Best of
Technology
2004
Head First Design Patterns
Eric Freeman - 2004
At any given moment, somewhere in the world someone struggles with the same software design problems you have. You know you don't want to reinvent the wheel (or worse, a flat tire), so you look to Design Patterns--the lessons learned by those who've faced the same problems. With Design Patterns, you get to take advantage of the best practices and experience of others, so that you can spend your time on...something else. Something more challenging. Something more complex. Something more fun. You want to learn about the patterns that matter--why to use them, when to use them, how to use them (and when NOT to use them). But you don't just want to see how patterns look in a book, you want to know how they look "in the wild". In their native environment. In other words, in real world applications. You also want to learn how patterns are used in the Java API, and how to exploit Java's built-in pattern support in your own code. You want to learn the real OO design principles and why everything your boss told you about inheritance might be wrong (and what to do instead). You want to learn how those principles will help the next time you're up a creek without a design pattern. Most importantly, you want to learn the "secret language" of Design Patterns so that you can hold your own with your co-worker (and impress cocktail party guests) when he casually mentions his stunningly clever use of Command, Facade, Proxy, and Factory in between sips of a martini. You'll easily counter with your deep understanding of why Singleton isn't as simple as it sounds, how the Factory is so often misunderstood, or on the real relationship between Decorator, Facade and Adapter. With Head First Design Patterns, you'll avoid the embarrassment of thinking Decorator is something from the "Trading Spaces" show. Best of all, in a way that won't put you to sleep! We think your time is too important (and too short) to spend it struggling with academic texts. If you've read a Head First book, you know what to expect--a visually rich format designed for the way your brain works. Using the latest research in neurobiology, cognitive science, and learning theory, Head First Design Patterns will load patterns into your brain in a way that sticks. In a way that lets you put them to work immediately. In a way that makes you better at solving software design problems, and better at speaking the language of patterns with others on your team.
Revolution in The Valley: The Insanely Great Story of How the Mac Was Made
Andy Hertzfeld - 2004
Revolution in the Valley traces this vision back to its earliest roots: the hallways and backrooms of Apple, where the groundbreaking Macintosh computer was born. The book traces the development of the Macintosh, from its inception as an underground skunkworks project in 1979 to its triumphant introduction in 1984 and beyond.The stories in "Revolution in the Valley" come on extremely good authority. That's because author Andy Hertzfeld was a core member of the team that built the Macintosh system software, and a key creator of the Mac's radically new user interface software. One of the chosen few who worked with the mercurial Steve Jobs, you might call him the ultimate insider.When "Revolution in the Valley" begins, Hertzfeld is working on Apple's first attempt at a low-cost, consumer-oriented computer: the Apple II. He sees that Steve Jobs is luring some of the company's most brilliant innovators to work on a tiny research effort the Macintosh. Hertzfeld manages to make his way onto the Macintosh research team, and the rest is history.Through lavish illustrations, period photos, and Hertzfeld's vivid first-hand accounts, Revolution in the Valley reveals what it was like to be there at the birth of the personal computer revolution. The story comes to life through the book's portrait of the talented and often eccentric characters who made up the Macintosh team. Now, over 20 years later, millions of people are benefiting from the technical achievements of this determined and brilliant group of people.
On Intelligence
Jeff Hawkins - 2004
Now he stands ready to revolutionize both neuroscience and computing in one stroke, with a new understanding of intelligence itself.Hawkins develops a powerful theory of how the human brain works, explaining why computers are not intelligent and how, based on this new theory, we can finally build intelligent machines.The brain is not a computer, but a memory system that stores experiences in a way that reflects the true structure of the world, remembering sequences of events and their nested relationships and making predictions based on those memories. It is this memory-prediction system that forms the basis of intelligence, perception, creativity, and even consciousness.In an engaging style that will captivate audiences from the merely curious to the professional scientist, Hawkins shows how a clear understanding of how the brain works will make it possible for us to build intelligent machines, in silicon, that will exceed our human ability in surprising ways.Written with acclaimed science writer Sandra Blakeslee, On Intelligence promises to completely transfigure the possibilities of the technology age. It is a landmark book in its scope and clarity.
Joel on Software
Joel Spolsky - 2004
For years, Joel Spolsky has done exactly this at www.joelonsoftware.com. Now, for the first time, you can own a collection of the most important essays from his site in one book, with exclusive commentary and new insights from joel.
Free Culture: The Nature and Future of Creativity
Lawrence Lessig - 2004
Never before have the cultural powers- that-be been able to exert such control over what we can and can't do with the culture around us. Our society defends free markets and free speech; why then does it permit such top-down control? To lose our long tradition of free culture, Lawrence Lessig shows us, is to lose our freedom to create, our freedom to build, and, ultimately, our freedom to imagine.
Hackers & Painters: Big Ideas from the Computer Age
Paul Graham - 2004
Who are these people, what motivates them, and why should you care?Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet.Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham, explains this world and the motivations of the people who occupy it. In clear, thoughtful prose that draws on illuminating historical examples, Graham takes readers on an unflinching exploration into what he calls “an intellectual Wild West.”The ideas discussed in this book will have a powerful and lasting impact on how we think, how we work, how we develop technology, and how we live. Topics include the importance of beauty in software design, how to make wealth, heresy and free speech, the programming language renaissance, the open-source movement, digital design, internet startups, and more.
How Linux Works: What Every Superuser Should Know
Brian Ward - 2004
Some books try to give you copy-and-paste instructions for how to deal with every single system issue that may arise, but How Linux Works actually shows you how the Linux system functions so that you can come up with your own solutions. After a guided tour of filesystems, the boot sequence, system management basics, and networking, author Brian Ward delves into open-ended topics such as development tools, custom kernels, and buying hardware, all from an administrator's point of view. With a mixture of background theory and real-world examples, this book shows both "how" to administer Linux, and "why" each particular technique works, so that you will know how to make Linux work for you.
Head First Servlets and JSP: Passing the Sun Certified Web Component Developer Exam
Bryan Basham - 2004
Isn't it time you learned the latest (J2EE 1.4) versions of Servlets & JSPs? This book will get you way up to speed on the technology you'll know it so well, in fact, that you can pass the Sun Certified Web Component Developer (SCWCD) 1.4 exam. If that's what you want to do, that is. Maybe you don't care about the exam, but need to use Servlets & JSPs in your next project. You're working on a deadline. You're over the legal limit for caffeine. You can't waste your time with a book that makes sense only AFTER you're an expert (or worse one that puts you to sleep). No problem. Head First Servlets and JSP's brain-friendly approach drives the knowledge straight into your head (without sharp instruments). You'll interact with servlets and JSPs in ways that help you learn quickly and deeply. It may not be The Da Vinci Code, but quickly see why so many reviewers call it "a page turner". Most importantly, this book will help you use what you learn. It won't get you through the exam only to have you forget everything the next day. Learn to write servlets and JSPs, what makes the Container tick (and what ticks it off), how to use the new JSP Expression Language (EL), what you should NOT write in a JSP, how to write deployment descriptors, secure applications, and even use some server-side design patterns. Can't talk about Struts at a cocktail party? That'll change. You won't just pass the exam, you will truly understand this stuff, and you'll be able to put it to work right away. This new exam is tough--much tougher than the previous version of the SCWCD. The authors of Head First Servlets and JSP know: they created it. (Not that it EVER occurred to them that if they made the exam really hard you'd have to buy a study guide to pass it.) The least they could do is give you a stimulating, fun way to pass the thing. If you're one of the thousands who used Head First EJB to pass the SCWCD exam, you know what to expect!
Gray Hat Hacking: The Ethical Hacker's Handbook
Shon Harris - 2004
Section I: Exploits 202; Chapter 1: Survival; Chapter 2: Basic Exploits; Chapter 3: Advance Exploits; Chapter 4: Writing Shell Code; Section II: Vulnerability Analysis; Chapter 5: Passive Analysis; Chapter 6: Active Analysis; Chapter 7: Bug to Exploit; Chapter 8: Mitigation; Section III: Advanced System Hacks; Chapter 9: Advanced.
The Tao of Network Security Monitoring: Beyond Intrusion Detection
Richard Bejtlich - 2004
This book reducesthe investigative workload of computer security incident response teams(CSIRT) by posturing organizations for incident response success.Firewalls can fail. Intrusion-detection systems can be bypassed. Networkmonitors can be overloaded. These are the alarming but true facts aboutnetwork security. In fact, too often, security administrators' tools can serve asgateways into the very networks they are defending.Now, a novel approach to network monitoring seeks to overcome theselimitations by providing dynamic information about the vulnerability of allparts of a network. Called network security monitoring (NSM), it draws on acombination of auditing, vulnerability assessment, intrusion detection andprevention, and incident response for the most comprehensive approach tonetwork security yet. By focusing on case studies and the application of opensourcetools, the author helps readers gain hands-on knowledge of how tobetter defend networks and how to mitigate damage from security incidents.
Creating the Twentieth Century: Technical Innovations of 1867-1914 and Their Lasting Impact
Vaclav Smil - 2004
At its beginnings in the 1870s were dynamite, the telephone, photographic film, and the first light bulbs. Its peak decade - the astonishing 1880s - brought electricity - generating plants, electric motors, steam turbines, the gramophone, cars, aluminum production, air-filled rubber tires, and prestressed concrete. And its post-1900 period saw the first airplanes, tractors, radio signals and plastics, neon lights and assembly line production. This book is a systematic interdisciplinary account of the history of this outpouring of European and American intellect and of its truly epochal consequences. It takes a close look at four fundamental classes of these epoch-making innovations: formation, diffusion, and standardization of electric systems; invention and rapid adoption of internal combustion engines; the unprecedented pace of new chemical syntheses and material substitutions; and the birth of a new information age. These chapters are followed by an evaluation of the lasting impact these advances had on the 20th century, that is, the creation of high-energy societies engaged in mass production aimed at improving standards of living.
The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life Plus the Secrets of Enigma
Alan Turing - 2004
In 1935, aged 22, he developed the mathematical theory upon which all subsequent stored-program digital computers are modeled.At the outbreak of hostilities with Germany in September 1939, he joined the Government Codebreaking team at Bletchley Park, Buckinghamshire and played a crucial role in deciphering Engima, the code used by the German armed forces to protect their radio communications. Turing's work on the versionof Enigma used by the German navy was vital to the battle for supremacy in the North Atlantic. He also contributed to the attack on the cyphers known as Fish, which were used by the German High Command for the encryption of signals during the latter part of the war. His contribution helped toshorten the war in Europe by an estimated two years.After the war, his theoretical work led to the development of Britain's first computers at the National Physical Laboratory and the Royal Society Computing Machine Laboratory at Manchester University.Turing was also a founding father of modern cognitive science, theorizing that the cortex at birth is an unorganized machine which through training becomes organized into a universal machine or something like it. He went on to develop the use of computers to model biological growth, launchingthe discipline now referred to as Artificial Life.The papers in this book are the key works for understanding Turing's phenomenal contribution across all these fields. The collection includes Turing's declassified wartime Treatise on the Enigma; letters from Turing to Churchill and to codebreakers; lectures, papers, and broadcasts which opened upthe concept of AI and its implications; and the paper which formed the genesis of the investigation of Artifical Life.
Beginning Web Programming with HTML, XHTML and CSS
Jon Duckett - 2004
It follows standards-based principles, but also teaches readers ways around problems they are likely to face using (X)HTML.While XHTML is the "current" standard, the book still covers HTML because many people do not yet understand that XHTML is the official successor to HTML, and many readers will still stick with HTML for backward compatibility and simpler/informal Web pages that don't require XHTML compliance.The book teaches basic principles of usability and accessibility along the way, to get users into the mode of developing Web pages that will be available to as many viewers as possible from the start. The book also covers the most commonly used programming/scripting language -- JavaScript -- and provides readers with a roadmap of other Web technologies to learn after mastering this book to add more functionality to their sites.
Envisioning an Empowered Nation: Technology for Societal Transformation
A.P.J. Abdul Kalam - 2004
Digital Retro: The Evolution and Design of the Personal Computer
Gordon J. Laing - 2004
Long before Microsoft and Intel ruled the PC world, a disparate variety of home computers, from an unlikely array of suppliers, were engaging in a battle that would shape the industry for years to come. Products from established electronics giants clashed with machines which often appeared to have been (or actually were) assembled in a backyard shed by an eccentric inventor. University professors were competing head to head with students in their parents' garages. Compatibility? Forget it! Each of these computers was its own machine and had no intention of talking to anything else. The same could be said of their owners, in fact, who passionately defended their machines with a belief that verged on the religious. This book tells the story behind 40 classic home computers of an infamous decade, from the dreams and inspiration, through passionate inventors and corporate power struggles, to their final inevitable demise. It takes a detailed look at every important computer from the start of the home computer revolution with the MITS Altair, to the NeXT cube, pehaps the last serious challenger in the personal computer marketplace. In the thirteen years between the launch of those systems, there has never been a more frenetic period of technical advance, refinement, and marketing, and this book covers all the important steps made on both sides of the Atlantic. Whether it's the miniaturization of the Sinclair machines, the gaming prowess of the Amiga, or the fermenting war between Apple Computer, "Big Blue," and "the cloners," we've got it covered. Digital Retro is an essential read for anyone who owned a home computer in the Eighties.
Google Hacking for Penetration Testers, Volume 1
Johnny Long - 2004
What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of informationleakage. *First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.
Building Moonships: The Grumman Lunar Module
Joshua Stoff - 2004
Kennedy announced his plans for landing a man on the moon by 1970 - despite the fact that the United States had a total of just 15 minutes of spaceflight experience up to that point. With that announcement, the space race had officially begun. In 1962, after a strenuous competition, the National Aeronautics and Space Administration (NASA) announced that the Grumman Aircraft Engineering Corporation of Bethpage, Long Island, had won the contract to build the lunar module - the spacecraft that would take Americans to the moon. This was the first and only vehicle designed to take humans from one world to another.Although much has been written about the first men to set foot on the moon, those first hesitant steps would not have been possible without the efforts of the designers and technicians assigned to Project Apollo. Building Moonships: The Grumman Lunar Module tells the story of the people who built and tested the lunar modules that were deployed on missions as well as the modules that never saw the light of day.
Programming from the Ground Up
Jonathan Bartlett - 2004
It takes you a step at a time through these concepts: * How the processor views memory * How the processor operates * How programs interact with the operating system * How computers represent data internally * How to do low-level and high-level optimization Most beginning-level programming books attempt to shield the reader from how their computer really works. Programming from the Ground Up starts by teaching how the computer works under the hood, so that the programmer will have a sufficient background to be successful in all areas of programming. This book is being used by Princeton University in their COS 217 "Introduction to Programming Systems" course.
Google Hacking for Penetration Testers, Volume 2
Johnny Long - 2004
But, Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system administrators to find this sensitive information and "self-police" their own organizations.Readers will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can mash up Google with MySpace, LinkedIn, and more for passive reconaissance.
Dark Hero of the Information Age: In Search of Norbert Wiener, The Father of Cybernetics
Flo Conway - 2004
His best-selling book, Cybernetics, catapulted him into the public spotlight, as did his chilling visions of the future and his ardent social activism. Based on a wealth of primary sources and exclusive access to Wiener's closest family members, friends, and colleagues, Dark Hero of the Information Age reveals this eccentric genius as an extraordinarily complex figure. No one interested in the intersection of technology and culture will want to miss this epic story of one of the twentieth century's most brilliant and colorful figures.
Capturing Sound: How Technology Has Changed Music
Mark Katz - 2004
Far from being simply a tool for the preservation of music, the technology is a catalyst. This is the clear message of Capturing Sound, a wide-ranging, deeply informative, consistently entertaining history of recording's profound impact on the musical life of the past century, from Edison to the Internet.In a series of case studies, Mark Katz explores how recording technology has encouraged new ways of listening to music, led performers to change their practices, and allowed entirely new musical genres to come into existence. An accompanying CD, featuring thirteen tracks from Chopin to Public Enemy, allows readers to hear what Katz means when he discusses music as varied as King Oliver's "Dippermouth Blues," a Jascha Heifetz recording of a Brahms Hungarian Dance, and Fatboy Slim's "Praise You."
Stealing the Network: How to Own a Continent
Ryan Russell - 2004
While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring* An informative and scary insight into the boundries of hacking and cyber-terrorism* Written by a team of the most accomplished cyber-security specialists in the world
Guide to Elliptic Curve Cryptography
Darrel R. Hankerson - 2004
Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism.Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application.Features & Benefits:* Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems* Describes important industry and government protocols, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology* Provides full exposition on techniques for efficiently implementing finite-field and elliptic curve arithmetic* Distills complex mathematics and algorithms for easy understanding* Includes useful literature references, a list of algorithms, and appendices on sample parameters, ECC standards, and software toolsThis comprehensive, highly focused reference is a useful and indispensable resource for practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security.
Physical Computing: Sensing and Controlling the Physical World with Computers
Dan O'Sullivan - 2004
With a multiple book buying audience, this book doesn't require a specific background or technical experience. It is designed to help make a more interesting connection between the physical world and the computer world. The audience size is comparable to that of the Robot builder market. In addition to this audience, physical computing is also taught at several universities across the US. This book is a great source of information and knowledge for anyone interested in bridging the gap between the physical and the virtual.
Network Security Assessment
Chris McNab - 2004
Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack.Network Security Assessment demonstrates how a determined attacker scours Internet-based networks in search of vulnerable components, from the network to the application level. This new edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks at the bigger picture by grouping and analyzing threats at a high-level. By grouping threats in this way, you learn to create defensive strategies against entire attack categories, providing protection now and into the future.Network Security Assessment helps you assess:Web services, including Microsoft IIS, Apache, Tomcat, and subsystems such as OpenSSL, Microsoft FrontPage, and Outlook Web Access (OWA)Web application technologies, including ASP, JSP, PHP, middleware, and backend databases such as MySQL, Oracle, and Microsoft SQL ServerMicrosoft Windows networking components, including RPC, NetBIOS, and CIFS servicesSMTP, POP3, and IMAP email servicesIP services that provide secure inbound network access, including IPsec, Microsoft PPTP, and SSL VPNsUnix RPC services on Linux, Solaris, IRIX, and other platformsVarious types of application-level vulnerabilities that hacker tools and scripts exploitAssessment is the first step any organization should take to start managing information risks correctly. With techniques to identify and assess risks in line with CESG CHECK and NSA IAM government standards, Network Security Assessment gives you a precise method to do just that.
Rebuilding the Royal Navy: Warship Design Since 1945
D.K. Brown - 2004
TechnoFeminism
Judy Wajcman - 2004
However, it is feminist politics rather than the technologies themselves that make the difference. TechnoFeminism fuses the visionary insights of cyberfeminism with a materialist analysis of the sexual politics of technology.
Shades of Loneliness: Pathologies of a Technological Society
Richard Stivers - 2004
In this incisive and controversial book, Richard Stivers rejects the recent emphasis on genetic explanations of psychological problems, arguing that the very organization of technological societies is behind the pervasive experience of loneliness. The extreme rationality that governs our institutions and organizations results in abstract and impersonal relationships in much of daily life. Moreover, as common meaning is gradually eroded, our connections to others become vague and tenuous. Our ensuing fear and loneliness, however, can be masked by an outgoing, extroverted personality. In its extreme form, loneliness assumes pathological dimensions in neurosis and schizophrenia. Stivers maintains that even here the causes remain social. The various forms of neuroses and psychoses follow the key contradictions of a technological society. For instance, narcissism and depression reflect the tension between power and meaninglessness that characterizes modern societies. Stivers demonstrates that there is a continuum from the normal "technological personality" through the various neuroses to full-blown schizophrenia. He argues that all forms of loneliness emanate from the same cause; they likewise share a common dynamic despite their differences. Loneliness, in its many manifestations, seems to be the price we must pay for living in the modern world. Yet nurturing family, friend, and community ties can mitigate its culturally and psychologically disorganizing power. This book is a clarion call for a renewal of moral awareness and custom to combat the fragmentation and depersonalization of our technological civilization.
They Made America: From the Steam Engine to the Search Engine: Two Centuries of Innovators
Harold Evans - 2004
An illustrated history of American innovators -- some well known, some unknown, and all fascinating -- by the author of the bestselling The American Century.
Foundations of Futures Studies: Volume 2: Values, Objectivity, and the Good Society
Wendell Bell - 2004
Wendell Bell's two-volume work Foundations of Futures Studies is widely acknowledged as the fundamental work on the subject. In Volume 2, Bell goes beyond possible and probable futures to the study of preferable futures. He shows that concern with ethics, morality, and human values follows directly from the futurist purposes of discovering or inventing, examining, and proposing desirable futures. He examines moral judgments as an inescapable aspect of all decision-making and conscious action, even in the everyday lives of ordinary people.Now available in paperback with a new preface from the author, Volume 2 of Foundations of Futures Studies moves beyond cultural relativism to critical evaluation. Bell compares depictions of the good society by utopian writers, describes objective methods of moral judgment, assesses religion and law as sources of what is morally right, documents the existence of universal human values, and shows that if human beings are to thrive in the global society of the future, some human values must be changed.
The Latex Companionst: A Complete Guide and Reference for Preparing, Illustrating, and Publishing Technical Documents, Revised Boxed Set
Michel Goossens - 2004
This book shows you how to begin using LaTeX, and also serves as a handy reference. The other books provide information on tools and techniques available for publishing technical text on the Web.
Disruptive Pattern Material: An Encyclopedia of Camouflage
Hardy Blechman - 2004
Learning from nature, military strategists reproduced, painted and printed camouflage patterns to protect equipment and soldiers.Disruptive Pattern Material is an encyclopedic history of camouflage from its roots in nature, through to its adoption by armed forces and on to its current popularity within modern civilian culture.The book begins with the wide variety of wildlife that protects itself by blending into the environment. Military camouflage covers the first uses of camouflage to disguise artillery and ships and eventually individual soldiers. A comprehensive, historical guide features the various camouflage patterns issued to soldiers of 107 nations around the world.The use of camouflage outside of the armed forces first began in the 1960s by anti-war protestors. From there, camouflage was further explored by artists and designers. The book covers the uses of non-military camouflage in:Fashion Architecture Music Sports Film Art and graffiti. Featuring 5,000 compelling images by leading photographers, Disruptive Pattern Material is an authoritative reference with fascinating cultural insight.
C# For Students
Douglas Bell - 2004
It is written in a simple, direct style for maximum clarity and is aimed at first level students at universities and colleges, but is also suitable for novices studying alone.
Computer Networking First-Step
Wendell Odom - 2004
From connecting our computers together at home and surfing the net at high speeds to editing and sharing digital music and video, computer networking has become both ubiquitous and indispensable. No experience needed! Computer Networking First-Step explains the basics of computer networking in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up network and Internet traffic. Whether you are looking to take your first step into a career in networking or are interested in just gaining a conversational knowledge of the technology, this book is for you!
SAS Certification Prep Guide: Base Programming
SAS Institute - 2004
The SAS Base Programming exam is available through 12/31/06 and tests your knowledge of SAS Version 8 programming. (This certification credential is valid for 3 years.) It will be replaced by the Base Programming Certification Exam for SAS?9. Increase your credibility as a technical professional, expand your knowledge of SAS software, and increase your career options and marketability by becoming a globally recognized SAS Certified Professional. Designed for new and experienced SAS users who want to prepare for the SAS Base Programming certification exam, this comprehensive guide covers all of the objectives tested on the exam and more. Major topics include basic concepts, producing reports, creating and modifying SAS data sets, and reading various types of raw data. Each chapter includes a quiz on the chapter's contents. Answer keys are included. Includes a free CD-ROM with tutorials, practice data, and sample programs to test your SAS skills! This book prepares you for the current SAS Base Programming Exam, which is available through December 31, 2006. Certification credentials are valid for three years.
Kinematic Self-Replicating Machines
Robert A. Freitas Jr. - 2004
The principal focus here is on self-replicating machine systems. Most importantly, we are concerned with kinematic self-replicating machines: systems in which actual physical objects, not mere patterns of information, undertake their own replication. Following a brief burst of activity in the 1950s and 1980s, the field of kinematic replicating systems design received new interest in the 1990s with the emerging recognition of the feasibility of molecular nanotechnology. The field has experienced a renaissance of research activity since 1999 as researchers have come to recognize that replicating systems are simple enough to permit experimental laboratory demonstrations of working devices.
Coventry Climax Racing Engines - The definitive development history
Des Hammill - 2004
Viewed through the eyes of an engineer, and the detailed recollections of those who were there, this is a fascinating account of the trials and tribulations of leading edge race engine design from 1952 to 1966.
Circuit Design with VHDL
Volnei A. Pedroni - 2004
While other textbooks concentrate only on language features, Circuit Design with VHDL offers a fully integrated presentation of VHDL and design concepts by including a large number of complete design examples, illustrative circuit diagrams, a review of fundamental design concepts, fully explained solutions and simulation results. The text presents the information concisely yet completely, discussing in detail all indispensable features of the VHDL synthesis. The book is organised in a clear progression, with the first part covering the circuit level, treating foundations of VHDL and fundamental coding, and the second part covering the system level (units that might be located in a library for code sharing, reuse and partitioning), expanding upon the earlier chapters to discuss system coding. techniques of VHDL, including code structure, data types, operators and attributes, concurrent and sequential statements and code, objects (signals, variables and constants), design of finite state machines and examples of additional circuit designs. Part II, System Design, builds on the material already presented, adding elements intended mainly for library allocation; it examines packages and components, functions and procedures and additional examples of system design. Appendixes on programmable logic devices (PLDs/FPGAs) and synthesis tools follow Part II. The book's highly original approach of teaching through extensive system examples as well as its unique integration of VHDL and design make it suitable both for use by students in computer science and electrical engineering.
The PayPal Wars: Battles with eBay, the Media, the Mafia, and the Rest of Planet Earth
Eric M. Jackson - 2004
But when their start-up, PayPal, survived the dot.com crash only to find itself besieged by unimaginable challenges, that dream threatened to become a nightmare. PayPal's history - as told by former insider Eric Jackson - is an engrossing study of human struggle and perseverance against overwhelming odds. The entrepreneurs that Thiel and Levchin recruited to overhaul world currency markets first had to face some of the greatest trials ever thrown at a Silicon Valley company before they could make internet history. Business guru Tom Peters, author of In Search of Excellence, called the hardcover edition of The PayPal Wars a real page turner that featured what he called the best description of business strategy unfolding in a world changing at warp speed. The new paperback edition will feature updated material and even more insights on the state of internet commerce.
Electronics Demystified
Stan Gibilisco - 2004
This book helps readers discover the electrifying truth about power transmission and power supplies and uncover the purpose of the diodes, transistors, amplifiers, and oscillators that make appliances work.
Tauntons Comp Illus GT Box Mak (Complete Illustrated Guide)
Doug Stowe - 2004
While it may seem a simple process, there are many ways to build a box -- and in this comprehensive pictorial reference, veteran woodworker Doug Stowe covers all the techniques you will need to produce boxes you'll be proud of.You'll learn about making boxes by using traditional carcase joinery or by shaping on the bandsaw or lathe. Stowe also covers special boxmaking techniques associated with making lids and bases, attaching them to the box, and partitioning boxes to hold small objects like jewelry. Additionally, there are a host of techniques for creating special effects that decorate a box, turning the small, useful object into a jewel itself. This book covers all these methods in a highly visual format that has become the hallmark of the Complete Illustrated Guide series: Everything is covered in over 500 step-by-step photos accompanied with straightforward text. About the author Doug Stowe is a professional furniture designer and box maker. His work has been featured in national woodworking magazines and is the author of Creating Beautiful Boxes with Inlay Techniques and Simply Beautiful Boxes. He lives on a hillside overlooking Eureka Softcover, 9-3/16 x 10-7/8 in., 160 pages, with color photos and drawings Published 2004, ISBN 1-56158-593-9, # 070721 Taunton's Complete Illustrated Guide to Box Making Preview
Concepts in Engineering
Mark T. Holtzapple - 2004
Its central focus is to positively motivate students for the rest of their engineering education, as well as their future engineering. Due to the book's concise, yet comprehensive coverage, it can be used in a wide variety of introductory courses.
Windows XP Simplified Service Pack
Paul McFedries - 2004
The perfect guide for visual learners who are brand-new to Windows XP and want to be shown-rather than told-how to solve problems and work through tasks Features highly visual two-page tutorials and full-color step-by-step screen shots that walk Windows newcomers through tasks such as working with files, sharing a computer, browsing the Web, using e-mail, and even creating movies Covers new SP2 enhancements, including the new Windows Firewall and wireless interface as well as updates to Windows Update, Media Player, and Internet Explorer
The Mac OS X Command Line: Unix Under the Hood
Kirk McElhearn - 2004
It's also the medium for many commands that aren't accessible using the GUI. The Mac OS X Command Line is a clear, concise, tutorial-style introduction to all the major functionality provided by the command line. It's also packed with information the experienced users need, including little-known shortcuts and several chapters devoted to advanced topics. This is a book to get you started, but also a book you won't soon outgrow.
The Visible Ops Handbook: Starting ITIL in 4 Practical Steps
Kevin Behr - 2004
Visible Ops is comprised of four prescriptive and self-fueling steps that take an organization from any starting point to a continually improving process. MAKING ITIL ACTIONABLE Although the Information Technology Infrastructure Library (ITIL) provides a wealth of best practices, it lacks prescriptive guidance: What do you implement first, and how do you do it? Moreover, the ITIL books remain relatively expensive to distribute. Other information, publicly available from a variety of sources, is too general and vague to effectively aid organizations that need to start or enhance process improvement efforts. The Visible Ops booklet provides a prescriptive roadmap for organizations beginning or continuing their IT process improvement journey. WHY DO WE NEED VISIBLE OPS? The Visible Ops methodology was developed because there was not a satisfactory answer to the question: "I believe in the need for IT process improvement, but where do I start?" Since 2000, Gene Kim and Kevin Behr have met with hundreds of IT organizations and identified eight high-performing IT organizations with the highest service levels, best security, and best efficiencies. For years, they studied these high-performing organizations to figure out the secrets to their success. Visible Ops codifies how these organizations achieved their transformation from good to great, showing how interested organizations can replicate the key processes of these high-performing organizations in just four steps: 1. Stabilize Patient, Modify First Response - Almost 80% of outages are self-inflicted. The first step is to control risky changes and reduce MTTR by addressing how changes are managed and how problems are resolved. 2. Catch and Release, Find Fragile Artifacts - Often, infrastructure exists that cannot be repeatedly replicated. In this step, we inventory assets, configurations and services, to identify those with the lowest change success rates, highest MTTR and highest business downtime costs. 3. Establish Repeatable Build Library - The highest return on investment is implementing effective release management processes. This step creates repeatable builds for the most critical assets and services, to make it "cheaper to rebuild than to repair." 4. Enable Continuous Improvement - The previous steps have progressively built a closed-loop between the Release, Control and Resolution processes. This step implements metrics to allow continuous improvement of all of these process areas, to best ensure that business objectives are met.
The Ascendancy of the Scientific Dictatorship: An Examination of Epistemic Autocracy, From the 19th to the 21st Century
Phillip Darrell Collins - 2004
In the past, the elite manipulated the population through a more mystical belief system. In particular, there was the institution of Sun worship (typified by deities such as Osiris and Set). However, as antiquity gave way to modern history, this system of control began to lose its effectiveness. During the sixteenth century, the ruling class managed to co-opt a relatively new methodology of truth discernment...science. Over the years, they would contaminate this institution with their own virulent strains of thought...metaphysical naturalism, radical empiricism, Malthusianism, Darwinism, behaviorism, radical environmentalism, etc. Many of these paradigms were derivative of their own occult doctrines, thinly veiled to appear as objective science. All of these concepts correlate in some way and, at some point, coalesce. Together, they are gradually paving the way for the re-introduction of the hidden god of the Ancient Mysteries.
Group Policy, Profiles, and Intellimirror for Windows 2003, Windows XP, and Windows 2000: Mark Minasi Windows Administrator Library
Jeremy Moskowitz - 2004
This book provides all the instruction and insight you need to take full control of your Active Directory with GPMC and other Group Policy tools. You'll also learn techniques for implementing IntelliMirror, making it possible for users to work securely from any location; and you'll find intensive troubleshooting advice, insider tips on keeping your network secure, and hundreds of clear examples that will help you accomplish all your administration goals. You will learn to:Create and manage all Group Policy functions within Active Directory Understand Group Policy differences in Windows 2000, Windows XP, and Windows 2003 systems Troubleshoot Group Policy using Support tools, Resource Kit utilities, log files, registry hacks, and third-party tools Create and deploy custom settings for managing client systems Manage, secure, and audit client and server systems Script complex operations, including linking, back-up, restore, permissions changes, and migrating Set up Local, Roaming, and Mandatory profiles Set up and manage IntelliMirror components with Group Policy Use Group Policy Software Installation to perform hands-off installations Use Remote Installation Services to automate the installation of new Windows systems Ensure the safety of your users' data with Redirected Folders and Shadow Copies About the SeriesThe Mark Minasi Windows Administrator Library is designed to equip system administrators with in-depth technical solutions to the many challenges associated with administering Windows in an enterprise setting. The series editor is leading Windows NT/2003 expert Mark Minasi, who selects the topics and authors and develops and reviews each book to ensure that every entry in the series meets your needs and helps you achieve your goals.
Excel 2003: The Missing Manual
Matthew MacDonald - 2004
Covering all the features of Excel 2002 and 2003, the most recent versions for Windows, Excel: The Missing Manual is an easy-to-read, thorough and downright enjoyable guide to one of the world's most popular, (and annoyingly complicated!) computer programs.Never a candidate for "the most user-friendly of Microsoft programs," Excel demands study, practice and dedication to gain even a working knowledge of the basics. Excel 2003 is probably even tougher to use than any previous version of Excel. However, despite its fairly steep learning curve, this marvelously rich program enables users of every stripe to turn data into information using tools to analyze, communicate, and share knowledge. Excel can help you to collaborate effectively, and protect and control access to your work. Power users can take advantage of industry-standard Extensible Markup Language (XML) data to connect to business processes.To unleash the power of the program and mine the full potential of their database talents, users need an authorative and friendly resource. None is more authoritative or friendlier than Excel: The Missing Manual. Not only does the book provide exhaustive coverage of the basics, it provides numerous tips and tricks, as well as advanced data analysis, programming and Web interface knowledge that pros can adopt for their latest project. Neophytes will find everything they need to create professional spreadsheets and become confident users.Excel: The Missing Manual covers: worksheet basics, formulas and functions, organizing worksheets, charts and graphics, advanced data analysis, sharing data with the rest of the world, and programming.If you buy just one book about using Excel, this has GOT to be it. This book has all you need to help you excel at Excel.
River Rouge
Joseph P. Cabadas - 2004
Eventually, that small pilot plant grew into the gigantic 1,100-acre River Rouge Complex, the most famous auto factory of the twentieth century, renowned as the home of Ford's "vertical integration." In 1999, Ford's great-grandson and Ford Chairman Bill Ford III announced that the company would reinvent the complex as the auto factory of the new century, scheduled for completion in 2004. Like "the Rouge" itself, this illustrated 90-year chronological history of the complex will provide a sprawling view of the evolution of automaking and industrial technologies, as well as the exciting new concepts the company is incorporating into the current redesign. Central to vertical integration was self-sufficiency: raw materials went in one end and finished cars came out the other. In fact, iron ore and coal became completed engine blocks in less than 24 hours! Filled with evocative inside-the-factory shots, this illustrated 90-year history provides sprawling views of manufacturing processes, factory evolution, and the exciting new concepts Ford has incorporated into the redesign. Author Joe Cabadas also explores "vertical integration" as conceived at the Rouge-raw materials essentially entered one door and new automobiles exited the other. In fact, iron ore and coal were transformed into engine blocks in less than 24 hours. In addition to manufacturing processes that also included glassmaking and woodworking, the engaging chronological history explores the Rouge's roles as a crucible of industry unionization (at its peak in 1929, the 1,100-acre factory employed 128,000 workers) and wartime production, and its profound influence on Japanese automakers. Thanks to the Rouge's immensity and diverse operations, archival and current images provide a visual cornucopia for just about any reader.- The River Rouge automotive factory is part of Henry Ford's grand legacy that remains today. It is one of the world's largest automotive manufacturing facilities.- Timed to coincide with the completed Rouge renovation and the complex's ninetieth anniversaryAbout the AuthorJoe Cabadas is an automotive journalist whose work regularly appears in several industry trade publications. He is the co-author of MBI Publishing Company's bestselling The American Auto Factory (ISBN 0-7603-1059-9) and lives in Dearborn, Michigan.
Redefining Literacy for the 21st Century
David F. Warlick - 2004
Practical, yet visionary suggestions and resources help you focus on literacy within the context of technology.
Sonography: Introduction to Normal Structure and Function
Reva Arnez Curry - 2004
After covering anatomy and physiology in the first half of each chapter, it then presents a wealth of ultrasound images to increase the reader's comfort with normal anatomy as it appears during scanning. Most images are accompanied by labeled drawings with detailed legends that explain what the reader is supposed to notice on the ultrasound scans. Instructor resources are available; please contact your Elsevier sales representative for details.Detailed, labeled line drawings accompany most sonograms to provide reinforcement of what the student should notice on the scan.1,200 images spread over 528 pages ensure students gain a thorough, visual understanding of the field.Introduction to Specialty Sonography section gives students an understanding of career options and an understanding of sonographers' work in those areas.Abdominal aorta, inferior vena cava and portal venous systems chapters have been moved ahead of the abdominal organ chapters to reflect the order in which most instructors prefer to teach this material.250 new scans and accompanying line drawings prepare students for the latest equipment, and help relevant anatomy pop into view.New chapter on abdominal vascular technology helps students understand the effects of vascular stenosis on health, enabling them to better scan and understand why they're imaging the aorta and vessels of the abdominal organs.Two new chapters on 3D ultrasound and ultrasound assisted special procedures ensure students are prepared for the latest in technology and opportunities in the sonography field.Color images now appear in four distinct inserts, so students can flip more easily to the color images to compare the textual information and black and white images with the distinct clarity given by the color images.
Venomous Earth: How Arsenic Caused The World's Worst Mass Poisoning
Andrew A. Meharg - 2004
It explores the geology, politics and biology of why tens thousands of people are dying, hundreds of thousands developing cancer and tens of millions of people are at risk in Bangladesh, India and beyond, from arsenic-contaminated well water. Andrew Meharg compares this scenario with that in other areas of the world where drinking water is tainted with arsenic, such as extensive areas of South Western USA, the Alto Plano of South America and New Zealand's volcanic regions. He details historical precedents spanning thousands of years in mining and smelting communities, and due to the widespread use of arsenic in alchemy, farming, medicine and manufacturing. His tale takes in William Morris, Paracelsus, George W Bush and a cosmetic that killed two popes. Finally Venomous Earth looks at how the current arsenic crisis is to be tackled and highlights new challenges to our ongoing struggle with the toxic element.
Hear that Train Whistle Blow! How the Railroad Changed the World
Milton Meltzer - 2004
Takes a look at the history of rail transportation, focussing on how it transformed societies from isolated communities which rarely communicated or traded into unified nations.
Photoshop CS Artistry
Barry Haynes - 2004
This book helps you learn Photoshop's features including Photomerge technology, enhanced Camera Raw support, an improved File Browser, and nonsquare pixel support. It emphasizes the relationship between Photoshop CS tools and traditional photography to provide context for complex tasks.
The IT Career Builder's Toolkit
Matthew Moran - 2004
While other books cover just the mechanics of preparing your resume, writing a cover letter, and interviewing, this book provides all that plus additional insight from IT career development expert, Matt Moran, to help you plan and create a rewarding IT career over the long term. The toolkit approach allows you to use this book to suit your unique needs: Are you new to the IT field? Benefit by reading the book cover to cover. Just need to fine-tune your IT career? Choose a topic and dive in.Understand and prepare for the various and changing factors that affect your career in both positive and negative ways. Learn how toPresent the value of your technical skills in the job marketPosition yourself as the primary commodity of your careerRemove the guesswork out of job searches Highlight on-the-job skills and gain meaningful professional exposure The companion CD-ROM includes career management tools such as resume and cover letter templates, forms to track important contacts, and self-assessment tools. Start or further your consulting career with sample proposals, opportunity tracking forms, and a time-tracking and billing database. Financial tools, including budget and cash-flow summary worksheets, help you gain financial well-being. Use the Value-Added Technologist presentation to gain a clear understanding of the career-building process and how to use the toolkit to build a dynamic career. Most of all, have fun Every year, people advance along the path to career stardom. Let Matt help you to be one of them through his career philosophy "Do not accept mediocrity as a career objective-demand more of yourself." "I want you to see the toolkit] techniques as one more set of skills to adopt in your overall career development program. They are skills, just like your technical skills, that you will use daily during your career. Just as you adopt new technical skills, use the toolkit to define those soft skills that you must learn and put to use. The result will be a more well-rounded and complete professional skill-set." Matthew Moran, from the Introduction Companion CD-ROMThe CD-ROM contains valuable tools, forms, spreadsheets, and documents that work with the Toolkit to help you master key areas of your career development.
Apple Training Series: Mac OS X Help Desk Essentials (Apple Training)
Owen W. Linzmayer - 2004
Keyed to the learning objectives of the Apple Helpdesk Specialist certification exam, the lessons in this self-paced volume serve as a perfect supplement to Apple's own training class and a first-rate primer for computer support personnel who need to troubleshoot and optimize Mac OS X as part of their jobs. Self-quizzes and chapter tests reinforce the knowledge gained along the way.
Autopia: Cars and Culture
Peter Wollen - 2004
Cars have brought benefits to individuals in terms of mobility and expanded horizons, but the cost has been very high in terms of damage to the environment and the consumption of precious resources. Despite the growing belief that a Faustian price is now being paid for the freedom cars have bestowed on us, we are none the less manufacturing them in ever greater numbers. Autopia is the first book to explore the culture of the motor car in the widest possible sense. Featuring newly commissioned essays by writers, critics, historians, artists and film-makers, as well as reprinting key texts, it examines the effect of the car throughout the world, including the USA, Western and Eastern Europe, Japan, China, Cuba, India and South Africa. In this book the car is treated neither as a technological fetish object nor as an instrument of danger. Instead, it is examined as a hugely important determinant of 20th-century culture, neither wholly good nor an unmitigated disaster, and certainly endlessly fascinating.Contributors include Michael Bracewell, Ziauddin Sardar, Al Rees, Martin Pawley, Donald Richie and Peter Hamilton. Key texts by Marshall Berman, Jane Jacobs, Roland Barthes, Marc Augé and others.
SAP BW Professional
Norbert Egger - 2004
Vital concepts are clearly explained with the help of practical examples, sample solutions, and highly detailed graphics. You'll quickly learn about the many capabilities of SAP BW as you "walk through" expert, step-by-step instruction designed to enable you to efficiently set up an SAP BW application with a user-specific data source, customized InfoCubes, data collection, and all of the necessary reporting components. This book, which focuses on Releases 3.0 and 3.1, shows you how to avoid costly mistakes and save countless hours when you optimize key functions and essential processes. Highlights:
Detailed introduction to SAP BW: InfoObjects, InfoProvider, InfoCubes, Star Scheme, DataSources, InfoSources, Web Items, and a lot more
SAP BW sample application: rules for transferal and extrapolation, InfoPackages, BEx Query, data collection, and Query-request
Data modeling: Implementation of a column-oriented Infosource in an account-oriented InfoCube; Illustration of the SAP product hierarchy in data modeling, data collection, and reporting
Functions of the Query Designers
Functions of the SAP BW Web Application Designers
Expandable SAP BW WebCockpit
Precalculus With Calculus Previews (Jones & Bartlett Learning Series in Mathematics)
Dennis G. Zill - 2004
With A Continued Effort To Keep The Text Complete, Yet Concise, The Authors Have Included Four Additional Chapters Making The Text A Clear Choice For Many Mainstream Courses. Additional Chapters Include A New Chapter On Polar Coordinates, As Well As Triangle Trigonometry, Systems Of Equations And Inequalities, And Sequences And Series. This Student-Friendly, Full-Color Text Offers Numerous Exercise Sets And Examples To Aid In Students' Learning And Understanding, And Graphs And Figures Throughout Serve To Better Illuminate Key Concepts. The Exercise Sets Include Engaging Problems That Focus On Algebra, Graphing, And Function Theory, The Sub-Text Of So Many Calculus Problems. The Authors Are Careful To Use The Terminology Of Calculus In An Informal And Comprehensible Way To Facilitate The Student's Successful Transition Into Future Calculus Courses.
Modern Science 1896-1945 (History of Science)
Ray Spangenburg - 2004
Examining the first half of the 20th century
The Story of Semiconductors
John Orton - 2004
It covers the development of the subject from its inception in the early nineteenth century to the recent millennium. Written in a lively, informal style, it emphasizes the interaction between pure scientific push and commercial pull, on the one hand, and between basic physics, materials, and devices, on the other. It also sets the various device developments in the context of systems requirements and explains how such developments met wide-ranging consumer demands. It is written so as to appeal to students at all levels in physics, electrical engineering, and materials science, to teachers, lecturers, and professionals working in the field, as well as to a non-specialist scientific readership.
Lab Manual for Security+ Guide to Networking Security Fundamentals [With CDROM]
Paul Cretaro - 2004
Every chapter fully corrolates with the text so students can easily apply CompTIA's Security+ exam objectives. Microsoft Windows Server 2003 is covered throughout for the most up-to-date technologies used in business environments.
Ivor Horton's Beginning Java: Java 7 Edition
Ivor Horton - 2004
In this latest edition, whether you're a beginner or an experienced programmer switching to Java, you'll learn how to build real-world Java applications using Java SE 7. The author thoroughly covers the basics as well as new features such as extensions and classes; extended coverage of the Swing Application Framework; and he does it all in his unique, highly accessible style that beginners love.Provides a thorough introduction to the latest version of the Java programming language, Java SE 7 Introduces you to a host of new features for both novices and experienced programmers Covers the basics as well as new language extensions and classes and class methods Guides you through the Swing Application Framework for creating Swing apps Uses numerous step-by-step programming examples to guide you through the development process There's no better way to get thoroughly up to speed on the latest version of Java than with Ivor Horton's latest, comprehensive guide.
Forensic Discovery
Dan Farmer - 2004
Simply picking it up off the shelf to read the cover has left a trail of evidence that you were here.
The New How Things Work: From Lawn Mowers to Surgical Robots and Everthing in Between
John Langone - 2004
Covering all areas of technology, The New How Things Work contains the most up-to-date, elaborately illustrated, fascinating, and fun entries that explain how our technology-driven world functions.Learn about the objects and ideas we encounter every day, and that are changing our lives, from DVDs and MP3s to plasma screen TVs and wireless Internet technology.
Object Thinking
David West - 2004
Delving into the history, philosophy, and even politics of object-oriented programming, West reveals how the best programmers rely on analysis and conceptualization on thinking rather than formal process and methods. Both provocative and pragmatic, this book gives form to what s primarily been an oral tradition among the field s revolutionary thinkers and it illustrates specific object-behavior practices that you can adopt for true object design and superior results.Gain an in-depth understanding of: Prerequisites and principles of object thinking. Object knowledge implicit in eXtreme Programming (XP) and Agile software development. Object conceptualization and modeling. Metaphors, vocabulary, and design for object development.Learn viable techniques for: Decomposing complex domains in terms of objects. Identifying object relationships, interactions, and constraints. Relating object behavior to internal structure and implementation design. Incorporating object thinking into XP and Agile practice."
Microsoft® Windows Server™ 2003 Inside Out
William R. Stanek - 2004
You’ll gain hundreds of timesaving solutions, troubleshooting tips, and workarounds, along with more than 100 tools and scripts on CD. Find the best and fastest ways to perform everyday system administration tasks, and challenge yourself to new levels of Windows Server mastery!Plan, prepare, and install Windows Server 2003 interactively or remotely Identify clear upgrade and migration paths, including incremental adoptions Design, manage, and maintain Active Directory sites, domains, and forests Manage storage, file systems, network resources, and print services Plan for and implement high availability with clustering and load balancing Set up and troubleshoot TCP/IP networking, DHCP, WINS, and DNS Configure security settings and manage critical updates and service packs Exploit command-line tools and scripts for simple to sophisticated tasks Perform backups and restoration and tune performance Get “insider secrets” and exclusive tips from the author! CD features:Complete eBook in PDF format Windows Server 2003 Resource Kit Tools—100+ tools and scripts for managing Active Directory operations, group policy, TCP/IP networks, the registry, security features, and more Extensive catalog of resources—with links to Internet Information Services (IIS) 6.0 Resource Kit tools, File Replication Services (FRS) tools, Management Pack tools for Microsoft Operations Manager, Microsoft Baseline Security Analyzer 1.2, and more Microsoft Systems Architecture 2.0 documentation—enterprise-class architectural blueprints and implementation guidance Insider Extras—including documentation on FRS, Emergency Management Services, certificates, and clustering A Note Regarding the CD or DVDThe print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.
The Frankenfood Myth: How Protest and Politics Threaten the Biotech Revolution
Henry I. Miller - 2004
For thousands of years, farmers have bred crops for their resistance to disease, productivity, and nutritional value; and over the past century, scientists have used increasingly more sophisticated methods for modifying them at the genetic level. But only since the 1970s have advances in biotechnology (or gene-splicing to be more precise) upped the ante, with the promise of dramatically improved agricultural products--and public resistance far out of synch with the potential risks.In this provocative and meticulously researched book, Henry Miller and Gregory Conko trace the origins of gene-splicing, its applications, and the backlash from consumer groups and government agencies against so-called Frankenfoods--from America to Zimbabwe. They explain how a happy conspiracy of anti-technology activism, bureaucratic over-reach, and business lobbying has resulted in a regulatory framework in which there is an inverse relationship between the degree of product risk and degree of regulatory scrutiny. The net result, they argue, is a combination of public confusion, political manipulation, ill-conceived regulation (from such agencies as the USDA, EPA, and FDA), and ultimately, the obstruction of one of the safest and most promising technologies ever developed--with profoundly negative consequences for the environment and starving people around the world. The authors go on to suggest a way to emerge from this morass, proposing a variety of business and policy reforms that can unlock the potential of this cutting-edge science, while ensuring appropriate safeguards and moving environmentally friendly products into the hands of farmers and consumers. This book is guaranteed to fuel the ongoing debate over the future of biotech and its cultural, economic, and political implications.
Enigma: How the Poles Broke the Nazi Code
Jerzy Straszak - 2004
In 1939, just before the outbreak of war, the Poles shared their knowledge with French and British intelligence services. This led to the powerful British decoding operation at Bletchley Park, which supplied vital intelligence known as Ultra to the allied forces. Yet, only recently have the Polish codebreakers received international recognition. This text offers a concise, up-to-date history of the Enigma decryption in Poland and the use of this achievement in Poland and England.
Cellphone: The Story of the World's Most Mobile Medium and How It Has Transformed Everything!
Paul Levinson - 2004
In contrast, the cellphone lets us walk through the world, fully connected. Cellphone explores the history of mobility in media--from books to cameras to transistor radios to laptops--and examines the unique impact of a device that sits in a pocket or palm, and lets us converse by voice or text. The restricting and liberating edge of accessibility transforms restaurants, public transport, automobiles, romance, literacy, parent-child relationships, war, and indeed all walks of life, trivial and profound. Like an organic cell that moves, evolves, combines with other cells, and generates, the cellphone has become a complex sparkplug of human life.
Assembly Language and Computer Architecture Using C++ and Java
Anthony J. Dos Reis - 2004
Because of
The World's Greatest Fix: A History of Nitrogen and Agriculture
G.J. Leigh - 2004
Starting with a layman's guide to the chemistry of nitrogen fixation, the book goes on to show how humans emerged from nomadic lifestyles and began developing towns and settlements. When they for the first time began planting the same fields year after year, they noticed quickly the need to ensure soil fertility. But how? The method they came up with is still in use to this day.
Leading It: The Toughest Job in the World
Bob Lewis - 2004
Leading IT: The Toughest Job in the World provides specific, proven techniques. If you're tired of clichés and inspiring-sounding but empty rhetoric that's devoid of concrete guidance, this is what you're looking for: A relentlessly pragmatic book, designed to help you become a more effective leader.
Perspectives on Intellectual Capital
Bernard Marr - 2004
It also offers interdisciplinary views on intellectual capital from the perspectives of public policy, knowledge management and epistemology. By analyzing the various perspectives, Editor Bernard Marr is able to present a truly comprehensive understanding of what intellectual capital is, including the state of the art thinking about it in each discipline, the common key trends, and the trajectories for future developments, learning, and practice.Contributors include many of the leading thinkers in their respective disciplines: Mie Augier and David Teece on the Economic Perspective, Bernard Marr and Goran Roos on the Strategy Perspective, Baruch Lev, Leandro Canibano, and Bernard Marr on the Accounting Perspective; Sudi Sudarsanam, Ghulam Sorwar, and Bernard Marr on the Finance Perspective; Jan Mourtisen, Per Nikolaj Bukh, and Bernard Marr on the Reporting Perspective; Lisa Fernstrom on the Marketing Perspective; Ulf Johanson on the HR Perspective; L. Martin Clotier and E. Richard Gold on the Legal Perspective; Partick H. Sullivan on the Intellectual Property Perspective; Giovanni Schiuma, Antonio Lerro, and Daniela Carlucci on the Interfirm Perspective; Ahmed Bounfour and Leif Edvinsson on the Public Policy Perspective; J-C Spender and Bernard Marr on a Knowledge-Based Perspective; Goran Roos on An Epistemology Perpsective. Foreword by Robert Grant.Bernard Marr is a Research Fellow in the Centre for Business Performance at Cranfield School of Management, UK, and Visiting Professor, University of Basilicata, Italy.
TCP/IP First-Step
Mark Sportack - 2004
It is the official protocol of the Internet and, consequently, has become the predominant communications protocol suite in many private networks and internetworks. No TCP/IP experience needed! TCP/IP First-Step explores TCP/IP concepts in a reader-friendly manner that assumes no previous experience. Learn about packetized data transfer, open networking, reference models, and standards bodies. Understand the architecture of the TCP/IP protocol suite and learn about its components, functions, and respective uses. TCP/IP First-Step helps you understand TCP/IP s role in the network. Learn more about the First-Step Series at www.ciscopress.com/firststep."
Bayesian Nets and Causality: Philosophical and Computational Foundations
Jon Williamson - 2004
But many philosophers have criticized and ultimately rejected the central assumption on which such work is based-the causal Markov Condition. So should Bayesian nets be abandoned? What explains their success in artificial intelligence? This book argues that the Causal Markov Condition holds as a default rule: it often holds but may need to be repealed in the face of counter examples. Thus, Bayesian nets are the right tool to use by default but naively applying them can lead to problems. The book develops a systematic account of causal reasoning and shows how Bayesian nets can be coherently employed to automate the reasoning processes of an artificial agent. The resulting framework for causal reasoning involves not only new algorithms, but also new conceptual foundations. Probability and causality are treated as mental notions - part of an agent's belief state. Yet probability and causality are also objective - different agents with the same background knowledge ought to adopt the same or similar probabilistic and causal beliefs. This book, aimed at researchers and graduate students in computer science, mathematics and philosophy, provides a general introduction to these philosophical views as well as exposition of the computational techniques that they motivate.
Avro Arrow: The Story of the Avro Arrow from Its Evolution to Its Extinction
Richard Organ - 2004
This Cold War aircraft was 20 years ahead of its time. Unfortunately, political realities resulted in the complete termination of the Arrow project. Cancellation of the Arrow called for the destruction of all photos, drawings, models, specifications and tooling. Even the aircraft themselves were disassembled and destroyed.Avro Arrow is a fascinating historical record with an extensive collection of rare and highly prized photos, drawings and found diagrams. Using 200 images, the book traces the story of the Arrow from its inception to roll out and flight test, including advanced proposals for the development of future versions.Primary sources include:Taped interviews, test pilots' firsthand impressions, Avro officials and many plant personnel Surviving company records Declassified government documents. Diagrams offer stunning details such as the North American strategic defense zones and interception tactics proposed for bomber attacks. This book concentrates solely on the vision, design and technical excellence of the airplane itself rather than the politics of its demise.
Expert Web Services Security in the .Net Platform
Peter A. Bromberg - 2004
Expert Web Services Security in the .NET Platform is a comprehensive treatment on how to secure Web services on the .NET platform. This book specifically focuses on Web services security, not general .NET security.Authors Brian Nantz and Laurence Moroney lay the foundation for a complete discussion of Web services security in the .NET platform by first describing the key aspects of security for the Windows operating system, Internet Information Services, and ASP.NET. They show developers how to use the WS-Security W3C specifications for industry-standard authentication, encryption, authorization, XML signature, attachments, and routing with Web services. The specific working code examples and clear-cut explanations will assist developers in readily integrating Web services security into their applications.
Aerodynamics: Selected Topics in the Light of Their Historical Development
Theodore von Karman - 2004
It recounts struggles of engineers and physicists with problems associated with lift, drag, stability, aeroelasticity, and the sound barrier. 72 figures. 1957 edition.
Enterprise Security Architecture: A Business-Driven Approach
John Sherwood - 2004
Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software--it requires a framework for developing and maintaining a system that is proactive. The book is based around the SABSA layered framework. It provides a structured approach to the steps and processes involved in developing security architectures. It also considers how some of the major business issues likely to be encountered can be resolved.