimizer tries to efficiently convert your query into an executable plan. Unfortunately, the model can't be perfect, your statistics can't be perfect, and the resulting execution plan may be far from perfect. In Cost-Based Oracle Fundamentals, the first book in a series of three, Jonathan Lewis--one of the foremost authorities in this field--describes the most commonly used parts of the model, what the optimizer does with your statistics, and why things go wrong. With this information, you'll be in a position to fix entire problem areas, not just single SQL statements, by adjusting the model or creating more truthful statistics.

The Black Art of Video Game Console Design


David Perry - 2005
    This book assumes no prior knowledge of Electrical Engineering or Computer Architecture, but takes you on a breathtaking journey from atomic semiconductor theory to the design and construction of basic video game consoles that you can build and write your own games for! Included in the book is the entire design of numerous embedded game systems including the XGameStation systems and much more.The Black Art of Video Game Console Design with 800+ pages covers everything you need to know to design your own game console including:• Basic atomic physics and semiconductor theory primer.• Introduction to circuit analysis; current, voltage, and resistance.• Analog design using discrete components.• Digital electronics and Boolean algebra.• Physical hardware construction and prototyping techniques.• Combinational logic and advanced integrated circuit building blocks.• Finite state machine design.• Computer architecture and design.• Understanding and using microprocessors and microcontrollers.• Developing software for embedded systems.• Designing video (NTSC/VGA), audio, and input device systems.• Interfacing and communications.• The complete design and discussion of numerous game systems including the XGameStations!CD-ROM Contains• PCB and circuit simulation tools.• All necessary data sheets.• Demos and source code.• Complete designs to numerous embedded systems including the XGameStations.

Extrusion Detection: Security Monitoring for Internal Intrusions


Richard Bejtlich - 2005
    Hardening your network perimeter won't solve this problem. You must systematically protect client software and monitor the traffic it generates. Extrusion Detection is a comprehensive guide to preventing, detecting, and mitigating security breaches from the inside out. Top security consultant Richard Bejtlich offers clear, easy-to-understand explanations of today's client-based threats and effective, step-by-step solutions, demonstrated against real traffic and data. You will learn how to assess threats from internal clients, instrument networks to detect anomalies in outgoing traffic, architect networks to resist internal attacks, and respond effectively when attacks occur.Bejtlich's The Tao of Network Security Monitoring earned acclaim as the definitive guide to overcoming external threats. Now, in Extrusion Detection , he brings the same level of insight to defending against today's rapidly emerging internal threats. Whether you're an architect, analyst, engineer, administrator, or IT manager, you face a new generation of security risks. Get this book and protect yourself.Coverage includesArchitecting defensible networks with pervasive awareness: theory, techniques, and tools Defending against malicious sites, Internet Explorer exploitations, bots, Trojans, worms, and more Dissecting session and full-content data to reveal unauthorized activity Implementing effective Layer 3 network access control Responding to internal attacks, including step-by-step network forensics Assessing your network's current ability to resist internal attacks Setting reasonable corporate access policies Detailed case studies, including the discovery of internal and IRC-based bot nets Advanced extrusion detection: from data collection to host and vulnerability enumeration About the Web Site Get book updates and network security news at Richard Bejtlich's popular blog, taosecurity.blogspot.com, and his Web site, www.bejtlich.net.

Valkyrie: North American's Mach 3 Superbomber


Dennis R. Jenkins - 2005
    Combining research in military, NASA and industrial archives with over 500 photographs and illustrations, this is an in-depth history of the North American Aviation XB-70A Valkyrie - the largest Mach 3 aircraft ever flown.

Optimal Routing Design: Techniques for optimizing large-scale IP routing operation and managing network growth (Networking Technology)


Russ White - 2005
    Beginning with an overview of design fundamentals, this book discusses the tradeoffs between various competing points of network design, the concepts of hierarchical network design, redistribution, and addressing and summarization.

The Elements of Coordinate Geometry


Sidney Luxton Loney - 2005
    

Mpls-Enabled Applications: Emerging Developments and New Technologies


Ina Minei - 2005
    In "MPLS-Enabled Applications, Third Edition," the authors methodically show how MPLS holds the key to network convergence by allowing operators to offer more services over a single physical infrastructure. The Third Edition contains more than 170 illustrations, new chapters, and more coverage, guiding the reader from the basics of the technology, though all its major VPN applications."MPLS Enabled-Applications" contains up-to-date coverage of: The current status and future potential of all major MPLS applications, including L2VPN, L3VPN, pseudowires and VPLS.A new chapter with up to date coverage of the MPLS transport profile, MPLS-TP.MPLS in access networks and Seamless MPLS, the new architecture for extending MPLS into the access, discussed in depth for both the unicast and the multicast case.Extensive coverage of multicast support in L3VPNs (mVPNs), explaining and comparing both the PIM/GRE and the next generation BGP/MPLS solutions, and including a new chapter on advanced topics in next generation multicast VPNs.A new chapter on advanced protection techniques, including detailed discussion of 50 ms end-to-end service restoration.Comprehensive coverage of the base technology, as well as the latest IETF drafts, including topics such as pseudowire redundancy, VPLS multihoming, IRB and P2MP pseudowires."MPLS-Enabled Applications" will provide those involved in the design and deployment of MPLS systems, as well as those researching the area of MPLS networks, with a thoroughly modern view of how MPLS is transforming the networking world."Essential new material for those trying to understand the next steps in MPLS."--Adrian Farrel, IETF Routing Area Director""MPLS-Enabled Applications" takes a unique and creative approach in explaining MPLS concepts and how they are applied in practice to meet the needs of Enterprise and Service Provider networks. I consistently recommend this book to colleagues in the engineering, education and business community."--Dave Cooper, Chief IP Technologist, Global Crossing Ltd

Chinese Houses: The Architectural Heritage of a Nation


Ronald G. Knapp - 2005
     Chinese Houses focuses on 20 well-preserved traditional homes, presenting examples from a range of rural and metropolitan areas throughout China.The photographs of each are accompanied by extensive background information and historical content. An introductory essay examines the different types of Chinese homes and provides an overview of the rich regional variety of Chinese dwelling forms. It also provides insights into little-known design concepts that emphasize the flexibility, adaptability, and versatility of traditional building forms and the work of traditional craftsmen.Richly illustrated with photographs, woodblock prints, historic images, and line drawings, Chinese Houses portrays an architectural tradition of amazing range and resilience.

Information Security: Principles and Practice


Mark Stamp - 2005
    This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is organized around four major themes: * Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis * Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multilateral security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems * Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and GSM * Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems-ranging from basic to challenging-to help readers apply their newly developed skills. A solutions manual and a set of classroom-tested PowerPoint(r) slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues. An Instructor's Manual presenting detailed solutions to all the problems in the book is available from the Wiley editorial department. An Instructor Support FTP site is also available.

Guitar Finishing Step-by-Step


Dan Erlewine - 2005
    Create your own look or replicate valuable vintage finishes.Techniques for new waterbase finishes and traditional nitrocellulose lacquers. Includes stain mixing charts for precision color matching.

San Antonio Then and Now


Paula Allen - 2005
    Building on the national recognition it enjoyed as the host of the World Fair in 1968, San Antonio is a center for the medical and biotechnology industry, as well as many multi-national companies. Twenty-first century business development blends harmoniously with Spanish and Mexican influences, local authors provide authoritative, insider text, and the archival and contemporary format of this tour offers a lively journey through San Antonio's fascinating history.

Ospf and Is-Is: Choosing an Igp for Large-Scale Networks: Choosing an Igp for Large-Scale Networks


Jeff Doyle - 2005
    Well-known network designer Jeff Doyle draws on his consulting experience, offering realistic advice and straight answers on every aspect of working with link-state protocols - from scalability, reliability, and security to area design and database synchronization. This book is organized to help network engineers and architects compare OSPF and IS-IS. One feature at a time, Doyle first demonstrates how a topic or feature is implemented in OSPF, and then walks through a similar implementation using IS-IS. Professionals who are relatively new to large-scale networking will welcome his practical introduction to the concepts, goals, and history of link state protocols.

Linux Device Drivers


Jonathan Corbet - 2005
    And writing device drivers is one of the few areas of programming for the Linux operating system that calls for unique, Linux-specific knowledge. For years now, programmers have relied on the classic "Linux Device Drivers" from O'Reilly to master this critical subject. Now in its third edition, this bestselling guide provides all the information you'll need to write drivers for a wide range of devices.Over the years the book has helped countless programmers learn: how to support computer peripherals under the Linux operating system how to develop and write software for new hardware under Linux the basics of Linux operation even if they are not expecting to write a driver The new edition of "Linux Device Drivers" is better than ever. The book covers all the significant changes to Version 2.6 of the Linux kernel, which simplifies many activities, and contains subtle new features that can make a driver both more efficient and more flexible. Readers will find new chapters on important types of drivers not covered previously, such as consoles, USB drivers, and more.Best of all, you don't have to be a kernel hacker to understand and enjoy this book. All you need is an understanding of the C programming language and some background in Unix system calls. And for maximum ease-of-use, the book uses full-featured examples that you can compile and run without special hardware.Today Linux holds fast as the most rapidly growing segment of the computer market and continues to win over enthusiastic adherents in many application areas. With this increasing support, Linux is now absolutely mainstream, and viewed as a solid platform for embedded systems. If you're writing device drivers, you'll want this book. In fact, you'll wonder how drivers are ever written without it.

This Isn't Excel, It's Magic!


Bob Umlas - 2005
    This expanded and enlarged guide is written in a friendly, easy-to-understand style, and is full of screen shots and visuals to help you on your way.

Real Digital Forensics: Computer Security and Incident Response


Keith J. Jones - 2005
    The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and practice. From binary memory dumps to log files, this DVD's intrusion data was generated by attacking live systems using the same tools and methods real-world attackers use. The evidence was then captured and analyzed using the same tools the authors employ in their own investigations. This book relies heavily on open source tools, so you can perform virtually every task without investing in any commercial software. You'll investigate environments ranging from financial institutions to software companies and crimes ranging from intellectual property theft to SEC violations. As you move step by step through each investigation, you'll discover practical techniques for overcoming the challenges forensics professionals face most often.Inside, you will find in-depth information on the following areas: * Responding to live incidents in both Windows and Unix environments * Determining whether an attack has actually occurred * Assembling a toolkit you can take to the scene of a computer-related crime * Analyzing volatile data, nonvolatile data, and files of unknown origin * Safely performing and documenting forensic duplications * Collecting and analyzing network-based evidence in Windows and Unix environments * Reconstructing Web browsing, e-mail activity, and Windows Registry changes * Tracing domain name ownership and the source of e-mails * Duplicating and analyzing the contents of PDAs and flash memory devices The accompanying DVD contains several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to le

Shoujo Manga Techniques: Drawing Basics


Hirono Tubasa - 2005
    But they don't know where to begin. This charming book takes fans on a step-by-step journey, starting with developing ideas and creating characters, all the way through making scripts and blueprints, through pencil drafting, inking and erasing, and screen tone application.• An ideal companion to Shoujo Manga Techniques: Writing Stories (1-56970-970-X)

C# for Programmers (Deitel Developer Series)


Harvey Deitel - 2005
    The book is updated for Visual Studio® 2005 and C# 2.0, and presents C# concepts in the context of fully tested programs, complete with syntax shading, detailed line-by-line code descriptions, and program outputs. The book features 200+ C# applications with 16,000+ lines of proven C# code, as well as 300+ programming tips that will help you build robust applications.Start with a concise introduction to C# fundamentals using an early classes and objects approach, then rapidly move on to more advanced topics, including multithreading,Dr. Harvey M. Deitel and Paul J. Deitel are the founders of Deitel & Associates, Inc., the internationally recognized programming languages content-creation and corporate-training organization. Together with their colleagues at Deitel & Associates, Inc., they have written many international best-selling programming languages textbooks that millions of people worldwide have used to master C, C++, Java™, C#,The DEITEL® Developer Series is designed for practicing programmers. The series presents focused treatments of emerging technologies, including .NET, J2EE, Web services, and more.Pre-publication Reviewer Testimonials"Excellent coverage of developing ASP.NET 2.0 applications, with plenty of sample code. The chapter on exception handling is one of, if not the best such chapters I have seen in the 50+ .NET related books I've read and reviewed. The chapter on Networking is one of the best I have seen."—Peter Bromberg, Merrill Lynch, C# MVP"A comprehensive introduction to—Gavin Osborne, Saskatchewan Institute of Applied Science and Technology"A superb job of clearly integrating the theory of relational databases and SQL with ADO.NET!"—Harlan Brewer, University of Cincinnati"Excellent introduction to .NET collections."—José Antonio González Seco, Andalucia's Parlamient"A beautiful presentation of threads."—Pavel Tsekov, Caesar BSC"The ATM OOD/UML case study is excellent! The implementation of the design developed in the early chapters gives the reader a fantastic model of a real world problem. You hit a home run with this one!"—Catherine Wyman, Devry-PhoenixPractical, Example-Rich Coverage Of: C# 2.0, .NET 2.0, FCL ASP.NET 2.0, Web Forms and Controls Database, SQL, and ADO.NET 2.0 Networking and .NET Remoting Generics, Collections GUI/Windows® Forms OOP: Classes, Inheritance, and Polymorphism OOD/UML™ ATM Case Study Graphics and Multimedia Multithreading Exception Handling And more... VISIT WWW.DEITEL.COM Download code examples To receive updates on this book, subscribe to the free DEITEL® BUZZ ONLINE e-mail newsletter at www.deitel.com/newsletter/subscribe.html Read archived Issues of the DEITEL® BUZZ ONLINE Get corporate training information

CCNA Portable Command Guide


Scott D. Empson - 2005
    The 'CCNA Portable Command Guide' is a supplementary guide to assist network administrators in the proper use of the Cisco IOS and of the commands needed to pass the CCNA vendor exam.

Fundamentals of Radar Signal Processing


Mark A. Richards - 2005
    End-of-chapter problems reinforce the material covered. Developed over many years of academic and professional education, this authoritative resource is ideal for graduate students as well as practicing engineers.Fundamentals of Radar Signal Processing, Second Edition, covers:Introduction to radar systemsSignal modelsPulsed radar data acquisitionRadar waveformsDoppler processingDetection fundamentalsMeasurements and trackingIntroduction to synthetic aperture imagingIntroduction to beamforming and space-time adaptive processing

Mechanics of Composite Materials (Mechanical and Aerospace Engineering Series)


Autar K. Kaw - 2005
    Kaw introduced the first edition of Mechanics of Composite Materials, receiving high praise for its comprehensive scope and detailed examples. He also introduced the groundbreaking PROMAL software, a valuable tool for designing and analyzing structures made of composite materials. Updated and expanded to reflect recent advances in the field, this Second Edition retains all of the features -- logical, streamlined organization; thorough coverage; and self-contained treatment -- that made the first edition a bestseller. The book begins with a question-and-answer style introduction to composite materials, including fresh material on new applications. The remainder of the book discusses macromechanical analysis of both individual lamina and laminate materials; micromechanical analysis of lamina including elasticity based models; failure, analysis, and design of laminates; and symmetrical and nonsymmetrical beams (new chapter). New examples and derivations are included in the chapters on micromechanical and macromechanical analysis of lamina, and the design chapter contains two new examples: design of a pressure vessel and design of a drive shaft. The author also adds key terms and a summary to each chapter. The most current PROMAL software is available via the author's often-updated Web site, along with new multiple-choice questions. With superior tools and complete coverage, Mechanics of Composite Materials, Second Edition makes it easier than ever to integrate composite materials into your designs with confidence.

The Screenwriter's Manual: A Complete Reference of Format & Style


Ronald Mangravite - 2005
    With its step-by step approach, this text is appropriate for readers of all experience levels. KEY TOPICS: Basic format and style, the elements of a screenplay, advanced format and style, special format situations, and common screenplay mistakes. MARKET: Introductory screenwriting.

Definitive MPLS Network Designs


Jim Guichard - 2005
    Techniques are presented through a set of comprehensive design studies. Each design study is based on characteristics and objectives common to a given profile of network operators having deployed MPLS and discusses all the corresponding design aspects. The book starts with a technology refresher for each of the technologies involved in the design studies. Next, a series of design studies is presented, each based on a specific hypothetical network representative of service provider and enterprise networks running MPLS. Each design study chapter delivers four elements. They open with a description of the network environment, including the set of supported services, the network topology, the POP structure, the transmission facilities, the basic IP routing design, and possible constraints. Then the chapters present design objectives, such as optimizing bandwidth usage. Following these are details of all aspects of the network design, covering VPN, QoS, TE, network recovery, and-where applicable-multicast, IPv6, and pseudowire. The chapters conclude with a summary of the lessons that can be drawn from the design study so that all types of service providers and large enterprise MPLS architects can adapt aspects of the design solution to their unique network environment and objectives. Although network architects have many resources for seeking information on the concepts and protocols involved with MPLS, there is no single resource that illustrates how to design a network that optimizes their benefits for a specific operating environment. The variety of network environments and requirements makes it difficult to provide a one-size-fits-all design recommendation. Definitive MPLS Network Designs fills this void. "This book comes as a boon to professionals who want to understand the power of MPLS and make full use of it." -Parantap Lahiri, Manager, IP Network Infrastructure Engineering, MCI Includes a FREE 45-Day Online Edition This book is part of the Networking Technology Series from Cisco Press(R), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.

Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

Thermodynamics: Foundations and Applications


Elias P. Gyftopoulos - 2005
    More than 300 solved problems span a wide range of realistic energy systems and processes.

Mpls Configuration On Cisco Ios Software


Umesh Lakshman - 2005
    configuration examples for MPLS and its features streamline the deployment of MPLS services, and easily replicated lab scenarios can be used in actual production deployments. Coverage in this book includes new advanced MPLS features, such as VPLS MPLS is driving next-generation IP networks by offering reliable, cost-effective revenue generation through implementation of converged services. It is also gaining momentum in service provider and enterprise markets due to its capability to provide speed, classes of service, and high availability. Key to effective service deployment, however, is knowing how to configure MPLS. MPLS Configuration on Cisco IOS fills the market need for books that go beyond theory and show users how to work with Cisco IOS Software to implement MPLS. The book shows readers the configurations involved in deploying MPLS networks on a small scale through a series of self-study lab-based scenarios, providing a solid foundation of the technology and the nuances involved with its configuration. features in different real-world deployment scenarios. The book does not delve into the detailed, theoretical aspects of MPLS; rather, it provides readers with practical guidance on the configuration of MPLS on Cisco routers. Readers will learn configuration guidelines for MPLS implementations available in Cisco IOS. They'll learn to implement Virtual Private LAN Services (VPLS), and also Layer 2 VPNs with Cisco's AToM.

Sheet Metal Technology


David J. Gingery - 2005
    Subjects covered are safety in the shop, use of tools, layout and pattern development, various ways of forming and joining metal along with edging methods, corner systems and panel reinforcement. You will be introduced to the basic sheet metal shop where you will learn about various methods of forming sheet metal and in some instances even constructing your own tools including a rather unique and functional 24 leaf brake constructed of hardwood. The final chapter opens with a mass production operation set up to demonstrate the efficiency and economy of modern industrial technology. Then further projects are progressively introduced as skill is acquired. Such projects as a dustpan for the shop, a handy tool tote tray as well as plans for single and double hinge tool boxes. By this time you are an advanced student and ready to construct the unique portable charcoal grill and the impressive three drawer tool chest from the plans provided. Dave Gingery brings it all within your grasp and you will be amazed at what can be produced with tin snips, standard measuring tools and a 24 sheet metal brake.

Managing Complex Systems: Thinking Outside the Box


Howard Eisner - 2005
    Following the author's methodology, the reader will be better able to devise and implement nontraditional solutions to seemingly intractable complex problems. By challenging the reader to think in new and creative ways, the book offers a road map to success, whether measured in terms of competitive advantage, greater market share, improved productivity, or higher profits, all based upon better solutions to difficult problems. The first four chapters set the foundation for creative thinking by exploring the nature of large-scale systems and complexity, thinking inside and outside the box, and examples of how an inventive mind solves problems in both management and scientific domains. Subsequent chapters address nine focused methods that the author has formulated to help the reader think outside the box: * Broaden and generalize * Crossover * Question conventional wisdom * Back of the envelope * Expanding the dimensions * Obversity * Remove constraints * Thinking with pictures * Systems approach Real-life examples are provided for each method that demonstrate how the approach enhances problem solving and decision making in system development and management. Following the discussion of the nine methods, the author examines group decision making as well as additional creative thinking procedures devised by other researchers, including references that assist in exploring these methods in greater detail. The author ends with a wrap-up chapter that includes a test to help readers practice their tendencies toward creative thinking skills and action with respect to solving real-world problems. The nine methods discussed in this book have broad applicability and can be used successfully by managers with a wide range of responsibilities in business and technology. For anyone who is tired of the same old approach with the same old results, this book is essential reading.

Fundamentals of Engineering Supplied-Reference Handbook


National Council of Examiners for Engineering and Surveying - 2005
    Review this book prior to the exam to become familiar with the charts, formulas, tables, and other reference information it provides. Please note that your ordered copy will not be allowed in the exam room; another copy will be supplied at the exam site.

Macromedia Flash Professional 8 Beyond the Basics: Includes Exercise Files and Demo Movies


Shane Rebenschied - 2005
     Macromedia Flash 8 Beyond the Basics is all about stepping to that next level. This book expands your skill set and shows you how to integrate those skills with advanced ActionScript. Through a series of carefully developed, step-by-step exercises and demo movies, you'll learn how to build a professional, interactive Web site--using source files and designs supplied on the book's CD-ROM. Along the way, you'll learn about the new Flash 8 features: the improved text tool, new text rendering engine, new graphic filters, and more. 50+ Step-by-Step Tutorials: - Format dynamically loaded text using HTML, CSS, and nested images - Create an ActionScript-driven menu - Build a preloader with MovieClipLoader class - Add a progressively downloading, multi-track MP3 player - Create a video player that allows users to control playback - Build a slideshow that loads images and text dynamically - Utilize components to create a feedback form - Create a Flash plug-in detector

Pro C# 2005 and the .NET 2.0 Platform


Andrew Troelsen - 2005
    But he s also extended his coverage of crucial topics like object serialization, garbage collection, and the Common Intermediate Language. Troelsen ranges from .NET s philosophy to C# s gory details : its core constructs, object implementation, memory management, exceptions, interfaces, collections, delegates, advanced type construction, and plenty more. He dives especially deeply into assemblies; then turns to exploring .NET 2.0 s base class library, from the remoting layer to ADO.NET. The book wraps up with a full section on building robust web applications and XML web services. Experienced C# programmers will be hard-pressed to find a more useful, comprehensive resource. Bill Camarda, from the November 2005 href="http://www.barnesandnoble.com/newslet... Only

Reversing: Secrets of Reverse Engineering


Eldad Eilam - 2005
    The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into disassembly-code-level reverse engineering-and explaining how to decipher assembly language

CCNA Portable Command Guide


Scott Empson - 2005
    The New Edition of this Best-Selling Portable Command Guide is Completely Updated and includes Content, Tips, and Examples for all Topics Covered in the New Exams. To succeed as a Cisco network professional, you need to keep track of scores of commands, keywords, command arguments, options, and prompts -- and Cisco's new CCNA(R) exams test you on most of these. Getting familiar with all these commands is a daunting task. "CCNA Portable Command Guide, Third Edition" brings them all together in one condensed, portable, easy-to-use reference. Packed with valuable, easy-to-access information, it's portable enough to use whether you're in the server room or the equipment closet. Completely updated for Cisco's latest CCNA exams (ICND1 100-101, ICND2 200-101, and CCNA 200-120), it summarizes all CCNA certification-level Cisco IOS(R) Software commands, keywords, command arguments, and associated prompts. You'll find dozens of tips and examples for applying these commands in real-world networking scenarios. Configuration examples throughout the book provide you with a better understanding of how these commands are used in basic network designs. The topics covered are:TCP/IPv4An Introduction to Cisco DevicesConfiguring a RouterRoutingSwitchingLayer 3 RedundancyIPv6Network Administration and TroubleshootingFeatures of the Portable Command Guide:Access all CCNA commands-use as a quick, offline resource for research and solutionsLogical how-to topic groupings provide one-stop researchGreat for review before CCNA certification examsCompact size makes it easy to carry with you, wherever you go"Create Your Own Journal" section with blank, lined pages allows you to personalize the book for your needs"What Do You Want to Do?" chart inside back cover helps you to quickly reference specific tasksScott Empson is the Associate Chair of the Bachelor of Applied Information Systems Technology degree program at the Northern Alberta Institute of Technology in Edmonton, Alberta, Canada, where he teaches Cisco routing, switching, and network design courses. Scott is also the Program Coordinator of the Cisco Networking Academy Program at NAIT, a Regional Academy covering Central and Northern Alberta. He has earned three undergraduate degrees: a Bachelor of Arts, with a major in English; a Bachelor of Education, again with a major in English/Language Arts; and a Bachelor of Applied Information Systems Technology, with a major in Network Management. Scott also has a Masters of Education degree from the University of Portland. He holds several industry certifications, including CCNP, CCAI, Network+ and CEH. Scott is the series creator and one of the authors of the Portable Command Guide Series. Portable Command Guides are filled with valuable, easy-to-access information to quickly refresh your memory. Each guide is portable enough for use whether you're in the server room or the equipment closet. This book is part of the Cisco Press(R) Certification Self-Study Product Family, which offers readers a self-paced study routine for Cisco(R) certification exams. Titles in the Cisco Press Certification Self-Study Product Family are part of a recommended learning program from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press.

Epistemic Logic: A Survey Of the Logic Of Knowledge


Nicolas Rescher - 2005
    Its object is to articulate and clarify the general principles of reasoning about claims to and attributions of knowledge. This comprehensive survey of the topic offers the first systematic account of the subject as it has developed in the journal literature over recent decades.Rescher gives an overview of the discipline by setting out the general principles for reasoning about such matters as propositional knowledge and interrogative knowledge. Aimed at graduate students and specialists, Epistemic Logic elucidates both Rescher's pragmatic view of knowledge and the field in general.

Creating the New American Townhouse


Alexander Gorlin - 2005
    Architect Alexander Gorlin explores a spectacular array of diverse town house designs (often referred to by different terms in different parts of the country) that carry this familiar symbol of architectural innovation and refinement into the twenty-first century. Creating the New American Town House features cutting-edge town houses that each draw from architectural tradition while achieving originality by both breaking from and adhering to the limitations of the town house form. Within the typical five-story frame and two parallel walls presented here are ingenious and exquisite and, above all, extremely livable design solutions to the constraints of this classic housing type.Ranging from sites in New York, San Francisco, Seattle, Los Angeles, and Washington, DC, each of the buildings featured in Creating the New American Town House represents an eloquent contribution to the form and is designed by such celebrated architects as Steven Ehrlich, Hugh Newell Jacobson, Stanley Saitowitz, and 1100 Architect. Each project is extensively illustrated with full-color photography that showcases the interior design as well as plans and drawings. Alexander Gorlin’s insightful text continues the discourse begun in his The New American Town House, surveying the adaptation of this beloved urban dwelling to the demands of a new century.

How to Build a Cheap Sports Car


Keith Tanner - 2005
    This book provides specific answers to common questions and covers the entire building process, including the post-build fine-tuning of the car that is necessary to extract the car's full performance (and fun) potential.

Knoppix Pocket Reference: Troubleshoot, Repair, and Disinfect Both Linux and Windows


Kyle Rankin - 2005
    It includes Linux software and desktop environments, automatic hardware detection and hundreds of other quality open source programs.Whether you're a system administrator or power user, you can use Knoppix for many different purposes. Knoppix boots and runs completely from a single CD so you don't need to install anything to your hard drive. Due to on-the-fly decompression, the CD can have up to 2 GB of executable software installed on it.What you do need, however, is a comprehensive reference guide so you can benefit from all that Knoppix has to offer. The Knoppix Pocket Reference from O'Reilly fits the bill. This handy book shows you how to use Knoppix to troubleshoot and repair your computer, how to customize the Knoppix CD, running RAM memory checks, recovering data from a damaged hard drive, cloning hard drives, using Knoppix as a Terminal Server, using Knoppix as a kiosk OS, scanning for viruses on a Windows system, editing the Registry of a Windows system, and much more.If you want more information than the average Knoppix user, Knoppix Pocket Reference is an absolutely essential addition to your personal library.

Software Systems Architecture: Working with Stakeholders Using Viewpoints and Perspectives


Nick Rozanski - 2005
    This practical, practitioner-oriented guide explains how to design successful architectures for information systems and to see these through to their successful implementation.

SRP: The Single Responsibility Principle


Robert C. Martin - 2005
    THERE SHOULD NEVER BE MORE THAN ONE REASON FOR A CLASS TO CHANGE.

Amphibians of the Pacific Northwest


Lawrence L.C. Jones - 2005
    

Thinking Recursively with Java


Eric S. Roberts - 2005
    published Thinking Recursively by Eric Roberts. Since its publication in 1986, Thinking Recursively has become a classic in a field in which books quickly become obsolete. By focusing on effective problem-solving strategies that enable students to think recursively, this text has helped many students over the conceptual hurdle that recursion so often represents. Moreover, by including many more examples and exercises than typical, Thinking Recursivelymakes it possible for students to master recursive techniques. To celebrate the 20th anniversary of its initial publication, John Wiley and Sons is publishing Thinking Recursively with Java, making the book even more relevant to today's students. Course Hierarchy: May fit a variety of Java programming courses as a supplement at the introductory or intermediate levels or serve as a core text in intermediate or advanced level programming courses.

Bioelectrical Signal Processing in Cardiac and Neurological Applications


Leif Sornmo - 2005
    This book takes a unique problem-driven approach to biomedical signal processing by considering a wide range of problems in cardiac and neurological applications-the two heavyweight areas of biomedical signal processing. The interdisciplinary nature of the topic is reflected in how the text interweaves physiological issues with related methodological considerations. Bioelectrical Signal Processing is suitable for a final year undergraduate or graduate course as well as for use as an authoritative reference for practicing engineers, physicians, and researchers.

Data Strategy


Sid Adelman - 2005
    This is the key to keeping cost and maintenance down. The book uses case studies and best practices to give the reader the tools they need to create the best strategy for the organization.

Introduction to Fiber Optics


John Crisp - 2005
    It meets the needs of systems designers, installation engineers, electronic engineers and anyone else looking to gain a working knowledge of fiber optics with a minimum of maths. Review questions are included in the text to enable the reader to check their understanding as they work through the book.The new edition of this successful book is now fully up to date with the new standards, latest technological developments and includes a new chapter on specifying optical components.Whether you are looking for a complete self-study course in fiber optics, a concise reference text to dip into, or a readable introduction to this fast moving technology, this book has the solution.

Joint Cognitive Systems: Foundations of Cognitive Systems Engineering


Erik Hollnagel - 2005
    Automobiles, telephones, computers, manufacturing machines, robots, office equipment, machines large and small; all affect the very essence of our daily lives. However, this interaction has not always been efficient or easy and has at times turned fairly hazardous. Cognitive Systems Engineering (CSE) seeks to improve this situation by the careful study of human/machine interaction as the meaningful behavior of a unified system.Written by pioneers in the development of CSE, Joint Cognitive Systems: Foundations of Cognitive Systems Engineering offers a principled approach to studying human work with complex technology. The authors use a top-down, functional approach and emphasize a proactive (coping) perspective on work that overcomes the limitations of the structural human information processing view. They describe a conceptual framework for analysis with concrete theories and methods for joint system modeling that can be applied across the spectrum of single human/machine systems, social/technical systems, and whole organizations. The book explores both current and potential applications of CSE illustrated by examples.Understanding the complexities and functions of the human/machine interaction is critical to designing safe, highly functional, and efficient technological systems. This is a critical reference for students, designers, and engineers in a wide variety of disciplines.

Catia V5 R17 For Designers


Sham Tickoo - 2005
    The textbook covers all-important workbenches of CATIA V5R17 with a thorough explanation of all commands, options, and their applications to create real-world products. About 55 mechanical engineering industry examples are used as tutorials and an additional 35 as exercises to ensure that the user can relate their knowledge and understand the design techniques used in the industry to design a product. After reading the textbook, the user will be able to create solid parts, assemblies, drawing views with bill of materials, surface models, and Sheet metal components. Also, the user will learn the editing techniques that are essential to make a successful design. In this book, the author emphasizes on the solid modeling techniques that improve the productivity and efficiency of the user. Salient Features of the Textbook Consists of 15 chapters that are organized in a pedagogical sequence. These chapters cover the Sketching, Modeling, Assembly, Drafting, Wireframe and Surface Design, and Generative Sheetmetal workbenches of CATIA V5R17. The first page of every chapter summarizes the topics that will be covered in it. Additional information is provided throughout the book in the form of tips and notes. Self-evaluation test and review questions are provided at the end of each chapter so that the users can assess their knowledge.Free Teaching and Learning Resources Online technical support by contacting techsupport@cadcim.com. All programs used in exercises and examples. Customizable PowerPoint presentations of all chapters in the textbook li>Instructor s Guide with solutions to all review questions and exercises in the textbook. Student projects to enhance the skills Class tests that can be used by faculty in the class To access these free teaching resources, please send your contact information to sales@cadcim.com, mentioning clearly your name, designation, university/college, street street address, city, state, zip, and country.

Us Spacesuits


Kenneth S. Thomas - 2005
    The text will explain how the routine use of clothing provides a link to the function of spacesuits and why spacesuits are far more than garments. They are a last refuge for survival in disaster or a personalized spacecraft that allows direct contact and interaction with everything beyond our world. Successfully meeting the challenges to creating safe, reliable and comfortable spacesuits is an ongoing effort that has spanned over four decades. The book will detail the technical evolution of U.S. spacesuits from their roots in high altitude aviation and vacuum tube development to the present day, with an additional look into the future. This primary source of spacesuit information will explain the function, historical development, and use of spacesuits from a worldwide perspective in a readable way. The story includes many technically and historically interesting efforts that never reached flight, and were either misunderstood or not widely reported.

How to Market Your School: A Guide to Marketing, Communication, and Public Relations for School Administrators


Johanna M. Lockhart - 2005
    However, even school and district administrators who recognize the importance of marketing often feel unprepared to initiate and maintain a strategic marketing effort. How to Market Your School is a comprehensive guide that provides school administrators with tools to help them create, implement, and maintain a successful marketing program. Topics covered include developing a marketing strategy, marketing research, communications, media relations, building beneficial partnerships, public relations, and fund raising. Although written for public school administrators, the book is equally applicable to private and charter schools.

Occupancy Estimation and Modeling: Inferring Patterns and Dynamics of Species Occurrence


Darryl I. MacKenzie - 2005
    Using four classes of models (single-species, single-season; single-species, multiple season; multiple-species, single-season; and multiple-species, multiple-season), the authors discuss the practical sampling situation, present a likelihood-based model enabling direct estimation of the occupancy-related parameters while allowing for imperfect detectability, and make recommendations for designing studies using these models.

Oracle PL/SQL for DBAs


Arup Nanda - 2005
    Although primarily a tool for developers, PL/SQL has also become an essential tool for database administration, as DBAs take increasing responsibility for site performance and as the lines between developers and DBAs blur.Until now, there has not been a book focused squarely on the language topics of special concern to DBAs Oracle PL/SQL for DBAs fills the gap. Covering the latest Oracle version, Oracle Database 10g Release 2 and packed with code and usage examples, it contains:A quick tour of the PL/SQL language, providing enough basic information about language fundamentals to get DBAs up and running Extensive coverage of security topics for DBAs: Encryption (including both traditional methods and Oracle's new Transparent Data Encryption, TDE); Row-Level Security (RLS), Fine-Grained Auditing (FGA); and random value generation Methods for DBAs to improve query and database performance with cursors and table functions Coverage of Oracle scheduling, which allows jobs such as database monitoring and statistics gathering to be scheduled for regular executionUsing Oracle's built-in packages (DBMS_CRYPTO, DBMS_RLS, DBMS_FGA, DBMS_RANDOM, DBMS_SCHEDULING) as a base, the book describes ways of building on top of these packages to suit particular organizational needs. Authors are Arup Nanda, Oracle Magazine 2003 DBA of the Year, and Steven Feuerstein, the world's foremost PL/SQL expert and coauthor of the classic reference, Oracle PL/SQL Programming.DBAs who have not yet discovered how helpful PL/SQL can be will find this book a superb introduction to the language and its special database administration features. Even if you have used PL/SQL for years, you'll find the detailed coverage in this book to be an invaluable resource.

Business Plan Pro, Entrepreneurship: Starting and Operating a Small Business


Software Palo Alto - 2005
    Business Plan Pro - Academic Edition [Value-Pack ONLY] The Pearson Academic Edition of the award-winning and best-selling Business Plan Pro is available as an add-on to any Pearson/Prentice Hall textbook. The software includes step-by-step instructions for writing a comprehensive business plan. The Pearson Academic Edition contains 60 of the retail product's 500+ sample business plans, and all pages of the plans it produces print with an Academic Edition watermark. Business Plan Pro Pearson Academic Edition works with computers running Windows.

Handbook of Stress and the Brain Part 1: The Neurobiology of Stress: The Neurobiology of Stress


T. Steckler - 2005
    Written for a broad scientific audience, the Handbook comprehensively reviews key principles and facts to provide a clear overview of the interdisciplinary field of stress. The work aims to bring together the disciplines of neurobiology, physiology, immunology, psychology and psychiatry, to provide a reference source for both the non-clinical and clinical expert, as well as serving as an introductory text for novices in this field of scientific inquiry. Part 1 addresses basic aspects of the neurobiology of the stress response including the involvement of neuropeptide, neuroendocrine and neurotransmitter systems and its corollaries regarding gene expression and behavioural processes such as cognition, motivation and emotionality. * Provides an overview of recent advances made in stress research* Includes timely discussion of stress and its effect on the immune system* Presents novel treatment strategies targeting brain processes involved in stress processing and coping mechanisms

Alvar Aalto Houses


Markku Lahti - 2005
    Markku Lahti, director of the Alvar Aalto Foundation, describes the fascinating history of the selected houses, the people for whom they were built, and how Aalto adapted his own design ideals to the needs of his clients.

Dynamical Systems: Examples of Complex Behaviour


Jürgen Jost - 2005
    Breadth of scope is uniqueAuthor is a widely-known and successful textbook authorUnlike many recent textbooks on chaotic systems that have superficial treatment, this book provides explanations of the deep underlying mathematical ideasNo technical proofs, but an introduction to the whole field that is based on the specific analysis of carefully selected examplesIncludes a section on cellular automata

Microsoft Solutions Framework (Msf): A Pocket Guide


Marlys Keeton - 2005
    IT managers will learn the most common causes of IT project failure and will receive guidance on how to organize teams, manage risk, and develop and deploy business-driven IT solutions.

Mpls and Next-Generation Networks: Foundations for Ngn and Enterprise Virtualization


Monique Morrow - 2005
    This book provides them with a precise guide for evaluating the benefits of MPLS-based applications and solutions. The book guides the network manager through the business case for MPLS by exploring other technology alternatives, including their applications, benefits, and deficiencies. Understanding the service creation process as the basis for MPLS-based solutions is pivotal when describing the benefits that MPLS offers. Furthermore, the book explores MPLS technology and its components, providing an overview of the architecture necessary to reap the true advantages that MPLS brings to a service provider or enterprise network. These advantages include new revenue opportunities and a total cost of ownership reduction that positively impacts a company's bottom-line. ROI models and case study examples further confirm the business impact and help decision-makers create a blueprint for MPLS service creation. Specific aspects such as security, network management, advanced services and the future of the technology complete the book, helping decision makers assess MPLS as a candidate for implementation. In short, you can use this comprehensive guide to understand and build a business case for the inclusion of MPLS in your network.

Nanotechnology: Science, Innovation, and Opportunity


Lynn E. Foster - 2005
    In Nanotechnology: Science, Innovation, and Opportunity, the field's leading experts offer an up-to-the-minute briefing on where the industry stands now, how it will unfold over the coming decade, and how it will impact you. Edited by the director of the U.S. government's first Nanotechnology Commercialization Conference, this book covers the latest in nanotech science, technology, and applications. You'll meet the key players, and discover nanotech at work in fields ranging from drug delivery to energy efficiency. Here are the opportunities, the challenges, the implications: all you need to know about today's nanotech business - and tomorrow's. The coverage includes: how the convergence of nanoscale science foreshadows revolutionary societal change; technical and business obstacles that still challenge the industry; lessons from the early gold rush days of biotech - managing the hype; nanotech as disruptive innovation - implications for investors and venture capitalists; the evolving roles of entrepreneurs, universities, and the U.S. gove

All of Nonparametric Statistics


Larry Wasserman - 2005
    The book is aimed at Masters or PhD level students in statistics, computer science, and engineering. It is also suitable for researchers who want to get up to speed quickly on modern nonparametric methods. It covers a wide range of topics including the bootstrap, the nonparametric delta method, nonparametric regression, density estimation, orthogonal function methods, minimax estimation, nonparametric confidence sets, and wavelets. The book's dual approach includes a mixture of methodology and theory.

Mining Imperfect Data: Dealing with Contamination and Incomplete Records


Ronald K. Pearson - 2005
    Specific strategies for data pretreatment and analytical validation that are broadly applicable are described, making them useful in conjunction with most data mining analysis methods. Examples illustrate the performance of the pretreatment and validation methods in a variety of situations. The book, which deals with a wider range of data anomalies than are usually treated, includes a discussion of detecting anomalies through generalized sensitivity analysis (GSA), a process of identifying inconsistencies using systematic and extensive comparisons of results obtained by analysis of exchangeable datasets or subsets. Real data is made extensive use of, both in the form of a detailed analysis of a few real datasets and various published examples. A succinct introduction to functional equations illustrates their utility in describing various forms of qualitative behavior for useful data characterizations.

Understanding Linux Network Internals


Christian Benvenuti - 2005
    Although some background in the TCP/IP protocols is helpful, you can learn a great deal from this text about the protocols themselves and their uses. And if you already have a base knowledge of C, you can use the book's code walkthroughs to figure out exactly what this sophisticated part of the Linux kernel is doing.Part of the difficulty in understanding networks -- and implementing them -- is that the tasks are broken up and performed at many different times by different pieces of code. One of the strengths of this book is to integrate the pieces and reveal the relationships between far-flung functions and data structures. Understanding Linux Network Internals is both a big-picture discussion and a no-nonsense guide to the details of Linux networking. Topics include:Key problems with networkingNetwork interface card (NIC) device driversSystem initializationLayer 2 (link-layer) tasks and implementationLayer 3 (IPv4) tasks and implementationNeighbor infrastructure and protocols (ARP)BridgingRoutingICMPAuthor Christian Benvenuti, an operating system designer specializing in networking, explains much more than how Linux code works. He shows the purposes of major networking features and the trade-offs involved in choosing one solution over another. A large number of flowcharts and other diagrams enhance the book's understandability.

How to Do Everything with Dreamweaver


Michael Meadhra - 2005
    Readers will learn to use all the components, including the visual layout tools, application development features, and code editing capabilities. The clearly defined chapters work equally well for readers who prefer to learn sequentially in a tutorial fashion, or for those who need a quick reference to a specific task or feature.

Rss and Atom: Understanding and Implementing Content Feeds and Syndication


Heinz Wittenbrink - 2005
    The feed formats and vocabularies are covered in depth, and the book does require some familiarity with XML, but no scripting or development expertise is necessary. The book starts by analyzing the need to distribute content that RSS emerged to meet. It outlines in development of the various formats as way of understanding how the technology map of today came about. The current status of the leading formats is summarized succinctly. Then RSS is examined in detail. The XML vocabulary and document structure is examined and explained clearly. Each element is illustrated with carefully chosen examples. The changes through RSS 0.9x to 2.0 are covered in depth as are extensions and modules such as BitTorrent, EasyNews and others. The book then goes on to examine the richness and complexity of RSS 1.0 and 1.1, again covering both how design decisions were made, then covering the XML structure in depth. The same in depth treatment is then given to Atom, comparing and contrasting the formats where appropriate.

Microsoft® Windows® XP Professional Resource Kit


The Microsoft Windows Team - 2005
    This official RESOURCE KIT has been fully updated and revised—with coverage of Windows XP Service Pack 2, featuring Advanced Security Technologies, along with new chapters on managing software updates, the Windows Firewall, and wireless networking. You’ll also find 120+ timesaving administrative tools and scripts—plus additional content and eBooks—on the CD. It’s everything you need to help maximize the performance and reliability of your business desktops—and help reduce ownership and support costs.Get in-depth guidance on how to:Plan, customize, and troubleshoot your deployment Use Group Policy and IntelliMirror technologies to manage users and network resources Administer disks, file systems, devices, print services, and digital media Manage authentication, authorization, access control, and EFS Configure TCP/IP, IP addressing, name resolution, and remote networking services NEW—Configure wireless networking protocols and standards; apply best practices for support NEW—Implement the boot-time security feature and other Windows Firewall enhancements NEW—Design and deploy a software update management strategy Apply expert strategies to diagnose and resolve system problems faster CD inside Resource Kit tools and eBooks inside!CD features:120+ tools and utilities for administering Windows-based clients and servers Microsoft Windows Server 2003 Automating and Customizing Installations eBook Microsoft Encyclopedia of Networking, Second Edition eBook Microsoft Encyclopedia of Security eBook Fully searchable eBook of the complete RESOURCE KIT A Note Regarding the CD or DVDThe print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Aspect-Oriented Analysis and Design: The Theme Approach


Siobhàn Clarke - 2005
    This book is useful for the developers who are using aspect-oriented programming.