Best of
Technology

2006

CSS: The Missing Manual


David Sawyer McFarland - 2006
    You can tap into the real power of this tool with CSS: The Missing Manual. This second edition combines crystal-clear explanations, real-world examples, and dozens of step-by-step tutorials to show you how to design sites with CSS that work consistently across browsers. Witty and entertaining, this second edition gives you up-to-the-minute pro techniques. You'll learn how to: - Create HTML that's simpler, uses less code, is search-engine friendly, and works well with CSS- Style text by changing fonts, colors, font sizes, and adding borders- Turn simple HTML links into complex and attractive navigation bars -- complete with rollover effects- Create effective photo galleries and special effects, including drop shadows- Get up to speed on CSS 3 properties that work in the latest browser versions- Build complex layouts using CSS, including multi-column designs Style web pages for printing With CSS: The Missing Manual, Second Edition, you'll find all-new online tutorial pages, expanded CSS 3 coverage, and broad support for Firebox, Safari, and other major web browsers, including Internet Explorer 8. Learn how to use CSS effectively to build new websites, or refurbish old sites that are due for an upgrade.

Computer Architecture: A Quantitative Approach


John L. Hennessy - 2006
    Today, Intel and other semiconductor firms are abandoning the single fast processor model in favor of multi-core microprocessors--chips that combine two or more processors in a single package. In the fourth edition of "Computer Architecture," the authors focus on this historic shift, increasing their coverage of multiprocessors and exploring the most effective ways of achieving parallelism as the key to unlocking the power of multiple processor architectures. Additionally, the new edition has expanded and updated coverage of design topics beyond processor performance, including power, reliability, availability, and dependability. CD System Requirements"PDF Viewer"The CD material includes PDF documents that you can read with a PDF viewer such as Adobe, Acrobat or Adobe Reader. Recent versions of Adobe Reader for some platforms are included on the CD. "HTML Browser"The navigation framework on this CD is delivered in HTML and JavaScript. It is recommended that you install the latest version of your favorite HTML browser to view this CD. The content has been verified under Windows XP with the following browsers: Internet Explorer 6.0, Firefox 1.5; under Mac OS X (Panther) with the following browsers: Internet Explorer 5.2, Firefox 1.0.6, Safari 1.3; and under Mandriva Linux 2006 with the following browsers: Firefox 1.0.6, Konqueror 3.4.2, Mozilla 1.7.11. The content is designed to be viewed in a browser window that is at least 720 pixels wide. You may find the content does not display well if your display is not set to at least 1024x768 pixel resolution. "Operating System"This CD can be used under any operating system that includes an HTML browser and a PDF viewer. This includes Windows, Mac OS, and most Linux and Unix systems. Increased coverage on achieving parallelism with multiprocessors. Case studies of latest technology from industry including the Sun Niagara Multiprocessor, AMD Opteron, and Pentium 4. Three review appendices, included in the printed volume, review the basic and intermediate principles the main text relies upon. Eight reference appendices, collected on the CD, cover a range of topics including specific architectures, embedded systems, application specific processors--some guest authored by subject experts.

CSS Mastery: Advanced Web Standards Solutions


Andy Budd - 2006
    You'll learn how to: - Plan, organize, and maintain your stylesheets more effectively- Apply the secrets of liquid, elastic, and hybrid layouts- Create flickr-style image maps, remote rollovers, and other advanced CSS features- Lay out forms using pure CSS- Recognize common browser bugs, and how to fix themWhile CSS is a relatively simple technology to learn, it is a difficult one to master. When you first start developing sites using CSS, you will come across all kinds of infuriating browser bugs and inconsistencies. It sometimes feels like there are a million and one different techniques to master, spread across a bewildering array of websites. The range of possibilities seems endless and makes for a steep and daunting learning curve. By bringing all of the latest tips, tricks, and techniques together in one handy reference, this book demystifies the secrets of CSS and makes the journey to CSS mastery as simple and painless as possible. While most books concentrate on basic skills, this one is different, assuming that you already know the basics and why you should be using CSS in your work, and concentrating mainly on advanced techniques. It begins with a brief recap of CSS fundamentals such as the importance of meaningful markup, how to structure and maintain your code, and how the CSS layout model really works. With the basics out of the way, each subsequent chapter details a particular aspect of CSS-based design. Through a series of easy-to-follow tutorials, you will learn practical CSS techniques you can immediately start using in your daily work. Browser inconsistencies are the thorn in most CSS developers' sides, so we have dedicated two whole chapters to CSS hacks, filters, and bug fixing, as well as looking at image replacement; professional link, form, and list styling; pure CSS layouts; and much more. All of these techniques are then put into practice in two beautifully designed case studies, written by two of the world's best CSS designers, Simon Collison and Cameron Moll. Summary of Contents: - Chapter 1: Setting the Foundations- Chapter 2: Visual Formatting Model Recap- Chapter 3: Background Images and Image Replacement- Chapter 4: Styling Links- Chapter 5: Styling Lists and Creating Nav Bars- Chapter 6: Styling Forms and Data Tables- Chapter 7: Layout- Chapter 8: Hacks and Filters- Chapter 9: Bugs and Bug Fixing- Case Study 1: More Than Doodles- Case Study 2: Tuscany Luxury Resorts

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities


Mark Dowd - 2006
    Drawing on their extraordinary experience, they introduce a start-to-finish methodology for "ripping apart" applications to reveal even the most subtle and well-hidden security flaws.

Digital Restoration from Start to Finish: How to Repair Old and Damaged Photographs


Ctein - 2006
    Nothing is left out, from choosing the right hardware and software and getting the photographs into the computer, to getting the finished photo out of the computer and preserving it for posterity.LEARN HOW TO: Scan faded and damaged prints or films Improve snapshots with Shadow/Highlight adjustmentCorrect uneven exposureFix color and skin tones quickly with Curves, plug-ins, and Hue/Saturation adjustment layersCorrect uneven exposure and do dodging and burning-in with adjustment layersHand-tint your photographs easilyCorrect skin tones with airbrush layersClean up dust and scratches speedily and effectivelyRepair small and large cracks with masks and filtersEliminate tarnish and silvered-out spots from a photograph in just a few stepsMinimize unwanted print surface texturesErase mildew spotsEliminate dots from newspaper photographsIncrease sharpness and fine detailandMaximize print quality

Getting Real: The Smarter, Faster, Easier Way to Build a Web Application


37 Signals - 2006
    At under 200 pages it's quick reading too. Makes a great airplane book.

Hubble: 15 Years of Discovery


Lars Lindberg Christensen - 2006
    It consistently delivers super-sharp images and clean, uncontaminated spectra over the entire near-infrared and ultraviolet regions of the electromagnetic spectrum. This has opened up new scientific territory and resulted in many paradigm-breaking discoveries.To mark the 15th anniversary on 24 April 2005, the European Space Agency presented a series of unique activities in collaboration with partners all over Europe. This included an exclusive, full-length DVD film (one of the most widely distributed documentary films ever); please see the link to info about the film below:ttp: //www.spacetelescope.org/projects/anniv...

Pro JavaScript Techniques


John Resig - 2006
    It provides everything you need to know about modern JavaScript, and shows what JavaScript can do for your web sites. This book doesn't waste any time looking at things you already know, like basic syntax and structures.Expert web developer and author John Resig concentrates on fundamental, vital topics--what modern JavaScripting is (and isnt), the current state of browser support, and pitfalls to be wary of. The book is organized into four sections:Modern JavaScript development using JavaScript the object-oriented way, creating reusable code, plus testing and debugging DOM scripting updating content and styles, plus events, and effect and event libraries How Ajax works, overcoming problems, and using libraries to speed up development of Ajax applications The future of JavaScript looking at cutting edge topics like JSON, HTML5, and moreAll concepts are backed up by real-world examples and case studies, and John provides numerous reusable functions and classes to save you time in your development. There are also up-to-date reference appendixes for the DOM, events, browser support (including IE7), and frameworks, so you can look up specific details quickly and easily.

Optimal State Estimation: Kalman, H Infinity, and Nonlinear Approaches


Dan Simon - 2006
    The author presents state estimation theory clearly and rigorously, providing the right amount of advanced material, recent research results, and references to enable the reader to apply state estimation techniques confidently across a variety of fields in science and engineering. While there are other textbooks that treat state estimation, this one offers special features and a unique perspective and pedagogical approach that speed learning: * Straightforward, bottom-up approach begins with basic concepts and then builds step by step to more advanced topics for a clear understanding of state estimation * Simple examples and problems that require only paper and pen to solve lead to an intuitive understanding of how theory works in practice * MATLAB(r)-based source code that corresponds to examples in the book, available on the author's Web site, enables readers to recreate results and experiment with other simulation setups and parameters Armed with a solid foundation in the basics, readers are presented with a careful treatment of advanced topics, including unscented filtering, high order nonlinear filtering, particle filtering, constrained state estimation, reduced order filtering, robust Kalman filtering, and mixed Kalman/H? filtering. Problems at the end of each chapter include both written exercises and computer exercises. Written exercises focus on improving the reader's understanding of theory and key concepts, whereas computer exercises help readers apply theory to problems similar to ones they are likely to encounter in industry. With its expert blend of theory and practice, coupled with its presentation of recent research results, Optimal State Estimation is strongly recommended for undergraduate and graduate-level courses in optimal control and state estimation theory. It also serves as a reference for engineers and science professionals across a wide array of industries.

Architectura Navalis Mercatoria: The Classic of Eighteenth-Century Naval Architecture


Fredrik Henrik Chapman - 2006
    Seventy detailed illustrations chart vessel dimensions, crew size, storage capabilities, and manner of rigging for packet ships, pleasure boats, privateers, frigates, and other ships.Fredrik Henrik af Chapman (1721–1808) was a naval architect, a vice-admiral in the Swedish navy, and the author of several books on shipbuilding. This volume constitutes an indispensable treatise for model builders, naval historians, and maritime enthusiasts, as well as anyone who appreciates the art of drafting.

Knowledge, Forms, the Aviary


Karla Kelsey - 2006
    This book, winner of the Sawtooth Poetry Prize, takes flight from Plato's Theaetetus, in which Socrates tells us that the mind works as an aviary--particles of knowledge fly around like birds, and the thinker plucks them down to use when he or she sees fit. The bird becomes a metaphor for the action of the mind folding and unfolding into explosions and navigational patterns of flight. Lyrical and thought-provoking, it is a masterful debut. Kelsey writes what it is to know, of 'what we become/ when the universe is seen in lights of its generation.' We are, in this work, in the midst of things, and as Plato's Socrates has it, 'the eye becomes filled with vision and now sees, and becomes, not vision but a seeing eye.'--Carolyn Forche.

Caster's Blog: A Geek Love Story


Marcus Alexander Hart - 2006
    in blog form!Ray Caster is too awkward to talk to people in the real world. Instead, he pours his heart and soul into a blog about movies, office drama, and "Star Trek" reruns. So when he meets Shadoe Moon Beaupre—literate, beautiful, and basically the coolest, most perfect girl he can possibly imagine—he has no idea how to get her attention. Caster needs a crash course in romance, so he turns to his online followers for advice on how to overcome his crippling social anxiety and win the heart of his dream girl before she beams out of his life forever.---The blog posts in "Caster’s Blog: A Geek Love Story" were written online in real time over the course of one year. None of Caster's followers knew he was a fictional character until the publication of the first-edition of this book. Come for the story, stay for the social experiment!

The Thompson Submachine Gun: From Prohibition Chicago to World War II


Martin Pegler - 2006
    Developed late in World War I (1914-1918) to be a fearsome trench-warfare weapon, the Thompson submachine gun's fame and success came in unexpected quarters. An iconic and innovative design, the M1921 Thompson was soon adopted by Prohibition-era gangs and used ruthlessly on the streets of New York and Chicago. But its military career was relaunched with the outbreak of World War II (1939-1945), used by armies, commandos and resistance groups worldwide.Using expert knowledge and first-hand accounts, this chronicle of one of the world's greatest submachine guns analyzes the Thompson's development, its legacy, and the experiences of the men who used it in combat. Features rare photographs and original artwork by Peter Dennis.

SQL Server 2005 Practical Troubleshooting: The Database Engine


Ken Henderson - 2006
     This is the definitive guide to troubleshooting the Microsoft SQL Server 2005 database engine, direct from the people who know it most intimately: the people who wrote it, designed it, and support it. SQL Server expert Ken Henderson, author of the best-selling Guru's Guides to SQL Server, has assembled a "dream team" of SQL Server developers and support engineers to provide in-depth troubleshooting and diagnostic information that has never been documented before: information that would be impossible to get without access to Microsoft's own source code. From caching to clustering, query processing to Service Broker, this book will help you address even the toughest problems with database engine operations. Each chapter begins with a brief architectural overview of a key SQL Server component, then drills down into the most common problems users encounter, offering specific guidance on investigating and resolving them. You'll find comprehensive, in-depth chapters on - Waiting and blocking - Data corruption and recovery - Memory - Procedure cache issues - Query processing - Server crashes and other critical failures - Service Broker - SQLOS and scheduling - tempdb - Clustering This is the indispensable resource for everyone who must keep SQL Server running smoothly: DBAs, database application developers, API programmers, and Web developers alike. Contents About the Authors ix Preface xii Acknowledgments xiv 1 Waiting and Blocking Issues 1 2 Data Corruption and Recovery Issues 47 3 Memory Issues 137 4 Procedure Cache Issues 183 5 Query Processor Issues 225 6 Server Crashes and Other Critical Failures 273 7 Service Broker Issues 331 8 SQLOS and Scheduling Issues 369 9 Tempdb Issues 411 10 Clustering Issues 425 The Aging Champion 441 Index 445

Joint Cognitive Systems: Patterns in Cognitive Systems Engineering


David D. Woods - 2006
    But how does new technology and more powerful automation change our work?Research in Cognitive Systems Engineering (CSE) looks at the intersection of people, technology, and work. What it has found is not stories of simplification through more automation, but stories of complexity and adaptation. When work changed through new technology, practitioners had to cope with new complexities and tighter constraints. They adapted their strategies and the artifacts to work around difficulties and accomplish their goals as responsible agents. The surprise was that new powers had transformed work, creating new roles, new decisions, and new vulnerabilities. Ironically, more autonomous machines have created the requirement for more sophisticated forms of coordination across people, and across people and machines, to adapt to new demands and pressures.This book synthesizes these emergent Patterns though stories about coordination and mis-coordination, resilience and brittleness, affordance and clumsiness in a variety of settings, from a hospital intensive care unit, to a nuclear power control room, to a space shuttle control center. The stories reveal how new demands make work difficult, how people at work adapt but get trapped by complexity, and how people at a distance from work oversimplify their perceptions of the complexities, squeezing practitioners. The authors explore how CSE observes at the intersection of people, technology, and work, how CSE abstracts patterns behind the surface details and wide variations, and how CSE discovers promising new directions to help people cope with complexities. The stories of CSE show that one key to well-adapted work is the ability to be prepared to be surprised. Are you ready?

CWNA Certified Wireless Network Administrator Official Study Guide: Exam PW0-104


David D. Coleman - 2006
    This valuable guide covers all objectives for the newest version of the PW0-104 exam, including radio technologies; antenna concepts; wireless LAN hardware and software; network design, installation and management; wireless standards and organizations; 802.11 network architecture; wireless LAN security; performing site surveys; and troubleshooting. Also included are hands-on exercises, chapter review questions, a detailed glossary, and a pre-assessment test. The CD-ROM features two bonus exams, over 150 flashcards, and numerous White Papers and demo software. Note: CD-ROM materials for eBook purchases can be downloaded from CWNP’s website at www.cwnp.com/sybex.

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities


John McDonald - 2006
    Drawing on their extraordinary experience, they introduce a start-to-finish methodology for "ripping apart" applications to reveal even the most subtle and well-hidden security flaws. "The Art of Software Security Assessment" covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code "drawn from past flaws in many of the industry's highest-profile applications." Coverage includes - Code auditing: theory, practice, proven methodologies, and secrets of the trade - Bridging the gap between secure software design and post-implementation review - Performing architectural assessment: design review, threat modeling, and operational review - Identifying vulnerabilities related to memory management, data types, and malformed data - UNIX/Linux assessment: privileges, files, and processes - Windows-specific issues, including objects and the filesystem - Auditing interprocess communication, synchronization, and state - Evaluating network software: IP stacks, firewalls, and common application protocols - Auditing Web applications and technologies

Colossus: The Secrets of Bletchley Park's Codebreaking Computers


B. Jack Copeland - 2006
    This book rewrites the history of computer science, arguing that in reality Colossus--the giant computer built by the British secret service during World War II--predates ENIAC by two years.Colossus was built during the Second World War at the Government Code and Cypher School at Bletchley Park. Until very recently, much about the Colossus machine was shrouded in secrecy, largely because the code-breaking algorithms that were employed during World War II remained in use by the British security services until a short time ago. In addition, the United States has recently declassified a considerable volume of wartime documents relating to Colossus. Jack Copeland has brought together memoirs of veterans of Bletchley Park--the top-secret headquarters of Britain's secret service--and others who draw on the wealth of declassified information to illuminate the crucial role Colossus played during World War II. Included here are pieces by the former WRENS who actually worked the machine, the scientist who pioneered the use of vacuum tubes in data processing, and leading authorities on code-breaking and computer science.A must read for anyone curious about code-breaking or World War II espionage, Colossus offers a fascinating insider's account of the world first giant computer, the great great grandfather of the massive computers used today by the CIA and the National Security Agency.

Mr. Lincoln's T-Mails: The Untold Story of How Abraham Lincoln Used the Telegraph to Win the Civil War


Tom Wheeler - 2006
    Among the many modern marvels that gave the North an advantage was the telegraph, which Lincoln used to stay connected to the forces in the field in almost real time.No leader in history had ever possessed such a powerful tool to gain control over a fractious situation. An eager student of technology, Lincoln (the only president to hold a patent) had to learn to use the power of electronic messages. Without precedent to guide him, Lincoln began by reading the telegraph traffic among his generals. Then he used the telegraph to supplement his preferred form of communication—meetings and letters. He did not replace those face-to-face interactions. Through this experience, Lincoln crafted the best way to guide, reprimand, praise, reward, and encourage his commanders in the field.Mr. Lincoln's T-Mails tells a big story within a small compass. By paying close attention to Lincoln's "lightning messages," we see a great leader adapt to a new medium. No reader of this work of history will be able to miss the contemporary parallels. Watching Lincoln carefully word his messages—and follow up on those words with the right actions—offers a striking example for those who spend their days tapping out notes on computers and BlackBerrys.An elegant work of history, Mr. Lincoln's T-Mails is an instructive example of timeless leadership lessons.

From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism


Fred Turner - 2006
    Bleak tools of the cold war, they embodied the rigid organization and mechanical conformity that made the military-industrial complex possible. But by the 1990s—and the dawn of the Internet—computers started to represent a very different kind of world: a collaborative and digital utopia modeled on the communal ideals of the hippies who so vehemently rebelled against the cold war establishment in the first place. From Counterculture to Cyberculture is the first book to explore this extraordinary and ironic transformation. Fred Turner here traces the previously untold story of a highly influential group of San Francisco Bay–area entrepreneurs: Stewart Brand and the Whole Earth network. Between 1968 and 1998, via such familiar venues as the National Book Award–winning Whole Earth Catalog, the computer conferencing system known as WELL, and, ultimately, the launch of the wildly successful Wired magazine, Brand and his colleagues brokered a long-running collaboration between San Francisco flower power and the emerging technological hub of Silicon Valley. Thanks to their vision, counterculturalists and technologists alike joined together to reimagine computers as tools for personal liberation, the building of virtual and decidedly alternative communities, and the exploration of bold new social frontiers. Shedding new light on how our networked culture came to be, this fascinating book reminds us that the distance between the Grateful Dead and Google, between Ken Kesey and the computer itself, is not as great as we might think.

Transforming the Twentieth Century: Technical Innovations and Their Consequences: Technical Innovations and Their Consequences v. 2


Vaclav Smil - 2006
    The history of the 20th century is rooted in amazing technical advances of 1871-1913, but the century differs so remarkably from the preceding 100 years because of several unprecedented combinations. The 20th century had followed on the path defined during the half century preceding the beginning of World War I, but it has traveled along that path at a very different pace, with different ambitions and intents. The new century's developments elevated both the magnitudes of output and the spatial distribution of mass industrial production and to new and, in many ways, virtually incomparable levels. Twentieth century science and engineering conquered and perfected a number of fundamental challenges which remained unresolved before 1913, and which to many critics appeared insoluble. This book is organized in topical chapters dealing with electricity, engines, materials and syntheses, and information techniques. It concludes with an extended examination of contradictory consequences of our admirable technical progress by confronting the accomplishments and perils of systems that brought liberating simplicity as well as overwhelming complexity, that created unprecedented affluence and equally unprecedented economic gaps, that greatly increased both our security and fears as well as our understanding and ignorance, and that provided the means for greater protection of the biosphere while concurrently undermining some of the key biophysical foundations of life on Earth. Transforming the Twentieth Century will offer a wide-ranging interdisciplinary appreciation of the undeniable technical foundations of the modern world as well as a multitude of welcome and worrisome consequences of these developments. It will combine scientific rigor with accessible writing, thoroughly illustrated by a large number of appropriate images that will include historical photographs and revealing charts of long-term trends.

Game Development Essentials: Game Project Management


Jeannie Novak - 2006
    This book offers an overview of the game project management process including: roles and responsibilities of team members; phases of production; concept development; testing, marketing; scheduling; and budgeting. The fast-growing game industry has fueled rapid upward movement of game production staff into the ranks of management. This book will train readers in the tools and techniques necessary to become effective team leaders.

Wardriving & Wireless Penetration Testing


Chris Hurley - 2006
    This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.

Colossus: Bletchley Park's Greatest Secret


Paul Gannon - 2006
    Using science, math, innovation, and improvisation, Bletchley Park code breakers worked furiously to invent a machine to decipher what turned out to be the secrets of Nazi high command. It was called Colossus. What these code breakers didn't realize was that they had fashioned the world's first true computer. When the war ended, this incredible invention was dismantled and hidden away for almost 50 years. Paul Gannon has pieced together the tremendous story of what is now recognized as the greatest secret of Bletchley Park.

Electric Power Systems


Alexandra von Meier - 2006
    It begins with a thorough discussion of the underlying physical concepts of electricity, circuits, and complex power that serves as a foundation for more advanced material. Readers are then introduced to the main components of electric power systems, including generators, motors and other appliances, and transmission and distribution equipment such as power lines, transformers, and circuit breakers. The author explains how a whole power system is managed and coordinated, analyzed mathematically, and kept stable and reliable. Recognizing the economic and environmental implications of electric energy production and public concern over disruptions of service, this book exposes the challenges of producing and delivering electricity to help inform public policy decisions. Its discussions of complex concepts such as reactive power balance, load flow, and stability analysis, for example, offer deep insight into the complexity of electric grid operation and demonstrate how and why physics constrains economics and politics. Although this survival guide includes mathematical equations and formulas, it discusses their meaning in plain English and does not assume any prior familiarity with particular notations or technical jargon. Additional features include: * A glossary of symbols, units, abbreviations, and acronyms * Illustrations that help readers visualize processes and better understand complex concepts * Detailed analysis of a case study, including a Web reference to the case, enabling readers to test the consequences of manipulating various parameters With its clear discussion of how electric grids work, Electric Power Systems is appropriate for a broad readership of professionals, undergraduate and graduate students, government agency managers, environmental advocates, and consumers.

Let's Tell a Story Together


Jimmy Maher - 2006
    http://maher.filfre.net/if-book/

Architecture and Patterns for It Service Management, Resource Planning, and Governance: Making Shoes for the Cobbler's Children


Charles T. Betz - 2006
    It fills the gap between high-level guidance on IT governance and detailed discussions about specific vendor technologies. It provides a unique value chain approach to integrating the COBIT, ITIL, and CMM frameworks into a coherent, unified whole. It presents a field-tested, detailed conceptual information model with definitions and usage scenarios, mapped to both process and system architectures.This book is recommended for practitioners and managers engaged in IT support in large companies, particularly those who are information architects, enterprise architects, senior software engineers, program/project managers, and IT managers/directors.

Cyber Security


Edward Amoroso - 2006
    In his role as Chief Security Officer, hes helped to discover and counter virtually every conceivable type of malicious threat that has been targeted at computers and networks around the world. In this new book, Amoroso brings his wealth of experience and expertise chasing computer hackers to the lay reader and he leaves no stone untouched! Some of his themes may be uncomfortable, but they simply must be examined in order to gain a proper perspective on our growing risk. Software Amoroso explains that we should be ashamed of how weve allowed bad software to pervade every aspect of our lives, leaving gaping vulnerabilities in critical infrastructure systems in our society. System Administration Virtually every one of us has now become an amateur system administrator of some sort of computer and the result is an unforeseen security nightmare that leaves us vulnerable to botnets, worms, and viruses. Complexity Computer scientists know that reducing complexity is the most important task in the design of software and systems. But what has happened instead is that systems abound with complex features that hackers control with ease. In this book, readers will find themselves absorbed into Amorosos endless anecdotes with real people, governments, and businesses. Youll laugh as Amoroso relates his time wandering around the office of a political party, finding their router unprotected. Youll wince as he explains the Cyber Security ignorance hes witnessed among so many corporate IT chiefs. Some of the stories are shocking, others a bit amusing. But in all cases, the underlying message is clear: Cyber Security plays a fundamental role in the way we live our lives. And understanding its basics is critical for citizens, lawmakers, and business people around the world.

Girls Make Media


Mary Celeste Kearney - 2006
    history, and they are creating media texts in virtually every format currently possible--magazines, films, musical recordings, and websites. Girls Make Media explores how young female media producers have reclaimed and reconfigured girlhood as a site for radical social, cultural, and political agency. Central to the book is an analysis of Riot Grrrl--a 1990s feminist youth movement from a fusion of punk rock and gender theory-and the girl power movement it inspired. The author also looks at the rise of girls-only media education programs, and the creation of girls' studies.This book will be essential reading for anyone seeking to understand contemporary female youth in today's media culture.

Alexander Graham Bell


John Micklos Jr. - 2006
    Interviews with experts and lively writing deliver the accurate reporting you expect from TIME For Kids®. Historical and contemporary photographs capture the life of this compassionate man and show how his innovative inventions still help us today.

The Professional Caterer's Handbook: How to Open and Operate a Financially Successful Catering Business (with CD-ROM)


Lora Arduser - 2006
    No component is left out of this encyclopedic new book explaining the risky but potentially highly rewarding business of catering. Whether your catering operation is on-premise, off-premise, mobile, inside a hotel, part of a restaurant, or from your own home kitchen you will find this book very useful. You will learn the fundamentals: profitable menu planning, successful kitchen management, equipment layout and planning, and food safety and HACCP. The employee and management chapters deal with how to hire and keep a qualified professional staff, manage and train employees, and report tips properly in accordance with the latest IRS requirements. The financial chapters focus on basic cost-control systems, accounting and bookkeeping procedures, auditing, successful budgeting and profit planning. You ll also master public relations and publicity, learn low-cost internal marketing ideas, and discover low-and no-cost ways to satisfy customers. One section of the book is devoted to home-based catering entrepreneurs. With low startup costs and overhead, a home-based catering business can be an ideal do-it-yourself part-or full-time business. Another section is for restaurateurs that wish to add catering to their restaurant operation. A successful restaurant s bottom line could be greatly enhanced by instituting catering functions in slow hours or down time. For example, many restaurants are closed on Saturday afternoons, so this would be an ideal time to create a profit by catering a wedding This book is also ideal for professionals in the catering industries, as well as newcomers who may be looking for answers to cost containment and training issues. There are literally hundreds of innovative ways demonstrated to streamline.

Head First Object-Oriented Analysis and Design: A Brain Friendly Guide to OOA&D


Brett McLaughlin - 2006
    What sets this book apart is its focus on learning. The authors have made the content of OOAD accessible, usable for the practitioner." Ivar Jacobson, Ivar Jacobson Consulting"I just finished reading HF OOA&D and I loved it! The thing I liked most about this book was its focus on why we do OOA&D-to write great software!" Kyle Brown, Distinguished Engineer, IBM"Hidden behind the funny pictures and crazy fonts is a serious, intelligent, extremely well-crafted presentation of OO Analysis and Design. As I read the book, I felt like I was looking over the shoulder of an expert designer who was explaining to me what issues were important at each step, and why." Edward Sciore, Associate Professor, Computer Science Department, Boston College Tired of reading Object Oriented Analysis and Design books that only makes sense after you're an expert? You've heard OOA&D can help you write great software every time-software that makes your boss happy, your customers satisfied and gives you more time to do what makes you happy.But how?Head First Object-Oriented Analysis & Design shows you how to analyze, design, and write serious object-oriented software: software that's easy to reuse, maintain, and extend; software that doesn't hurt your head; software that lets you add new features without breaking the old ones. Inside you will learn how to:Use OO principles like encapsulation and delegation to build applications that are flexible Apply the Open-Closed Principle (OCP) and the Single Responsibility Principle (SRP) to promote reuse of your code Leverage the power of design patterns to solve your problems more efficiently Use UML, use cases, and diagrams to ensure that all stakeholders are communicating clearly to help you deliver the right software that meets everyone's needs.By exploiting how your brain works, Head First Object-Oriented Analysis & Design compresses the time it takes to learn and retain complex information. Expect to have fun, expect to learn, expect to be writing great software consistently by the time you're finished reading this!

The Oxford Handbook of Engineering and Technology in the Classical World


John Peter Oleson - 2006
    This volume highlights both the accomplishments of the ancient societies and the remaining research problems, and stimulates further progress in the history of ancient technology. The subject matter of the book is the technological framework of the Greek and Roman cultures from ca. 800 B.C. through ca. A.D. 500 in the circum-Mediterranean world and Northern Europe. Each chapter discusses a technology or family of technologies from an analytical rather than descriptive point of view, providing a critical summation of our present knowledge of the Greek and Roman accomplishments in the technology concerned and the evolution of their technical capabilities over the chronological period. Each presentation reviews the issues and recent contributions, and defines the capacities and accomplishments of the technology in the context of the society that used it, the available technological shelf, and the resources consumed. These studies introduce and synthesize the results of excavation or specialized studies. The chapters are organized in sections progressing from sources (written and representational) to primary (e.g., mining, metallurgy, agriculture) and secondary (e.g., woodworking, glass production, food preparation, textile production and leather-working) production, to technologies of social organization and interaction (e.g., roads, bridges, ships, harbors, warfare and fortification), and finally to studies of general social issues (e.g., writing, timekeeping, measurement, scientific instruments, attitudes toward technology and innovation) and the relevance of ethnographic methods to the study of classical technology. The unrivalled breadth and depth of this volume make it the definitive reference work for students and academics across the spectrum of classical studies.

CompTIA A+ Certification All-in-One Exam Guide (A+ Certification All in One Exam)


Mike Meyers - 2006
    Mike Meyers, the leading authority on CompTIA A+ certification and training, has helped hundreds of thousands of people pass the CompTIA A+ exams-and now he can help you too. Inside, you'll find detailed coverage of the exam format, helpful exam tips, end-of-chapter practice questions, and hundreds of photographs and illustrations. After you ace the exams, this comprehensive guide will serve as an essential on-the-job reference.Full details on all exam objectives, including how to: Work with CPUs, RAM, and motherboards Install, partition, and format hard drives Work with portable PCs, PDAs, and wireless technologies Install, upgrade, and troubleshoot Windows 2000 Professional and Windows XP Install sound and video cards Manage printers and connect to networks Implement security measures Understand safety and environmental issues Establish good communication skills and adhere to privacy policies The CD-ROM features: Eight full practice exams covering CompTIA A+ Essentials and Exams 220-602, 220-603, & 220-604 One hour of LearnKey video training featuring Mike Meyers teaching key A+ topics Electronic copy of the book Complete exam objective map for all four exams List of official CompTIA A+ acronyms Useful tools and utilities for PC technicians

The Art of SQL


Stephane Faroult - 2006
    Database performance has become a major headache, and most IT departments believe that developers should provide simple SQL code to solve immediate problems and let DBAs tune any bad SQL later.In The Art of SQL, author and SQL expert Stephane Faroult argues that this safe approach only leads to disaster. His insightful book, named after Art of War by Sun Tzu, contends that writing quick inefficient code is sweeping the dirt under the rug. SQL code may run for 5 to 10 years, surviving several major releases of the database management system and on several generations of hardware. The code must be fast and sound from the start, and that requires a firm understanding of SQL and relational theory.The Art of SQL offers best practices that teach experienced SQL users to focus on strategy rather than specifics. Faroult's approach takes a page from Sun Tzu's classic treatise by viewing database design as a military campaign. You need knowledge, skills, and talent. Talent can't be taught, but every strategist from Sun Tzu to modern-day generals believed that it can be nurtured through the experience of others. They passed on their experience acquired in the field through basic principles that served as guiding stars amid the sound and fury of battle. This is what Faroult does with SQL.Like a successful battle plan, good architectural choices are based on contingencies. What if the volume of this or that table increases unexpectedly? What if, following a merger, the number of users doubles? What if you want to keep several years of data online? Faroult's way of looking at SQL performance may be unconventional and unique, but he's deadly serious about writing good SQL and using SQL well. The Art of SQL is not a cookbook, listing problems and giving recipes. The aim is to get you-and your manager-to raise good questions.

Administering Windows Vista Security: The Big Surprises


Mark Minasi - 2006
    From leading Windows expert Mark Minasi comes this "just-in-time" book to get you there. This targeted, hands-on guide takes a rapid-fire approach to the biggest security changes and how they'll affect business as usual for those who must integrate and provide technical support for Windows Vista. You'll find practical instruction, tips, workarounds, and much more. * Work through a slew of Vista surprises, such as logging on as Administrator and how to re-enable Run * Discover how virtualization works--and where it doesn't * Find out why you can no longer delete files in System32, even though you are an Administrator * Get familiar with new post-boot security features such as PatchGuard * Protect laptops to the max with the innovative BitLocker feature * Meet the new Windows Integrity mechanism * Explore the revamped Event Viewer, event forwarding, and new troubleshooting tools Go above and beyond what you've heard about Vista Discover the changes to Share and Registry Access Catch up on all the encryption news and services Try out Vista Remote Desktop with its enhanced security About the Series The Mark Minasi Windows Administrator Library equips system administrators with in-depth technical solutions to the many challenges associated with administering Windows in an enterprise setting. Series editor Mark Minasi, a leading Windows expert, not only selects the topics and authors, he also develops each book to meet the specific needs and goals of systems administrators, MIS professionals, help-desk personnel, and corporate programmers.

Process, Materials, and Measurements: All the Details Industrial Designers Need to Know But Can Never Find


Dan Cuffaro - 2006
    This book collects all the crucial information designers need to know on a daily basis and organizes it in one neat essential handbook.For designers to be able to make designs that work and endure and to ensure they are legal, they need to know-or be able to find-an endless number of details. Whether it's what kind of glue needs to be used on a certain surface, metric equivalents, thread sizes, or how to apply for a patent, these details are essential and must be readily available so designers can create successful products efficiently. This book provides designers with a comprehensive handbook they can turn to over and over again.The author includes information that is essential to successful product design, including measurement conversions, information on trademark and copyright standards as well as patents and product-related intellectual property rights/standards, setting up files for prototyping and production runs, and manufacturing and packaging options to optimize the design.

Oracle 10g: SQL [With CDROM]


Joan Casteel - 2006
    This textbook is not simply a study guide; it is written for individuals who have just a basic knowledge of databases and can be utilized in a course on this latest implementation of SQL from Oracle. Students begin with a solid foundation for creating databases (7 chapters) then strengthen their knowledge in creating queries (7 chapters). To assist students in bridging SQL topics to further studies, the last two chapters introduce students to SQL tuning, compare Oracle's SQL syntax to other databases (MS SQL Server and MySQL) and describe how SQL can be embedded in applications (ASP.net). This textbook also covers SQL*Plus and iSQL*Plus so students can identify and distinguish the differences between these interfaces.

Beginning SQL Server 2005 Administration


Dan Wood - 2006
    With this powerful new release, you may find yourself being called upon to perform duties that are no longer strictly "administrative," duties that have become much more complicated and difficult. With that in mind, a team of experienced Microsoft Certified Professionals provides you with the necessary information to be a more competent and successful database developer or administrator. Beginning with a foundation that features detailed coverage of typical administrative duties, the authors proceed to explain how to build complex data transformations for data import, build distributed data solutions, and maintain the security and integrity of the database. You will be able to apply what you learn to real-world scenarios, and smoothly navigate the vastly changed landscape of SQL Server 2005 administration.What you will learn from this bookHow to install, maintain, and manage an SQL Server 2005 installation, including high availability and security considerations Various features such as the Common Language Runtime, SQL Server Integration Services, Notification Service, and the Service Broker How to use the tools that are necessary to manage configuration, backups, restores, security, availability, performance, and monitoring A sampling of some of the more advanced areas and complex jobs of the broadening role of a database administrator in the enterprise Who this book is forThis book is for both developers and administrators who are responsible for the management and maintenance of an SQL Server 2005 database. Familiarity with relational database concepts and SQL is assumed.Wrox Beginning guides are crafted to make learning programming languages and technologies easier than you think, providing a structured, tutorial format that will guide you through all the techniques involved. Enhance Your Knowledge Advance Your Career

Designing and Implementing Linux Firewalls with Qos Using Netfilter, Iproute2, Nat and L7-Filter


Lucian Gheorghe - 2006
    These form the crux of building Linux firewalls and QOS. The later part of the book covers 5 real-world networks for which we design the security policies, build the firewall, setup the script, and verify our installation. These comprehensive set of set up scripts and set up guidelines to create firewall protection for various specific usage scenarios are unique and set this book apart.

Software Engineering for Internet Applications


Eve Andersson - 2006
    Unlike the desktop applications that most students have already learned to build, server-based applications have multiple simultaneous users. This fact, coupled with the unreliability of networks, gives rise to the problems of concurrency and transactions, which students learn to manage by using the relational database system.After working their way to the end of the book, students will have the skills to take vague and ambitious specifications and turn them into a system design that can be built and launched in a few months. They will be able to test prototypes with end-users and refine the application design. They will understand how to meet the challenge of extreme business requirements with automatic code generation and the use of open-source toolkits where appropriate. Students will understand HTTP, HTML, SQL, mobile browsers, VoiceXML, data modeling, page flow and interaction design, server-side scripting, and usability analysis.The book, which originated as the text for an MIT course, is suitable for classroom use and will be a useful reference for software professionals developing multi-user Internet applications. It will also help managers evaluate such commercial software as Microsoft Sharepoint of Microsoft Content Management Server.

Fundamentals of Plasma Physics


Paul M. Bellan - 2006
    More thorough than previous texts, it exploits new powerful mathematical techniques to develop deeper insights into plasma behavior. After developing the basic plasma equations from first principles, the book explores single particle motion with particular attention to adiabatic invariance. The author then examines types of plasma waves and the issue of Landau damping. Magnetohydrodynamic equilibrium and stability are tackled with emphasis on the topological concepts of magnetic helicity and self-organization. Advanced topics follow, including magnetic reconnection, nonlinear waves, and the Fokker-Planck treatment of collisions. The book concludes by discussing unconventional plasmas such as non-neutral and dusty plasmas. Written for beginning graduate students and advanced undergraduates, this text emphasizes the fundamental principles that apply across many different contexts.

Art And Anatomy In Renaissance Italy: Images From A Scientific Revolution


Domenico Laurenza - 2006
    Medical science advanced at an unprecedented rate, and physicians published on anatomy as never before. Simultaneously, many of the period's most prominent artists—including Leonardo and Michelangelo in Florence, Raphael in Rome, and Rubens working in Italy—turned to the study of anatomy to inform their own drawings and sculptures, some by working directly with anatomists and helping to illustrate their discoveries. The result was a rich corpus of art objects detailing the workings of the human body with an accuracy never before attained.Art and Anatomy in Renaissance Italy examines this crossroads between art and science, showing how the attempt to depict bone structure, musculature, and our inner workings—both in drawings and in three dimensions—constituted an important step forward in how the body was represented in art. While already remarkable at the time of their original publication, the anatomical drawings by 16th-century masters have even foreshadowed developments in anatomic studies in modern times.

Space: The Ultimate Frontier


Mike Sharpe - 2006
    

LPI Linux Certification in a Nutshell


Steven Pritchard - 2006
    This book will help you determine when you're ready to take the exams, which are technically challenging and designed to reflect the skills that administrators need in real working environments.As more corporations adopt Linux as the networking backbone for their IT systems, the demand for certified technicians will become even greater. Passing the LPI exams will broaden your career options because the LPIC is the most widely known and respected Linux certification program in the world. Linux Journal recognized the LPI as the best Training and Certification Program. The exams were developed by the Linux Professional Institute, an international, volunteer-driven organization with affiliates in a dozen countries.The core LPI exams cover two levels. Level 1 tests a basic knowledge of Linux installation, configuration, and command-line skills. Level 2 goes into much more depth regarding system troubleshooting and network services such as email and the Web. The second edition of LPI Linux Certification in a Nutshell is a thoroughly researched reference to these exams. The book is divided into four parts, one for each of the LPI exams. Each part features not only a summary of the core skills you need, but sample exercises and test questions, along with helpful hints to let you focus your energies.Major topics include:GNU and Unix commands Linux installation and package management Devices, filesystems, and kernel configuration Text editing, processing, and printing The X Window System Networking fundamentals and troubleshooting Security, including intrusion detection, SSH, Kerberos, and more DNS, DHCP, file sharing, and other networking infrastructure Email, FTP, and Web services Praise for the first edition:"Although O'Reilly's Nutshell series are intended as 'Desktop Reference' manuals, I have to recommend this one as a good all-round read; not only as a primer for LPI certification, but as an excellent introductory text on GNU/Linux. In all, this is a valuable addition to O'Reilly's already packed stable of Linux titles and I look forward to more from the author." --First Monday

The C# Programming Language


Anders Hejlsberg - 2006
    Written by the language's architect, Anders Hejlsberg, and design team members, and now updated for C# 2.0, The C# Programming Language, Second Edition, is the definitive technical reference for C#. The book provides the complete specification of the language, along with descriptions, reference materials, and code samples from the C# design team. The first part of the book opens with an introduction to the language to bring readers quickly up-to-speed on the concepts of C#. Next follows a detailed and complete technical specification of the C# 1.0 language, as delivered in Visual Studio .NET 2002 and 2003. Topics covered include Lexical Structure, Types, Variables, Conversions, Expressions, Statements, Namespaces, Exceptions, Attributes, and Unsafe Code. The second part of the book describes the many new features of C# 2.0, including Generics, Anonymous Methods, Iterators, Partial Types, and Nullable Types. This second edition describes C# 2.0 as actually released in Visual Studio .NET 2005, with many additions and improvements over the design presented in the first edition. Reference tabs and an exhaustive index allow readers to easily navigate the text and quickly find the topics that interest them most. The C# Programming Language, Second Edition, is the definitive reference for programmers who want to acquire an in-depth knowledge of C#.

Information Science


David G. Luenberger - 2006
    Now, renowned scholar and author David Luenberger has produced Information Science, a text that distills and explains the most important concepts and insights at the core of this ongoing revolution. The book represents the material used in a widely acclaimed course offered at Stanford University.Drawing concepts from each of the constituent subfields that collectively comprise information science, Luenberger builds his book around the five "E's" of information: Entropy, Economics, Encryption, Extraction, and Emission. Each area directly impacts modern information products, services, and technology--everything from word processors to digital cash, database systems to decision making, marketing strategy to spread spectrum communication.To study these principles is to learn how English text, music, and pictures can be compressed, how it is possible to construct a digital signature that cannot simply be copied, how beautiful photographs can be sent from distant planets with a tiny battery, how communication networks expand, and how producers of information products can make a profit under difficult market conditions.The book contains vivid examples, illustrations, exercises, and points of historic interest, all of which bring to life the analytic methods presented: Presents a unified approach to the field of information science Emphasizes basic principles Includes a wide range of examples and applications Helps students develop important new skills Suggests exercises with solutions in an instructor's manual

Perl Hacks: Tips & Tools for Programming, Debugging, and Surviving


chromatic - 2006
    While other languages have stagnated, Perl remains fresh, thanks to its community-based development model, which encourages the sharing of information among users. This tradition of knowledge-sharing allows developers to find answers to almost any Perl question they can dream up.And you can find many of those answers right here in Perl Hacks. Like all books in O'Reilly's Hacks Series, Perl Hacks appeals to a variety of programmers, whether you're an experienced developer or a dabbler who simply enjoys exploring technology. Each hack is a short lesson--some are practical exercises that teach you essential skills, while others merely illustrate some of the fun things that Perl can do. Most hacks have two parts: a direct answer to the immediate problem you need to solve right now and a deeper, subtler technique that you can adapt to other situations. Learn how to add CPAN shortcuts to the Firefox web browser, read files backwards, write graphical games in Perl, and much more.For your convenience, Perl Hacks is divided by topic--not according to any sense of relative difficulty--so you can skip around and stop at any hack you like. Chapters include:Productivity Hacks User Interaction Data Munging Working with Modules Object Hacks DebuggingWhether you're a newcomer or an expert, you'll find great value in Perl Hacks, the only Perl guide that offers something useful and fun for everyone.

The Best of Technology Writing 2006


Brendan I. Koerner - 2006
    People steeped in the world of AJAX or Massively Mulitplayer Online Games will find a lot to value here, but so will readers simply in search of good writing.”—James Fallows, National Correspondent for Atlantic Monthly  “The human experience is being shaped by our symbiotic relationship to technology. What makes this collection wonderful is that it’s not about the technology, per se, but it’s about this changing human experience. I will look forward to it every year.”—Po Bronson, author of What Should I Do With My Life?  The Best of Technology Writing 2006 brings together some of the most important, timely, and just plain readable writing in the fast-paced, high-stakes field of technology.  The first annual collection to target this vibrant and versatile area, The Best of Technology Writing 2006 features innovative work from an unusually diverse array of writers: best-selling authors, noted academics, and indie journalists and bloggers.  The culmination of an open, on-line nominating process, this collection covers topics ranging from jetpacks, to the ethics of genetically cloned pets, to the meaning of life in the information age. By turns epic and intimate, serious and playful, The Best of Technology Writing 2006 captures the vitality, importance, and complexity of technology today. Koerner Featuring contributions from: David A. BellDavid BernsteinMike DaiseyJoshua DavisJay DixitDaniel EngberDan FerberSteven JohnsonSteven LevyFarhad ManjooLisa MargonelliDavid McNeillJustin MullinsKoranteng Ofosu-AmaahAdam L. PenenbergDaniel H. PinkEvan RatliffAlex RossJim RossignolJesse SunenblickEdward TennerClive ThompsonJoseph TurowRichard Waters   Brendan I. Koerner is a contributing editor for Wired, a columnist for both New York Times and Slate, and a fellow at the New America Foundation. His first book will be published by Henry Holt & Company in 2008. digitalculturebooks is an imprint of the University of Michigan Press and the Scholarly Publishing Office of the University of Michigan Library dedicated to publishing innovative and accessible work exploring new media and their impact on society, culture, and scholarly communication. Visit the website at www.digitalculture.org.

Thinking on the Web: Berners-Lee, Godel, and Turing


H. Peter Alesso - 2006
    What Is Thinking? What is Turing's Test? What is Godel's Undecidability Theorem? How is Berners-Lee's Semantic Web logic going to overcome paradoxes and complexity to produce machine processing on the Web?Thinking on the Web draws from the contributions of Tim Berners-Lee (What is solvable on the Web?), Kurt Godel (What is decidable?), and Alan Turing (What is machine intelligence?) to evaluate how much "intelligence" can be projected onto the Web.The authors offer both abstract and practical perspectives to delineate the opportunities and challenges of a "smarter" Web through a threaded series of vignettes and a thorough review of Semantic Web development.

The Aesthetics of Disengagement: Contemporary Art and Depression


Christine Ross - 2006
    In The Aesthetics of Disengagement Christine Ross shows how contemporary art is a powerful yet largely unacknowledged player in the articulation of depression in Western culture, both adopting and challenging scientific definitions of the condition. Ross explores the ways in which contemporary art performs the detached aesthetics of depression, exposing the viewer's loss of connection and ultimately redefining the function of the image. Ross examines the works of Ugo Rondinone, Rosemarie Trockel, Ken Lum, John Pilson, Liza May Post, Vanessa Beecroft, and Douglas Gordon, articulating how their art conveys depression's subjectivity and addresses a depressed spectator whose memory and perceptual faculties are impaired. Drawing from the fields of psychoanalysis as well as psychiatry, Ross demonstrates the ways in which a body of art appropriates a symptomatic language of depression to enact disengagement - marked by withdrawl, radical protection of the self from the other, distancing signals, isolation, communication ruptures, and perceptual insufficiency. Most important, Ross reveals the ways in which art transforms disengagement into a visual strategy of disclosure, a means of reaching the viewer, and how in this way contemporary art puts forth a new understanding of depression.

PHP 5 in Practice


Elliott White III - 2006
    In just a few years, PHP has become one of the most popular languages for powering web content worldwide. This popularity affords both new users and long-time developers access to a large cadre of applications and a vast community of expertise. PHP 5, the latest revision of the language, has extended many concepts of the base language, especially in object-oriented programming, and has necessitated new approaches to PHP programming and new best practices. PHP 5 in Practice is a compendium of best practices and solutions. Targeted both to the novice and the expert in PHP, this book provides answers to many common problems software developers may face on a day-to-day basis. The solutions cover a large range of topics, including database access, dynamic web page creation, and so-called Web 2.0 technologies. This book is not a tutorial on the use of PHP, but a how-to answer book; when there is a new problem to solve, readers should be able to quickly find a solution that will meet their needs completely or provide insight on how to best solve their particular problem. various presentations at international PHP and Web conferences on topics such as PHP, CSS, and XHTML, as well as helping Brainbench develop some of their programming certifications. He currently works for digg.com as a senior PHP programmer. Jonathan Eisenhamer has served as systems administrator and software developer for the Astronomy department at UCLA. From there, he moved on to the Space Telescope Science Institute (STScI), where he began his work in PHP, developing websites to disseminate the scientific results from the Hubble Space Telescope to the general public. He currently is the supervisor of the Web and Print group at STScI.

The FL Studio Bible: Making Music Happen


Scott W. Fisher - 2006
    The FL Studio Bible will guide you through all the (often hidden) features and gems of FL Studio.

Space Shuttle Challenger: Ten Journeys Into the Unknown


Ben Evans - 2006
    I was nine years old. My parents were, at the time, midway through moving house and, luckily, the TV was one of the few domestic items still to be packed. I watched the entire horror unfold live on all of the network stations. Admittedly, my fascination with rockets and astronauts, stars and planets had begun several years earlier, but Challenger's destruction turned it from an occasional hobby to a fascination which has remained with me ever since. In September 1988, aged 11,1 came home from school to watch STS-26 return the Shuttle fleet to orbital operations. Five years later, I gave a speech on the STS-51L disaster to my teacher as part of my GCSE English assessment. Another decade passed and, now a teacher myself, I returned to my school one cold Monday morning to explain to my pupils what had happened to Challenger's sister ship, Columbia, a few days earlier. In some ways, the loss of Columbia affected me more deeply than Challenger.

Mobile Web 2.0: The Innovator's Guide to Developing and Marketing Next Generation Wireless/Mobile Applications


Ajit Jaokar - 2006
    - Dion Hinchcliffe, Editor-in-Chief of the Web 2.0 Journal and President of Hinchcliffe & Company In their latest book, the authors make fresh challenges on the paradigms in Mobile data. You are not going to agree with it all, but it will challenge your own thinking. - Jeremy Flynn, Head of Commercial Partnerships, Vodafone UK Simply the most comprehensive and easily-accessible book, on mobile Web 2.0 and it's future potential, available to date. - Dr Rebecca Lingwood CEng MIMechE, Director of Continuing Professional Development, University of Oxford Why should you buy this book? - Gain an understanding of both Web 2.0 and Mobile Web 2.0 - Learn how Web 2.0 extends to the 'wider Internet' - Learn from the experts: our work has been widely published and referenced on the Web. Our viewpoints are practical, independent and realistic - Understand the seven principles of Mobile Web 2.0 - Understand the other factors that affect Mobile Web 2.0 (like the rollout of IMS, WiMAX, Revenue models for Web 2.0 etc.) The seven principles of Mobile Web 2.0 - Mobile content and the changing balance of power (The power of user-generated content) - I am not a number, I am a tag (The impact on the telecoms industry's management of numbers) - Multilingual mobile access (Everyone, Everywhere with a phone running .. ) - Mobile Web 2.0 and digital convergence (Mobile Web 2.0 is a driver to digital convergence) - The disruptive power of Ajax and mobile widgets - Location based services and Mobile Web 2.0 (LBS has never quitetaken off. Will Mobile Web 2.0 help?) - Mobile search: Much more than Google on your mobile phone

Small Form Factor PCs


Duane Wessels - 2006
    They consume less power, have few or no moving parts, and are very quiet. Whether you plan to use one as a standalone PC or want to embed it in your next hacking project, a small form factor PC may be the next thing you build.Small Form Factor PCs is the only book available that shows you how to build small form factor PCs -- from kits and from scratch -- that are more interesting and more personalized than what a full-sized PC can give you. Included in the book are projects for building personal video recorders, versatile wireless access points, digital audio jukeboxes, portable firewalls, and much more. This book shows you how to build eight different systems, from the shoebox-sized Shuttle system down to the stick-of-gum sized gumstix. With thorough illustrations and step-by-step instructions, Small Form Factor PCs makes it easy for anyone who wants to get started building these tiny systems. Small form factor computing is taking off, and this guide is an absolute must for anyone who wants to get in on the launch.

Andre Citroen: Engineer, Explorer, Entrepreneur


John Reynolds - 2006
    This will be a much-expanded version of a title originally published by Sutton in 1996, remade into a larger format with 120,000 words (50% more than before) and 220 photos (three times as many as before).

Designing Embedded Systems with PIC Microcontrollers: Principles and Applications


Tim Wilmshurst - 2006
    The 8-bit PIC which this book focuses on is a versatile work horse that completes many designs. An engineer working with applications that include a microcontroller will no doubt come across the PIC sooner rather than later. It is a must to have a working knowledge of this 8-bit technology. This book takes the novice from introduction of embedded systems through to advanced development techniques for utilizing and optimizing the PIC family of microcontrollers in your device. To truly understand the PIC, assembly and C programming language must be understood. The author explains both with sample code and examples, and makes the transition from the former to the latter an easy one. This is a solid building block for future PIC endeavors. New to the 2nd Edition: *Include end of chapter questions/activities moving from introductory to advanced*More worked examples *Includes PowerPoint slides for instructors *Includes all code snips on a companion web site for ease of use *A survey of 16/32-bit PICs*A project using ZigBee*Covers both assembly and C programming languages, essential for optimizing the PIC*Amazing breadth of coverage moving from introductory to advanced topics covering more and more complex microcontroller families*Details MPLAB and other Microchip design tools

Psychoanalysis and Neuroscience


Mauro Mancia - 2006
    Recent great developments in the latter offer the opportunity to build a bridge to psyc- analysis, providing an anatomo-functional basis for some of the functions in which the psychoanalytic theories of the mind are rooted. The functions which are specifically discussed from an interdisciplinary point of view are the following: emotions, memory, unconscious, perception, attention, wa- fulness, sleep, dreams, empathy, sharing affects, intentionality, embodied s- ulation, and aspects of infantile mental development. The book is divided into four sections. The first contains recent obser- tions relating to memory in its double function (implicit and explicit) and its relation to the unconscious. This section also discusses the relationship between emotions, memory, and cognitive functions of the mind. Particular attention is paid to the right hemisphere, considered the emotional brain par excellence.Papers on the brain s predictive capacities and its plasticity in re- tion to special functional states complete this first section. The second section is dedicated to neuropsychological findings from bioimaging investigations related to the human mind s ability to share e- tional and affective experiences. Here the role of mirror neurons in empathy, intentionality, and embodied simulation is discussed

Light And Lighting


Michael Freeman - 2006
    

HTML Mastery: Semantics, Standards, and Styling


Paul Haine - 2006
    HTML Mastery discusses and demonstrates all available HTML tags, including less common ones, explains where and how to use them, and offers styling and scripting techniques that can be employed on sophisticated web sites. The book also explores advanced semantic tools that further improve the usability and semantic value of sites. HTML Mastery devotes an entire chapter to Microformats, and gives the reader a preview of XHTML 2.0 and Web Applications 1.0 -- web standards of the future.

The Bomb in the Basement: How Israel Went Nuclear and What That Means for the World


Michael Karpin - 2006
     After Israel won its war of independence in 1948, founding prime minister David Ben-Gurion realized that his country faced the possibility of having to fight Arab nations again in the future. He embraced the idea of developing a nuclear capability and put a young lieutenant, Shimon Peres, in charge of the project. This was the beginning of Israel's quest for nuclear capability, a project that could not have happened without the cooperation of the French. In The Bomb in the Basement, journalist Michael Karpin gives us the most complete account of how Israel became the Middle East's only nuclear power and how its status as an officially unacknowledged nuclear nation affects the politics of that volatile region. Karpin's research includes exclusive interviews that provide new insights into the key figures behind the program (notably a harsh rivalry between Peres and Isser Harel, the first head of Mossad). He explains how different U.S. administrations have dealt with Israel's nuclear status, from Eisenhower's disapproval to Johnson's open support. And he shows how the key to Israel's nuclear capability has been its policy of "nuclear ambiguity." A compelling account of a complicated history, The Bomb in the Basement raises provocative questions about how Israel's nuclear arsenal may affect not only its own future, but the future of the entire Middle East.

The Organization and Architecture of Innovation


Thomas J. Allen - 2006
    Allen of MIT has joined with award-winning German architect Gunter Henn of HENN Architekten to produce a book that explores the combined use of two management tools to make the innovation process most effective: organizational structure and physical space. They present research demonstrating how organizational structure and physical space each affect communication among people--in this case, engineers, scientists, and others in technical organizations--and they illustrate how organizations can transform both to increase the transfer of technical knowledge and maximize the "communication for inspiration" that is central to the innovation process. Allen and Henn illustrate their points with discussions of well-known buildings around the world, including Audi's corporate headquarters, Steelcase's corporate design center, and the Corning Glass Becker building, as well as several of Gunter Henn's own projects, including the Skoda automotive factory in the Czech Republic and the Faculty for Mechanical Engineering at the Technical University of Munich. Allen and Henn then demonstrate the principles developed in their work by discussing in detail one example in which organizational structure and physical space were combined successfully to promote innovation with impressive results: HENN Architekten's Project House for the BMW Group Research and Innovation Centre in Munich, cited by Business Week (April 24, 2006) in naming BMW one of the world's most innovative companies.Professor Thomas Allen is the originator of the Allen curve. In the late 1970s, Tom Allen undertook a project to determine how the distance between engineers' offices coincided with the level of regular technical communication between them. The results of that research, now known as the Allen Curve, revealed a distinct correlation between distance and frequency of communication (i.e. the more distance there is between people -- 50 meters or more to be exact -- the less they will communicate). This principle has been incorporated into forward-thinking commercial design ever since, in, for example, The Decker Engineering Building in New York, the Steelcase Corporate Development Center in Michigan, and BMW's Research Center in Germany.

Winners Take All - The 9 Fundamental Rules of High Tech Strategy


Tony Seba - 2006
    Category winners increasingly take it all (market share, revenues, profits, growth, market valuation) while others fight for whatever is left. The good news is that there are 9 really simple rules that companies can follow to help them be successful in tough times. These rules have been used by companies such as Google, Apple, Symantec, Salesforce.com, Netflix, Intel, Dell, Texas Instruments, and Microsoft. This book shows how these winners have applied these rules strategically to gain competitive advantage. It also shows practical tools that the entrepreneur and the product and corporate managers can use to implement the rules. These 9 Rules apply to small and large companies; product, service, web, and innovation-based companies; consumer and enterprise-oriented companies. They apply at the beginning,middle, and end of the product lifecycle.

Make: Technology on Your Time Volume 08: Technology on Your Time


Mark Frauenfelder - 2006
    You'll learn how to build a wind-up bird that really flies, how to restore an old pinball machine, and learn the secret history of the world's best-selling computer game from Myst's co-creator. You'll also meet a well-known toy inventor and learn how to make molds and casts with MythBusters star Adam Savage.

How to Use Flickr: The Digital Photography Revolution


Richard Giles - 2006
    Provides information on using the digital photography management community.

A Practical Reader in Universal Design for Learning


David H. Rose - 2006
    Rose bring together a collection of articles on the practical, classroom dimensions of the UDL revolution in education. Universal Design for Learning (UDL) stands at the forefront of contemporary efforts to create universal access to educational curricula for all students, including those with disabilities. The “universal” in UDL does not mean there is a single optimal solution for everyone. Instead, it underscores the need for flexible approaches to teaching and learning that meet the needs of different kinds of learners. The authors offer insights on learner differences, the capacities of new media in the classroom, and effective teaching and assessment practices. The volume also includes lessons from teacher professional development workshops, classroom-based research, and UDL practitioners themselves. A highly readable volume aimed particularly at school teachers and administrators, this book is also an uncommonly accessible introduction to UDL for all readers committed to creating improved and universal access to educational materials for all students.

Vanishing Point: How to Disappear in America Without a Trace


Susanne Burner - 2006
    There are many bad reasons to want to. There are many good ways to disappear from society and there are many bad ways to disappear. While I won’t delve too deeply into the whys of disappearing, I will cover my opinions on how to disappear successfully.This essay covers what I consider to be most salient points on how to disappear and remain successfully hidden in American society.

Semi-Supervised Learning


Olivier Chapelle - 2006
    Interest in SSL has increased in recent years, particularly because of application domains in which unlabeled data are plentiful, such as images, text, and bioinformatics. This first comprehensive overview of SSL presents state-of-the-art algorithms, a taxonomy of the field, selected applications, benchmark experiments, and perspectives on ongoing and future research.Semi-Supervised Learning first presents the key assumptions and ideas underlying the field: smoothness, cluster or low-density separation, manifold structure, and transduction. The core of the book is the presentation of SSL methods, organized according to algorithmic strategies. After an examination of generative models, the book describes algorithms that implement the low-density separation assumption, graph-based methods, and algorithms that perform two-step learning. The book then discusses SSL applications and offers guidelines for SSL practitioners by analyzing the results of extensive benchmark experiments. Finally, the book looks at interesting directions for SSL research. The book closes with a discussion of the relationship between semi-supervised learning and transduction.

Designed for Dry Feet: Flood Protection and Land Reclamation in the Netherlands


Robert J. Hoeksema - 2006
    Located in the lowland delta of three major rivers, this small European country has fought for more than a thousand years to protect its inhabitants from floods and to reclaim flooded land.Designed for Dry Feet explores Holland's unique challenges in water control and management. Hoeksema discusses the Netherlands' history of flood protection and land reclamation, as well as the history of water management organizations. He focuses on specific activities and projects, such as simple dwelling mounds, 17th-century windmill-powered lake draining systems, 19th-century steam-powered drainage activities, and 20th-century land reclamation and flood protection projects. Hoeksema also includes a Sites to Visit supplement, which he organizes into six excursions designed for those planning a trip to the Netherlands.This book is a great asset to civil engineers from all over the world, as the technology from one country's battle with flood protection is borrowed to rebuilt others.About the Author Robert J. Hoeksema, Ph.D., is a professor of engineering at Calvin College in Grand Rapids, Michigan, with a research focus on geostatistics and groundwater. With a geographer, Hoeksema has been taking students to learn about Dutch flood protection and land reclamation for more than 10 years.Product ReviewsEvery day there are stories in The Advocate about the ongoing work on Louisiana's levees. It seems like an endless, overwhelming job to make the levees safe and secure against storm surges and flooding. It has to be done or we face another occurrence like Hurricane Katrina. But it can be done. [Designed for Dry Feet] offers proof. --Greg Langley, The Advocate, Baton Rouge, LouisianaAll civil engineers (not just hydrologists) should know this story, though few do, and the author is in a unique position to tell it. --Steven G. Vick, P.E., a consulting geotechnical engineer and author of Degrees of Belief: Subjective Probability and Engineering JudgmentA fascinating book about themes that deserve the pride of the Netherlands. The recent floods in the United States prove that this book is published at the right time. --Dr. Ing. Sybe Schaap, chairman of the Water Authority Groot Salland, President of the Association of Dutch Water Authorities, and Professor, Free University of AmsterdamNot only does Robert Hoeksema give an accurate account of the ways in which, throughout the centuries, the Dutch kept their feet dry or at least tried to do so, with the help of windmills and pumping stations, dikes and dams but he also describes in great detail how these constructions were built and how they work. --Henk Meijer, former director, Information and Documentation Centre for the Geography of the NetherlandsA well-written historical account of the legendary land reclamation and flood protection in the Netherlands ... The lessons of the Dutch experience, particularly the storm barriers of the Delta Project, should serve both as models and as a wake-up call to a ravaged post-Katrina world. --Johan Snapper, Ph.D., Queen Beatrix Professor Emeritus of Dutch Literature & Culture, University of California at Berkeley

Agile Virtual Enterprises: Implementation and Management Support


Maria Manuela Cruz-Cunha - 2006
    This book addresses A/VE as a highly dynamic, reconfigurable agile network of independent enterprises sharing all resources.

Automotive Air-Conditioning and Climate Control Systems


Steven Daly - 2006
    It provides the reader with a thorough up-to-date knowledge of current A/C systems, refrigerants and the new possible replacement systems like CO2, and includes unrivalled coverage of electronic and electrical control.Filling the gap in the automotive engineering and servicing market for students and those training on the job, this book will help both newcomers and those with more experience of air-conditioning systems maintenance engineering to keep up with the latest developments and legislation.

Avatars at Work and Play: Collaboration and Interaction in Shared Virtual Environments


Ralph Schroeder - 2006
    They present a well-rounded and state-of-the-art overview of current applications of multi-user virtual environments, ranging from highly immersive virtual reality systems to internet-based virtual environments on personal computers. The volume is a follow-up to a previous essay collection, 'The Social Life of Avatars', which explored general issues in this field. This collection goes further, examining uses of shared virtual environments in practical settings such as scientific collaboration, distributed meetings, building models together, and others. It also covers online gaming in virtual environments, which has attracted hundreds of thousands of users and presents an opportunity for studying a myriad of social issues. Covering both 'work' and 'play', the volume brings together issues common to the two areas, including:What kind of avatar appearance is suitable for different kinds of interaction? How best to foster collaboration and promote usable shared virtual spaces? What kinds of activities work well in different types of virtual environments and systems?Avatars at Work and Play will be required reading for computer scientists and social scientists who are researching and developing virtual worlds. It will be useful on courses in New Media and human-computer interaction

The Future Is Now: Science And Technology Policy in America Since 1950


Alan I. Marcus - 2006
    In this important work, historians Alan I Marcus and Amy Sue Bix present illuminating case studies that highlight crucial policy patterns, shifts in emphasis, and debates over future directions of US science and technology policy. One major theme that emerges from these studies is that universities quickly became the main vehicles through which national science and technology policy was developed. As universities became involved in implementing federal policy, their role as educational institutions inevitably changed. Other themes include the effect of gender and minority concerns on policy, as well as the application of social science to selecting research agendas and technology initiatives. Marcus and Bix’s revealing analysis corrects the misperception that federal science and technology policy is solely concerned with defense. They demonstrate that biotechnology, robotics, nanotechnology, and information science have also become potent policy choices in recent years, impacting such diverse areas of society as medicine, agriculture, energy use, economic trends, and homeland security. Containing a wealth of information and insightful analysis, this comprehensive chronological study will be especially useful for undergraduate readers, while offering much to graduate students and established scholars.

Skype: The Definitive Guide


Harry Max - 2006
    This book will help you get started fast, with any computer: Windows, Mac, Linux, even Pocket PC. Then, take Skype to the limit, with SkypeIn, SkypeOut, instant messaging, secure file transfer, even video calling. Set up and customize Skype in just minutes Take Skype on the road--avoid expensive hotel phones and international calls Transform your PC into a state-of-the-art Skype videophone Troubleshoot Skype connections and audio quality Discover even more ways to save money, simplify life, even build your business! Written by Skype insiders, this is the only official guide to Skype. It's up-to-date, easy-to-use, quick, simple . . . and above all, FUN! Bonus coverage for more experienced users: Skype architecture, security, and advanced configuration.

Strategic Maintenance Planning


Anthony Kelly - 2006
    It explains how to establish objectives for physical assets and maintenance resources, and how to formulate an appropriate life plan for plant. It then shows how to use the life plans to formulate a preventive maintenance schedule for the plant as a whole, along with a maintenance organization and a budget to ensure that maintenance work can be resourced.This is one of three stand-alone volumes designed to provide maintenance professionals in any sector with a better understanding of maintenance management, enabling the identification of problems and the delivery of effective solutions.* The first of three stand-alone companion books, focusing on the formulation of strategy and the planning aspects of maintenance management * Learn how to establish objectives - for physical assets and maintenance resources; Formulate a life plan for each unit and a preventive maintenance schedule for the plant as a whole; Design a maintenance organization and budget to ensure that the maintenance work can be resourced* With numerous review questions, exercises and case studies - selected to ensure coverage across a wide range of industries including processing, mining, food, power generation and transmission

Frames of Evil: The Holocaust as Horror in American Film


Caroline Joan S. Picart - 2006
    Picart and David A. Frank. In Frames of Evil: The Holocaust as Horror in American Film, Picart and Frank challenge this classic horror frame—the narrative and visual borders used to demarcate monsters and the monstrous. After examining the way in which directors and producers of the most influential American Holocaust movies default to this Gothic frame, they propose that multiple frames are needed to account for evil and genocide.Using Schindler’s List, The Silence of the Lambs, and Apt Pupil as case studies, the authors provide substantive and critical analyses of these films that transcend the classic horror interpretation. For example, Schindler’s List, say Picart and Frank, has the appearance of a historical docudrama but actually employs the visual rhetoric and narrative devices of the Hollywood horror film. The authors argue that evil has a face: Nazism, which is configured as quintessentially innate, and supernaturally crafty.Frames of Evil, which is augmented by thirty-six film and publicity stills, also explores the commercial exploitation of suffering in film and offers constructive ways of critically evaluating this exploitation. The authors suggest that audiences will recognize their participation in much larger narrative formulas that place a premium on monstrosity and elide the role of modernity in depriving millions of their lives and dignity, often framing the suffering of others in a manner that allows for merely “documentary” enjoyment.

Exam Prep CISA: Certified Information Systems Auditor


Michael Gregg - 2006
    He holds two associate degrees, a bachelor's degree, and a master's degree. He presently maintains more than a dozen certifications and is a nine-time winner of Global Knowledge's Perfect Instructor Award. Michael not only has experience in performing security audits and assessments, but also is the author of Que Publishing's Certified Ethical Hacker Exam Prep, CISSP Exam Cram, and is the co-author of Inside Network Security Assessment: Guarding Your IT Infrastructure by Sams Publishing. IntroductionStudy and Exam Prep Tips Part I: IT Governance and the Audit Process Chapter 1: The Audit Process Chapter 2: IT Governance Part II: System and Infrastructure Lifecycle Management Chapter 3: Lifecycle Management Chapter 4: System Infrastructure Control Part III: IT Service Delivery and Support Chapter 5: Information Systems Hardware and Architecture Chapter 6: Information Systems Used for IT Delivery and Support Part IV: Protection of Information Assets Chapter 7: Protection of Logical Assets Chapter 8: Physical Security Part V: Business Continuity and Disaster Recovery Chapter 9: Business Continuity and Disaster Recovery Part VI: Final Preparation Fast Facts Practice Exam Answers to Practice Exam Questions Glossary Index www.examcram.com ISBN-13: 978-0-7897-3573-7 ISBN-10: 0-7897-3573-3

Beginning Sharepoint with Excel: From Novice to Professional


Gini Courter - 2006
    There's no code in this book because it's not for programmers; nor is it for Excel beginners. It's for those who regularly use Excel in enterprise business environments and who want to leverage the power and capabilities of SharePoint.Authors Gini Courter and Annette Marquis have authored over 22 books on Microsoft Office and are partners in a business application consulting firm. In this book, they provide easy-to-implement examples of powerful business solutions. And they take care to explore the interaction between Excel and SharePoint. They also include resources and add-ons that extend SharePoint and Excel features.

Let's Build!: Why We Need Five Million New Homes In The Next 10 Years


James Heartfield - 2006
    

Andy Grove: The Life and Times of an American


Richard S. Tedlow - 2006
    This is an inspiring biography of the highly respected business legend that will enthral anyone who cares about technology or leadership.

Codes and Ciphers


Sean Callery - 2006
    Everything from smoke signals to military encryption devices Codes and Ciphers reveals the development and role of secret communications throughout history and offers practical advice on how to make codes (whether by pencil and paper or by computer) and how to break them! Inside you will find information on: Code-breaking devices Hieroglyphics, Native American smoke signals, flags, and semaphore Braille, Morse code, and computer language Mono- and polyalphabetic letter substitution Computer algorithms

RFID Essentials (Theory in Practice (O'Reilly))


Bill Glover - 2006
    From Wal-Mart and Tesco to the U.S. Department of Defense, early efforts are already showing benefits, but software, integration, and data processing for RFID still present a challenge. If you are a developer or an architect charged with developing an RFID system, this book is for you. Drawing on extensive experience, Bill Glover and Himanshu Bhatt provide you with essential information on this emerging technology. With the knowledge you gain in these pages, you will possess the information and understanding you need to start designing, building, or integrating with RFID systems. In RFID Essentials you will find information on: Tags and tag protocols, including the Electronic Product Code (EPC) Readers and reader protocols RFID middleware Security and privacy Managing RFID devices RFID's impact on your architecture Bill Glover has been writing software since 1981 and has worked as a programmer, lead developer, or architect on systems of all sizes, from small, automated systems controlling dams and feedmills up to a complete redesign and reimplementation of one of the world's busiest travel web sites. Bill first worked with RFID in 1995, tracking individual cattle using ear tags. He is currently a Senior Java Architect with Sun Microsystems, Inc., and works with Sun's RFID consulting practice and the RFID Test Center. Himanshu Bhatt heads the U.S. RFID Practice and Software Technology Lab for Sun Microsystems, Inc. Prior to assuming this role, Himanshu was responsible for business development and consulting in emerging areas of technology. Himanshu has over 16 years of experience in the architecture and development of distributed, multitier systems using a host of technologies for Fortune 1000 companies. Himanshu has spoken at industry conferences such as JavaOne and the LoneStar Symposium and has published articles on Java/J2EE technologies."The Information Age is over. We're entering an era where network connectivity is almost ubiquitous - it's participate or perish." --Jonathan Schwartz, President and COO, Sun Microsystems, Inc. "Unique competitive advantage erupts from enterprises that couple the RFID technologies laid out in RFID Essentials with modern business integration using service-oriented architectures. This is the book to read in order to understand this new landscape."--Mark Bauhaus, Senior Vice President, Sun Microsystems, Inc. "This is a must read for RFID Software and Solution architects and is highly recommended for anyone needing to gain more insight into the myriad of components, standards and technologies that make up an RFID solutions environment."--Bryan Tracey, Chief Architect, GlobeRanger Corporation "The authors have done a commendable job of covering a lot of ground in the RFID space, including the infrastructure needed to share the volumes of data RFID will likely generate."--Graham Gillen, Senior Product Manager, VeriSign

The Pig and the Box


MCM - 2006
    Pig becomes so protective of his box, and so suspicious of anyone that wants to use it, that he takes drastic measures. He forces everyone to take their copied items home in special buckets... buckets designed to protect. but might not be so good for anyone else... "The Pig and the Box" is a modern fable that teaches kids and adults alike that sometimes, yes, it's a good idea to trust and to share.

Cutting Code; Software and Sociality


Adrian Mackenzie - 2006
    Although software is everywhere, it is hard to say what it actually is. Cutting Code: Software and Sociality is one of the first books to treat software seriously as a full-blown cultural process and as a subtly powerful material in contemporary communication. From deCSS to Java, from Linux to Extreme Programming, this book analyses software artworks, operating systems, commercial products, infrastructures, and programming practices. It explores social forms, identities, materialities, and power relations associated with software, and it asks how software provokes the re-thinking of production, consumption and distribution as entwined cultural processes. Cutting Code argues that analysis of code as a mosaic of algorithms, protocols, infrastructures, and programming conventions offers valuable insights into how contemporary social formations invent new kinds of personhood and new ways of acting.

Literacy, Technology, and Diversity: Teaching for Success in Changing Times


Jim Cummins - 2006
    Authored by some of the most respected researchers in the field today, "Literacy, Technology, and Diversity "reflects on the idea that great expectations are achievable through educational projects that foster academic growth, with classroom diversity and technology as catalysts for deeper learning, and that a narrow focus ongrade expectations yields superficial results. Arguing today's learning principles need to incorporate the core values of community learning, critical pedagogy, multilingualism, anti-racist education, high academic standards, and technological fluency, Cummins, Sayers and Brown provide a thought-provoking introduction into these learning principles that will inspire the life-long learning of students. Take a peek inside...Provides examples of projects, backed by research-based theories for their effective adaptation to help both pre-service and practicing teachers become more independent and creative in the ways they use technology.Gives useful suggestions on how to effectively integrate literacy and technology into the classroom. Presents Portraits (Case studies) of collaborative projects promoting literacy learning and often involving technology on such topics as: Cognition, Assessment, Community of Learning, and Tools and Resources in Section II (Chapters 5-9).Contains an appendix of short vignettes of exemplary projects that promote learning of standards-based expectations for academic achievement. Includes a complimentary CD-ROM of additional resources for teachers as well as updated portraits on exemplary projects.