Sunday, December 6, 2009

Mission Critical or Ontological Engineering

Mission Critical: Realizing the Promise of Enterprise Systems

Author: Thomas H Davenport

"Mission Critical is a clear and comprehensive account of the enduring value of enterprise systems. Davenport's experience consulting for the world's leading companies gives his research an undeniable veracity. Anyone interested in how the real world of business works will gain a great deal of insight from this book."
--Henning Kagermann, Co-Chairman of the Executive Board and Co-CEO of SAP AG

"Finally, here is a book that provides a comprehensive and practical understanding of enterprise systems-their promise, their peril, and their future. Any manager not familiar with Davenport's book and its emphasis on information management will be lacking in the business literacy so necessary for success."
--Warren Bennis, Distinguished Professor of Business, University of Southern California, and Co-author of Organizing Genius and Co-Leaders

"Transformation in any corporation requires excellence in strategy, organization, and systems. Davenport illustrates the success that results when all three components are effectively addressed and the risks in implementing systems when they are not."
--William Stavropoulos, President and CEO, The Dow Chemical Company

What People Are Saying

Warren Bennis
Finally, here is a book that provides a comprehensive and practical understanding of enterprise systems....their promise, their peril, and their future.




Book about: Hizb Allah in Lebanon or John Quincy Adams

Ontological Engineering

Author: Asuncion Gomez Perez

Ontologies provide a common vocabulary of an area and define - with different levels of formality - the meaning of the terms and the relationships between them. Ontologies may be reused and shared across applications and groups Concepts in the ontology are usually organized in taxonomies and relations between concepts, properties of concepts, and axioms are typically used for representing the knowledge contained in ontologies. With the growth of information available, e.g. on the WWW, they are popularly applied in knowledge management, semantic web, natural language generation, enterprise modelling, knowledge-based systems, ontology-based brokers, e-commerce platforms and interoperability between systems. This book looks at questions such as: * What is an ontology? * What are the uses of ontologies? * What types of ontologies exist? What are the most well-known ones? * How do I select the best ontology for my application? * What are the principles for building an ontology? * What methodologies should I use to build my own ontology? Which techniques are appropriate for each step? * How do software tools support the process of building and using ontologies? * What language can I use to implement ontologies? * How can I integrate ontologies in a given language? The book presents the theoretical foundations of ontological engineering and covers the practical aspects of selecting and applying methodologies, tools and languages for building ontologies. The applications of ontologies are also illustrated with case studies taken from the areas of knowledge management, e-commerce and the semantic web.



Table of Contents:
1Theoretical Foundations of Ontologies1
2The Most Outstanding Ontologies47
3Methodologies and Methods for Building Ontologies107
4Languages for Building Ontologies199
5Ontology Tools293
Bibliography363
Index389
Index of figures397
Index of tables403

Friday, December 4, 2009

Database and Applications Security or DeBugging C

Database and Applications Security

Author: Miguel J Bagajewicz

As the demand for data management increases, so does the need for maintaining security of databases, applications, and information systems. The advent of the Web increased the likelihood of unauthorized access and malicious corruption, bringing to the forefront the necessity for effective mechanisms that secure critical information. Database and Applications Security: Integrating Information Security and Data Management reviews recent developments in security, with a special emphasis on the protection of databases. The author pays particular attention to securing emerging applications such as e-commerce, sensor information processing, and knowledge management. The book begins by providing essential background in database security, followed by descriptions of discretionary access control, multilevel secure databases, and models, functions, prototypes, and products of multilevel secure relational systems. It then discusses facets of the inference problem and addresses secure distributed databases. Following an analysis of secure object systems, the book focuses on security aspects of data warehousing and data mining. It also covers threats to privacy due to data mining, and concludes with an exploration of emerging technologies. This volume delivers a comprehensive overview of database and applications security for technical managers, technologists, and executives, as well as for those intending to pursue research in the field. It provides a high-level overview while discussing many technical details.



Table of Contents:
1Introduction1
Pt. ISupporting technologies for database and applications security
2Data management technologies23
3Information security61
4Information management technologies77
Pt. IIDiscretionary security for database systems
5Security policies115
6Policy enforcement and related issues127
Pt. IIIMandatory security from database systems
7Historical developments141
8Design principles159
Pt. IVMultilevel secure relational database systems
9Multilevel relational data models175
10Security impact on database functions187
11Prototypes and products197
Pt. VThe inference problem
12A perspective of the inference problem217
13Security-constraint processing for inference control229
14Conceptual structures for inference control253
Pt. VISecure distributed and heterogeneous database systems
15Discretionary security for distributed database systems281
16Multilevel security for distributed database systems295
17Secure heterogeneous and federated database systems309
Pt. VIISecure object and multimedia systems
18Discretionary and multilevel security for object database systems331
19Aspects of objects and security349
20Secure multimedia data management systems361
Pt. VIIIData warehousing, data mining, security, and privacy
21Secure data warehousing381
22Data mining for security applications399
23Privacy419
Pt. IXSecure Web data and information management technologies
24Secure Web data management and digital libraries441
25Security for XML, RDF, and the semantic Web465
26Secure E-commerce, collaboration, and knowledge management487
Pt. XEmerging secure data management technologies and applications
27Secure dependable data management505
28Secure sensor and wireless information management523
29Digital identity, forensics, and related topics549
30Summary and directions565
App. AData management systems : developments and trends577
App. BSuggested reading : books in database systems and information security593

Interesting book: Judgment of Paris or The Three Trillion Dollar War

DeBugging C++: Troubleshooting for Programmers

Author: Chris H Pappas

Write error-free programs from development to deployment! This unique reference shows you how to prevent problematic procedure-oriented and object-oriented code and handle ActiveX,COM,STL,and MFC coding problems.

"Great advice with practical,real-world examples. C++ programmers will avoid all kinds of headaches with this book. " —Elden Nelson,Editor-in-Chief,Visual C++ Developer's Journal Prevent problematic code and fix bugs with help from the expert techniques and strategies found in this unique resource. Debugging C++ shows you how to recognize and stamp out common and little-known code bugs quickly and easily. You'll get complete coverage of procedure-oriented and object-oriented debugging. And there's more—learn how to debug STL and Windows applications also developed with the MFC. Software bugs cause chaos and downtime which can result in lost revenue. Save the day! Use the real-world solutions offered in this handbook to prevent bugs from crippling your company's systems.

  • Optimize your code with the compiler
  • Investigate logical and syntactical errors
  • Debug code in the procedure-oriented environment-at the command line and in Windows
  • Locate,analyze,and repair object-oriented code errors at the command line and in the Microsoft Foundation Class (FMC) Library
  • Handle Standard Template Library (SQL) code debugging
  • Work with DLLs and fix ActiveX and COM errors



Thursday, December 3, 2009

Embedded Linux System Design and Development or Adobe Dreamweaver CS3 Illustrated

Embedded Linux System Design and Development

Author: P Raghavan

· Contains an entire roadmap for embedded Linux systems
· Explains the MTD (Memory Technology Device) model for Flash based storage
· Illustrates real-time programming techniques using POSIX.1b real-time extensions such as memory locking, real-time signals and asynchronous IO
· Examines how uClinux differs from standard Linux
· Discusses porting applications from a traditional
RTOS to embedded Linux

Based upon the authors' experience in designing and deploying an embedded Linux system with a variety of applications, Embedded Linux System Design and Development contains a full embedded Linux system development roadmap for systems architects and software programmers. Explaining the issues that arise out of the use of Linux in embedded systems, the book facilitates movement to embedded Linux from traditional real-time operating systems, and describes the system design model containing embedded Linux.

This book delivers practical solutions for writing, debugging, and profiling applications and drivers in embedded Linux, and for understanding Linux BSP architecture. It enables you to understand: various drivers such as serial, I2C and USB gadgets; uClinux architecture and its programming model; and the embedded Linux graphics subsystem. The text also promotes learning of methods to reduce system boot time, optimize memory and storage, and find memory leaks and corruption in applications.

This volume benefits IT managers in planning to choose an embedded Linux distribution and in creating a roadmap for OS transition. It also describes the application of the Linux licensing model in commercial products.

What People Are Saying

David McCullough
"A good overview of uClinux, and the infrastructure that supports it."
uClinux Core Maintainer


Todd Fischer
"The authors have done a good job fitting all the pieces together that are necessary for embedded Linux development. The book discusses topics such as board support packages, embedded storage and real-time Linux programming in depth. Embedded graphics and uCLinux are also explained with clarity. "
President, Cadenux, from the Foreword


Greg Haerr
"A great job covering the Linux framebuffer interface in detail – a lot of people will find this useful."
CEO & Founder, Century Software




See also: Moo Baa La La La or The Cat in the Hat

Adobe Dreamweaver CS3 Illustrated

Author: Sherry Bishop

Part of the Illustrated Series, this text covers the fundamental concepts of Adobe Dreamweaver CS3 with a strong emphasis on design. Fully revised to include coverage of the latest version of Dreamweaver, this title takes users from learning all the basic functions to fully understanding how to get Web sites up and running.



Table of Contents:
Unit A: Getting Started with Dreamweaver CS3 Unit B: Creating a Web Site Unit C: Developing a Web Page Unit D: Formatting Text and Using Cascading Style Sheets Unit E: Inserting and Managing Images Unit F: Creating Links and Navigation Bars Unit G: Laying Out Pages with Tables Unit H: Laying Out Pages with CSS Unit I: Collecting Data with HTML Forms
Appendix: Updating, Maintaining and Publishing a Web Site