Access 2007: The Missing Manual


Matthew MacDonald - 2006
    It runs on PCs rather than servers and is ideal for small- to mid-sized businesses and households. But Access is still intimidating to learn. It doesn't help that each new version crammed in yet another set of features; so many, in fact, that even the pros don't know where to find them all. Access 2007 breaks this pattern with some of the most dramatic changes users have seen since Office 95. Most obvious is the thoroughly redesigned user interface, with its tabbed toolbar (or "Ribbon") that makes features easy to locate and use. The features list also includes several long-awaited changes. One thing that hasn't improved is Microsoft's documentation. To learn the ins and outs of all the features in Access 2007, Microsoft merely offers online help.Access 2007: The Missing Manual was written from the ground up for this redesigned application. You will learn how to design complete databases, maintain them, search for valuable nuggets of information, and build attractive forms for quick-and-easy data entry. You'll even delve into the black art of Access programming (including macros and Visual Basic), and pick up valuable tricks and techniques to automate common tasks -- even if you've never touched a line of code before. You will also learn all about the new prebuilt databases you can customize to fit your needs, and how the new complex data feature will simplify your life. With plenty of downloadable examples, this objective and witty book will turn an Access neophyte into a true master.

Domain-Driven Design Quickly


Floyd Marinescu - 2006
    This book is a short, quickly-readable summary and introduction to the fundamentals of DDD; it does not introduce any new concepts; it attempts to concisely summarize the essence of what DDD is, drawing mostly Eric Evans' original book, as well other sources since published such as Jimmy Nilsson's Applying Domain Driven Design, and various DDD discussion forums. The main topics covered in the book include: Building Domain Knowledge, The Ubiquitous Language, Model Driven Design, Refactoring Toward Deeper Insight, and Preserving Model Integrity. Also included is an interview with Eric Evans on Domain Driven Design today.

The New Kingmakers: How Developers Conquered the World


Stephen O’Grady - 2013
    In a 1995 interview, the late Steve Jobs claimed that the secret to his and Apple’s success was talent. “We’ve gone to exceptional lengths to hire the best people,” he said, believing that the talented resource was twenty-five times more valuable than an average alternative. For Microsoft founder Bill Gates, the multiple was even higher:A great lathe operator commands several times the wage of an average lathe operator, but a great writer of software code is worth 10,000 times the price of an average software writer.While the actual number might be up for debate, the importance of technical talent is not. The most successful companies today are those that understand the strategic role that developers will play in their success or failure. Not just successful technology companies – virtually every company today needs a developer strategy. There’s a reason that ESPN and Sears have rolled out API programs, that companies are being bought not for their products but their people. The reason is that developers are the most valuable resource in business.How did we get here? How did developers become the most important constituency in business seemingly overnight? The New Kingmakers explores the rise of the developer class, its implications and provides suggestions for navigating the new developer-centric landscape.

Core Java, Volume 1: Fundamentals


Cay S. Horstmann - 2007
    Fully updated for the new Java SE 6 platform, this no-nonsense tutorial and reliable reference illuminates the most important language and library features with thoroughly tested real-world examples. The example programs have been carefully crafted to be easy to understand as well as useful in practice, so you can rely on them as an outstanding starting point for your own code. Volume I is designed to quickly bring you up to speed on what's new in Java SE 6 and to help you make the transition as efficiently as possible, whether you're upgrading from an earlier version of Java or migrating from another language. The authors concentrate on the fundamental concepts of the Java language, along with the basics of user-interface programming. You'll find detailed, insightful coverage ofJava fundamentalsObject-oriented programmingInterfaces and inner classesReflection and proxiesThe event listener modelGUI programming with SwingPackaging applicationsException handlingLogging and debuggingGeneric programmingThe collections frameworkConcurrencyFor detailed coverage of XML processing, networking, databases, internationalization, security, advanced AWT/Swing, and other advanced features, look for the forthcoming eighth edition of "Core Java(TM), Volume II--Advanced Features "(ISBN: 978-0-13-235479-0).

Kanban and Scrum - Making the Most of Both


Henrik Kniberg - 2010
    So how do they relate to each other? The purpose of this book is to clear up the fog, so you can figure out how Kanban and Scrum might be useful in your environment. Part I illustrates the similarities and differences between Kanban and Scrum, comparing for understanding, not for judgement. There is no such thing as a good or bad tool - just good or bad decisions about when and how to use which tool. This book includes: - Kanban and Scrum in a nutshell - Comparison of Kanban and Scrum and other Agile methods - Practical examples and pitfalls - Cartoons and diagrams illustrating day-to-day work - Detailed case study of a Kanban implementation within a Scrum organization Part II is a case study illustrating how a Scrum-based development organization implemented Kanban in their operations and support teams.

Database System Concepts


Abraham Silberschatz - 1987
    It aims to present these concepts and algorithms in a general setting that is not tied to one particular database system.

Starting Out with Programming Logic and Design


Tony Gaddis - 2007
    In the successful, accessible style of Tony Gaddis’ best-selling texts, useful examples and detail-oriented explanations allow students to become comfortable with fundamental concepts and logical thought processes used in programming without the complication of language syntax. Students gain confidence in their program design skills to transition into more comprehensive programming courses.The book is ideal for a programming logic course taught as a precursor to a language-specific introductory programming course, or for the first part of an introductory programming course.

The Microsoft Data Warehouse Toolkit: With SQL Server 2008 R2 and the Microsoft Business Intelligence Toolset


Joy Mundy - 2006
    In this new edition, the authors explain how SQL Server 2008 R2 provides a collection of powerful new tools that extend the power of its BI toolset to Excel and SharePoint users and they show how to use SQL Server to build a successful data warehouse that supports the business intelligence requirements that are common to most organizations. Covering the complete suite of data warehousing and BI tools that are part of SQL Server 2008 R2, as well as Microsoft Office, the authors walk you through a full project lifecycle, including design, development, deployment and maintenance.Features more than 50 percent new and revised material that covers the rich new feature set of the SQL Server 2008 R2 release, as well as the Office 2010 release Includes brand new content that focuses on PowerPivot for Excel and SharePoint, Master Data Services, and discusses updated capabilities of SQL Server Analysis, Integration, and Reporting Services Shares detailed case examples that clearly illustrate how to best apply the techniques described in the book The accompanying Web site contains all code samples as well as the sample database used throughout the case studies The Microsoft Data Warehouse Toolkit, Second Edition provides you with the knowledge of how and when to use BI tools such as Analysis Services and Integration Services to accomplish your most essential data warehousing tasks.

sed & awk


Dale Dougherty - 1990
    The most common operation done with sed is substitution, replacing one block of text with another. awk is a complete programming language. Unlike many conventional languages, awk is "data driven" -- you specify what kind of data you are interested in and the operations to be performed when that data is found. awk does many things for you, including automatically opening and closing data files, reading records, breaking the records up into fields, and counting the records. While awk provides the features of most conventional programming languages, it also includes some unconventional features, such as extended regular expression matching and associative arrays. sed & awk describes both programs in detail and includes a chapter of example sed and awk scripts. This edition covers features of sed and awk that are mandated by the POSIX standard. This most notably affects awk, where POSIX standardized a new variable, CONVFMT, and new functions, toupper() and tolower(). The CONVFMT variable specifies the conversion format to use when converting numbers to strings (awk used to use OFMT for this purpose). The toupper() and tolower() functions each take a (presumably mixed case) string argument and return a new version of the string with all letters translated to the corresponding case. In addition, this edition covers GNU sed, newly available since the first edition. It also updates the first edition coverage of Bell Labs nawk and GNU awk (gawk), covers mawk, an additional freely available implementation of awk, and briefly discusses three commercial versions of awk, MKS awk, Thompson Automation awk (tawk), and Videosoft (VSAwk).

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

Identity Is the New Money


David Birch - 2014
    Because of technological change the two trends are converging so that all that we need for transacting will be our identities captured in the unique record of our online social contacts. Social networks and mobile phones are the key technologies. They will enable the building of an identity infrastructure that can enhance both privacy and security - there is no trade-off. The long-term consequences of these changes are impossible to predict, partly because how they take shape will depend on how companies take advantage of business opportunities to deliver transaction services. But one prediction made here is that cash will soon be redundant - and a good thing too. In its place we will see a proliferation of new digital currencies.

Jane Austen's Lady Susan


Emily Allen - 2012
    Jane Austen writing an “improper” novel? Find out why her overlooked Lady Susan, which depicts the exploits of England’s worst coquette, is worth experiencing; how its presence fits in the larger context of the 18th-century novel’s development; and why it can be considered Austen’s literary “road not taken.”©2012 The Great Courses (P)2012 The Great Courseshttps://www.audible.com/pd/Jane-Auste...

Java Web Services: Up and Running


Martin Kalin - 2009
    You'll learn how to write web services from scratch and integrate existing services into your Java applications. With Java Web Services: Up and Running, you will:Understand the distinction between SOAP-based and REST-style services Write, deploy, and consume SOAP-based services in core Java Understand the Web Service Definition Language (WSDL) service contract Recognize the structure of a SOAP message Learn how to deliver Java-based RESTful web services and consume commercial RESTful services Know security requirements for SOAP- and REST-based web services Learn how to implement JAX-WS in various application servers Ideal for students as well as experienced programmers, Java Web Services: Up and Running is the concise guide you need to start working with these technologies right away.

Summer's French Kiss: 4 hot and humorous beach reads set in France


Alix Nichols - 2017
    She is his son's nanny, a 23-year-old virgin, and a guileless ingenue to boot...WHAT IF IT'S LOVE (Dante Rossetti Winner)When the hottest man in Paris - Rob Dumont - shows interest in geeky, introverted heiress Lena, she suspects something fishy... And so she should.AMANDA'S GUIDE TO LOVE (Kindle Scout Winner)One snooty career girl who worships Perfection. One handsome gambler who worships Freedom. One wild night that changes everything... ~ PRAISE FOR ALIX NICHOLS"Written in the spirit of pure pleasure, and it delivers just that." -- Kirkus Reviews"Exceptionally entertaining."-- Readers' Favorite"The numerous twists and turns will keep you hanging off the edge of your seat, and the magical setting in France will reel you in all the way up till the magnificent finish." -- RT Book Reviews"No one does contemporary romance like this, with the warmth and love of family and friends as well as the naughty sexy romance, all steeped in the inimitable charm of Paris." -- Melanie S."Engaging, witty, romantic ... kept me involved and wanting more." -- A Wonderful World of Words"Sexy and humorous - highly recommended." -- Perri Stephens​~ Grab this bundle now because you'll save 50% -- or 3 Kindle Unlimited borrows -- over downloading each book individually!

99 Inspiring Stories for Presentations: Instantly Improve Your Business Storytelling, Public Speaking and Conversation Skills (Presentation skills for ... short stories and motivational quotations)


Barry Powell - 2015
    Regularly priced at $4.99. Read on your PC, Mac, smart phone, tablet or Kindle device. Are you looking for inspiring stories to use in some of your presentations or simply to help you start practicing storytelling? You’re about to discover a unique reference book that will change the impact of your future presentations forever. Barry Powell proudly presents the 99 most inspiring short stories ever heard in the business world. After extensive research, Barry Powell has discovered and collected the most popular stories that businessmen and public speakers have been using for years to engage their audiences and offer them the best storytelling experiences. Stories: The Key to a Memorable Presentation "Make Them Care" This is the greatest advice that the most successful public speakers will give you. Whether your audience is hundreds of business executives in a conference room, your marketing team being briefed by you or just a few peers around you drinking cocktails on a networking event, the key to putting your message through and making an impact is to make your audience care. Storytelling is a powerful technique that can do this. When you just dump information onto your audience, you are not really making an impact on their hearts and minds. But, when you start telling a story, a magic thing happens: They instantly give you their full attention. They start really listening to what you are saying with their hearts and minds. And this is your chance to evoke in them some kind of emotion. Delivering your message with a funny or touching story end is the key to creating emotion and making a lasting impact in their hearts and minds. What You Will Find in this Book This collection includes some of the most amazing stories ever told by famous businessmen, spiritual leaders and bestselling writers. If you are determined to improve your presentation and public speaking skills, this book is a highly recommended starting point. The stories included cover a wide range of business values to help you start practicing your storytelling skills at every opportunity. Start today! Why to Buy this Book Using stories from this collection in your presentations will help you: Deliver an outstanding presentation even to a tough audience Get your message through effectively Inspire and motivate others into taking the desired actions Start being regarded as an inspiring public speaker You will also discover that practicing storytelling frequently, not only in presentations but in your daily conversations as well, will make you popular in your business and social circles. Buy this amazing collection today! Business values covered: #1 ASSESSMENT #2 ASSUMPTION MAKING #3 ATTITUDE #4 CARING #5 CHALLENGE #6 COMMON SENSE #7 COMMUNICATION #8 CONFIDENCE #9 CREATIVE THINKING #10 CRISIS MANAGEMENT #11 CUSTOMER EXPERIENCE #12 DECISION MAKING #13 DIPLOMACY #14 DIVERSITY #15 ENTREPRENEURSHIP #16 EXPERIENCE #17 GIVING CREDIT #18 GOALS #19 HABITS #20 INFORMATION #21 INITIATIVE #22 INTEGRITY #23 JUDGEMENT #24 LEADERSHIP #25 LEARNING