Saturday, January 31, 2009

C Programming for the Absolute Beginner or Producing Video Podcasts

C Programming for the Absolute Beginner

Author: Michael Vin

If you are new to programming with C and are looking for a solid introduction, this is the book for you. Developed by computer science instructors, books in the for the absolute beginner™ series teach the principles of programming through simple game creation. C is not an easy language to learn, but fortunately the clear explanations, examples, and pictures in this book make learning C easy and fun. Each chapter contains programming challenges, a chapter review, and a complete program that uses chapter-based concepts to construct an easily built application. You will acquire the skills that you need for more practical C programming applications and will learn how these skills can be put to use in real-world scenarios. Additionally, by the time you finish this book, you will be able to apply the programming principles you've learned to the next programming language you tackle.



Table of Contents:


Chapter 1 Getting Started •

Chapter 2 Beginning Data Types •

Chapter 3 Conditions •

Chapter 4 Looping Structures •

Chapter 5 Structured Programming •

Chapter 6 Arrays •

Chapter 7 Pointers •

Chapter 8 Strings •

Chapter 9 Arrays & Structures •

Chapter 10 Dynamic Memory Allocation •

Chapter 11 File Access •

Chapter 12 The C Preprocessor

Read also Ho Chi Minh or Weak Courts Strong Rights

Producing Video Podcasts: A Guide for Media Professionals

Author: Richard Harrington

This guide is full of solid information from people who know online video and are in the trenches doing it. It's a must read for anyone who wants to produce professional video podcasts.
— Jason Van Orden, podcasting consultant and author of Promoting Your Podcast

...required reading...Starting with a clear analysis of the nature and business of podcasting it covers the essentials of production and finishes with the all-important topics of delivery, RSS feeds, publishing, and hosting.
— Tom Wolsky, vp editorial, National Podcasting System, nationalpod.com

WOW, the accumulated knowledge from thousands of hours of planning, production, post and delivery essentials delivered in a simple, concise fashion...a professional resource manual that needs to be a part of every video production library.
— Gary Adcock, digital artist and technology trainer

...not just a book about Podcasting, but a full primer on professional audio and video production and digital publishing that is lavishly illustrated and full of practical tips.
— Philip Hodgetts, president and ceo, Open Television Network, openTVnetwork.com

Put the video podcast medium to work for you and your clients with a winning formula. Know how video podcasts work and every facet of what it takes to produce a professional-quality program that will meet every criterion for success. The authors are seasoned video production pros that have been on the crest of the video podcasting wave as it has risen. With over 2500 episodes produced, they can reveal what works and what doesn't with detailed, illustrated guidance. You get the nuts and bolts of the complete process, including:
* Preproduction: budgeting guidelines, mapping your production, and working with talent
* Production: the ENG shooting style, lighting values and portability, sound, essential camera features, acquisition formats, and gear lists
* Postproduction: resources for adding music and images, motion graphics, and editing techniques
* Delivery: cost-effective hosting options, creating RSS feeds, compression, and hosting processes
* Promotion: choosing directories, promoting your program, and monetizing your podcast

Instruction and case studies go in-depth on issues unique to the podcast medium. A full-color presentation delivers tangible, inspiring examples of creative video podcasts. The companion website—VidPodcaster.com—provides a blog, templates, planning documents, sample clips, and state-of-the-art updates.

Richard Harrington is a certified instructor for Adobe, Apple, and Avid, and a member of the National Association of Photoshop Professionals Instructor Dream Team. He is a popular trainer, podcaster, and prolific author, with 11 books and articles in DV, Photoshop User, and Layers magazine to his credit.

Mark Weiser is vice president of operations for RHED Pixel. Named to AV Multimedia Producer's list of top producers, Mark has been a featured speaker at DV Expo and the NAB conferences.

RHED Pixel (RHEDPixel.com) is a visual communications consultancy that is co-owned by the principal authors. Video and multimedia projects produced include over 2,500 video podcasts for clients that include Microsoft, Apple, and Google.



Friday, January 30, 2009

Inside Microsoft Windows Sharepoint Services 3 0 or IT Disaster Recovery Planning For Dummies

Inside Microsoft Windows Sharepoint Services 3. 0

Author: Ted Pattison

Get in-depth architectural insights for building enterprise solutions—straight from the experts.

Focus in on the internals of the Windows SharePoint Services 3.0 platform with this in-depth, straightforward reference. You get expert insights, task-oriented guidance, and extensive code samples to help you master the intricacies of building robust, enterprise content management applications.

Discover how to:

•Build application pages and site pages
•Develop and deploy reusable Web parts to enable customization and personalization
•Exploit Windows SharePoint APIs to deploy Microsoft ASP.NET AJAX components
•Use XML and Collaborative Application Markup Language (CAML) to create provisioning components
•Design and implement custom document libraries
•Use Windows Workflow Foundation to create applications that automate business process
•Create Site Definitions to aggregate components and package them for deployment
•Implement Code Access Security, Trust Levels, authentication, and authorization

PLUS—Get Microsoft Visual C# and XML code samples on the Web



Table of Contents:
Acknowledgments

Books about: Apple Orchard Cookbook or Down the Bayou

IT Disaster Recovery Planning For Dummies

Author: Peter Gregory

If you have a business or a nonprofit organization, or if you’re the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital. But it’s easy to put it off. After all, where do you start?

IT Disaster Recovery Planning For Dummies shows you how to get started by creating a safety net while you work out the details of your major plan. The right plan will get your business back on track quickly, whether you're hit by a tornado or a disgruntled employee with super hacking powers. Here's how to assess the situation, develop both short-term and long-term plans, and keep your plans updated.

This easy-to-understand guide will help you



• Prepare your systems, processes, and people for an organized response to disaster when it strikes

• Identify critical IT systems and develop a long-range strategy

• Select and train your disaster recovery team

• Conduct a Business Impact Analysis

• Determine risks to your business from natural or human-made causes

• Get management support

• Create appropriate plan documents

• Test your plan



Some disasters get coverage on CNN, and some just create headaches for the affected organization. With IT Disaster Recovery Planning For Dummies, you’ll be prepared for anything from hackers to hurricanes!



Thursday, January 29, 2009

High Tech Ventures or NiGHTS

High-Tech Ventures: The Guide for Entrepreneurial Success

Author: C Gordon Bell

High-Tech Ventures is for those who design, build, and market innovative products—people who are creating the high-tech world of the future. More specifically it is for all engineers, engineering managers, entrepreneurs, and intrapreneurs. Although engineers are responsible for identifying products and businesses that might benefit their company, all too often their suggestions are rejected. The products don’t fit within the current business, or they threaten the status quo. Thus, start-up companies are the main arena for innovation.Entrepreneurs who are considering starting up a company, or who are already doing so, can use this book to determine the health of their venture. With High-Tech Ventures they can systematically assess the exact stages of their company’s growth. They can compare their experiences to an ideal model, and sidestep—or eliminate—flaws early enough to save time, money, and even the company itself.High-Tech Ventures provides entrepreneurs with insight into the problems they may face, as well as a formal checklist for measuring success. It is also useful for board members, investors, and service industry personnel who are intimately involved in ventures. Professionals such as attorneys, accountants, technical consultants, and marketing consultants, who support the venture’s infrastructure will also find critical information here.High-Tech Ventures includes revealing case studies from major entrepreneurial players such as Sun Microsystems, Apollo, Prime, Amdahl, Cullinet, etc.



Book review: Digital Communications or Latin Journey

NiGHTS: Journey of Dreams Official Strategy Guide

Author: BradyGames

Fly Into a Magical World Where Dreams Come Alive


Every night when we fall asleep, we visit the mysterious world of dreams known as Nightopia. For Will and Helen, two kids that are growing up fast, Nightopia is more than just a dreamworld--it’s a place where they can overcome their fears and address their anxieties. But now it’s in danger of being overrun. With this essential guide, help Will and Helen defend Nightopia, conquer their fears, and defeat the evil Nightmarens!


Complete Walkthrough
We lead you step by step through every area of Nightopia and Nightmare! Complete walkthroughs for both Will and Helen!


Detailed Maps
Our maps guide you through the vivid world of dreams, revealing the courses and pinpointing critical locations throughout the game!


Expert Strategy
We show you the most effective way to defeat every frightful monster and evil Nightmaren boss!


Expanded Coverage
Find all the Dreamdrops! Master all three Persona Masks! Personalize your experience with the My Dream feature!


That’s Not All!
Two-Player Match Coverage, Character and Enemy Profiles, Complete Item Roster, Secrets & Unlockables, and Much More!


Platform: Nintendo Wii


Genre: Adventure



Wednesday, January 28, 2009

Powerful PowerPoint for Educators or Pthreads Programming

Powerful PowerPoint for Educators: Using Visual Basic for Applications to Make PowerPoint Interactive

Author: David M Marcovitz

Learn to use PowerPoint in ways you never thought possible. Marcovitz shows how, providing practical instruction for using Visual Basic for Applications (VBA) to create learning environments and educational materials that support and enhance student success. With the widespread availability of PowerPoint (every copy beginning with version 1997 comes with VBA built-in) schools have all the tools they need to create powerful and interactive multimedia resources.



Book review: Access 2002 for Dummies or Microsoft SQL Server 2005 Programming For Dummies

Pthreads Programming: Using POSIX Threads

Author: Bradford Nichols

Computers are just as busy as the rest of us nowadays. They have lots of tasks to do at once and need some cleverness to get them all done at the same time. That's why threads are becoming a new model for programming. Microsoft Windows NT, the Distributed Computing Environment (DCE), and many UNIX-based operating systems support threads. One advantage of most UNIX and DCE implementations is that they conform to a recently ratified POSIX standard (originally 1003.4a, now 1003.1c), which allows your programs to be portable between them. The POSIX threads standard, commonly known as Pthreads, is supported by most UNIX-based operating systems. With threads programming, multiple tasks run concurrently within the same program. They can share a single CPU as processes do or take advantage of multiple CPUs when available. They provide a clean way to divide the tasks of a program while sharing data. In this book you will learn when to use threads and how to make them efficient. The book delves into performance issues, comparing threads to processes, contrasting kernel threads to user threads, and showing how to measure speed. It describes in a simple, clear manner what all the advanced features are for and how threads interact with the rest of the UNIX system.

Booknews

Shows how to use the POSIX threads standard, discussing performance issues and how threads interact with the rest of the UNIX system, and comparing various types of threads. Subjects include basic design techniques, specialized synchronization techniques, UNIX libraries, measuring performance, and special considerations for DCE. Source code and examples are available electronically. For programmers. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Table of Contents:
Preface
1Why Threads?1
2Designing Threaded Programs29
3Synchronizing Pthreads61
4Managing Pthreads109
5Pthreads and UNIX163
6Practical Considerations193
App. APthreads and DCE235
App. BPthreads Draft 4 vs. the Final Standard243
App. CPthreads Quick Reference249
Index261

Monday, January 26, 2009

Beginning DotNetNuke Design Skinning and Management or Security Warrior

Beginning DotNetNuke Design, Skinning and Management

Author: Andrew Hay



• "Skinning" refers to an application's ability to change the look of the design by a setting in the application

• Explains how DotNetNuke skins can be created in either ASP.NET or HTML with CSS and can be developed with any Web tool that creates HTML/CSS or ASP.NET

• Combines the hot topic of using the DotNetNuke application framework with CSS and other site layout technologies to manage the user experience, look, feel, and functionality of Web sites

• Covers how to package, install, and remove a skin and offers programming tools for skins

• Discusses efficient design, when to use HTML versus CSS versus ASP.NET for a design, and browser-safe designs




Table of Contents:
Introduction.

Part I: Getting Acquainted.

Chapter 1: Introducing DotNetNuke Skinning.

Chapter 2: Installing DotNetNuke.

Chapter 3: Installing Skin Packages.

Chapter 4: Exploring Skins.

Chapter 5: Creating Custom Skins.

Part II: Welcome to the Neighborhood.

Chapter 6: The Neighborhood Association Website.

Chapter 7: Skinning the Neighborhood Association Website.

Chapter 8: Designing the Navigation.

Chapter 9: Leveraging Web User Controls.

Part III: Increasing the Property Value.

Chapter 10: Exploring Silverlight.

Chapter 11: Using Cascading Style Sheets.

Chapter 12: Web Standards and Compliance.

Chapter 13: Targeting Modules with CSS.

Chapter 14: Exploring AJAX in DotNetNuke.

Chapter 15: Using sIFR with DotNetNuke.

Appendix A: Exercises and Solutions.

Appendix B: Glossary of Terms and Acronyms.

Index.

See also: Efficace amministrazione di piccola impresa: Un metodo imprenditoriale

Security Warrior

Author: Cyrus Peikari

It's easy to find books on computer security. Many users and administrators are becoming overwhelmed, and justifiably so. The sophistication of attacks against computer systems increases with each exploit in the wild. What's the worst an attacker can do to you? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be threatened. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and advanced attacks against Unix and Windows systems, this book leaves you knowing your enemy and prepared to do battle.

Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on machines: Trojaned binaries, "spyware" that looks innocuous while sending private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive, up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book, on your shelf -- and in your hands.

Library Journal

Network security assessment (see also Computer Media, LJ 8/03) involves identifying vulnerabilities so that they can be minimized, and these guides address the topic from varying perspectives. Case Studies delves into implementing the framework of network security standards (IAM, or Information Assurance Methodology) defined by the U.S. National Security Agency (NSA), while Network Security Assessment focuses partially on NSA IAM and partially on the UK's Government Communication Headquarters (GCHQ) security framework, CESG (Communications and Electronics Security Group) CHECK. Case Studies' checklists, case studies, and sample templates create a practical and useful guide for firms that provide security assessments, individuals who have taken an IAM class, and organizations conducting security audits. A nice overview of an often-confusing topic, moving from the security contract stage through final reporting and follow-up. Network Security Assessment's broader coverage-as well as its step-by-step discussion of security risks and how to combat or minimize them-makes it a good choice for those addressing security issues in general. Its take on multiple services and operating systems, and its real-world examples create a comprehensive, useful guide. Both are appropriate for larger libraries; buy McNab's if you can afford only one. For advanced administrators and security experts, Warrior addresses security assessment in general. It focuses most heavily, however, on the topic of reverse engineering, or of disassembling applications to see what is going on at their lowest levels. This allows administrators to dissect malware and spyware in order to disinfect and secure their systems more effectively. Its coverage of multiple environments and tools and the overview of attacks from a cracker's perspective make this an appropriate purchase for larger libraries. Copyright 2004 Reed Business Information.



Sunday, January 25, 2009

Practical PHP and MySQL or Adobe Photoshop Lightroom 2

Practical PHP and MySQL: Building Eight Dynamic Web Applications

Author: Jono Bacon

Suddenly, it's easy to build commercial-quality Web applications using free and open source software. With this book, you'll learn from eight ready-to-run, real-world applications-all backed by clear diagrams and screenshots, well-documented code, and simple, practical explanations.

Leading open source author Jomo Bacon teaches the core skills you'll need to build virtually any application. You'll discover how to connect with databases, upload content, perform cacading deletes, edit records, validate registrations, specify user security, create reusable components, use Pear extensions, and even build Ajax applications.



New interesting textbook: Meaning in Suffering or The Patient

Adobe Photoshop Lightroom 2: (Visual QuickStart Guide Series)

Author: Nolan Hester

This book uses simple step-by-step instructions, loads of screen shots, and an array of time-saving tips and tricks, serving both as the quickest route to Adobe Photoshop Lightroom 2 mastery for new users, and a handy reference for more experienced digital photographers.

Adobe Photoshop Lightroom 2 features numerous new features and enhancements including the ability to enhance specific areas of a photo, edit JPG, TIFF, and more than 190 camera raw file formats non-destructively, print more efficiently, and sharpen smartly.

Adobe Photoshop Lightroom 2: Visual QuickStart Guide is the definitive task-based tutorial for digital photographers needing a jump-start on the complete range of features available in Adobe Photoshop Lightroom 2. Master this workflow application quickly and completely by working from beginning to end or just skip to the task you need right now. It's all covered, everything from importing, organizing and processing images, to managing and showcasing your images—whether it's one shot or an entire shoot.



Saturday, January 24, 2009

Collective Intelligence or Software Testing

Collective Intelligence: Mankind's Emerging World in Cyberspace

Author: Pierre Levy

The number of travelers along the information superhighway is increasing at a rate of 10 percent a month. How will this communications revolution affect our culture and society? Pierre Lévy shows how the unfettered exchange of ideas in cyberspace has the potential to liberate us from the social and political hierarchies that have stood in the way of mankind’s advancement.Anthropologist, historian, sociologist, and philosopher, Lévy writes with a depth of scholarship and imaginative insight rare among media critics. At once a profound historical analysis of the development of human culture and a blueprint for the future, Collective Intelligence is a visionary work.



Table of Contents:
Prologue: The Nomad Planet
Introduction1
1The Just: The Ethics of Collective Intelligence23
2Human Qualities: The Economy of Collective Intelligence31
3From the Molar to the Molecular: The Technology of Collective Intelligence39
4The Dynamics of Intelligent Cities: A Manifesto for Molecular Politics57
5Choreography of Angelic Bodies: The Atheology of Collective Intelligence91
6The Art and Architecture of Cyberspace: The Aesthetics of Collective Intelligence117
7The Four Spaces131
8Anthropological Space143
9Identity151
10Semiotics163
11Figures of Space and Time173
12Navigational Instruments185
13Objects of Knowledge195
14Epistemologies209
15The Relationship between the Spaces: Toward a Political Philosophy225
Epilogue: Voyage to Knossos245
Notes257
Index269

See also: Macroeconomia

Software Testing: A Craftman's Approach

Author: Paul C Jorgensen

A bestseller in its first two editions, Software Testing: A Craftsman's Approach, Third Edition has been thoroughly revised and updated to highlight issues such as how Agile and XP development environments have radically changed the role of software testers by making testing integral to every phase of the development process. Coverage also includes model-based and test-driven development, reexamination of all-pairs testing, and explanation of the four contexts of software testing. The author provides new downloadable programs that demonstrate white-box, black-box and other fundamental types testing. This text continues to serve as a valuable reference for software testers, developers, and engineers.



Friday, January 23, 2009

80211 Wireless Local Area Network Fundamentals or Compressed Image File Formats

802.11 Wireless Local-Area Network Fundamentals

Author: Pejman Roahan

Master the basics in designing, building, and managing a Cisco Aironet WLAN.

  • Master the basics of Wireless LANs with this concise design and deployment guide
  • Understand implementation issues for a variety of environments including vertical, SOHO, and enterprise networks
  • Learn design and troubleshooting advice from real-world case studies

802.11 Wireless LAN Fundamentals gives networking engineers and IT professionals the knowledge they need to design, deploy, manage, and troubleshoot their own wireless local-area networks (WLANs). Starting with an overview of the technology and architecture of WLANs, the book goes on to explain services and advanced features that such applications can provide. Most importantly, it provides practical design guidance and deployment recommendations.

Wireless LANs connect computer networks via radio transmissions instead of traditional phone lines or cables. Benefits to these systems go well beyond getting rid of all the cables and wires. Campus networks can grow geographically larger while still retaining all their efficiency and speed. Additionally, cost savings can be realized when third-party phone lines are no longer necessary, saving the cost of line rental and equipment upkeep. Finally, flexibility in campus network design increases significantly for the networking professional, while the network accessibility and usefulness increases for the individual users.

802.11 Wireless LAN Fundamentals helps networking professionals realize these benefits by helping them understand how to design, build, and maintain these networks, as well as how to justify their valuewithin organizations.



Interesting book: Edizioni professionali in patologia ed audiologia di Discorso-Lingua

Compressed Image File Formats: JPEG, PNG, GIF, XBM, BMP

Author: John Miano

This comprehensive reference on the major graphics file formats and the compression technologies they employ is an indispensable resource for graphics programmers, especially those developing graphical applications for the Web.

Compressed Image File Formats: JPEG, PNG, GIF, XBM, BMP examines the most common graphics file formats in detail and demonstrates how to encode and decode image files for each. In particular, this book offers in-depth coverage of the elaborate JPEG and newer PNG formats, providing clear explanations of complex concepts, experience-based practical techniques, and plentiful code examples. GIF, XBM, and BMP are also covered, with a focus on some of the less familiar and less well-documented features of these common file formats.

Specific topics covered include:


  • Compression technologies that each file format utilizes
  • Color models employed by each file format
  • The advantages and disadvantages of each file format
  • Huffman Coding
  • LZW Compression
  • Deflate/Inflate
  • Progressive JPEG
  • The Discrete Cosine Transform
  • Animated GIF


The accompanying CD-ROM contains the complete source code for all of the image formats covered in the book, as well as working examples and sample images. If you want to learn how to read and write graphic file formats for the Web--including PNG and JPEG files--there is no better resource than this book. System requirements: Windows 95 or Windows NT, Borland C++ Builder 3, or Microsoft Visual C++ 5.0.

Booknews

Shows graphics programmers how to write software that can read and write files using various 2-D image formats associated with Web browsers. Topics include compression technologies, color models, Huffman code generation, block ordering, the discrete cosine transform, and animated GIF. The CD-ROM contains source code and examples in C++. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Table of Contents:
Preface

Thursday, January 22, 2009

Professional SQL Server 2005 Administration or The Definitive Guide To Sqlite

Professional SQL Server 2005 Administration

Author: Brad McGehe

SQL Server 2005 is the largest leap forward for SQL Server since its inception. With this update comes new features that will challenge even the most experienced SQL Server DBAs. Written by a team of some of the best SQL Server experts in the industry, this comprehensive tutorial shows you how to navigate the vastly changed landscape of the SQL Server administration.

Drawing on their own first-hand experiences to offer you best practices, unique tips and tricks, and useful workarounds, the authors help you handle even the most difficult SQL Server 2005 administration issues, including blocking and locking. You'll learn how to fine-tune queries you've already written, automate redundant monitoring and maintenance tasks, and use hidden tools so that you can quickly get over the learning curve of how to configure and administer SQL Server 2005.

What you will learn from this book



• How to use some of the more advanced concepts of installation

• Techniques for properly administering development features such as SQL CLR

• Ways to secure your SQL Server from common threats

• How to choose the right hardware configuration

• Best practices for backing up and recovering your database

• Step-by-step guidelines for clustering your SQL Server



Who this book is for

This book is for experienced developers and database administrators who plan to administer or are already administering an SQL Server 2005 system and its business intelligence features.

Wrox Professional guides are planned and written by working technologists to meet thereal-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.



New interesting textbook: How to Avoid Falling or So Youre Having Prostate Surgery

The Definitive Guide To Sqlite

Author: Michael Owens

The Definitive Guide to SQLite is the perfect book about SQLite. It covers everything needed to start working with SQLite including installation, using the SQLite shell, and programming with SQLite using six different language extensions.


— Joe Topjian, Adminspotting

Traditional relational databases and embedded databases both have shortcomings that can leave a developer perplexed. So for many people, the solution resides in SQLite, an open source embeddable database with an amazingly small footprint (less than 250 kilobytes). SQLite packs a powerful array of features and can handle databases as large as 2 terabytes. It offers a flexible set of datatypes and the ability to perform transactions, and it is supported by languages like C, PHP, Perl, and Python. And because SQLite's databases are completely file based, privileges are granted at the operating system level, allowing for easy and fast user management.

The Definitive Guide to SQLite is the first book to devote complete coverage to the latest version of this powerful database. It offers you a thorough overview of SQLite capabilities and APIs, while remaining cognizant of newcomers who may be making their first foray into a database environment with SQLite. This book serves as both a first-time tutorial and future reference guide.

  • You'll learn about SQLite extensions available for C, Java, Perl, PHP, Python, Ruby, and Tcl.
  • The book thoroughly covers SQLite internals to help you take full advantage of its features while minimally impacting resource consumption.
  • Author Mike Owens is the original creator of Pysqlite, the popular Python extension for SQLite.



Table of Contents:
Ch. 1Introducing SQLite1
Ch. 2Getting started17
Ch. 3The relational model47
Ch. 4SQL73
Ch. 5Design and concepts171
Ch. 6The core C API205
Ch. 7The extension C API255
Ch. 8Language extensions301
Ch. 9SQLite internals341

Wednesday, January 21, 2009

Special Edition Using Microsoft Office Project 2003 or Master Visually Microsoft Windows Vista

Special Edition Using Microsoft Office Project 2003

Author: Timothy W Pyron

This book provides readers with everything they need to make the most of Project 2003. Project 2003 helps users manage projects indepently or as part of a large organization. Business professionals can gain access into their portfolio of projects, and collaborate on the documents, issues and risks associated with those projects.

Special Edition Using Office Project 2003, covers both Standard and Enterprise Project Management versions and provides direct answers about how to put a project schedule together. It is organized to follow the project cycle of initializing and developing a plan, implementing the plan, tracking progress and adjusting to changes and unforeseen events, and preparing the final reports.



Table of Contents:
Introduction
IGetting Started with Microsoft Project 2003
1The Power of Microsoft Project 200315
2Learning the Basics of Microsoft Project29
3Setting Up a Project Document55
4Managing Project Files95
IIScheduling Tasks
5Creating a Task List115
6Entering Scheduling Requirements175
7Viewing Your Schedule231
IIIAssigning Resources and Costs
8Defining Resources and Costs277
9Understanding Resource Scheduling321
10Assigning Resources and Costs to Tasks359
11Resolving Resource Assignment Problems401
IVReviewing and Distributing the Project
12Reviewing the Project Plan467
13Printing Views and Reports489
VTracking and Analyzing Progress
14Tracking Work on a Project519
15Analyzing Progress and Revising the Schedule555
VICoordinating Projects and Sharing Data
16Working with Multiple Projects603
17Exporting and Importing Data with Other File Formats631
18Copying, Pasting, and Inserting Data with Other Applications691
VIIUsing and Customizing the Display
19Using the Standard Views, Tables, Filters, and Groups735
20Formatting Views775
21Customizing Views, Tables, Fields, Filters, and Groups833
22Using and Customizing the Standard Reports877
23Customizing Toolbars, Menus, and Forms921
VIIIUsing Project Server and Project Professional
24Introduction to Microsoft Office Project Server 2003965
25Enterprise Project Administration985
26Enterprise Project Management1029
27Enterprise Resource Management1069
28Enterprise Collaboration1119
Index

Book about: Quando Regra de Corporações o Mundo:SEGUNDA EDIÇÃO

Master Visually Microsoft Windows Vista

Author: Rob Tidrow

"One picture is worth a thousand words." If you prefer instructions that show you how rather than tell you why, then this intermediate to advanced level reference is for you. Hundreds of succinctly captioned, step-by-step screen shots reveal how to accomplish more than 200 Windows Vista tasks, including:
* Handling new, upgrade, or dual-boot installation
* Using the new desktop and start menu
* Creating toolbars and changing display settings
* Managing the firewall and antivirus software
* Installing CD and DVD burners
* Working with the new productivity features
* "Master It" sidebars answer questions and present shortcuts
* High-resolution screen shots demonstrate each task
* Succinct explanations walk you through step by step
* Two-page lessons break big topics into bite-sized modules



Monday, January 19, 2009

Networking Basics or MCAD MCSD Self Paced Training Kit

Networking Basics

Author: Alan Dennis

You can get there

Whether you're already working in the computer networking field and looking to expand your skills or setting out on a new career path, Networking Basics will help you get there. Easy-to-read, practical, and up-to-date, this text not only helps you learn the fundamentals of networking at your own pace; it helps you master the core competencies and skills you need to succeed.

With this book, you will be able to:
* Fully absorb and apply essential network concepts, from local and wide-area network configurations to large-scale enterprise networks
* Design and build both wired and wireless networks
* Work with common network models and standards such as the OSI and TCP/IP (DoD) models, and IEEE 802 standards
* Match network capabilities to organizational needs

Networking Basics is ideal for both traditional and online courses. The accompanying Networking Basics Project Manual ISBN: 978-0-470-12799-5 is also available to help reinforce your skills.

Wiley Pathways helps you achieve your goals

The books in this series offer a coordinated curriculum for learning information technology. Learn more at wiley.com/go/pathways.



Table of Contents:
1. Network Fundamentals
2. Network Standards and Models
3. Network Architectures
4. Network Topologies
5. Network Media and Devices
6. Network Protocols
7. Transmission Control Protocol/Internet Protocol (TCP/IP)
8. Wireless, Remote, and Wide Area Networking
9. Network Servers and Services Fundamentals
10. Wide Area and Enterprise Networking Services
11. Network Management
12. Network Security

Read also Tampa Treasures or Recipes for Relaxed Italian Eating

MCAD/MCSD Self-Paced Training Kit: Developing web Applications with Microsoft Visual Basic .NET and Microsoft Visual Basic .NET and Microsoft Visual C# .NET

Author: Microsoft

Build real-world programming skills--and prepare for MCP Exams 70-305 and 70-315--with this official Microsoft study guide. Work at your own pace through the lessons and hands-on exercises to learn how to build Web applications using Visual Basic .NET and Visual C# .NET. This fully revised second edition provides even more side-by-side code examples and labs that show how to perform essential tasks in both programming languages and thoroughly covers the objectives of both certification exams. It also includes an enhanced testing tool on CD that provides more practice questions, detailed feedback on answers, and automated scoring. As you build your programming expertise through the skill-building exercises and self-assessment tests, you're also preparing for MCAD or MCSD certification for Microsoft .NET.



The Man Who Knew Too Much or Alison Balters Mastering Microsoft Office Access 2007 Development

The Man Who Knew Too Much: Alan Turing and the Invention of the Computer (Great Discoveries)

Author: David Leavitt

A "skillful and literate" (New York Times Book Review) biography of the persecuted genius who helped create the modern computer.

To solve one of the great mathematical problems of his day, Alan Turing proposed an imaginary computer. Then, attempting to break a Nazi code during World War II, he successfully designed and built one, thus ensuring the Allied victory. Turing became a champion of artificial intelligence, but his work was cut short. As an openly gay man at a time when homosexuality was illegal in England, he was convicted and forced to undergo a humiliating "treatment" that may have led to his suicide.

With a novelist's sensitivity, David Leavitt portrays Turing in all his humanity—his eccentricities, his brilliance, his fatal candor—and elegantly explains his work and its implications.

Publishers Weekly

Hounded by authorities and peers alike, British mathematician Alan Turing committed suicide in 1954 by biting into a cyanide-laced apple. A groundbreaking thinker in the field of pure math, a man principally responsible for breaking the Enigma code used by the Germans during WWII and the originator of the ideas that led to the invention of the computer, Turing was also an avowed homosexual at a time when such behavior flew in the face of both convention and the law. Leavitt (The Body of Jonah Boyd) writes that the unfailingly logical Turing was so literal minded, he "neither glorified nor anthologized" his homosexuality. Educated at King's College, Cambridge, and Princeton, Turing produced the landmark paper "On Computable Numbers" in 1937, where he proposed the radical idea that machines would and could "think" for themselves. Despite his Enigma code-breaking prowess during the war, which gave the Allies a crucial advantage, Turing was arrested in 1952 and charged with committing acts of gross indecency with another man. With lyrical prose and great compassion, Leavitt has produced a simple book about a complex man involved in an almost unfathomable task that is accessible to any reader. Illus. (Nov. 28) Copyright 2005 Reed Business Information.

Library Journal

Sparks are bound to fly when the life of one of the 20th century's greatest scientists and thinkers is displayed through a gay lens. Novelist Leavitt (The Lost Language of Cranes) picks over old bones in the closet of acclaimed mathematician, cryptographer, computer theorist, and philosopher Alan Turing (1912-54), looking for insight into the influence that his homosexual orientation might have had on his personal and professional life. Turing spent his life bridging the gap between pure mathematics and real-world applications. Perhaps the best example of his work is the machine that broke Germany's World War II Enigma cipher. This book balances lay reader-friendly explanations of Turing's accomplishments with the story of his life and offers a great exploration of the relationship among reputation, talent, and influence. But despite Leavitt's best efforts to bring something new to Turing's story, the gay lens never really illuminates anything of substance. Because the book attempts to appeal to a gay readership, some popular science readers will be lost. For larger collections only.-James A. Buczynski, Seneca Coll. of Applied Arts & Technology, Toronto Copyright 2005 Reed Business Information.

Kirkus Reviews

Given the example of the great British mathematician and inventor Alan Turing, it's ironic, writes novelist Leavitt (The Body of Jonah Boyd, 2004, etc.), that the study of mathematics was once thought to cure homosexuality. Turing expanded upon important ideas of how thinking happens and how machines could be taught to think, and he had a certain inclination toward machine-like literalness himself. A brilliant man who never quite shone, he was always off in the corner, becoming increasingly eccentric and spectacularly unhygienic as he grew older, oblivious to the norms by which others around him lived. Still, Turing found himself at the very heart of the British effort during WWII to crack the German Enigma code. He labored endlessly to decrypt enemy communications, making important discoveries about machine logic in the process. Many of Turing's contributions to mathematics and nascent computer science date to his years doing top-secret work at Bletchley Park. He might have gone on to greater things had he not been hauled up on the postwar morals charge of "gross indecency with another male: the same crime of which Oscar Wilde had been convicted, and for which he had been sent down, more than fifty years before." No jail for Turing, though: He instead ate a cyanide-laced apple in homage to a favorite movie, Snow White and the Seven Dwarfs, a gay martyr who had written of himself, sadly: "Turing believes machines think / Turing lies with men / Therefore machines do not think."Competent and always interesting, if a little cursory on some of the heavier mathematics.



Interesting textbook: Economic Change in China C 1800 1950 or Supervision

Alison Balter's Mastering Microsoft Office Access 2007 Development

Author: Alison Balter

Microsoft Office 2007 is a major upgrade from the last version of Office; Access will also be greatly revised. Alison Balter is the name that Access developers will trust to guide them through Access 2007's new features. She has the rare ability to take complex topics and explain them clearly, as shown by the success of her ten previous books on Access. Balter is known for providing real-world solutions to specific Access development problems. She also is known for her ability to back up her practical examples with just enough underlying theory to give the reader a good overall understanding of Access. In short, this book will provide beginning and intermediate Access developers with everything that they need to know to design and build Access 2007 applications. It should also appeal to DBAs and power users who want or need to get started building custom Access apps. This latest book in her Mastering Access series will not disappoint her many fans who anxiously await each new version, and should win her new fans as well.


 



Introduction


Part I The Basics of Access Development


1 Access as a Development Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7


2 What Every Developer Needs to Know About Databases and Tables . . . . . . . 75


3 Relationships: Your Key to Data Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115


4 What Every Developer Needs to Know About Query Basics. . . . . . . . . . . . . . . . . 137


5 What Every Developer Needs to Know About Forms. . . . . . . . . . . . . . . .. . . . . . . . . . 189


6 What Every Developer Needs to Know About Reports. . . . . . . . . . . . . . . . . . . . . . . . 269


7 What Are Macros, and When Do You Need Them? . . . . . . . . . . . . . . . . . . . . . . . . . . . 315


8 VBA: An Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345


9 Objects, Properties, Methods, and Events Explained . . . . . . . . . . . . . . . . . . . . . . . . . . 401


10 Advanced Form Techniques. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431


11 Advanced Report Techniques. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493


12 Advanced Query Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539


13 Advanced VBA Techniques. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599


14 Exploiting the Power of Class Modules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637


15 What Are ActiveX Data Objects, and Why Are They Important?. . . . . . . . . . 671


Part II What to Do When Things Don’t Go as Planned


16 Debugging: Your Key to Successful Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727


17 Error Handling: Preparing for the Inevitable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755


18 Optimizing Your Application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801


Part III Developing Multiuser and Enterprise Applications


19 A Strategy to Developing Access Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835


20 Using External Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 847


21 Access 2007 and SharePoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 883


22 Developing Multiuser and Enterprise Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 909


00_0672329328_FM.qxd 5/4/07 9:23 AM Page iii


Part IV Black Belt Programming


23 Working with and Customizing Ribbons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 935


24 Automation: Communicating with Other Applications. . . . . . . . . . . . . . . . . . . . . . 949


25 Exploiting the Power of the Windows API . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 985


26 Creating Your Own Libraries. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1011


27 Using Builders and Wizards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1027


28 An Introduction to Access and the Internet/Intranet. . . . . . . . . . . . . . . . . . . . . . . . 1055


Part V Adding Polish to Your Application


29 Documenting Your Application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1073


30 Maintaining Your Application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1091


31 Database Security Made Easy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1103


The following appendixes are available for download


at samspublishing.com/title/0672329328.


Part VI Appendixes


A Naming Conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PDF:1131


B Table Structures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PDF:1137


Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1193


 



Table of Contents:
Introduction


Part I The Basics of Access Development


1 Access as a Development Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7


2 What Every Developer Needs to Know About Databases and Tables . . . . . . . 75


3 Relationships: Your Key to Data Integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115


4 What Every Developer Needs to Know About Query Basics. . . . . . . . . . . . . . . . . 137


5 What Every Developer Needs to Know About Forms. . . . . . . . . . . . . . . . . . . . . . . . . . 189


6 What Every Developer Needs to Know About Reports. . . . . . . . . . . . . . . . . . . . . . . . 269


7 What Are Macros, and When Do You Need Them? . . . . . . . . . . . . . . . . . . . . . . . . . . . 315


8 VBA: An Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345


9 Objects, Properties, Methods, and Events Explained . . . . . . . . . . . . . . . . . . . . . . . . . . 401


10 Advanced Form Techniques. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431


11 Advanced Report Techniques. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493


12 Advanced Query Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 539


13 Advanced VBA Techniques. . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599


14 Exploiting the Power of Class Modules. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637


15 What Are ActiveX Data Objects, and Why Are They Important?. . . . . . . . . . 671


Part II What to Do When Things Don’t Go as Planned


16 Debugging: Your Key to Successful Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727


17 Error Handling: Preparing for the Inevitable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755


18 Optimizing Your Application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 801


Part III Developing Multiuser and Enterprise Applications


19 A Strategy to Developing Access Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835


20 Using External Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 847


21 Access 2007 and SharePoint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 883


22 Developing Multiuser and Enterprise Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 909


00_0672329328_FM.qxd 5/4/07 9:23 AM Page iii


Part IV Black Belt Programming


23 Working with and Customizing Ribbons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 935


24 Automation: Communicating with Other Applications. . . . . . . . . . . . . . . . . . . . . . 949


25 Exploiting the Power of the Windows API . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 985


26 Creating Your Own Libraries. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1011


27 Using Builders and Wizards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1027


28 An Introduction to Access and the Internet/Intranet. . . . . . . . . . . . . . . . . . . . . . . . 1055


Part V Adding Polish to Your Application


29 Documenting Your Application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1073


30 Maintaining Your Application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1091


31 Database Security Made Easy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1103


The following appendixes are available for download


at samspublishing.com/title/0672329328.


Part VI Appendixes


A Naming Conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PDF:1131


B Table Structures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . PDF:1137


Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1193

Sunday, January 18, 2009

Information Operations Doctrine and Practice or Mastering Financial Mathematics with Excel

Information Operations - Doctrine and Practice: A Reference Handbook

Author: Christopher Paul

A no-nonsense treatment of information operations, this handbook makes clear what does and does not fall under information operations, how the military plans and executes such efforts, and what the role of IO ought to be in the "war of ideas." Paul provides detailed accounts of the doctrine and practice of the five core information operations capabilities (psychological operations, military deception, operations security, electronic warfare, and computer network operations) and the three "related" capabilities (public affairs, civil-military operations, and military support to public diplomacy). The discussion of each capability includes historical examples, explanations of tools and forces available, and current challenges faced by that community. An appendix of selected excerpts from military doctrine ties the work firmly to the military theory behind information operations. Paul argues that contemporary IO's mixing of capabilities focused on information content with those focused on information systems conflates "apples" with the "apple carts." This important study concludes that information operations would be better poised to contribute to the war of ideas if IO were reorganized, separating content capabilities from systems capabilities and separating the employment of "black" (deceptive or falsely attributed) information from "white" (wholly truthful and correctly attributed) information.



Table of Contents:
Foreword   Charles A. Krohn     ix
Preface     xi
Acronyms and Abbreviations     xiii
The History of Information Operations and the Broader "War of Ideas" as Context     1
Contemporary Information Operations     22
Information Content-Psychological Operations (PSYOP), Deception (MILDEC), and Operations Security (OPSEC)     57
Information Systems-Electronic Warfare (EW) and Computer Network Operations (CNO)     83
Related Military Capabilities-Public Affairs (PA), Civil-Military Operations (CMO), Military Support to Public Diplomacy (MSPD)     99
The Future of IO     118
IO Doctrinal Excerpts     127
Glossary     157
Index     171

Interesting book: Diabetic Goodie Book or Winetasters Secrets

Mastering Financial Mathematics with Excel: A Practical Guide for Business Calculations

Author: Alstair Day

Tools enabling managers to carry out financial calculations have evolved in the last 20 years from tables through calculators to programs on PCs and personal organisers. Today, the majority of those in finance have Excel on their desks and increasingly on their laptops or pocket computers.

Mastering Financial Mathematics in Microsoft Excel provides a comprehensive set of tools and methods to apply Excel to solving mathematical problems. Alastair Day clearly explains the basic calculations for mathematical finance backed up with simple templates for further use and development, together with numerous examples and exercises.

Providing an explanation of key financial formulas and subject areas, the book includes a CD which:

·    allows you to work step-by-step through each of the chapters and examples

·    shows the use of formulas using straight-forward Excel templates

·    introduces examples and exercises for extension work

·    provides a menu of basic templates for further development

·    enables you to practise, develop and improve your efficiency and competence with Excel

Mastering Financial Mathematics in Microsoft Excel  will be invaluable in helping improve your Excel skills and understand the underlying financial concepts.



Saturday, January 17, 2009

Complete Guide to Windows Server 2008 or Managing Software Requirements

Complete Guide to Windows Server 2008

Author: John Savill

The Start-to-Finish, Comprehensive Windows Server 2008 Book for Every Working Administrator and Architect

To make the most of Windows Server 2008 in production environments, you need a deep understanding of its technical details. However, accurate and reliable information is scarce, and even most skilled Windows professionals don't know Windows Server 2008 as well as they should. The Complete Guide to Windows Server 2008 brings together more than 15,000 pages of practical Windows Server 2008 insight and in-depth knowledge that you can't find anywhere else, all based on final code.

John Savill—one of the world's most visible and trusted experts on Windows Server technology—specializes in helping real companies use Windows Server 2008 to run their businesses. His access to Microsoft's product team as a Microsoft MVP and one of 50 elite "Windows Server 2008 Delta Force Rangers" benefited this book's accuracy and value. Coverage includes

• Deployment planning, implementing, and managing new features, including Windows Server Core and Hyper-V virtualization

• Choosing the right installation and upgrade options for your environment

• Securing Windows Server 2008: authentication, authorization, BitLocker, certification services, and more

• Implementing TCP/IP, advanced network services, remote access, and thin-client Terminal Services

• Active Directory in depth, including Federated Services, Lightweight Directory Services, and Rights Management

• Providing high availability through Network Load Balancing and failover clustering

• Using Windows Deployment Services to quickly deploy multiple servers

• Supporting complex distibuted environments with the Distributed File System

• Automating server management with PowerShell and the command prompt

• Integrating Windows Server 2008 with UNIX, Linux, and legacy Netware servers

• Troubleshooting Windows Server 2008 and Vista environments, including an intuitive "how to" index to quickly locate answers to commonly asked questions



Table of Contents:
Front Matter
1           Windows 101: Its Origins, Present, and the Services It Provides
2           Windows Server 2008 Fundamentals: Navigating and Getting Started
3           Installing and Upgrading Windows Server 2008
4           Securing Your Windows Server 2008 Deployment
5           File System and Print Management Features
6           TCP/IP
7           Advanced Networking Services
8           Remote Access and Securing and Optimizing the Network
9           Terminal Services
10         Active Directory Domain Services Introduction
11         Designing and Installing Active Directory
12         Managing Active Directory and Advanced Concepts
13         Active Directory Federated Services, Lightweight Directory Services, and Rights Management
14         Server Core
15         Distributed File System
16         Deploying Windows
17         Managing and Maintaining Windows Server 2008
18         Highly Available Windows Server 2008
19         Virtualization and Resource Management
20         Troubleshooting Windows Server 2008 and Vista Environments
21         Group Policy
22         The Command Prompt and PowerShell
23         Connecting Windows Server 2008 to Other Environments
24         Internet Information Services

Interesting book: In the Company of Soldiers or Sex Trafficking

Managing Software Requirements: A Use Case Approach (Addison-Wesley Object Technology Series)

Author: Dean Leffingwell

"Many projects fail because developers fail to build the right thing. Developers of any kind of application should read this book." —Grady Booch
"A comprehensive solution to the requirements challenges faced by every development team. Full of insight and ideas all developers can learn from." —Ivar Jacobson
Despite the wealth of development knowledge, experience, and tools available today, a substantial percentage of software projects fail, often because requirements are not correctly determined and defined at the outset, or are not managed correctly as the project unfolds. This second edition of the popular text Managing Software Requirements focuses on this critical cause of failure and offers a practical, proven approach to building systems that meet customers' needs on time and within budget.
Using an accessible style, their own war stories, and a comprehensive case study, the authors show how analysts and developers can effectively identify requirements by applying a variety of techniques, centered on the power of use cases. The book illustrates proven techniques for determining, implementing, and validating requirements. It describes six vital Team Skills for managing requirements throughout the lifecycle of a project: Analyzing the Problem, Understanding User Needs, Defining the System, Managing Scope, Refining the System Definition, and Building the Right System. Managing Software Requirements, Second Edition, specifically addresses the ongoing challenge of managing change and describes a process for assuring that project scope is successfully defined and agreed upon by all stakeholders.Topicscovered include:


  • The five steps in problem analysis

  • Business modeling and system engineering

  • Techniques for eliciting requirements from customers and stakeholders

  • Establishing and managing project scope

  • Applying and refining use cases

  • Product management

  • Transitioning from requirements to design and implementation

  • Transitioning from use cases to test cases

  • Agile requirements methods

032112247XB05082003



Networking All In One Desk Reference for Dummies or Maran Illustrated Windows Vista

Networking All-In-One Desk Reference for Dummies

Author: Doug Low

10 books in 1 - your key to networking success!

Your one-stop guide to the latest updates on networking

Packed with new and updated material on Windows Server 2008, the latest Red Hat(r) Fedora(r), Vista, and Office 2007, and the most up-to-date wireless standards, this solitary reference contains everything you need to manage both large and small networks. With these ten minibooks, you'll discover how to make your network share information in the most efficient way possible.

Discover how to:


  • Manage Macs in a Windows environment
  • Handle mobile devices on a network
  • Configure Windows(r) XP and Vista clients
  • Back up and protect your data
  • Set up a wireless network



Table of Contents:
Introduction1
Bk. 1Networking Basics7
Ch. 1Understanding Networks9
Ch. 2Understanding Network Protocols and Standards23
Ch. 3Understanding Network Hardware47
Ch. 4Understanding Network Operating Systems67
Bk. IIBuilding a Network83
Ch. 1Planning a Network85
Ch. 2Installing Network Hardware103
Ch. 3Setting up a Network Server119
Ch. 4Configuring Client Computers135
Ch. 5Configuring Other Network Features149
Ch. 6Verifying Your Network Installation161
Bk. IIINetwork Administration and Security167
Ch. 1Help Wanted: Job Description for a Network Administrator169
Ch. 2Security 101183
Ch. 3Managing User Accounts193
Ch. 4Firewalls and Virus Protection201
Bk. IVNetwork Troubleshooting and Disaster Planning211
Ch. 1Solving Network Problems213
Ch. 2Network Performance Anxiety229
Ch. 3Protecting Your Network239
Ch. 4Disaster Recovery and Business Continuity Planning251
Ch. 5Dealing with Dysfunctional E-Mail259
Bk. VTCP/IP and the Internet267
Ch. 1Introduction to TCP/IP and the Internet269
Ch. 2Understanding IP Addresses277
Ch. 3Using DHCP301
Ch. 4Using DNS317
Ch. 5Using FTP345
Ch. 6TCP/IP Tools and Commands369
Bk. VIWireless and Home Networking399
Ch. 1Networking Your Home401
Ch. 2Connecting to the Internet with Internet Explorer413
Ch. 3Home Networking with Windows XP431
Ch. 4Setting Up a Wireless Network455
Ch. 5Securing a Wireless Network475
Bk. VIIWindows 2000 and 2003 Server Reference487
Ch. 1Installing and Configuring Windows 2000 and 2003 Server489
Ch. 2Managing User Accounts501
Ch. 3Managing a File Server521
Ch. 4Managing Security539
Ch. 5Troubleshooting551
Ch. 6Windows Commands563
Bk. VIIINetWare 6 Reference589
Ch. 1Installing and Managing NetWare 6591
Ch. 2Managing User Objects611
Ch. 3TCP/IP and NetWare 6623
Ch. 4NetWare Login Scripts643
Ch. 5NetWare Console Commands655
Bk. IXLinux Reference667
Ch. 1Installing a Linux Server669
Ch. 2Getting Used to Linux693
Ch. 3Basic Linux Network Configuration703
Ch. 4Doing the Samba Dance715
Ch. 5Running Internet Servers729
Ch. 6Linux Commands751
Bk. XAppendixes779
App. ADirectory of Useful Web Sites781
App. B: Glossary789
Index811

Read also Wisdom of Yoga or Caring for Yourself While Caring for Your Aging Parents

Maran Illustrated Windows Vista

Author: Maran

Maran Illustrated Windows Vista is an excellent guide for Windows users of all skill levels. Using clear, step-by-step instructions accompanied by over 500 full-color screen shots, Maran Illustrated Windows Vista is perfect for any visual learner who prefers seeing what to do rather than reading lengthy explanations. Maran Illustrated Windows Vista is the fastest and easiest way to learn about Windows Vista. New and improved Vista features covered in this book include: Live Taskbar Thumbnails, Windows Flip and Flip 3D Vista Firewall and Windows Defender Desktop Search and Quick Search Internet Explorer 7, including Shrink-to-fit printing Windows Sidebar and Gadgets Picture slide shows and Media Center Maran Illustrated guides are full-color, easy-to-use, information-packed resources. The information is communicated through clear, step-by-step instructions and accompanied by full-color screen shots - perfect for any visual learner. Maran Illustrated contains 30% more content than our Guided Tour Series. Learning Windows has never been this easy.



Friday, January 16, 2009

The Official Guide to Rootsweb com or Mastering Windows XP Registry

The Official Guide to Rootsweb. com

Author: Myra Vanderpool Gormley

From the former editor of the RootsWeb Review and the author of The Official Guide to Family Tree Maker 2006 comes the insider's tour of RootsWeb.com. In it, you will learn how to put your family tree online, locate valuable research resources, create successful message board posts, search effectively, connect with other users, and much more. The guide also features success stories from members of the RootsWeb community just like you. Unlock the full potential of the world's largest free genealogy website using the tips and tricks found only in this book.



Books about: Cold War or The Challenge

Mastering Windows XP Registry

Author: Peter D Hipson

Expert Advice for Windows XP Power Users

Created for Windows power users and anyone who aspires to be one, Mastering Windows XP Registry provides focused, practical coverage of Windows' most important--and most challenging--element: the registry. Inside, you'll learn to customize Windows XP, optimize the network, and avoid scores of potential disasters, all by working with registry settings. If you're a power user, a system administrator, programmer, or consultant, this guide is absolutely essential.

Coverage includes:
* Understanding registry keys and data types
* Applying the secrets of the most important registry keys
* Adjusting the Windows GUI through registry settings
* Using the registry in networking
* Optimizing performance by editing registry settings
* Working with registry tools
* Recovering from disasters
* Eliminating unwanted keys, entries, applications, and files
* Taking advantage of the registry in your own programs
* Tracking registry changes made by applications
* Navigating registry entries



UML for the IT Business Analyst or C

UML for the IT Business Analyst: A Practical Guide to Object-Oriented Requirements Gathering

Author: Howard Podeswa

The IT Business Analyst is one of the fastest growing roles in the IT industry. Business Analysts are found in almost all large organizations and are important members of any IT team whether in the private or public sector. UML for the IT Business Analyst provides a clear, step-by-step guide to how the Business Analyst can perform his or her role using state-of-the-art object-oriented technology. Business analysts are required to understand object-oriented technology although there are currently no other books that address their unique needs as non-programmers using this technology. Assuming no prior knowledge of business analysis, IT, or object-orientation, material is presented in a narrative, chronological, hands-on style using a real-world case study. Upon completion of UML for the IT Business Analyst, you will have created an actual business requirements document using all of the techniques of object-orientation required of a Business Analyst.



Book review: Pigs at the Trough or Humanitarianism in Question

C++: The Complete Reference, Fourth Edition

Author: Herbert Schildt

Best-selling genius Herb Schildt covers everything from keywords, syntax, and libraries, to advanced features such as overloading, inheritance, virtual functions, namespaces, templates, and RTTI—plus, a complete description of the Standard Template Library (STL).
Herbert Schildt is a world leading programming author. He is an authority on the C, C++, Java, and C# programming languages, and a master Windows programmer. His programming books have sold more than three million copies worldwide and have been translated into all major foreign languages. He is the author of numerous best sellers including C: The Complete Reference, Java 2: The Complete Reference, Java 2: A Beginner's Guide, C#: A Beginner's Guide, and many more. Schildt holds a master's degree in computer science from the University of Illinois.



Table of Contents:
Introduction
Pt. IThe Foundation of C++: The C Subset
1An Overview of C3
2Expressions13
3Statements57
4Arrays and Null-Terminated Strings89
5Pointers113
6Functions137
7Structures, Unions, Enumerations, and User-Defined Types161
8C-Style Console I/O187
9File I/O211
10The Preprocessor and Comments237
Pt. IIC++
11An Overview of C++255
12Classes and Objects289
13Arrays, Pointers, References, and the Dynamic Allocation Operators325
14Function Overloading, Copy Constructors, and Default Arguments359
15Operator Overloading383
16Inheritance417
17Virtual Functions and Polymorphism443
18Templates459
19Exception Handling487
20The C++ I/O System Basics509
21C++ File I/O539
22Run-Time Type ID and the Casting Operators567
23Namespaces, Conversion Functions, and Other Advanced Topics591
24Introducing the Standard Template Library629
Pt. IIIThe Standard Function Library
25The C-Based I/O Functions699
26The String and Character Functions723
27The Mathematical Functions737
28Time, Date, and Localization Functions747
29The Dynamic Allocation Functions757
30Utility Functions761
31The Wide-Character Functions775
Pt. IVThe Standard C++ Class Library
32The Standard C++ I/O Classes787
33The STL Container Classes811
34The STL Algorithms839
35STL Iterators, Allocators, and Function Objects861
36The String Class881
37The Numeric Classes897
38Exception Handling and Miscellaneous Classes925
Pt. VApplying C++
39Integrating New Classes: A Custom String Class935
40Parsing Expressions963
AThe .NET Managed Extensions to C++999
BC++ and the Robotics Age1005
Index1009

Wednesday, January 14, 2009

How to Photograph Absolutely Everything or Rick Steves Greece Turkey Israel and Egypt DVD 2000 2007

How to Photograph Absolutely Everything: Successful Pictures from Your Digital Camera

Author: Tom Ang

This comprehensive step-by-step guide to photographing an unbelievably wide range of subjects includes hundreds of inspirational images, each of which is accompanied by detailed step-by-step instructions. From sporting events and safaris to family gatherings and flowers, this is the most comprehensive photography manual ever assembled.

Daniel Lombardo - Library Journal

When Ang first began working professionally as a photographer and picture editor, digital photography was in its infancy. Today, it has removed the expense and inconvenience from picture taking and put the creative capability of a darkroom within reach of anyone with a computer. This author of 17 titles on video and photography has just published two landmarks for this particular time in an ever-changing field. How To Photograph Absolutely Everythingis the most useful and comprehensive book on the subject available for the nonprofessional. Ang begins with the elements of digital photography, from choosing equipment to framing images. Five chapters follow on how to photograph real-life situations and events, e.g., portraits, weddings, and sports events. Artistic expression (working with reflections, color, light, and abstract forms) and practical photography (for auctions, selling a car, and business promotion) round out the volume. Ang's Advanced Digital Photographyrevises a book first issued in 2003. Technically detailed yet clearly written, it's for the serious photographer or professional and remains a rich source for mastering the manipulation of digital images. Both books are highly recommended.



New interesting book: The Best Damn Cybercrime and Forensics Book Period or Microsoft Office Word 2003 Quicksteps

Rick Steves' Greece, Turkey, Israel and Egypt DVD 2000-2007

Author: Rick Steves

This is the only DVD that includes all eight half-hour “Rick Steves’ Europe” TV shows on Greece, Turkey, Israel and Egypt, produced from 2000 to 2007: Athens and the Peloponnese, Greek Islands, Istanbul, West Turkey, Central Turkey, Eastern Turkey, Israel, and Egypt. The running time is four hours. Filmed on location by America's most popular travel guidebook writer, Rick Steves' DVDs offer one great escape after another, from Europe's most thrilling cities to its charming, little-known villages. These DVDs are of the highest broadcast quality (NTSC format, all region compatible), with closed-captioning. Each DVD is packaged in a durable Amaray case with on-location cover photos and complete program details.



CNC Robotics or Oracle Database 11g Administration

CNC Robotics: Build Your Own WorkshopBot

Author: Geoff Williams

Here's the FIRST book to offer step-by-step guidelines that walk the reader through the entire process a building a CNC (Computer Numerical Control) machine from start to finish. Using inexpensive, off-the-shelf parts, readers can build CNC machines with true industrial shop applications such as machining, routing, and cutting--at a fraction of what it would cost to purchase one.


* Great for anyone who wants to automate a task in their home shop or small business
* Easy-to-use Windows-based software controls the robotic automation
* Builders can scale and customize the machine to suit their own industrial needs
* Numerous tips, tricks, and pictorials walk the reader through every step--design, construction, and completion

Geoff Williams is a woodworking enthusiast who owns and operates an athletic flooring company in Ontario, Canada. Also a professional photographer, he has extensive experience troubleshooting and repairing printed circuit boards.



Book review: Magic Lantern Guides or Adobe Illustrator CS3 How Tos

Oracle Database 11g Administration

Author: Sam R Alapati

Sam Alapati’s Expert Oracle Database 11g Administration is a comprehensive handbook for Oracle database administrators (DBAs) using the latest release of the Oracle Database (Oracle Database 11g). All key aspects of database administration are covered, including backup and recovery, day–to–day administration and monitoring, performance tuning, and more. This is the one book to have on your desk as a continual reference. Refer to it frequently. It’ll help you get the job done.

  • Comprehensive handbook for Oracle DBAs. Covers all major aspects of database administration.
  • Tests and explains in detail key DBA commands.
  • Offers primers on Linux/Unix, data modeling, SQL, and PL/SQL.

  • What you’ll learn

  • Prepare an environment for Oracle. Configure the system. Install the software. Create a database.
  • Monitor your database environment day–to–day with confidence that you will detect and resolve problems before they become emergencies.
  • Get the most out of Oracle Database 11g by taking full advantage of its management features and cutting–edge technologies.
  • Back up your database and be able to recover it if needed.
  • Secure your database, in terms of both regulatory compliance and user management.
  • Troubleshoot and resolve connectivity, network, and performance problems.
  • And more!

  • Who is this book for?

    Expert Oracle Database 11g Administration is written for Oracle database administrators who want a comprehensive reference to refer to during their day–to–day work. It’sclearly written in a way that is accessible to both intermediate and beginning administrators. Readers can easily and quickly find the content they need.



    Table of Contents:

    Pt. 1 Background, Data Modeling, UNIX/Linux, and SQL*Plus

    Ch. 1 The Oracle DBA's World 3

    Ch. 2 Relational Database Modeling and Database Design 19

    Ch. 3 Essential UNIX (and Linux) for the Oracle DBA 43

    Ch. 4 Using SQL*Plus and Oracle Enterprise Manager 97

    Pt. 2 Oracle Database 11g Architecture, Schema, and Transaction Management

    Ch. 5 Oracle Database 11g Architecture 165

    Ch. 6 Managing Tablespaces 215

    Ch. 7 Schema Management 261

    Ch. 8 Oracle Transaction Management 337

    Pt. 3 Installing Oracle Database 11g, Upgrading, and Creating Databases

    Ch. 9 Installing and Upgrading to Oracle Database 11g 391

    Ch. 10 Creating a Database 443

    Pt. 4 Connectivity and User Management

    Ch. 11 Connectivity and Networking 511

    Ch. 12 User Management and Database Security 543

    Pt. 5 Data Loading, Backup, and Recovery

    Ch. 13 Loading and Transforming Data 625

    Ch. 14 Using Data Pump Export and Import 677

    Ch. 15 Backing Up Databases 725

    Ch. 16 Database Recovery 801

    Pt. 6 Managing the Database

    Ch. 17 Automatic Management and Online Capabilities 877

    Ch. 18 Managing and Monitoring the Operational Database 947

    Pt. 7 Performance Tuning

    Ch. 19 Improving Database Performance: SQL Query Optimization 1041

    Ch. 20 Performance Tuning: Tuning the Instance 1129

    Appendix Oracle Database 11g SQL and PL/SQL: A Brief Primer 1221

    Index 1255