Best of
Technical

2007

Clean Code: A Handbook of Agile Software Craftsmanship


Robert C. Martin - 2007
    But if code isn't clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code. But it doesn't have to be that way. Noted software expert Robert C. Martin presents a revolutionary paradigm with Clean Code: A Handbook of Agile Software Craftsmanship . Martin has teamed up with his colleagues from Object Mentor to distill their best agile practice of cleaning code on the fly into a book that will instill within you the values of a software craftsman and make you a better programmer but only if you work at it. What kind of work will you be doing? You'll be reading code - lots of code. And you will be challenged to think about what's right about that code, and what's wrong with it. More importantly, you will be challenged to reassess your professional values and your commitment to your craft. Clean Code is divided into three parts. The first describes the principles, patterns, and practices of writing clean code. The second part consists of several case studies of increasing complexity. Each case study is an exercise in cleaning up code - of transforming a code base that has some problems into one that is sound and efficient. The third part is the payoff: a single chapter containing a list of heuristics and "smells" gathered while creating the case studies. The result is a knowledge base that describes the way we think when we write, read, and clean code. Readers will come away from this book understanding ‣ How to tell the difference between good and bad code‣ How to write good code and how to transform bad code into good code‣ How to create good names, good functions, good objects, and good classes‣ How to format code for maximum readability ‣ How to implement complete error handling without obscuring code logic ‣ How to unit test and practice test-driven development This book is a must for any developer, software engineer, project manager, team lead, or systems analyst with an interest in producing better code.

Release It!: Design and Deploy Production-Ready Software (Pragmatic Programmers)


Michael T. Nygard - 2007
    Did you design your system to survivef a sudden rush of visitors from Digg or Slashdot? Or an influx of real world customers from 100 different countries? Are you ready for a world filled with flakey networks, tangled databases, and impatient users?If you're a developer and don't want to be on call for 3AM for the rest of your life, this book will help.In Release It!, Michael T. Nygard shows you how to design and architect your application for the harsh realities it will face. You'll learn how to design your application for maximum uptime, performance, and return on investment.Mike explains that many problems with systems today start with the design.

A Student's Guide to Maxwell's Equations


Daniel Fleisch - 2007
    In this guide for students, each equation is the subject of an entire chapter, with detailed, plain-language explanations of the physical meaning of each symbol in the equation, for both the integral and differential forms. The final chapter shows how Maxwell's equations may be combined to produce the wave equation, the basis for the electromagnetic theory of light. This book is a wonderful resource for undergraduate and graduate courses in electromagnetism and electromagnetics. A website hosted by the author at www.cambridge.org/9780521701471 contains interactive solutions to every problem in the text as well as audio podcasts to walk students through each chapter.

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard - 2007
    The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.

Network Warrior


Gary A. Donahue - 2007
    What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren 't on the exam, but they 're exactly what you need to do your job well.Network Warrior takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you 'll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author 's own experience as well as those he worked for and with, Network Warrior is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks -- the realm that Cisco Systems now dominates. The book covers: The type of networks now in use, from LANs, WANs and MANs to CANsThe OSI Model and the layers involved in sending data Hubs, repeaters, switches, and trunks in practice Auto negotiation and why it 's a common problem in network slowdowns Route maps, routing protocols, and switching algorithms in Cisco routers The resilient Ethernet -- how to make things truly redundant Cisco 6500 multi-layer switches and the Catalyst 3750 switch Telecom nomenclature -- why it 's different from the data world T1 and DS3 Firewall theory, designing access lists, authentication in Cisco devices Server load balancing technology Content switch module in action Designing QOS and what QOS does not do IP design and subnetting made easy The book also explains how to sell your ideas to management, how networks become a mess as a company grows, and why change control is your friend. Network Warrior will help network administrators and engineers win the complex battles they face every day.

Digital Design and Computer Architecture


David Money Harris - 2007
    Digital Design and Computer Architecture begins with a modern approach by rigorously covering the fundamentals of digital logic design and then introducing Hardware Description Languages (HDLs). Featuring examples of the two most widely-used HDLs, VHDL and Verilog, the first half of the text prepares the reader for what follows in the second: the design of a MIPS Processor. By the end of Digital Design and Computer Architecture, readers will be able to build their own microprocessor and will have a top-to-bottom understanding of how it works--even if they have no formal background in design or architecture beyond an introductory class. David Harris and Sarah Harris combine an engaging and humorous writing style with an updated and hands-on approach to digital design.Unique presentation of digital logic design from the perspective of computer architecture using a real instruction set, MIPS.Side-by-side examples of the two most prominent Hardware Design Languages--VHDL and Verilog--illustrate and compare the ways the each can be used in the design of digital systems.Worked examples conclude each section to enhance the reader's understanding and retention of the material.

Absolute Freebsd: The Complete Guide to Freebsd


Michael W. Lucas - 2007
    But it can be even trickier to use than either Unix or Linux, and harder still to master.Absolute FreeBSD, 2nd Edition is your complete guide to FreeBSD, written by FreeBSD committer Michael W. Lucas. Lucas considers this completely revised and rewritten second edition of his landmark work to be his best work ever; a true product of his love for FreeBSD and the support of the FreeBSD community. Absolute FreeBSD, 2nd Edition covers installation, networking, security, network services, system performance, kernel tweaking, filesystems, SMP, upgrading, crash debugging, and much more, including coverage of how to:Use advanced security features like packet filtering, virtual machines, and host-based intrusion detection Build custom live FreeBSD CDs and bootable flash Manage network services and filesystems Use DNS and set up email, IMAP, web, and FTP services for both servers and clients Monitor your system with performance-testing and troubleshooting tools Run diskless systems Manage schedulers, remap shared libraries, and optimize your system for your hardware and your workload Build custom network appliances with embedded FreeBSD Implement redundant disks, even without special hardware Integrate FreeBSD-specific SNMP into your network management system. Whether you're just getting started with FreeBSD or you've been using it for years, you'll find this book to be the definitive guide to FreeBSD that you've been waiting for.

Linux System Programming: Talking Directly to the Kernel and C Library


Robert Love - 2007
    With this comprehensive book, Linux kernel contributor Robert Love provides you with a tutorial on Linux system programming, a reference manual on Linux system calls, and an insider’s guide to writing smarter, faster code.Love clearly distinguishes between POSIX standard functions and special services offered only by Linux. With a new chapter on multithreading, this updated and expanded edition provides an in-depth look at Linux from both a theoretical and applied perspective over a wide range of programming topics, including:A Linux kernel, C library, and C compiler overviewBasic I/O operations, such as reading from and writing to filesAdvanced I/O interfaces, memory mappings, and optimization techniquesThe family of system calls for basic process managementAdvanced process management, including real-time processesThread concepts, multithreaded programming, and PthreadsFile and directory managementInterfaces for allocating memory and optimizing memory accessBasic and advanced signal interfaces, and their role on the systemClock management, including POSIX clocks and high-resolution timers

Windows via C/C++ (PRO-Developer) (Pro - Developer)


Jeffrey Richter - 2007
    Programming Applications for Microsoft Windows is a classic book (formerly titled Advanced Windows, Third Edition) and is now fully updated for Windows Vista, including the latest information about Windows XP. In-depth and comprehensive, this essential reference covers the Windows operating system and how to program at the API level. Recognized experts provide an inside view of how Windows works and how to use its features in Visual C++ development tasks. Topics covered include processes, thread pooling, virtual memory, DLLs, file I/O, and message crackers. For systems-level programmers, this is a must-have title. Includes code samples in Visual C++.

Design Patterns in Ruby


Russ Olsen - 2007
    Russ Olsen has done a great job of selecting classic patterns and augmenting these with newer patterns that have special relevance for Ruby. He clearly explains each idea, making a wealth of experience available to Ruby developers for their own daily work."--Steve Metsker, Managing Consultant with Dominion Digital, Inc."This book provides a great demonstration of the key 'Gang of Four' design patterns without resorting to overly technical explanations. Written in a precise, yet almost informal style, this book covers enough ground that even those without prior exposure to design patterns will soon feel confident applying them using Ruby. Olsen has done a great job to make a book about a classically 'dry' subject into such an engaging and even occasionally humorous read."--Peter Cooper"This book renewed my interest in understanding patterns after a decade of good intentions. Russ picked the most useful patterns for Ruby and introduced them in a straightforward and logical manner, going beyond the GoF's patterns. This book has improved my use of Ruby, and encouraged me to blow off the dust covering the GoF book."--Mike Stok" Design Patterns in Ruby is a great way for programmers from statically typed objectoriented languages to learn how design patterns appear in a more dynamic, flexible language like Ruby."--Rob Sanheim, Ruby Ninja, RelevanceMost design pattern books are based on C++ and Java. But Ruby is different--and the language's unique qualities make design patterns easier to implement and use. In this book, Russ Olsen demonstrates how to combine Ruby's power and elegance with patterns, and write more sophisticated, effective software with far fewer lines of code.After reviewing the history, concepts, and goals of design patterns, Olsen offers a quick tour of the Ruby language--enough to allow any experienced software developer to immediately utilize patterns with Ruby. The book especially calls attention to Ruby features that simplify the use of patterns, including dynamic typing, code closures, and "mixins" for easier code reuse.Fourteen of the classic "Gang of Four" patterns are considered from the Ruby point of view, explaining what problems each pattern solves, discussing whether traditional implementations make sense in the Ruby environment, and introducing Ruby-specific improvements. You'll discover opportunities to implement patterns in just one or two lines of code, instead of the endlessly repeated boilerplate that conventional languages often require. Design Patterns in Ruby also identifies innovative new patterns that have emerged from the Ruby community. These include ways to create custom objects with metaprogramming, as well as the ambitious Rails-based "Convention Over Configuration" pattern, designed to help integrate entire applications and frameworks.Engaging, practical, and accessible, Design Patterns in Ruby will help you build better software while making your Ruby programming experience more rewarding.

High Performance Web Sites


Steve Souders - 2007
    Author Steve Souders, in his job as Chief Performance Yahoo!, collected these best practices while optimizing some of the most-visited pages on the Web. Even sites that had already been highly optimized, such as Yahoo! Search and the Yahoo! Front Page, were able to benefit from these surprisingly simple performance guidelines.The rules in High Performance Web Sites explain how you can optimize the performance of the Ajax, CSS, JavaScript, Flash, and images that you've already built into your site -- adjustments that are critical for any rich web application. Other sources of information pay a lot of attention to tuning web servers, databases, and hardware, but the bulk of display time is taken up on the browser side and by the communication between server and browser. High Performance Web Sites covers every aspect of that process.Each performance rule is supported by specific examples, and code snippets are available on the book's companion web site. The rules include how to: Make Fewer HTTP RequestsUse a Content Delivery NetworkAdd an Expires HeaderGzip ComponentsPut Stylesheets at the TopPut Scripts at the BottomAvoid CSS ExpressionsMake JavaScript and CSS ExternalReduce DNS LookupsMinify JavaScriptAvoid RedirectsRemove Duplicates ScriptsConfigure ETagsMake Ajax CacheableIf you're building pages for high traffic destinations and want to optimize the experience of users visiting your site, this book is indispensable.If everyone would implement just 20% of Steve's guidelines, the Web would be adramatically better place. Between this book and Steve's YSlow extension, there's reallyno excuse for having a sluggish web site anymore.-Joe Hewitt, Developer of Firebug debugger and Mozilla's DOM InspectorSteve Souders has done a fantastic job of distilling a massive, semi-arcane art down to a set of concise, actionable, pragmatic engineering steps that will change the world of web performance.-Eric Lawrence, Developer of the Fiddler Web Debugger, Microsoft Corporation

The Origins of Genome Architecture


Michael Lynch - 2007
    Such readily accessible data have encouraged the proliferation of adaptive arguments for the evolution of gene and genomicfeatures, often with little or no attention being given to simpler and more powerful alternative explanations. By integrating the central observations from molecular biology and population genetics relevant to comparative genomics, Lynch shows why the details matter.Presented in a nontechnical fashion, at both the population-genetic and molecular-genetic levels, this book offers a unifying explanatory framework for how the peculiar architectural diversity of eukaryotic genomes and genes came to arise. Under Lynch's hypothesis, the genome-wide repatterning ofeukaryotic gene structure, which resulted primarily from nonadaptive processes, provided an entirely novel resource from which natural selection could secondarily build new forms of organismal complexity.

Calculus for the Practical Man


J.E. Thompson - 2007
    E. THOMPSON. Originally published in 1931. PREFACE: THIS book on simplified calculus is one of a series designed by the author and publisher for the reader with an interest in the meaning and simpler technique of mathematical science, and for those who wish to obtain a practical mastery of some of the more usual and directly useful branches of the science without the aid of a teacher. Like the other books in the series it is the outgrowth of the author's experience with students such as those mentioned and the demand experienced by the publisher for books which may be read as well as studied. One of the outstanding features of the book is the use of the method of rates instead of the method of limits. To the conven tional teacher of mathematics, whose students work for a college degree and look toward the modern theory of functions, the author hastens to say that for their purposes the limit method is the only method which can profitably be used. To the readers contem plated in the preparation of this book, however, the notion of a limit and any method of calculation based upon it always seem artificial and not hi any way connected with the familiar ideas of numbers, algebraic symbolism or natural phenomena. On the other hand, the method of rates seems a direct application of the principle which such a reader has often heard mentioned as the extension of arithmetic and algebra with which he must become acquainted before he can perform calculations which involve changing quantities. The familiarity of examples of changing quantities in every-day life also makes it a simple matter to in troduce the terminology of the calculus; teachers and readers will recall the difficulty encountered in this connection in more formal treatments. The scope and range of the book are evident from the table of contents. The topics usually found in books on the calculus but not appearing here are omitted in conformity with the plan of the book as stated in the first paragraph above. An attempt has been made to approach the several parts of the subject as naturally and directly as possible, to show as clearly as possible the unity and continuity of the subject as a whole, to show what the calculus is all about and how it is used, and to present the material in as simple, straightforward and informal a style as it will permit. It is hoped thus that the book will be of the greatest interest and usefulness to the readers mentioned above. The first edition of this book was prepared before the other volumes of the series were written and the arrangement of the material in this volume was not the same as in the others. In this revised edition the arrangement has been changed somewhat so that it is now the same in all the volumes of the series.

Windows Powershell in Action


Bruce Payette - 2007
    In the tradition of Manning's ground breaking "In Action" series, this book comes from right from the source. Written by Bruce Payette, one of principal creators of PowerShell, Windows PowerShell in Action shows you how to build scripts and utilities to automate system tasks or create powerful system management tools to handle the day-to-day tasks that drive a Windows administrator's life. Because it's based on the .NET platform, PowerShell is also a powerful tool for developers and power users.Windows PowerShell in Action was written by Bruce Payette, one of the founding members of the Windows PowerShell team, co-designer of the PowerShell language and the principal author of the PowerShell language implementation. The book enables you to get the most out of the PowerShell environment. Using many examples, both small and large, this book illustrates the features of the language and environment and shows how to compose those features into solutions, quickly and effectively.This book is designed for anyone who wants to learn PowerShell and use it well. Rather than simply being a book of recipes to read and apply, this book gives you the deep knowledge about how PowerShell works and how to apply it.

Climbing Anchors Field Guide


John Long - 2007
    This field guide is up to date with the essential knowledge every climber can depend on.

A Modern Approach to Logical Reasoning


R.S. Aggarwal - 2007
    Nowadays success in every single competitive examinations lime bank clerical,bank PO,LIC,GIC,MBA Assistant grade,excise & income tax,IAS,IFS,AAO,Railway hotel management and others depend much on the candiate's performance in the reasoning paper.so much comprehensive and intelligent approach to it is the need of the day.This book serves the purpose

Advanced Windows Debugging


Mario Hewardt - 2007
    This book stands out from all other Win32 debugging literature, thanks to its in-depth examples-including resolving intricate problems like stack and heap corruptions." -- Kinshuman, Development Lead, Windows Core OS Division, Microsoft The First In-Depth, Real-World, Insider's Guide to Powerful Windows Debugging For Windows developers, few tasks are more challenging than debugging--or more crucial. Reliable and realistic information about Windows debugging has always been scarce. Now, with over 15 years of experience two of Microsoft's system-level developers present a thorough and practical guide to Windows debugging ever written. Mario Hewardt and Daniel Pravat cover debugging throughout the entire application lifecycle and show how to make the most of the tools currently available--including Microsoft's powerful native debuggers and third-party solutions. To help you find real solutions fast, this book is organized around real-world debugging scenarios. Hewardt and Pravat use detailed code examples to illuminate the complex debugging challenges professional developers actually face. From core Windows operating system concepts to security, Windows(R) Vista(TM) and 64-bit debugging, they address emerging topics head-on-and nothing is ever oversimplified or glossed over! This book enables you to Master today's most powerful Windows debugging tools, including NTSD, CDB, WinDbg, KD, and ADPlus Debug code that wasn't designed or written for easy debugging Understand debuggers "under the hood," and manage symbols and sources efficiently Debug complex memory corruptions related to stacks and heaps Resolve complex security problems Debug across processes: identity tracking, RPC debugger extensions, and tracking IPCs with Ethereal Find and fix resource leaks, such as memory and handle leaks. Debug common thread synchronization problems Learn when and how to write custom debugger extensions Perform "postmortem debugging" using crash dumps and Windows Error Reporting Automate debugging with DebugDiag and the Analyze Debugger command Whether you're a system-level or application developer, Advanced Windows Debugging delivers the deep understanding of debugging that could save you weeks on your very next project. Part I Overview Chapter 1 Introduction to the Tools Chapter 2 Introduction to the Debuggers Chapter 3 Debugger Uncovered Chapter 4 Managing Symbol and Source Files Part II Applied Debugging Chapter 5 Memory Corruptions Part I - Stacks Chapter 6 Memory Corruptions Part I - Heaps Chapter 7 Security Chapter 8 Inter-process Communication Chapter 9 Resource Leaks Chapter 10 Synchronization Part III Advanced Topics Chapter 11 Writing Custom Debugger Extensions Chapter 12 64-bit Debugging Chapter 13 Postmortem Debugging Chapter 14 Power Tools Chapter 15 Windows Vista Fundamentals Appendix A Application Verifier Test Settings If you like Advanced Windows Debugging, keep an eye out for ADVANCED .NET DEBUGGING COMING IN NOV. 2009.

Architecture of a Database System


Joseph M. Hellerstein - 2007
    Architecture of a Database System presents an architectural discussion of DBMS design principles, including process models, parallel architecture, storage system design, transaction system implementation, query processor and optimizer architectures, and typical shared components and utilities. Successful commercial and open-source systems are used as points of reference, particularly when multiple alternative designs have been adopted by different groups. Historically, DBMSs were among the earliest multi-user server systems to be developed, and thus pioneered many systems design techniques for scalability and reliability now in use in many other contexts. While many of the algorithms and abstractions used by a DBMS are textbook material, Architecture of a Database System addresses the systems design issues that make a DBMS work. Architecture of a Database System is an invaluable reference for database researchers and practitioners and for those in other areas of computing interested in the systems design techniques for scalability and reliability that originated in DBMS research and development.

Windows Forensic Analysis: DVD Toolkit


Harlan Carvey - 2007
    However, in order to create broad appeal, the registry section was probably shortened. You can tell Harlan has a lot more to tell." "-Rob Lee, Instructor and Fellow at the SANS Technology Institute, coauthor of Know Your Enemy: Learning About Security Threats, 2E"Author Harlan Carvey has brought his best-selling book up-to-date to give you: the responder, examiner, or analyst the must-have tool kit for your job. Windows is the largest operating system on desktops and servers worldwide, which mean more intrusions, malware infections, and cybercrime happen on these systems. "Windows Forensic Analysis DVD Toolkit, 2E" covers both live and post-mortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants. The book is also accessible to system administrators, who are often the frontline when an incident occurs, but due to staffing and budget constraints do not have the necessary knowledge to respond effectively. The book s companion DVD contains significant new and updated materials (movies, spreadsheet, code, etc.) not available any place else, because they are created and maintained by the author. Best-Selling Windows Digital Forensic book completely updated in this 2nd EditionLearn how to Analyze Data During Live and Post-Mortem InvestigationsDVD Includes Custom Tools, Updated Code, Movies, and Spreadsheets

Geometric Folding Algorithms


Erik D. Demaine - 2007
    Folding and unfolding problems have been implicit since Albrecht Durer in the early 1500s, but have only recently been studied in the mathematical literature. Over the past decade, there has been a surge of interest in these problems, with applications ranging from robotics to protein folding. A proof shows that it is possible to design a series of jointed bars moving only in a flat plane that can sign a name or trace any other algebraic curve. One remarkable algorithm shows you can fold any straight-line drawing on paper so that the complete drawing can be cut out with one straight scissors cut. Aimed primarily at advanced undergraduate and graduate students in mathematics or computer science, this lavishly illustrated book will fascinate a broad audience, from high school students to researchers.

Schneier's Cryptography Classics Library: Applied Cryptography / Secrets and Lies / Practical Cryptography


Bruce Schneier - 2007
    Schneier's Cryptography Classics Library: Applied Cryptography. Secrets and Lies. and Practical Cryptography published in the year 2007 was published by John Wiley & Sons. The author of this book is Bruce Schneier . ed page displaying collection of Bruce Schneier books here. This is the Paperback version of the title "Schneier's Cryptography Classics Library: Applied Cryptography. Secrets and Lies. and Practical Cryptography ". Schneier's Cryptography Classics Library: Applied Cryptography. Secrets and Lies. and Practical Cryptography is currently Available with us.

San Luis 2005


Alik Gershon - 2007
    Bulgarian Grandmaster Veselin Topalov triumphed and proved that he is a worthy successor to World Champions such as Bobby Fischer and Garry Kasparov.Tournament books used to be a familiar part of chess literature with Zurich 1953 a classic example, however such books are now rare because of the huge effort they demand from the authors. Gershon and Nor have risen to the challenge and produced a book that is destined to become a modern classic, a magnificent book worthy of an extraordinary tournament. Many color photographs of the event and the surrounding Argentinean scenery help the reader feel what it was like to be at San Luis 2005.

Linux Fundamentals


Paul Cobbaut - 2007
    For self-study, the intent is to read this book next to a working Linux computer so you can immediately do every subject, practicing each command.This book is aimed at novice Linux system administrators (and might be interesting and useful for home users that want to know a bit more about their Linux system). However, this book is not meant as an introduction to Linux desktop applications like text editors, browsers, mail clients, multimedia or office applications.- See more at: http://ebookjunkie.com/free-ebook/lin...

Todd Lammle's CCNA IOS Commands Survival Guide


Todd Lammle - 2007
    This handy reference from Cisco networking authority Todd Lammle is just what you need to master those commands. From a thorough introduction to Cisco's basic operating system to making the transition to IPv6, Todd Lammle walks you through hundreds of commands with short, to-the-point explanations and plenty of figures and real-world examples.

National Electrical Code 2008 Handbook: Nfpa 70: National Electrical Code, International Electrical Code Series


National Fire Protection Association (NFPA) - 2007
    Only the handbook offers the full NECr 2008 text alongside expert commentary from code specialists, offering insight into code rationale, explanations of new and revised rules, and practical, hands-on advice on how to apply the code. A valuable resource for anyone involved in electrical design, installation, inspection, and safety, this book will give users the knowledge needed to feel confident that their work will be safe, efficient, and code-compliant. Thomson Delmar Learning is pleased to make this one-of-a-kind reference - containing the most widely accepted and most frequently used criteria for electrical installations in the U.S. - available directly from us for our customers who work in and around the electrical trades. It may be used independently and also makes an excellent companion to books in Thomson Delmar Learning's best-selling electrical wiring series. Benefits: * new identifiers at the top of each page in the index help users locate topics and identify solutions quickly and easily * more than 500 full-color graphics, diagrams, photos, tables, and charts illustrate key concepts * color-coded commentary makes it easy to distinguish from mandatory NECr provisions * summaries of key changes in each article highlight revisions in the NECr 2008 to allow users to immediately identify the key changes they need to learn

Energiya-Buran: The Soviet Space Shuttle


Bart Hendrickx - 2007
    The program eventually saw just one unmanned flight in November 1988 before the end of the Cold War and the collapse of the Soviet Union sealed its fate.After a Foreword provided by lead Buran test pilot Igor Volk, the authors look at the experience gradually accumulated in high-speed aeronautics with the development of various Soviet rocket planes and intercontinental cruise missiles between the 1930s to 1950s and the study of several small spaceplanes in the 1960s. Next the authors explain how the perceived military threat of the US Space Shuttle led to the decision in February 1976 to build a Soviet equivalent, and explore the evolution of the design until it was frozen in 1979. Following this is a detailed technical description of both Energiya and Buran and a look at nominal flight scenarios and emergency situations, highlighting similarities and differences with the US Space Shuttle.The authors then expand on the managerial aspects of the Energiya-Buran program, sum up the main design bureaus and production facilities involved in the project and describe the infrastructure needed to transport the hardware and prepare it for launch at the Baikonur cosmodrome. They go on to detail the selection and training of teams of civilian and military test pilots for Buran, crew assignments for the first manned missions and preparatory flights aboard Soyuz spacecraft.Next the focus turns to the extensive test program that preceded the first flight of Buran, notably the often trouble-plagued test firings of rocket engines, the first flight of Energiya with the enigmatic Polyus payload, test flights of subscale models and atmospheric approach and landing tests. After an analysis of Western speculation on the Soviet space shuttle effort in the pre-glasnost era, a detailed account is given of final preparations for the maiden flight of Buran and the mission itself.In the final chapters the authors look at the gradual demise of the project in the early 1990s, the fate of the Soviet orbiters and their cosmodrome infrastructure, cancelled missions, and the many planned derivatives of the Energiya rocket. Attention is also paid to technological spin-offs such as the Zenit and Sea Launch projects and the RD-180 and RD-191 rocket engines. Finally, an overview is given of alternative spaceplane proposals during and after the Buran era, including the MAKS air-launched spaceplane, the Kliper spacecraft and various single-stage-to-orbit systems.The book closes off with key specifications of the Energiya-Buran system, short biographies of the Buran pilots, an extensive list of Russian acronyms, a short bibliographical essay and a detailed index. Based largely on Russian sources, it is richly illustrated with some 250 pictures and diagrams.Although Energiya-Buran was primarily a program of unfulfilled promises and shattered dreams, it represented a major technological breakthrough for the Soviet Union and its story deserves to be told.

Nanotechnology: Understanding Small Systems


Ben Rogers - 2007
    Students in a first course on nanotechnology come from a wide variety of backgrounds, so the text must not assume understanding of too much background material, nor be too focused on any particular area. And still, those students are capable of understanding the hard details of the science, so the text must not gloss over the rigorous scientific explanations. Nanotechnology: Understanding Small Systems fits perfectly between popular science books and high-level treatises, neither of which suit the needs of students approaching this field for the first time. Working from the ground up, this text provides a detailed yet accessible introduction to the world's fastest growing field. Through real-world examples, hundreds of homework problems, original illustrations, and a clear approach, the authors accomplish the delicate task of keeping the book engaging while not avoiding real explanations of complex concepts. They take a systems-based approach, demonstrating how an understanding of the various areas underlying nanotechnology come together to create systems with unique functions and characteristics. In every case, comparing nanoscale systems to macroscale systems reveals the complex and fundamental differences between phenomena at different scales and uncovers the specific challenges posed by nanotechnology.With comprehensive coverage conveyed in an engaging and entertaining style, Nanotechnology: Understanding Small Systems provides a gateway into the exciting and rapidly evolving area of nanotechnology.

Strategic Modelling and Business Dynamics: A Feedback Systems Approach


John D.W. Morecroft - 2007
    The book covers all that is necessary to develop expertise in system dynamics modelling and through the range of applications makes a persuasive case for the power and scope of the approach. As such it will appeal to practitioners as well as students. Robert Dyson, Professor of Operational Research, Associate Dean, Warwick Business School. Much more than an introduction, John Morecroft's Strategic Modelling and Business Dynamics uses interactive "management flight simulators" to create an engaging and effective learning environment in which readers, whatever their background, can develop their intuition about complex dynamic systems. The numerous examples provide a rich test-bed for the development of systems thinking and modelling skills John Sterman, Jay W. Forrester Professor of Management, MIT Sloan School of Management This book, with its vivid examples and simulators, will help to bring modelling, system dynamics and simulation into the mainstream of management education where they now belong. John A. Quelch, Professor of Marketing, Harvard Business School, Former Dean of London Business School This text fills the gap between texts focusing on the purely descriptive systems approach and the more technical system dynamics ones. Ann van Ackere, Professor of Decision Sciences, HEC Lausanne, Universite de Lausanne Strategic modelling based on system dynamics is a powerful tool for understanding how firms adapt to a changing environment. The author demonstrates the appeal and power of business modelling to make sense of strategic initiatives and to anticipate their impacts through simulation. The book offers various simulators that allow readers to conduct their own policy experiments. Dr. Erich Zahn, Professor of Strategic Management, Betriebswirtschaftliches Institut, University of Stuttgart A website to accompany the book can

Game Physics Engine Development [With CDROM]


Ian Millington - 2007
    Physics engines are the software programs that run these simulations. Building an engine is difficult, however. There are a large number of new developers (and hobbyists) coming into this market who need help through this complex process. Current introductory books are inadequate; they don't bring enough real-world programming experience to the task. There is a need for an introductory book on game physics with solid coding guidance but which limits the math content. Ian Millington brings his extensive professional programming experience to this problem. He has developed games since 1987, has studied AI and mathematics at the PhD level, and founded Mindlathe Ltd., a company that designed and built commercial physics engines. Physics Engine Development carefully describes each step in the creation of a robust, usable physics engine. It introduces the mathematical concepts in a clear and simple manner, keeping to high school level topics and building a physics code library as it goes. Each new concept is explained in diagrams and code to make sure that even the most novice of game programmers understands. The companion CD-ROM includes the source code for a complete physics engine of commercial quality. This book will serve as a introduction to more mathematically advanced books on game physics, such as Dave Eberly's Game Physics. * Uses only high school algebra* Shows how to build a complete system based on professional principles* CD-ROM with C++ source code for a full commercial-quality physics engine

Manufacturing Processes for Engineering Materials


Serope Kalpakjian - 2007
    The book carefully presents the fundamentals of materials processing along with their relevant applications, so that the reader can clearly assess the capabilities, limitations, and potentials of manufacturing processes and their competitive aspects. Using real-world examples and well-wrought graphics, this book covers a multitude of topics, including the mechanical behavior of materials; the structure and manufacturing properties of metals; surfaces, dimensional characteristics, inspection, and quality assurance; metal-casting processes including heat treatment; bulk deformation processes; sheet-metal forming processes; material removal processes; polymers, reinforced plastics, rapid prototyping and rapid tooling; metal powders, ceramics, glasses, composites, and superconductors; joining and fastening processes; microelectronic and micromechanical devices; automation; computer-integrated systems; and product design. For manufacturing engineers, metallurgists, industrial designers, material handlers, product designers, and quality assurance managers.

A Beam of Intense Darkness: Wilfred Bion's Legacy to Psychoanalysis


James S. Grotstein - 2007
    The scope of this work is to synopsize, synthesize, and extend Bion's works in a reader-friendly manner. The book presents his legacy - his most important ideas for psychoanalysis. These ideas need to be known by the mental health profession at large. This work highlights and defines the broader and deeper implications of his works.It presents his ideas faithfully and also uses his ideas as "launching pads" for the author's conjectures about where his ideas point.

Perfect Your Chess


Andrei Volokitin - 2007
    This book includes topics that are written in collaboration with his trainer. It features 375 positions where the reader is given a task or asked a question. These tasks resemble those that players regularly face.

Biomedical Optics: Principles and Imaging


Lihong V. Wang - 2007
    After the fundamentals of photon transport in biological tissues are established, various optical imaging techniques for biological tissues are covered. The imaging modalities include ballistic imaging, quasi-ballistic imaging (optical coherence tomography), diffusion imaging, and ultrasound-aided hybrid imaging. The basic physics and engineering of each imaging technique are emphasized. A solutions manual is available for instructors; to obtain a copy please email the editorial department at ialine@wiley.com.

Introduction to Digital Filters: with Audio Applications


Julius O. Smith III - 2007
    In digital audio signal processing applications, such number sequences usually represent sounds. For example, digital filters are used to implement graphic equalizers and other digital audio effects. This book is a gentle introduction to digital filters, including mathematical theory, illustrative examples, some audio applications, and useful software starting points. The theory treatment begins at the high-school level, and covers fundamental concepts in linear systems theory and digital filter analysis. Various “small” digital filters are analyzed as examples, particularly those commonly used in audio applications. Matlab programming examples are emphasized for illustrating the use and development of digital filters in practice.

4G LTE/LTE-Advanced for Mobile Broadband


Erik Dahlman - 2007
    This book focuses on LTE and LTE-Advanced, and provides engineers with real insight and understanding into the why and how of the standard and its related technologies. This book is written by engineers from Ericsson--the world's leading telecommunications supplier--who was heavily involved in the development of the standard.

Immunobiology: The Immune System (Janeway)


Kenneth P. Murphy - 2007
    It guides the reader through the immune system in all its aspects - from the first engagement of innate immunity to the generation of the adaptive immune response and its clinical consequences. The Seventh Edition has been comprehensively updated throughout, and includes new information on topics such as NK cells, Toll-like receptors, AID, viral evasins, mucosal immunity, and celiac disease, to name a few. Each copy of the book includes a revised CD-ROM, Immunobiology Interactive, which contains animations and videos with voiceover narration, as well as the figures from the text for presentation purposes. Janeway's Immunobiology continues to set the standard for currency and authority with its clear writing style and organization, full-color art program, scientific accuracy and consistent viewpoint - that of the host's interaction with an environment containing many species of potentially harmful microorganisms.

Options Trading 101: From Theory to Application


Bill Johnson - 2007
    Options Trading 101 was written as a complete introductory guide for investors and traders who want to understand the world of options. While it is labeled as an introductory book, it is anything but a general overview. It starts by exploring the most fundamental concepts of options trading and ends with some basic strategies that traders will fully understand and be able to use immediately. In a clear, concise way readers will be led through the most important topics that are necessary to master and advance with options trading. Options Trading 101 makes use of many fun examples including Gordon Gekko's mistake in the hit movie "Wall Street" from not understanding put-call parity.

The Art of Hypnotherapy


C. Roy Hunter - 2007
    

Inside Microsoft SQL Server 2005: Query Tuning and Optimization: Query Tuning and Optimization


Kalen Delaney - 2007
    This in-depth guide delivers best practices, pragmatic advice, and code samples to help you enable efficient, effective queries—and optimize database performance. Discover how to: Create a baseline and monitor workload by using System Monitor and DMVs Design, manipulate, and manage traces to isolate database performance issues Audit user activity by using built-in default, black box, and Common Criteria traces Analyze query execution using scans and seeks, joins, aggregations, unions, and parallelism Generate efficient and cost-effective queries using cached plans or new plans Detect and resolve locking, blocking, and deadlocking concurrency issues Use best practices to diagnose and troubleshoot response time, throughput, and scalability issues PLUS—Includes Transact-SQL code samples and on the Web

Next Generation ABAP Development


Rich Heilman - 2007
    Based on a single real-world example that runs throughout the book - a university upgrading from SAP R/3 4.6C to SAP NetWeaver 2004s - you'll follow along with the university's lead ABAP developer as he develops a custom course booking system. This unique approach allows readers to view the entire process of design, development, and testing - right through the eyes of a developer. You'll quickly familiarize yourself with all of the new possibilities in ABAP while discovering a series of actual scenarios that could easily be encountered in a real-life project. In certain areas the author also provides you with a glimpse towards upcoming ABAP releases, as well as references to former releases, as required. Highlights Include: New ABAP Workbench possibilities Strings and Binary Strings in Transparent Tables Web Service Proxies, Exposing Web Services Persistent Objects, ZIP Compression, Shared Memory Objects ABAP Unit Web Dynpro ABAP, Web Dynpro Debugger View Adobe Interactive Forms, BSP, AJAX Visual Composer, Portal Eventing, Guided Procedures

Router Security Strategies: Securing IP Network Traffic Planes


Gregg Schudel - 2007
    This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data, control, management, and services planes that provide the infrastructure for IP networking. The first section provides a brief overview of the essential components of the Internet Protocol and IP networking. At the end of this section, you will understand the fundamental principles of defense in depth and breadth security as applied to IP traffic planes. Techniques to secure the IP data plane, IP control plane, IP management plane, and IP services plane are covered in detail in the second section. The final section provides case studies from both the enterprise network and the service provider network perspectives. In this way, the individual IP traffic plane security techniques reviewed in the second section of the book are brought together to help you create an integrated, comprehensive defense in depth and breadth security architecture. "Understanding and securing IP traffic planes are critical to the overall security posture of the IP infrastructure. The techniques detailed in this book provide protection and instrumentation enabling operators to understand and defend against attacks. As the vulnerability economy continues to mature, it is critical for both vendors and network providers to collaboratively deliver these protections to the IP infrastructure." -Russell Smoak, Director, Technical Services, Security Intelligence Engineering, Cisco Gregg Schudel, CCIE(R) No. 9591, joined Cisco in 2000 as a consulting system engineer supporting the U.S. service provider organization. Gregg focuses on IP core network security architectures and technology for interexchange carriers and web services providers. David J. Smith, CCIE No. 1986, joined Cisco in 1995 and is a consulting system engineer supporting the service provider organization. David focuses on IP core and edge architectures including IP routing, MPLS technologies, QoS, infrastructure security, and network telemetry. Understand the operation of IP networks and routers Learn about the many threat models facing IP networks, Layer 2 Ethernet switching environments, and IPsec and MPLS VPN services Learn how to segment and protect each IP traffic plane by applying defense in depth and breadth principles Use security techniques such as ACLs, rate limiting, IP Options filtering, uRPF, QoS, RTBH, QPPB, and many others to protect the data plane of IP and switched Ethernet networks Secure the IP control plane with rACL, CoPP, GTSM, MD5, BGP and ICMP techniques and Layer 2 switched Ethernet-specific techniques Protect the IP management plane with password management, SNMP, SSH, NTP, AAA, as well as other VPN management, out-of-band management, and remote access management techniques Secure the IP services plane using recoloring, IP fragmentation control, MPLS label control, and other traffic classification and process control techniques This security book is part of the Cisco Press(R) Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Vbscript, Wmi, and ADSI Unleashed: Using Vbscript, Wmi, and ADSI to Automate Windows Administration


Don Jones - 2007
    Top scripting guru Don Jones has written the definitive administrator's guide to getting results with Microsoft's key scripting technologies: VBScript, WMI, and ADSI. Jones draws on his unsurpassed experience training Windows administrators in conferences, classes, and from his enormously popular site, ScriptingAnswers.com. You'll learn how to use VBScript, WMI, and ADSI to gain administrative control over nearly every aspect of every recent Windows server or client, including Windows Server 2003, Vista, XP, 2000, and NT. As you gain experience, Jones introduces more advanced techniques, ranging from modular scripting and script encryption to integrating VBScript with HTML code. Jones concludes with a full section of ready-to-run, real-world examples-from logon/logoff scripts to automated domain and network administration, from querying WMI to creating Active Directory groups. Every script is explained line-by-line, with challenging techniques described in even greater detail. Detailed information on how to... Decide what you can script: a framework for getting started fast Understand how scripts are designed, assembled, and run Master VBScript from start to finish: functions, I/O, data manipulation, program flow, and much more Use scripting objects for tasks ranging from retrieving network information to mapping drives Utilize FileSystemObject to manipulate the Windows filesystem Write ADSI scripts to manipulate any directory service your company uses, from Active Directory to Novell NDS Modify domain information, users, groups, and policies Query WMI information-from basic to advanced Plan for errors, and test and debug your scripts Build your own "resource kit" of reusable script components ON THE WEB: Download all examples and source code presented in this book from ScriptingAnswers.com, where you'll also be able to post follow-up questions directly to the author in a moderated, active community. Introduction 1 Part I: Introduction to Windows Administrative Scripting 11 Chapter 1: Scripting Concepts and Terminology 13 Chapter 2: Running Scripts 21 Chapter 3: The Components of a Script 39 Chapter 4: Designing a Script 55 Part II: VBScript Tutorial 73 Chapter 5: Functions, Objects, Variables, and More 75 Chapter 6: Input and Output 101 Chapter 7: Manipulating Numbers 115 Chapter 8: Manipulating Strings 129 Chapter 9: Manipulating Other Types of Data 145 Chapter 10: Controlling the Flow of Execution 155 Chapter 11: Built-In Scripting Objects 173 Chapter 12: Working with the File System 193 Chapter 13: Putting It All Together: Creating Your First Script from Scratch 219 Part III: Windows Management Instrumentation and Active Directory Services Interface 245 Chapter 14: Working with ADSI Providers 247 Chapter 15: Manipulating Domains 257 Chapter 16: Manipulating Users and Groups 271 Chapter 17: Understanding WMI 283 Chapter 18: Querying Basic WMI Information 299 Chapter 19: Querying Complex WMI Information 317 Chapter 20: Putting It All Together: Your First WMI/ADSI Script 335 Chapter 21: Testing and Debugging WMI and ADSI Queries 357 Part IV: Advanced Scripting Techniques 371 Chapter 22: Modular Script Programming 373 Chapter 23: Scripts Packaging and Protection 389 Chapter 24: Scripting Security 399 Chapter 25: Introduction to HTML Applications 409 Chapter 26: Debugging Tips, Tools, and Techniques 421 Part V: Ready-to-Run Examples 437 Chapter 27: Logon and Logoff Scripts 439 Chapter 28: Windows and Domain Administration Scripts 455 Chapter 29: Network Administration Scripts 481 Chapter 30: WMI and ADSI Scripts 497 Appendix 509 Index 523 .

Glial Neurobiology: A Textbook


Alexei Verkhratsky - 2007
    -Quarterly Review of Biology AT LAST - A comprehensive, accessible textbook on glial neurobiology!Glial cells are the most numerous cells in the human brain but for many years have attracted little scientific attention. Neurophysiologists concentrated their research efforts instead, on neurones and neuronal networks because it was thought that they were the key elements responsible for higher brain function. Recent advances, however, indicate this isn't exactly the case. Not only are astroglial cells the stem elements from which neurones are born, but they also control the development, functional activity and death of neuronal circuits. These ground-breaking developments have revolutionized our understanding of the human brain and the complex interrelationship of glial and neuronal networks in health and disease.Features of this book: an accessible introduction to glial neurobiology including an overview of glial cell function and its active role in neural processes, brain function and nervous system pathology an exploration of all the major types of glial cells including: the astrocytes, oligodendrocytes and microglia of the ACNS and Schwann cells of the peripheral nervous system; the book also presents a broad overview of glial receptors and ion channels an investigation into the role of glial cells in various types of brain diseases including stroke, neurodegenerative diseases such as Alzheimer's, Parkinson's and Alexander's disease, brain oedema, multiple sclerosis and many more a wealth of illustrations, including unique images from the authors' own libraries of images, describing the main features of glial cells Written by two leading experts in the field, Glial Neurobiology provides a concise, authoritative introduction to glial physiology and pathology for undergraduate/postgraduate neuroscience, biomedical, medical, pharmacy, pharmacology, and neurology, neurosurgery and physiology students. It is also an invaluable resource for researchers in neuroscience, physiology, pharmacology and pharmaceutics.

Patterns of Protocols: Rethinking Network Architecture


John Day - 2007
    Piercing the fog of history, he bridges the gap between our experience from the original ARPANET and today’s Internet to a new perspective on networking. Along the way, he shows how socioeconomic forces derailed progress and led to the current crisis.Beginning with the seven fundamental, and still unanswered, questions identified during the ARPANET’s development, Patterns in Network Architecture returns to bedrock and traces our experience both good and bad. Along the way, he uncovers overlooked patterns in protocols that simplify design and implementation and resolves the classic conflict between connection and connectionless while retaining the best of both. He finds deep new insights into the core challenges of naming and addressing, along with results from upper-layer architecture. All of this in Day’s deft hands comes together in a tour de force of elegance and simplicity with the annoying turn of events that the answer has been staring us in the face: Operating systems tell us even more about networking than we thought. The result is, in essence, the first “unified theory of networking,” and leads to a simpler, more powerful—and above all—more scalable network infrastructure. The book then lays the groundwork for how to exploit the result in the design, development, and management as we move beyond the limitations of the Internet.Using this new model, Day shows how many complex mechanisms in the Internet today (multihoming, mobility, and multicast) are, with this collapse in complexity, now simply a consequence of the structure. The problems of router table growth of such concern today disappear. The inescapable conclusion is that the Internet is an unfinished demo, more in the tradition of DOS than Unix, that has been living on Moore’s Law and 30 years of band-aids. It is long past time to get networking back on track.• Patterns in network protocols that synthesize “contradictory” approaches and simplify design and implementation• “Deriving” that networking is interprocess communication (IPC) yielding• A distributed IPC model that repeats with different scope and range of operation• Making network addresses topological makes routing purely a local matter• That in fact, private addresses are the norm—not the exception—with the consequence that the global public addresses required today are unnecessary• That mobility is dynamic multihoming and unicast is a subset of multicast, but multicast devolves into unicast and facilitates mobility• That the Internet today is more like DOS, but what we need should be more like Unix• For networking researchers, architects, designers, engineersProvocative, elegant, and profound, Patterns in Network Architecture transforms the way you envision, architect, and implement networks.Preface: The Seven Unanswered Questions xiiiChapter 1: Foundations for Network Architecture 1Chapter 2: Protocol Elements 23Chapter 3: Patterns in Protocols 57Chapter 4: Stalking the Upper-Layer Architecture 97Chapter 5: Naming and Addressing 141Chapter 6: Divining Layers 185Chapter 7: The Network IPC Model 235Chapter 8: Making Addresses Topological 283Chapter 9: Multihoming, Multicast, and Mobility 317Chapter 10: Backing Out of a Blind Alley 351Appendix A: Outline for Gedanken Experiment on Separating Mechanism and Policy 385Bibliography 389Index 399

Digital Signal Processing: Fundamentals and Applications


Li Tan - 2007
    Coverage includes DSP principles, applications, and hardware issues with an emphasis on applications. Many instructive worked examples are used to illustrate the material and the use of mathematics is minimized for easier grasp of concepts.In addition to introducing commercial DSP hardware and software, and industry standards that apply to DSP concepts and algorithms, topics covered include adaptive filtering with noise reduction and echo cancellations; speech compression; signal sampling, digital filter realizations; filter design; multimedia applications; over-sampling, etc. More advanced topics are also covered, such as adaptive filters, speech compression such as PCM, u-law, ADPCM, and multi-rate DSP and over-sampling ADC.

Colt Single Action: From Patersons to Peacemakers


Dennis Adler - 2007
    Author and photographer Dennis Adler takes you on a pictorial voyage through history with striking studio photography of the world's greatest Colt revolvers, factory archival images and original patent drawings, and tales of the soldiers, lawmen, and lawbreakers who made Colt revolvers part of American history.

Algorithm Collections for Digital Signal Processing Applications Using MATLAB


E.S. Gopi - 2007
    are presently scattered in different fields. There remains a need to collect all such algorithms for quick reference. Also there is the need to view such algorithms in application point of view. This book attempts to satisfy the above requirement. The algorithms are made clear using MATLAB programs.

C# 3.0 in a Nutshell: A Desktop Quick Reference


Joseph Albahari - 2007
    C# 3.0 in a Nutshell gets right to the point, covering the essentials of language syntax and usage as well as the parts of the .NET base class libraries you need to build working applications. But unlike earlier editions, this book is now organized entirely around concepts and use cases, providing greater depth and readability. C# 3.0 introduces the most significant enhancements yet to the programming language, and C# 3.0 in a Nutshell delves deep into the subject while assuming minimal prior knowledge of C#-making it accessible to anyone with a reasonable background in programming. In addition to the language, the book covers the .NET CLR and the core Framework assemblies, along with the unified querying syntax called Language Integrated Query (LINQ), which bridges the traditional divide between programs and their data sources. Free of clutter and long introductions, this book provides a map of C# 3.0 knowledge in a succinct and unified style:Opening chapters concentrate purely on C#, starting with the basics of syntax, types and variables, and finishing with advanced topics such as unsafe code and preprocessor directivesLater chapters cover the core .NET 3.5 Framework, including such topics as LINQ, XML, collections, I/O and networking, memory management, reflection, attributes, security, threading, application domains and native interoperabilityDesigned as a handbook for daily use, C# 3.0 in a Nutshell is an ideal companion to any of the vast array of books that focus on an applied technology such as WPF, ASP.NET, or WCF. The areas of the language and .NET Framework that such books omit, this one covers in detail.

Computer Forensics Library Boxed Set


Keith J. Jones - 2007
    Forensic Discovery unearths hidden treasures in enlightening and entertaining ways, showing how a time-centric approach to computer forensics reveals even the cleverest intruder. I highly recommend reading this book. --Richard Bejtlich, TaoSecurity Praise for Real Digital Forensics Real Digital Forensics is as practical as a printed book can be. In a very methodical fashion, the authors cover live response (Unix, Windows), network-based forensics following the NSM model (Unix, Windows), forensics duplication, common forensics analysis techniques (such as file recovery and Internet history review), hostile binary analysis (Unix, Windows), creating a forensics toolkit and PDA, flash and USB drive forensics. The book is both comprehensive and in-depth; following the text and trying the investigations using the enclosed DVD definitely presents an effective way to learn forensic techniques.--Anton Chuvakin, LogLogic Praise for File System Forensic Analysis Carrier has achieved what few technical authors do, namely a clear explanation of highly technical topics that retains a level of detail making it valuable for the long term. For anyone looking seriously at electronic forensics, this is a must have. File System Forensic Analysis is a great technical resource. --Jose Nazario, Arbor Networks The Computer Forensics Library With the ever-increasing number of computer-related crimes, more and more professionals find themselves needing to conduct a forensics examination. But where to start? What if you don't have the time or resources to take a lengthy training course? We've assembled the works of today's leading forensics experts to help you dive into forensics, give you perspective on the big picture of forensic investigations, and arm you to handle the nitty-gritty technicalities of the toughest cases out there. Forensic Discovery, the definitive guide, presents a thorough introduction to the field of computer forensics. Authors Dan Farmer and Wietse Venema cover everything from file systems to memory andkernel hacks and malware.They expose many myths about forensics that can stand in the way of success. This succinct book will get you started with the realities of forensics. Real Digital Forensics allows you to dive right in to an investigation and learn by doing. Authors Keith J. Jones, Richard Bejtlich, and Curtis W. Rose walk you through six detailed, highly realistic investigations and provide a DVD with all the data you need to follow along and practice. Once you understand the big picture of computer forensics, this book will show you what a Unix or Windows investigation really looks like. File System Forensic Analysis completes the set and provides the information you need to investigate a computer's file system. Most digital evidence is stored within the computer's file system, so many investigations will inevitably lead there. But understanding how the file system works is one of the most technically challenging concepts for digital investigators. With this book, expert Brian Carrier closes out the set by providing details about file system analysis available nowhere else.

Patterns in Network Architecture: A Return to Fundamentals (Paperback): A Return to Fundamentals


John Day - 2007
    Piercing the fog of history, he bridges the gap between our experience from the original ARPANET and today's Internet to a new perspective on networking. Along the way, he shows how socioeconomic forces derailed progress and led to the current crisis. Beginning with the seven fundamental, and still unanswered, questions identified during the ARPANET's development, Patterns in Network Architecture returns to bedrock and traces our experience both good and bad. Along the way, he uncovers overlooked patterns in protocols that simplify design and implementation and resolves the classic conflict between connection and connectionless while retaining the best of both. He finds deep new insights into the core challenges of naming and addressing, along with results from upper-layer architecture. All of this in Day's deft hands comes together in a tour de force of elegance and simplicity with the annoying turn of events that the answer has been staring us in the face: Operating systems tell us even more about networking than we thought. The result is, in essence, the first "unified theory of networking," and leads to a simpler, more powerful--and above all--more scalable network infrastructure. The book then lays the groundwork for how to exploit the result in the design, development, and management as we move beyond the limitations of the Internet. Using this new model, Day shows how many complex mechanisms in the Internet today (multihoming, mobility, and multicast) are, with this collapse in complexity, now simply a consequence of the structure. The problems of router table growth of such concern today disappear. The inescapable conclusion is that the Internet is an unfinished demo, more in the tradition of DOS than Unix, that has been living on Moore's Law and 30 years of band-aids. It is long past time to get networking back on track. - Patterns in network protocols that synthesize "contradictory" approaches and simplify design and implementation - "Deriving" that networking is interprocess communication (IPC) yielding - A distributed IPC model that repeats with different scope and range of operation - Making network addresses topological makes routing purely a local matter - That in fact, private addresses are the norm--not the exception--with the consequence that the global public addresses required today are unnecessary - That mobility is dynamic multihoming and unicast is a subset of multicast, but multicast devolves into unicast and facilitates mobility - That the Internet today is more like DOS, but what we need should be more like Unix - For networking researchers, architects, designers, engineers Provocative, elegant, and profound, Patterns in Network Architecture transforms the way you envision, architect, and implement networks. Preface: The Seven Unanswered Questions xiii Chapter 1: Foundations for Network Architecture 1 Chapter 2: Protocol Elements 23 Chapter 3: Patterns in Protocols 57 Chapter 4: Stalking the Upper-Layer Architecture 97 Chapter 5: Naming and Addressing 141 Chapter 6: Divining Layers 185 Chapter 7: The Network IPC Model 235 Chapter 8: Making Addresses Topological 283 Chapter 9: Multihoming, Multicast, and Mobility 317 Chapter 10: Backing Out of a Blind Alley 351 Appendix A: Outline for Gedanken Experiment on Separating Mechanism and Policy 385 Bibliography 389 Index 399

Stories of Modern Technology Failures and Cognitive Engineering Successes


Nancy J. Cooke - 2007
    A plane runs out of gas while circling an airport for 30 minutes...A passenger liner is mistaken for an enemy fighter and shot down...A company invests in a new system that will cost them money...What do these failure have in common? How can we prevent them from happening again?Offering a critical perspective on problems with human-technical systems, Stories of Modern Technology Failures and Cognitive Engineering Successes explores the significant efforts of those who have made a positive difference. The book analyzes a variety of cognitive engineering applications, including training, design, military, transportation, communications, medicine, and emergency response in the nuclear industry. Real world examples include- Designing a military training program that improved the detection rates of land mines Redesigning a monitor to help anesthesiologists predict dosages more effectively Implementing new protocols to improve the workflow and safety of a nuclear power plant The book's focus on cognitive engineering solutions emphasizes methodology such as knowledge elicitation, laboratory studies, naturalistic observation, usability, and modeling. It addresses highly complex systems as well as traditional human-machine interfaces. This book demonstrates how cognitive engineers- Identify and address cognitive problems Develop, test, and implement solutions Consider social, cultural, political, and economic factors Develop criteria to measure the success of a solution

The Scrum Papers: Nuts, Bolts, and Origins of an Agile Process


Jeff Sutherland - 2007
    

CCNA ICND2 Official Exam Certification Guide [CCNA Exams 640-816 and 640-802]


Wendell Odom - 2007
    

Human Spaceflight with Website


Larson Wiley - 2007
    This book provides a much-needed big-picture perspective that can be used by managers, engineers and students to integrate the myriad of elements associated with human spaceflight. With end-to-end coverage of designing human space systems for Earth, Moon, and Mars, Human Spaceflight spotlights key issues and possible problems to consider as part of the design process. Written by a group of 67 professional engineers, managers, and educators from industry, government, and academia, this book shares industry and government best practices as well as lessons learned from decades of experience. Topics include: space and surface environments, human factors, safety, orbits and trajectories, space station design, life support systems, thermal controls, guidance and navigation, power systems, robotics, and so much more.

Practical Financial Optimization: Decision Making for Financial Engineers


Stavros A. Zenios - 2007
    This book illuminates the relationship between theory and practice, providing the readers with solid foundational knowledge. Focuses on classical static mean-variance analysis and portfolio immunization, scenario-based models, multi-period dynamic portfolio optimization, and the relationships between classes of models Analyizes real world applications and implications for financial engineers Includes a list of models and a section on notations that includes a glossary of symbols and abbreviations

Official (ISC)2 Guide to the SSCP CBK


Harold F. Tipton - 2007
    Having helped thousands of people around the world obtain this distinguished certification, the bestselling Official (ISC)2 Guide to the SSCP CBK(R) has quickly become the book that many of today's security practitioners depend on to attain and maintain the required competence in the seven domains of the (ISC)� CBK.Picking up where the popular first edition left off, the Official (ISC)2 Guide to the SSCP CBK, Second Edition brings together leading IT security tacticians from around the world to discuss the critical role that policy, procedures, standards, and guidelines play within the overall information security management infrastructure. Offering step-by-step guidance through the seven domains of the SSCP CBK, the text:Presents widely recognized best practices and techniques used by the world's most experienced administrators Uses accessible language, bulleted lists, tables, charts, and diagrams to facilitate a clear understanding Prepares you to join the thousands of practitioners worldwide who have obtained (ISC)� certification Through clear descriptions accompanied by easy-to-follow instructions and self-assessment questions, this book will help you establish the product-independent understanding of information security fundamentals required to attain SSCP certification. Following certification it will be a valuable guide to addressing real-world security implementation challenges.

Hormones and Behaviour


Nick Neave - 2007
    Behaviour is complex but can be explained to a large degree by interactions between various psychological and physiological components, such as the interplay between hormonal and psychological systems. This new textbook from Nick Neave offers a detailed introduction to the fascinating science of behavioural endocrinology from a psychological perspective, examining the relationships between hormones and behaviour in both humans and animals. Neave explains the endocrine system and the ways in which hormones can influence brain structure and function, and presents a series of examples to demonstrate how hormones can influence specific behaviours, including sexual determination and differentiation, neurological differentiation, parental behaviours, aggressive behaviours and cognition. This introductory textbook will appeal to second and third year social science undergraduate students in psychology and biomedicine.

Signal Processing Study Guide: Fourier analysis, FFT algorithms, Impulse response, Laplace transform, Transfer function, Nyquist theorem, Z-transform, DSP Techniques, Image proc. & more


MobileReference - 2007
    You will use it from an undergraduate school all the way to graduate school and beyond. FREE first 2 chapters in the trial version. Features Clear and concise explanations Difficult concepts are explained in simple terms Illustrated with graphs and diagrams Search for the words or phrases Access the guide anytime, anywhere - at home, on the train, in the subway. Use your down time to prepare for an exam. Always have the guide available for a quick reference. Table of Contents I. Foreword II Mathematical Analysis III. DSP Theory IV. DSP Sub-fields V. DSP Techniques VI. Sampling VII. Statistical Signal Processing VIII. Image processing IX. Control engineering X. DSP Architecture I. Foreword About Signal Processing About Digital signal processing II. Mathematical Analysis Fourier analysis Fourier series Fourier transform Fast Fourier transform Gibbs phenomenon Impulse response Laplace transform Two-sided Laplace transform Transfer function Dirac comb Dirac delta function Sinc function Goertzel algorithm Abel transform Spline interpolation Stochastic differential equation III. DSP Theory Nyquist-Shannon sampling theorem Whittaker-Shannon interpolation formula Estimation theory Detection theory LTI system theory IV. DSP Sub-fields Audio signal processing Digital image processing Speech processing Statistical signal processing Image processing Control engineering V. DSP Techniques Discrete Fourier transform (DFT) Bilinear transform Z-transform Aadvanced Z-transform Discrete cosine transform Modified discrete cosine transform VI. Sampling Sampling Digital frequency Quantization Companding Signal reconstruction Aliasing Reconstruction filter Negative frequency VII. Statistical Signal Processing Bayes theorem Bayes estimator Recursive Bayesian estimation Wiener filter Kalman filter Fast Kalman filter Adaptive filter Finite impulse response Statistical classification Hidden Markov models VIII. Image processing Principal components analysis Independent component analysis Self-organizing maps Neural networks Computer vision Affine shape adaptation Blob detection Lanczos resampling Tomographic reconstruction IX. Control engineering Adaptive control Building Automation Control reconfiguration Feedback H infinity Intelligent control Laplace transform Model predictive control Non-linear control Optimal control Process control Quantitative feedback theory Robotic unicycle Robust control Servomechanism State space VisSim X. DSP Architecture Digital signal processor von Neumann architectur

The History of Information Security: A Comprehensive Handbook


Karl De Leeuw - 2007
    These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other aspects have remained largely uncovered.There has never been any effort to write a comprehensive history. This is most unfortunate, because Information Security should be perceived as a set of communicating vessels, where technical innovations can make existing legal or organisational frame-works obsolete and a breakdown of political authority may cause an exclusive reliance on technical means.This book is intended as a first field-survey. It consists of twenty-eight contributions, written by experts in such diverse fields as computer science, law, or history and political science, dealing with episodes, organisations and technical developments that may considered to be exemplary or have played a key role in the development of this field.These include: the emergence of cryptology as a discipline during the Renaissance, the Black Chambers in 18th century Europe, the breaking of German military codes during World War II, the histories of the NSA and its Soviet counterparts and contemporary cryptology. Other subjects are: computer security standards, viruses and worms on the Internet, computer transparency and free software, computer crime, export regulations for encryption software and the privacy debate.

NASA Systems Engineering Handbook (NASA/Sp-2007-6105 Rev1)


National Aeronautics and Space Administration - 2007
    These core chapters are supplemented by appendices that provide outlines, examples, and further information to illustrate topics in the core chapters. The handbook makes extensive use of boxes and figures to define, refine, illustrate, and extend concepts in the core chapters without diverting the reader from the main information. The handbook provides top-level guidelines for good systems engineering practices; it is not intended in any way to be a directive. NASA/SP-2007-6105 Rev1 supersedes SP-6105, dated June 1995

Insectos de España y Europa


Patrice Leraut - 2007
    As well as illustrations it includes information about systematic biology and the collection and conservation of insects. Dragonflies, crickets, locusts, beetles, bumblebees and butterflies; the reader will be astonished as much by their abundance as their diversity. Covers the main insect groups of Europe and its neighbouring regions. Exquisite presentation: more than 5000 species illustrated with photographs taken specially for this book, presented in 185 colour plates. With an extensive bibliography for those who wish to read further.

Jitter, Noise, and Signal Integrity at High-Speed


Mike Peng Li - 2007
    Now, there's a comprehensive and up-to-date guide to overcoming these challenges, direct from Dr. Mike Peng Li, cochair of the PCI Express jitter standard committee. One of the field's most respected experts, Li has brought together the latest theory, analysis, methods, and practical applications, demonstrating how to solve difficult JNB and SI problems in both link components and complete systems. Li introduces the fundamental terminology, definitions, and concepts associated with JNB and SI, as well as their sources and root causes. He guides readers from basic math, statistics, circuit and system models all the way through final applications. Emphasizing clock and serial data communications applications, he covers JNB and SI simulation, modeling, diagnostics, debugging, compliance testing, and much more.Coverage includes *JNB component classification, interrelationships, measurement references, and transfer functions *Statistical techniques and signal processing theory for quantitatively understanding and modeling JNB and related components *Jitter, noise, and BER: physical/mathematical foundations and statistical signal processing views *Jitter separation methods in statistical distribution, time, and frequency domains *Clock jitter in detail: phase, period, and cycle-to-cycle jitter, and key interrelationships among them *PLL jitter in clock generation and clock recovery *Jitter, noise, and SI mechanisms in high-speed link systems *Quantitative modeling and analysis for jitter, noise, and SI *Testing requirements and methods for links and systems *Emerging trends in high-speed JNB and SI As data rates continue to accelerate, engineers encounter increasingly complex JNB and SI problems.In Jitter, Noise, and Signal Integrity at High-Speed, Dr. Li provides powerful new tools for solving these problems-quickly, efficiently, and reliably.Preface xv Acknowledgements xxi About the Author xxiii Chapter 1: Introduction 1 Chapter 2: Statistical Signal and Linear Theory for Jitter, Noise, and Signal Integrity 27 Chapter 3: Source, Mechanism, and Math Model for Jitter and Noise 75 Chapter 4: Jitter, Noise, BER (JNB), and Interrelationships 109 Chapter 5: Jitter and Noise Separation and Analysis in Statistical Domain 131 Chapter 6: Jitter and Noise Separation and Analysis in the Time and Frequency Domains 163 Chapter 7: Clock Jitter 185 Chapter 8: PLL Jitter and Transfer Function Analysis 209 Chapter 9: Jitter and Signal Integrity Mechanisms for High-Speed Links 253 Chapter 10: Modeling and Analysis for Jitter and Signaling Integrity for High-Speed Links 281 Chapter 11: Testing and Analysis for Jitter and Signaling Integrity for High-Speed Links 309 Chapter 12: Book Summary and Future Challenges 345 Index 353

Mathematics at Berkeley: A History


Calvin C. Moore - 2007
    Moore's account spans from its origins in the 1850s to the establishment and early years of the Mathematical Sciences Research Institute (MSRI) in the early to mid 1980s.

The Radon Transform and Some of Its Applications


Stanley R. Deans - 2007
    This 1993 edition is a revised and updated version by the author of his pioneering work.

What Every Engineer Should Know about Software Engineering


Philip A. LaPlante - 2007
    Nearly every engineer, regardless of field, will need to develop some form of software during their career. Without exposure to the challenges, processes, and limitations of software engineering, developing software can be a burdensome and inefficient chore.In What Every Engineer Should Know about Software Engineering, Phillip Laplante introduces the profession of software engineering along with a practical approach to understanding, designing, and building sound software based on solid principles. Using a unique question-and-answer format, this book addresses the issues and misperceptions that engineers need to understand in order to successfully work with software engineers, develop specifications for quality software, and learn the basics of the most common programming languages, development approaches, and paradigms.

Mathematics for Physics and Physicists


Walter Appel - 2007
    In this unique book, oriented specifically toward physicists, Appel shows graduate students and researchers the vital benefits of integrating mathematics into their study and experience of the physical world. His approach is mathematically rigorous yet refreshingly straightforward, teaching all the math a physicist needs to know above the undergraduate level. Appel details numerous topics from the frontiers of modern physics and mathematics--such as convergence, Green functions, complex analysis, Fourier series and Fourier transform, tensors, and probability theory--consistently partnering clear explanations with cogent examples. For every mathematical concept presented, the relevant physical application is discussed, and exercises are provided to help readers quickly familiarize themselves with a wide array of mathematical tools. Mathematics for Physics and Physicists is the resource today's physicists must have to strengthen their math skills and to gain otherwise unattainable insights into their fields of study.

Filthy Rich Clients: Developing Animated and Graphical Effects for Desktop Java� Applications


Chet Haase - 2007
    They suck the user in from the outset and hang on to them with a death grip of excitement. Filthy Rich Clients: Developing Animated and Graphical Effects for Desktop Java(TM) Applications shows you how to build better, more effective, cooler desktop applications that intensify the user experience.The keys to Filthy Rich Clients are graphical and animated effects. These kinds of effects provide ways of enhancing the user experience of the application through more attractive GUIs, dynamic effects that give your application a pulse, and animated transitions that keep your user connected to the logical flow of the application. The book also discusses how to do so effectively, making sure to enrich applications in sensible ways.In-depth coverage includesGraphics and GUI fundamentals: Dig deep into the internals of how Swing and Java 2D work together to display GUI applications onscreen. Learn how to maximize the flexibility of these libraries and use them most effectively. Performance: Follow in-depth discussions and tips throughout the book that will help you write high-performing GUI applications. Images: Understand how images are created and used to make better Java applications. Advanced graphics: Learn more about elements of Swing and Java 2D that are of particular benefit to Filthy Rich Clients. Animation: Discover general concepts of animation, as well as how to use the facilities provided in the Java platform. Learn new utility libraries that vastly simplify animations in Java. Effects: Learn how to create, customize, and use static and animated effects--the mainstays of Filthy Rich Clients. Code examples illustrate key concepts, and the book's companion Web site, http: //filthyrichclients.org, includes extensive demos, utility libraries, additional information on related technologies, and more.Informal, fun, and, most of all, useful, this book is great for any developer working with Java to build desktop applications.

Premiere Pro CS3 for Windows and Macintosh: Visual Quickpro Guide


Antony Bolante - 2007
    Through step-by-step instructions, enhanced by tips, sidebars, and plenty of visual aids, veteran video editor Antony Bolante shows you how to effectively and efficiently work with audio, create transitions and titles, manipulate subclips and virtual clips, and more. you'll learn about key features with real-world examples of how and when features should be used, including all that's new in Premiere Pro CS3: the ability to build Blu-ray Disc, DVD, and Flash projects with Adobe Encore CS3 (now included with Premiere Pro CS3); Adobe OnLocation CS3, which lets on-the-road users record footage directly to their computer disk—removing the need to capture video to tape later. You will enjoy learning to create slow-motion effects with Time Remapping, and will get up to speed on Premiere's new editing tools.

Oracle Database 11g SQL


Jason Price - 2007
    Published by Oracle Press, Oracle Database 11g SQL explains how to retrieve and modify database information, use SQL Plus and SQL Developer, work with database objects, write PL/SQL programs, and much more. Inside, you'll find in-depth coverage of the very latest SQL features and tools, performance optimization techniques, advanced queries, Java support, and XML. This book contains everything you need to master SQL.Explore SQL Plus and SQL DeveloperUse SQL SELECT, INSERT, UPDATE, and DELETE statementsWrite PL/SQL programsCreate tables, sequences, indexes, views, and triggersWrite advanced queries containing complex analytical functionsCreate database objects and collections to handle abstract dataUse large objects to handle multimedia files containing music and moviesWrite Java programs to access an Oracle Database using JDBCTune your SQL statements to make them execute fasterExplore the XML capabilities of the Oracle DatabaseMaster the very latest Oracle Database 11g features, such as PIVOT and UNPIVOT, flashback archives, and much more

Reconfigurable Computing: The Theory and Practice of Fpga-Based Computationvolume 1


Scott Hauck - 2007
    Reconfigurable computers serve as affordable, fast, and accurate tools for developing designs ranging from single chip architectures to multi-chip and embedded systems.Scott Hauck and Andre DeHon have assembled a group of the key experts in the fields of both hardware and software computing to provide an introduction to the entire range of issues relating to reconfigurable computing. FPGAs (field programmable gate arrays) act as the "computing vehicles" to implement this powerful technology. Readers will be guided into adopting a completely new way of handling existing design concerns and be able to make use of the vast opportunities possible with reconfigurable logic in this rapidly evolving field.

Model Engineers' Workshop Projects (Workshop Practice S)


Harold Hall - 2007
    A collection of 18 projects for home workshop equipment, which enables the model engineer to create items that cannot be purchased, including: An auxilliary workbench; Tap Holders; Distance and height gauges; Lathe back stop; Tailstock die-holder; Faceplate clamps; Collets; DTI accessories; Sash clamps; Low profile clamps; and, Tapping stand.

Android Forensics: Investigation, Analysis and Mobile Security for Google Android


Andrew Hoog - 2007
    This book offers a thorough review of the Android platform, including the core hardware and software components, file systems and data structures, data security considerations, and forensic acquisition techniques and strategies for the subsequent analysis require d. this book is ideal for the classroom as it teaches readers not only how to forensically acquire Android devices but also how to apply actual forensic techniques to recover data.The book lays a heavy emphasis on open source tools and step-by-step examples and includes information about Android applications needed for forensic investigations. It is organized into seven chapters that cover the history of the Android platform and its internationalization; the Android Open Source Project (AOSP) and the Android Market; a brief tutorial on Linux and Android forensics; and how to create an Ubuntu-based virtual machine (VM). The book also considers a wide array of Android-supported hardware and device types, the various Android releases, the Android software development kit (SDK), the Davlik VM, key components of Android security, and other fundamental concepts related to Android forensics, such as the Android debug bridge and the USB debugging setting. In addition, it analyzes how data are stored on an Android device and describes strategies and specific utilities that a forensic analyst or security engineer can use to examine an acquired Android device.Core Android developers and manufacturers, app developers, corporate security officers, and anyone with limited forensic experience will find this book extremely useful. It will also appeal to computer forensic and incident response professionals, including commercial/private sector contractors, consultants, and those in federal government.

Professional C# 2005 with .Net 3.0


Christian Nagel - 2007
    Preparing readers to program in C#, this authoritative guide provides the necessary background information on how the .NET architecture works Begins with a tutorial on C# 2005 and the .NET 3.0 Framework, then moves through the vast .NET class library, showing how C# can be used to solve various tasks Includes coverage of the new .NET 3.0 Framework, Generics, ObjectSpaces, .NET 3.0 in SQL Server, ASP.NET 3.0, Windows Communication Foundation, Windows Workflow Foundation, Windows Presentation Foundation, arrays, system transactions, tracing, and event logging Additional coverage includes such topics as writing Windows applications and Windows services, writing Web pages and Web services with ASP.NET 3.0, manipulating XML using C# 2005, and generating graphics using C# 2005

Cisco Asa, Pix, and Fwsm Firewall Handbook


David Hucaby - 2007
    Fully updated to cover the latest firewall releases, this book helps you to quickly and easily configure, integrate, and manage the entire suite of Cisco firewall products, including ASA, PIX(r), and the Catalyst(r) Firewall Services Module (FWSM). Organized by families of features, this book helps you get up to speed quickly and efficiently on topics such as file management, building connectivity, controlling access, firewall management, increasing availability with failover, load balancing, logging, and verifying operation. Sections are marked by shaded tabs for quick reference, and information on each feature is presented in a concise format, with background, configuration, and example components. Whether you are looking for an introduction to the latest ASA, PIX, and FWSM devices or a complete reference for making the most out of your Cisco firewall deployments, Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, helps you achieve maximum protection of your network resources. Many books on network security and firewalls settle for a discussion focused primarily on concepts and theory. This book, however, goes well beyond these topics. It covers in tremendous detail the information every network and security administrator needs to know when configuring and managing market-leading firewall products from Cisco. Jason Nolet, Vice President of Engineering, Security Technology Group, Cisco David Hucaby, CCIE(r) No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.Learn about the various firewall models, user interfaces, feature sets, and configuration methodsUnderstand how a Cisco firewall inspects trafficConfigure firewall interfaces, routing, IP addressing services, and IP multicast supportMaintain security contexts and flash and configuration files, manage users, and monitor firewalls with SNMPAuthenticate, authorize, and maintain accounting records for firewall usersControl access through the firewall by implementing transparent and routed firewall modes, address translation, and traffic shunningDefine security policies that identify and act on various types of traffic with the Modular Policy FrameworkIncrease firewall availability with firewall failover operationUnderstand how firewall load balancing worksGenerate firewall activity logs and learn how to analyze the contents of the logVerify firewall operation and connectivity and observe data passing through a firewallConfigure Security Services Modules, such as the Content Security Control (CSC) module and the Advanced Inspection Processor (AIP) module This security book is part of the Cisco Press(r) Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks. Category: Networking: Security Covers: Cisco ASA 8.0, PIX 6.3, and FWSM 3.2 version firewalls

The Definitive Guide to Symfony


François Zaninotto - 2007
    Thats why a framework is an essential item in your development toolbox. It helps you respect coding standards; write bulletproof, maintainable code; and focus on business rules rather than waste time on repetitive tasks. This book introduces you to symfony, the leading framework for PHP developers, showing you how to wield its many features to develop web applications faster and more efficiently, even if you only know a bit of PHP.In The Definitive Guide to symfony, you will learn about the Model-View-Controller architecture and the crucial role it plays in making frameworks like symfony possible. The book also covers framework installation and configuration, and shows you how to build pages, deal with templates, manage requests and sessions, and communicate with databases and servers. You will see how symfony can make your life easier by effectively managing form data, enhancing the user experience with Ajax, internationalizing applications for a global audience, and using smart URLs. Authors Francois Zaninotto and Fabien Potencier put a strong emphasis on the tools that symfony provides for professional environments, showing you how to take advantage of unit tests, scaffolding, plug-ins, the command line, and extensible configuration. And since frameworks often raise performance-related debate, this book will give you many tips and techniques for monitoring and improving your applications performance, from caching to expert configuration tweaks.Always keen to offer practical instruction, the authors include lots of code examples, expert tips, best practices, and illustrations throughout this book, with the goal of providing a resource that satisfies the educational needs of symfony's rapidly growing user community.

Financial Applications Using Excel Add-In Development in C/C++ [With CDROM]


Steve Dalton - 2007
    This is the only complete how-to guide and reference book for the creation of high performance add-ins for Excel in C and C++ for users in the finance industry. Steve Dalton explains how to apply Excel add-ins to financial applications with many examples given throughout the book. It also covers the relative strengths and weaknesses of developing add-ins for Excel in VBA versus C/C++, and provides comprehensive code, workbooks and example projects on the accompanying CD-ROM. The impact of Excel 2007's multi-threaded workbook calculations and large grids on add-in development are fully explored. "Financial Applications using Excel Add-in Development in C/C++" features: Extensive example codes in VBA, C and C++, explaining all the ways in which a developer can achieve their objectives.Example projects that demonstrate, from start to finish, the potential of Excel when powerful add-ins can be easily developed.Develops the readers understanding of the relative strengths and weaknesses of developing add-ins for Excel in VBA versus C/C++.A CD-ROM with several thousand lines of example code, numerous workbooks, and a number of complete example projects.

Object-Oriented Programming Languages: Interpretation


Iain D. Craig - 2007
    It has given the possibility that software components can be constructedandreusedwithconsiderablymorecredibility.Therearenowmany case studies in which the reuse of object-oriented components has been made and analysed. Object-oriented programming relates the programming activity to that of modelling or simulation; objects are identi?ed by a correspondence with the objects found in the application area of the program and are used to model those domain operations. Object-oriented programming also opens the prospect of more ?exible software that is able to respond dynamically to the needs of the application at runtime. It is very easy to think that object-oriented programming can be performed in only one way. The prevalence of C++ and Java suggests that they are the onlywaytoapproachtheproblemofwhatanobject-orientedprogrammingl- guage should look like. There are many approaches to this way of programming andC++andJavaexemplifyjustoneofthesedi?erentapproaches.Indeed, the wayinwhichtheconceptoftheobjectisinterpreteddi?ersbetweenapproaches and between languages. The two main approaches found in object-oriented programming languages are, respectively, class-based and prototype-based languages. Class-based l- guages are exempli?ed by Smalltalk [34], C++ [75, 74] and Java [47]. This 2 1. Introduction approach is based upon the identi?cation of common properties of objects and their description in terms of a de?nitional structure called a class. The objects manipulated by class-based programs are the result of instantiating classes."

A Practical Guide to Data Structures and Algorithms using Java (Chapman & Hall/CRC Applied Algorithms and Data Structures series)


Sally A. Goldman - 2007
    Rare book