Sunday, December 6, 2009

Mission Critical or Ontological Engineering

Mission Critical: Realizing the Promise of Enterprise Systems

Author: Thomas H Davenport

"Mission Critical is a clear and comprehensive account of the enduring value of enterprise systems. Davenport's experience consulting for the world's leading companies gives his research an undeniable veracity. Anyone interested in how the real world of business works will gain a great deal of insight from this book."
--Henning Kagermann, Co-Chairman of the Executive Board and Co-CEO of SAP AG

"Finally, here is a book that provides a comprehensive and practical understanding of enterprise systems-their promise, their peril, and their future. Any manager not familiar with Davenport's book and its emphasis on information management will be lacking in the business literacy so necessary for success."
--Warren Bennis, Distinguished Professor of Business, University of Southern California, and Co-author of Organizing Genius and Co-Leaders

"Transformation in any corporation requires excellence in strategy, organization, and systems. Davenport illustrates the success that results when all three components are effectively addressed and the risks in implementing systems when they are not."
--William Stavropoulos, President and CEO, The Dow Chemical Company

What People Are Saying

Warren Bennis
Finally, here is a book that provides a comprehensive and practical understanding of enterprise systems....their promise, their peril, and their future.




Book about: Hizb Allah in Lebanon or John Quincy Adams

Ontological Engineering

Author: Asuncion Gomez Perez

Ontologies provide a common vocabulary of an area and define - with different levels of formality - the meaning of the terms and the relationships between them. Ontologies may be reused and shared across applications and groups Concepts in the ontology are usually organized in taxonomies and relations between concepts, properties of concepts, and axioms are typically used for representing the knowledge contained in ontologies. With the growth of information available, e.g. on the WWW, they are popularly applied in knowledge management, semantic web, natural language generation, enterprise modelling, knowledge-based systems, ontology-based brokers, e-commerce platforms and interoperability between systems. This book looks at questions such as: * What is an ontology? * What are the uses of ontologies? * What types of ontologies exist? What are the most well-known ones? * How do I select the best ontology for my application? * What are the principles for building an ontology? * What methodologies should I use to build my own ontology? Which techniques are appropriate for each step? * How do software tools support the process of building and using ontologies? * What language can I use to implement ontologies? * How can I integrate ontologies in a given language? The book presents the theoretical foundations of ontological engineering and covers the practical aspects of selecting and applying methodologies, tools and languages for building ontologies. The applications of ontologies are also illustrated with case studies taken from the areas of knowledge management, e-commerce and the semantic web.



Table of Contents:
1Theoretical Foundations of Ontologies1
2The Most Outstanding Ontologies47
3Methodologies and Methods for Building Ontologies107
4Languages for Building Ontologies199
5Ontology Tools293
Bibliography363
Index389
Index of figures397
Index of tables403

Friday, December 4, 2009

Database and Applications Security or DeBugging C

Database and Applications Security

Author: Miguel J Bagajewicz

As the demand for data management increases, so does the need for maintaining security of databases, applications, and information systems. The advent of the Web increased the likelihood of unauthorized access and malicious corruption, bringing to the forefront the necessity for effective mechanisms that secure critical information. Database and Applications Security: Integrating Information Security and Data Management reviews recent developments in security, with a special emphasis on the protection of databases. The author pays particular attention to securing emerging applications such as e-commerce, sensor information processing, and knowledge management. The book begins by providing essential background in database security, followed by descriptions of discretionary access control, multilevel secure databases, and models, functions, prototypes, and products of multilevel secure relational systems. It then discusses facets of the inference problem and addresses secure distributed databases. Following an analysis of secure object systems, the book focuses on security aspects of data warehousing and data mining. It also covers threats to privacy due to data mining, and concludes with an exploration of emerging technologies. This volume delivers a comprehensive overview of database and applications security for technical managers, technologists, and executives, as well as for those intending to pursue research in the field. It provides a high-level overview while discussing many technical details.



Table of Contents:
1Introduction1
Pt. ISupporting technologies for database and applications security
2Data management technologies23
3Information security61
4Information management technologies77
Pt. IIDiscretionary security for database systems
5Security policies115
6Policy enforcement and related issues127
Pt. IIIMandatory security from database systems
7Historical developments141
8Design principles159
Pt. IVMultilevel secure relational database systems
9Multilevel relational data models175
10Security impact on database functions187
11Prototypes and products197
Pt. VThe inference problem
12A perspective of the inference problem217
13Security-constraint processing for inference control229
14Conceptual structures for inference control253
Pt. VISecure distributed and heterogeneous database systems
15Discretionary security for distributed database systems281
16Multilevel security for distributed database systems295
17Secure heterogeneous and federated database systems309
Pt. VIISecure object and multimedia systems
18Discretionary and multilevel security for object database systems331
19Aspects of objects and security349
20Secure multimedia data management systems361
Pt. VIIIData warehousing, data mining, security, and privacy
21Secure data warehousing381
22Data mining for security applications399
23Privacy419
Pt. IXSecure Web data and information management technologies
24Secure Web data management and digital libraries441
25Security for XML, RDF, and the semantic Web465
26Secure E-commerce, collaboration, and knowledge management487
Pt. XEmerging secure data management technologies and applications
27Secure dependable data management505
28Secure sensor and wireless information management523
29Digital identity, forensics, and related topics549
30Summary and directions565
App. AData management systems : developments and trends577
App. BSuggested reading : books in database systems and information security593

Interesting book: Judgment of Paris or The Three Trillion Dollar War

DeBugging C++: Troubleshooting for Programmers

Author: Chris H Pappas

Write error-free programs from development to deployment! This unique reference shows you how to prevent problematic procedure-oriented and object-oriented code and handle ActiveX,COM,STL,and MFC coding problems.

"Great advice with practical,real-world examples. C++ programmers will avoid all kinds of headaches with this book. " —Elden Nelson,Editor-in-Chief,Visual C++ Developer's Journal Prevent problematic code and fix bugs with help from the expert techniques and strategies found in this unique resource. Debugging C++ shows you how to recognize and stamp out common and little-known code bugs quickly and easily. You'll get complete coverage of procedure-oriented and object-oriented debugging. And there's more—learn how to debug STL and Windows applications also developed with the MFC. Software bugs cause chaos and downtime which can result in lost revenue. Save the day! Use the real-world solutions offered in this handbook to prevent bugs from crippling your company's systems.

  • Optimize your code with the compiler
  • Investigate logical and syntactical errors
  • Debug code in the procedure-oriented environment-at the command line and in Windows
  • Locate,analyze,and repair object-oriented code errors at the command line and in the Microsoft Foundation Class (FMC) Library
  • Handle Standard Template Library (SQL) code debugging
  • Work with DLLs and fix ActiveX and COM errors



Thursday, December 3, 2009

Embedded Linux System Design and Development or Adobe Dreamweaver CS3 Illustrated

Embedded Linux System Design and Development

Author: P Raghavan

· Contains an entire roadmap for embedded Linux systems
· Explains the MTD (Memory Technology Device) model for Flash based storage
· Illustrates real-time programming techniques using POSIX.1b real-time extensions such as memory locking, real-time signals and asynchronous IO
· Examines how uClinux differs from standard Linux
· Discusses porting applications from a traditional
RTOS to embedded Linux

Based upon the authors' experience in designing and deploying an embedded Linux system with a variety of applications, Embedded Linux System Design and Development contains a full embedded Linux system development roadmap for systems architects and software programmers. Explaining the issues that arise out of the use of Linux in embedded systems, the book facilitates movement to embedded Linux from traditional real-time operating systems, and describes the system design model containing embedded Linux.

This book delivers practical solutions for writing, debugging, and profiling applications and drivers in embedded Linux, and for understanding Linux BSP architecture. It enables you to understand: various drivers such as serial, I2C and USB gadgets; uClinux architecture and its programming model; and the embedded Linux graphics subsystem. The text also promotes learning of methods to reduce system boot time, optimize memory and storage, and find memory leaks and corruption in applications.

This volume benefits IT managers in planning to choose an embedded Linux distribution and in creating a roadmap for OS transition. It also describes the application of the Linux licensing model in commercial products.

What People Are Saying

David McCullough
"A good overview of uClinux, and the infrastructure that supports it."
uClinux Core Maintainer


Todd Fischer
"The authors have done a good job fitting all the pieces together that are necessary for embedded Linux development. The book discusses topics such as board support packages, embedded storage and real-time Linux programming in depth. Embedded graphics and uCLinux are also explained with clarity. "
President, Cadenux, from the Foreword


Greg Haerr
"A great job covering the Linux framebuffer interface in detail – a lot of people will find this useful."
CEO & Founder, Century Software




See also: Moo Baa La La La or The Cat in the Hat

Adobe Dreamweaver CS3 Illustrated

Author: Sherry Bishop

Part of the Illustrated Series, this text covers the fundamental concepts of Adobe Dreamweaver CS3 with a strong emphasis on design. Fully revised to include coverage of the latest version of Dreamweaver, this title takes users from learning all the basic functions to fully understanding how to get Web sites up and running.



Table of Contents:
Unit A: Getting Started with Dreamweaver CS3 Unit B: Creating a Web Site Unit C: Developing a Web Page Unit D: Formatting Text and Using Cascading Style Sheets Unit E: Inserting and Managing Images Unit F: Creating Links and Navigation Bars Unit G: Laying Out Pages with Tables Unit H: Laying Out Pages with CSS Unit I: Collecting Data with HTML Forms
Appendix: Updating, Maintaining and Publishing a Web Site

Wednesday, December 2, 2009

Information Seeking in Electronic Environments or 3ds Max 8 Essentials

Information Seeking in Electronic Environments

Author: Gary Marchionini

In the computer age, it is essential for individuals to develop skills and strategies for manipulating, storing, and retrieving electronic information. This book considers how electronic technologies have changed these skills and strategies and augmented the fundamental human activity of information seeking. Writing from the point of view of the user rather than the computer, the author makes a case for creating new interface designs that allow information seekers to choose what strategy to apply according to their immediate needs. Such systems may be designed by providing information seekers with alternative interface mechanisms for displaying and manipulating multiple levels of representation for information objects. This book is multidisciplinary in approach and aims to bridge the perspectives of information science, computer science and education. It will be essential reading for researchers and graduate students in these fields.



Interesting textbook: Shattered Peace or National Geographic Kids Almanac 2010

3ds Max 8 Essentials: Autodesk Media and Entertainment Courseware

Author: Autodesk

Welcome to the Autodesk Media and Entertainment Official Training Courseware for 3ds max X software! Consider this book an all-access pass to the production and training experience of Autodesk developers and training experts. Written for self-paced learning or instructor-led classroom training, the manual will teach you the fundamentals of using 3ds max X. The book is organized into sections dedicated to animation, modelling, materials, lighting and rendering. Each section covers basic theory, and then includes exercises for hands-on demonstration of the concept. By the end of the book, you will have mastered the basics and moved onto full-length projects. Flexibility is built in, so that you can complete the tutorials in the way that works best for you. Complete the book and you will be a seasoned 3ds max pro, ready to work confidently in a production environment.

•For beginners or those new to 3ds max
•Tutorials and exercises designed for flexibility and ease of use
•CD contains 3ds max support models, materials, textures, and animations for completing the exercises



Table of Contents:
Ch. 1Getting started3
User interface5
Overview lab57
Files and objects97
Transforms149
Applying modifiers195
Ch. 2Modeling243
Low poly modeling245
Shapes279
Using compound objects341
Modeling lab375
Ch. 3Animation395
Animation basics397
Hierarchies431
Character animation - biped455
Animation lab481
Ch. 4Materials & mapping499
Introduction to materials501
Using maps535
Mapping coordinates561
Materials and mapping601
Ch. 5Rendering623
Cameras625
Basic lighting651
Global illumination677
Rendering the scene697
Scene assembly lab725

Tuesday, December 1, 2009

Pro SQL Server 2008 Xml or The Internet and Society

Pro SQL Server 2008 XML

Author: Apress

Knowledge and ability to apply XML are de rigueur in today’s world, and SQL Server developers and administrators are no exception to that rule. Pro SQL Server 2008 XML is your key to unlocking the powerful XML feature set first introduced in SQL Server 2005 and since refined in SQL Server 2008. Author Michael Coles shows how to store XML using SQL Server’s built–in XML data type. Learn to query and manipulate XML data using standard technologies such as XQuery and XSLT. No SQL Server database professional can afford to be without knowledge of the XML feature set. Pro SQL Server 2008 XML delivers on the knowledge that you need to remain competitive in your career.

  • Shows how to store, query, and manipulate XML documents in SQL Server
  • Provides step–by–step examples showing best practices and advanced features
  • Accurately discusses how SQL Server’s XML feature set stacks up against the ISO XML standards
  • What you’ll learn

  • Store XML documents using SQL Server’s built–in XML data type.
  • Query those stored documents using SQL/XML and XQuery.
  • Manipulate and transform XML using XSLT and XPath.
  • Understand how SQL Server’s XML support compares to the ISO XML standards.
  • Create SOAP endpoints for use in web services applications.
  • Create primary and secondary XML indexes to improve performance of XML queries.
  • Who is this book for?

    SQL Server SQL/T–SQL developers and .NET developers who want to take advantage of the specific server–side XML functionality available in SQL Server2008

    About the Apress Pro Series

    The Apress Pro series books are practical, professional tutorials to keep you on and moving up the professional ladder.

    You have gotten the job, now you need to hone your skills in these tough competitive times. The Apress Pro series expands your skills and expertise in exactly the areas you need. Master the content of a Pro book, and you will always be able to get the job done in a professional development project. Written by experts in their field, Pro series books from Apress give you the hard–won solutions to problems you will face in your professional programming career.



    Look this: Cost Accounting for Managerial Planning Decision Making and Control 5e or Substance Abuse in the WorkPlace

    The Internet and Society

    Author: James Slevin

    The Internet and Society explores the impact of the internet on modern culture.



    Monday, November 30, 2009

    Adobe Photoshop and Photoshop Elements for Teens or Practical CakePHP Projects

    Adobe Photoshop and Photoshop Elements for Teens

    Author: Marc Campbell

    You see them in magazines, pass them around in emails, and run across them everywhere on the web—incredibly cool, crazy, and sometimes strange images that you know have been doctored using Photoshop. Have you ever looked at them and wondered, "How did they do that?" Adobe Photoshop and Photoshop Elements for Teens is filled with the tips and techniques that you need to know to use these powerful programs to create your own amazing images or retouch your digital photographs. Begin with the fundamentals of Photoshop and Photoshop Elements as you conquer the essential features and functions of each program. Master the interface and learn how to create and manage layers. Next, get ready to edit your images as you develop the skills you need to paint with the Brush, draw shapes and text, and apply special effects to your images. Put your new skills to the test as you complete a variety of hands-on projects, including making prints, dressing up your computer desktop, creating animation, laying out websites, and creating logos.



    New interesting textbook: Belleza universal or YMCA Healthy Back Book

    Practical CakePHP Projects

    Author: Kai Chan

    If you’ve been using PHP for sometime now and would like to start using a web framework, you’ll want to try CakePHP, which is an open source rapid development web framework built on PHP.

    PHP experts Kai Chan and John Omokore guide you through a variety of practical CakePHP applications. You will work on projects such as a video gallery, unit testing application, an e–commerce app, a blog site, and much more. Practical CakePHP Projects covers the key architectural concepts as well as including mini projects that you can use to enhance your own applications.

  • A friendly introduction for any web programmer looking to choose a PHP framework
  • Real–world projects based on current and future trends
  • Practical CakePHP techniques that you can use right away

  • What you’ll learn

  • Painlessly create a secure and dynamic web site with CakePHP and MySQL.
  • Discover how CakePHP can be used in high–level and demanding applications using CakePHP built–in components as well as methods such as Smarty, caching, and unit testing.
  • See how CakePHP integrates with technologies such as Ajax and web services.
  • Integrate your own components into CakePHP’s framework.
  • Apply CakePHP to mainstream technologies such as Google Video, blogging, mashups, and e–commerce.
  • Work through the few pitfalls of some of the CakePHP framework, for example, Access Control Lists.

  • Who is this book for?

    Aimed primarily at CakePHP novices to professionals and PHP programmers seeking to build web applications easily usingCakePHP and related web technologies, this book will also appeal to programmers using other frameworks in other languages, for example, Ruby on Rails and Java Spring.

    About the Apress Practical Series

    The Practical series from Apress is your best choice for getting the job done, period. From professional to expert, this series lets you apply project–motivated templates (or frameworks) step by step in a very direct, practical, and efficient manner toward current real–world projects that may be sitting on your desk. So whatever your career goal, Apress can be your trusted guide to take you where you want to go on your IT career empowerment path.



    Sunday, November 29, 2009

    Adobe Photoshop Lightroom 2 or Oracle SQL Plus Pocket Reference

    Adobe Photoshop Lightroom 2: A Digital Photographer's Guide

    Author: David Huss

    Adobe Photoshop Lightroom has taken the photography world by storm! Let two industry experts, Dave Huss and David Plotkin, help you get up to speed fast with the all-new version 2. This complete reference for all users of Lightroom starts out with the basics, covering each available tool found in Lightroom with step-by-step clarity. The book then moves on to more in-depth discussions of the most often used tools and techniques, so you can customize a workflow that best suits your own needs. Start at the beginning to develop a complete set of Lightroom skills, or skip ahead to the sections that delve deeper into the tools you want to use immediately. Learn how to work smarter, faster, and more creatively to improve the overall quality of your work so you can spend less time in front of the computer and more time behind your camera!

    *Maximize your productivity and learn from two experts exactly how to incorporate Adobe Photoshop Lightroom into your own workflow, whether you use Windows or a Mac
    *Fully up-to-date with the latest features of Lightroom 2 and packed with full color, step-by-step screenshots and photographs
    *Visit focalpress.com/Lightroom for additional Lightroom tutorials, software news and updates



    Table of Contents:

    Ch. 1 Lightroom Fundamentals 1

    Ch. 2 Getting to Know the Library Module 37

    Ch. 3 Getting Your Photos into Lightroom 57

    Ch. 4 Organizing Your Photos 97

    Ch. 5 Fixing Photos Fast Using Quick Develop 153

    Ch. 6 Precision Correction and Enhancement Using Develop Module 179

    Ch. 7 Making Local Adjustments 241

    Ch. 8 Showtime: Making Slideshows 263

    Ch. 9 Web Wizard: Creating and Posting Images on the Web 293

    Ch. 10 Layout and Composition 311

    Index 361

    Read also Understanding Business or Information Campaigns

    Oracle SQL Plus Pocket Reference

    Author: Jonathan Gennick

    The Oracle SQL*Plus Pocket Reference is a must-have for anyone working with Oracle databases, especially those looking to maximize the effectiveness of SQL*Plus. As Oracle's long-standing interactive query tool, SQL*Plus is available at every Oracle site, from the largest data warehouse to the smallest single-user system. Despite its wide use, however, SQL*Plus is still often not completely understood or fully utilized.

    Database administrators and developers alike will therefore find the Oracle SQL*Plus Pocket Reference to be extremely beneficial. In addition to summarizing all of the SQL*Plus syntax and format options, including new Oracle Database 10g features, this handy, on-the-job guide specifically shows readers how to:

    Differentiate between SQL and SQL*Plus Interact with SQL*Plus from both the command line and the web browser Select, insert, update, and delete data Format both text and HTML reports with SQL*Plus Specify SQL*Plus commands and format elements Tune SQL queries The new third edition of this book has been updated for Oracle Database 10g to include information on both SQL*Plus and SQL. New SQL information includes the SELECT statement's new MODEL clause, flashback queries, partition outer joins, and DBMS_XPLAN.

    With its quick-reference format and compact size, the Oracle SQL*Plus Pocket Reference follows in the long line of successful "pocket references" offered by O'Reilly. It also serves as the ideal companion to O'Reilly's larger, more comprehensive book on SQL*Plus, the bestselling Oracle SQL*Plus: The Definitive Guide.

    Author Jonathan Gennick is an editor for O'Reilly specializing in database and programming titles, having amassed some 17 years of programming and database management experience.



    Friday, November 27, 2009

    Data Monitoring in Clinical Trials or Oracle Wait Interface

    Data Monitoring in Clinical Trials

    Author: David L Demets

    Randomized clinical trials are the gold standard for establishing many clinical practice guidelines and are central to evidence based medicine. Obtaining the best evidence through clinical trials must be done within the boundaries of rigorous science and ethical principles. One fundamental principle is that trials should not continue longer than necessary to reach their objectives. Therefore, trials must be monitored for recruitment progress, quality of data, adherence to patient care or prevention standards, and early evidence of benefit or harm. Frequently, a group of external experts, independent from the investigators and trial sponsor, is charged with this monitoring responsibility, especially for safety and early benefit. This group is referred to by various names, such as a data monitoring committee or a data and safety monitoring board. This book, through a series of case studies presented by many distinguished clinical trial experts, illustrates the complexity of this monitoring process. The editors provide an overview of the process and a summary of a multitude of the lessons learned from the cases presented.

    This book should be useful to anyone serving on a data and safety monitoring board, or planning to do so, for colleagues in academia, industry and governmental agencies, and for teaching students in biostatistics, epidemiology, clinical trials and medical ethics. No other text has as extensive a collection of cases which provide insight into the many issues, often conflicting, that must be examined before recommendations to continue or discontinue a trial can be made. While depth in statistical methods is not required, some familiarity with statistical design andanalysis issues in clinical trials is helpful. The cases cover trials which were terminated early for convincing evidence of benefit, or for harmful effects. Cases with complex issues are also included. This series of cases should provide broad background information for potential monitoring committee members and better prepare them for the challenges that may exist in the trials for which they are responsible.



    Table of Contents:
    1Monitoring committees : why and how3
    2Lessons learned14
    3FDA and clinical trial data monitoring committees39
    Introduction to case studies showing benefit from the intervention53
    Assessing possible late treatment effects early : the diabetic retinopathy study experience55
    Data and safety monitoring in the beta-blocker heart attack trial : early experience in formal monitoring methods64
    Data monitoring for the aspirin component of the physicians' health study : issues in early termination for a major secondary endpoint73
    Early termination of the stroke prevention in atrial fibrillation I trial : protecting participant interests in the face of scientific uncertainties and the cruel play of chance85
    Early termination of the diabetes control and complications trial93
    Data monitoring in the AIDS clinical trials group study #981 : conflicting interim results109
    Challenges in monitoring the breast cancer prevention trial118
    Data monitoring experience in the metoprolol CR/XL randomized intervention trial in chronic heart failure : potentially high-risk treatment in high-risk patients136
    Stopping the randomized aldactone evaluation study early for efficacy148
    Data monitoring in the heart outcomes prevention evaluation and the clopidogrel in unstable angina to prevent recurrent ischemic events trials : avoiding important information loss158
    The data monitoring experience in the candesartan in heart failure assessment of reduction in mortality and morbidity program166
    Introduction to case studies showing harmful effects of the intervention179
    Breaking new ground : data monitoring in the coronary drug project183
    The data monitoring experience in the cardiac arrhythmia suppression trial : the need to be prepared early198
    Data monitoring in the prospective randomized milrinone survival evaluation : dealing with an agonizing trend209
    Stopping the carotene and retinol efficacy trial : the viewpoint of the safety and endpoint monitoring committee220
    Monitoring a clinical trial with waiver of informed consent : diaspirin cross-linked hemoglobin for emergency treatment of post-traumatic shock228
    Consideration of early stopping and other challenges in monitoring the heart and estrogen/progestin replacement study236
    Data monitoring in the antihypertensive and lipid-lowering treatment to prevent heart attack trial : early termination of the doxazosin treatment arm248
    Data monitoring experience in the moxonidine congestive heart failure trial260
    Data monitoring of a placebo-controlled trial of daclizumab in acute graft-versus-host disease269
    Introduction to case studies with special issues281
    Clinical trials of herpes simplex encephalitis : the role of the data monitoring committee285
    The nocturnal oxygen therapy trial data monitoring experience : problem with reporting lags292
    Stopping a trial for futility : the cooperative new Scandinavian enalapril survival study II302
    Lessons from warfarin trials in atrial fibrillation : missing the window of opportunity312
    Data monitoring experience in the AIDS toxoplasmic encephalitis study320
    Data monitoring in the randomized evaluation of strategies for left ventricular dysfunction pilot study : when reasonable people disagree330
    The data monitoring experience in the carvedilol post-infarct survival control in left ventricular dysfunction study : hazards of changing primary outcomes337
    Controversies in the early reporting of a clinical trial in early breast cancer346
    Making independence work : monitoring the bevacizumab colorectal cancer clinical trial360

    Look this: Unimagined Community or Best Practices for Social Work with Refugees and Immigrants

    Oracle Wait Interface: A Practical Guide to Performance Diagnostics and Tuning

    Author: Richmond She

    Troubleshoot, tune, and optimize your Oracle database efficiently and successfully every time. This book explains how to take full advantage of the revolutionary Oracle Wait Interface to quickly pinpoint--and solve--core problems and bottlenecks, and increase productivity exponentially.



    Thursday, November 26, 2009

    Usability Testing and Research or Groovy Programming

    Usability Testing and Research (Part of the Allyn & Bacon Series in Technical Communication)

    Author: Carol M Barnum

    Built on a solid foundation of current research in the field, Usability Testing and Research provides a comprehensive, up-to-date perspective in this increasingly important area of technical communication. Based on the most current research in the field, this book reflects the most recent developments and studies on this topic available. Sidebars throughout the book catch the attention of the readers and highlight key concepts in the text. A chapter on web testing provides coverage of what is now the hottest area in usability testing. End of chapter discussions and exercises reinforce learning. Frequent examples of planning, conducting, and reporting usability tests present current samples of projects. An appendix on teamwork gives pertinent advice in an area neglected by other texts: building and coordinating cross-functional teams for usability testing. For those interested in usability testing and research.



    Book review: Anlagengebäude & Gemeinschaftsentwicklung

    Groovy Programming: An Introduction for Java Developers

    Author: Kenneth Barclay

    Groovy Programming: An Introduction for Java Developers
    Kenneth Barclay and John Savage

    "For a book targeting those new to scripting, OO or dynamic languages in general, this book is fabulous!"
    — Andrew Glover, President, Stelligent Incorporated

    Groovy is a unique scripting language designed to augment the Java platform. It offers Java-like syntax, native support for maps and lists, methods, classes, closures, and builders. With its dynamic weak typing and seamless access to the Java API, it is well suited to the development of many small- to medium-size applications.

    Groovy is more expressive and operates at higher levels of abstraction than Java. This results in more rapid application development and increased programmer productivity. It can be used for "gluing" applications together rather than implementing complex data structures and algorithms.

    Another major strength of Groovy is that the coding effort required is relatively small by comparison with code written in Java. Often the latter appears to be overly complex and difficult to understand and maintain. This is because it requires extensive boilerplate or conversion code not required by Groovy.

    In one of the first guides to Groovy, authors Kenneth Barclay and John Savage introduce all the major aspects of Groovy development and explain the dynamic features this innovative programming language brings to the Java platform. This book assumes only a general knowledge of Java programming. Whether a seasoned Java developer or new to scripting languages, you'll receive expert guidance on how to make Groovy work for you.

    Features
    * The first comprehensive book on Groovyprogramming that shows how writing applications and scripts for the Java platform is fast and easy

    * Written by leading software engineers and acclaimed computing instructors

    * Offers numerous programming examples, code samples, detailed case studies, exercises for self-study, and a companion website with a Windows-based Groovy editor

    About the Authors
    Kenneth Barclay and John Savage are both lecturers at the School of Computing, Napier University, Edinburgh, Scotland. Their speciality is object-oriented software engineering, development, and programming. They are - coauthors of Object-Oriented Design with UML and Java (Butterworth-Heinemann, 2003).

    Java/Programming
    ISBN 978-0-12-372507-3



    Table of Contents:
    Preface; Chapter 1: Groovy; Chapter 2: Numbers and Expressions; Chapter 3: Strings and Regular Expressions; Chapter 4: Lists, Maps and Ranges; Chapter 5: Simple Input and Output; Chapter 6: Case Study: A Library Application (Modelling); Chapter 7: Methods; Chapter 8: Flow of Control; Chapter 9: Closures; Chapter 10: Files; Chapter 11: Case Study: A Library Application (Methods); Chapter 12: Classes; Chapter 13: Case Study: A Library Application (Objects); Chapter 14: Specialization; Chapter 15: Unit Testing (JUnit); Chapter 16: Case Study: A Library Application (Specialization); Chapter 17: Persistence; Chapter 18: Case Study: A Library Application (Persistence); Chapter 19: XML Builders and Parsers; Chapter 20: GUI Builders; Chapter 21: Template Engines; Chapter 22: Case Study: A Library Application (GUI); Chapter 23: Server Side Programming; Chapter 24: Case Study: A Library Application (Web); Chapter 25: Epilogue; Bibliography; Appendix A: Software Distribution; Appendix B: Groovy; Appendix C: More on Numbers and Expressions; Appendix D: More on Strings and Regular Expressions; Appendix E: More on Lists, Maps and Ranges; Appendix F: More on Simple Input and Output; Appendix G: More on Methods; Appendix H: More on Closures; Appendix I: More on Classes; Appendix J: Advanced Closures; Appendix K: More on Builders; Appendix L: More on GUI Builders; Index

    Wednesday, November 25, 2009

    Ruby Programming for the Absolute Beginner or Logistic Regression Using the SAS System

    Ruby Programming for the Absolute Beginner

    Author: Jerry Lee Ford

    Want to learn the fundamentals of Ruby programming but aren't sure where to start? Look no further! Ruby is a free, easy-to-learn, yet powerful scripting programming language that can run on any operating system. These attributes have made Ruby an extremely popular language in recent years for almost any programming task. Ruby Programming for the Absolute Beginner teaches you the basics of computer programming with Ruby through the creation of simple computer games. Not only will this "learn by doing" approach provide you with an instant sense of accomplishment, but it's also a fun way to learn. In addition to learning Ruby, you'll also learn the basics of computer programming, so you'll have a solid foundation from which you can confidently jump to other programming languages.



    Interesting book: Still Going Strong or Antipasto Table

    Logistic Regression Using the SAS System: Theory and Application

    Author: Paul D Allison

    If you are a researcher or student with experience in multiple linear regression and want to learn about logistic regression, this book is for you! Informal and nontechnical, this book both explains the theory behind logistic regression and looks at all the practical details involved in its implementation using the SAS System. Several social science real-world examples are included in full detail. This book also explains the differences and similarities among the many generalizations of the logistic regression model. The following topics are covered: binary logit analysis, logit analysis of contingency tables, multinomial logit analysis, ordered logit analysis, discrete-choice analysis with the PHREG procedure, and Poisson regression. Other highlights include discussions on how to use the GENMOD procedure to do loglinear analysis and GEE estimation for longitudinal binary data. Only basic knowledge of the SAS DATA step is assumed. Supports releases 6.12 and higher of SAS software.



    Table of Contents:
    Acknowledgments
    Ch. 1Introduction1
    Ch. 2Binary Logit Analysis: Basics5
    Ch. 3Binary Logit Analysis: Details and Options31
    Ch. 4Logit Analysis of Contingency Tables81
    Ch. 5Multinomial Logit Analysis111
    Ch. 6Logit Analysis for Ordered Categories133
    Ch. 7Discrete Choice Analysis161
    Ch. 8Logit Analysis of Longitudinal and Other Clustered Data179
    Ch. 9Poisson Regression217
    Ch. 10Loglinear Analysis of Contingency Tables233
    Appendix267
    References275
    Index279

    Sunday, February 22, 2009

    Essential C for Engineers and Scientists or Health Information Technology

    Essential C++ for Engineers and Scientists

    Author: Jeri Hanly

    Essential C++ for Engineers and Scientists focuses readers on the key elements of good programming and C++ using a multitude of engineering and scientific examples that are relevant to future engineers. The book covers the features of C++ needed for writing engineering programs, including many features of object-oriented programming. Early on, it makes some simplifying assumptions that allow the use of C++ topics without lengthy explanation, and then later discusses the intricacies of the features. Readers will come away with the confidence needed to solve problems with C++.

    THIS SECOND EDITION FEATURES:

    • Over 50% more programming projects than in the first edition.
    • Two new case studies with complete algorithm development.
    • Over 80 engineering and scientific examples and programming projects drawn from interesting areas such as solar heating, environmentally sound power production, water conservation, automated manufacturing, pipeline and power grid modeling, and others.
    • Updated and enhanced coverage of many topics including member operators and member functions, files, and structs.
    • Reference appendices on using the C programming language and about both the Borland and Visual C++ integrated development environments.
    • Fundamentals of numerical methods that represent commonly used techniques for solving engineering and scientific problems.



    New interesting book: Last Campaign or Blueprint for Action

    Health Information Technology

    Author: Nadinia Davis

    This book is designed to meet the needs of students at the beginning of their course of study in health information technology - both as a work-based task-oriented function and as a part of a larger profession of health information management. Individuals who wish to acquire basic knowledge of health information technology and how it fits into the health care arena will find this text useful.

  • Chapter learning objectives are tied to the American Health Information Management Association's (AHIMA) domains and sub-domains of the Health Information Technology (HIT) curriculum to allow instructors to teach to the credentialing exam and to help students prepare for the exam.
  • Provides job descriptions in every chapter to give students a broader view of the field and show them they many options they have upon graduation.
  • Includes application-oriented exercises and activities in each chapter to make learning more interactive for students and to also fulfill the AHIMA HIT curriculum requirements.
  • Each chapter builds on the previous chapter and encourages the application of key concepts to support comprehensive learning of the material.
  • A clear writing style and easy reading level is appropriate for two-year postsecondary students to make their reading and studying more time-efficient.
  • A comprehensive Instructor's Resource Manual with CD-ROM makes it easier for instructors to develop and teach the course.
  • Evolve provides an interactive learning environment instructors can utilize to work with the text.
  • Workbook exercises are incorporated into the text to keep the core content and review material close together.
  • Materialon statistics have been broken out into a new, separate chapter to give new students a better foundation for learning.
  • New Special Health Records chapter includes information on accreditation and major Health Information Management (HIM) issues.
  • Includes a computer-based health systems chapter to address how HIM is moving to an increasingly electronic environment.
  • A new Confidentiality and Compliance chapter covers HIPAA Privacy regulations.


  • Table of Contents:
    Environment of Health Information
    Health Care Delivery Systems     2
    Health Care Professionals     4
    Health Information Management     11
    Comparison of Facilities     13
    Legal and Regulatory Environment     22
    Chapter Activities     29
    Paying for Health Care     32
    Reimbursement     34
    Insurance     37
    Government Influence on Reimbursement     47
    Chapter Activities     51
    Collecting Health Care Data     54
    Basic Concepts     56
    Key Data Categories     59
    Medical Decision Making     62
    Describing Data     65
    Organization of Data Elements in a Health Record     67
    Data Quality     74
    Chapter Activities     82
    Content, Structure, and Processing of Health Information
    Acute Care Records     86
    Clinical Flow of Data     88
    Clinical Data     92
    Data Quality     102
    Accreditation     104
    Chapter Activities     106
    Health Information Management Processing     108
    Data Quality     110
    Postdischarge Processing     114
    OtherHealth Information Management Roles     124
    Chapter Activities     126
    Coding and Reimbursement     128
    Coding     130
    Prospective Payment Systems     136
    Billing     150
    Impact of Coding     154
    Chapter Activities     158
    Health Information Management Issues in Alternative Settings     161
    Ambulatory Care     163
    Ambulatory Care: Radiology and Laboratory     169
    Ambulatory Care: Ambulatory Surgery     172
    Long-Term Care     173
    Behavioral Health Facilities     175
    Rehabilitation Facilities     177
    Hospice     178
    Home Health Care     180
    Other Specialty Facilities     181
    Chapter Activities     185
    Maintenance and Analysis of Health Information
    Storage     188
    The Paper Perspective     190
    Master Patient Index     191
    Filing     197
    Alternative Storage Methods     218
    Chart Locator Systems     225
    Security of Health Information     229
    Chapter Activities     236
    Statistics     238
    Organized Collection of Data      240
    Data Retrieval     245
    Reporting of Data     252
    Statistical Analysis of Patient Information     254
    Routine Institutional Statistics     264
    Chapter Activities     277
    Quality and Uses of Health Information     279
    The Quality of Health Care     281
    Quality Management Theories     282
    History and Evolution of Quality in Health Care     283
    Monitoring the Quality of Health Information     288
    Health Information in Quality Activities     293
    Organization and Presentation of Data     301
    Health Care Facility Committees     307
    Uses of Health Information     310
    Chapter Activities     320
    Legal and Supervisory Issues in Health Information
    Confidentiality and Compliance     324
    Confidentiality     326
    Health Insurance Portability and Accountability Act     328
    Access     333
    Consent     339
    Release of Information     342
    Preparing a Record for Release     345
    Internal Requests for Information     348
    Sensitive Records     349
    Federal, Corporate, and Facility Compliance     349
    Chapter Activities     353
    Electronic Health Records     355
    The Evolution of the Electronic Health Record     357
    Government and Private Sector Intervention     363
    Advantages of and Barriers to Implementing an Electronic Health Record     366
    Electronic Health Record Management     368
    Career Opportunities     375
    Chapter Activities     378
    HIM Department Management     380
    Human Resources     382
    Organization Charts     384
    Health Information Management Department Workflow     389
    Department Planning     393
    Prioritization of Department Functions     396
    Evaluation of Department Operations and Services     397
    Department Policies and Procedures     398
    Health Information Personnel     400
    Employee Productivity     403
    Employee Evaluations     406
    Hiring Health Information Management Personnel     409
    Fair Employment Practices     416
    Department Equipment and Supplies     417
    Ergonomics     420
    Chapter Activities     423
    Training and Development     425
    Orientation     427
    Training      432
    Inservice Education     436
    Educating the Public     436
    Continuing Education     436
    Communication     439
    Department Meetings     442
    Chapter Activities     447
    Sample Paper Records     450
    Sample Electronic Medical Record     466
    Minimum Data Set     472
    Using Microsoft Excel to Perform Calculations     486
    Glossary     493

    Saturday, February 21, 2009

    C or Microsoft Visual C 2005 Express Edition Programming for the Absolute Beginner

    C++: The Core Language

    Author: Gregory Satir

    A first book for C programmers transitioning to C++, an object-oriented enhancement of the C programming language. Designed to get readers up to speed quickly, this book thoroughly explains the important concepts and features and gives brief overviews of the rest of the language. Covers features common to all C++ compilers, including those on UNIX, Windows NT, Windows, DOS, and Macs



    Book about: Services Marketing or Organization Modeling

    Microsoft Visual C++ 2005 Express Edition Programming for the Absolute Beginner

    Author: Premier Development

    Microsoft Visual C++ 2005 Express Edition Programming for the Absolute Beginner focuses on teaching first time programmers how to program using Visual C++ 2005 Express Edition as a foundation language. Written for the entry-level user, the book assumes no prior programming or scripting experience. Whether you are a new or experienced C++ developer, this book delivers the tools and libraries you need to write a variety of programs. Written in a straight-forward style, using a games-based approach that makes learning beginning-level programming fun and easy, Microsoft Visual C++ 2005 Express Edition Programming for the Absolute Beginner is the perfect introductory programming book.



    Table of Contents:
    Ch. 1An introduction to Visual C++ 2005 express1
    Ch. 2Navigating the Visual C++ 2005 express edition environment27
    Ch. 3Creating an application interface63
    Ch. 4Working with menus and toolbars101
    Ch. 5Storing and retrieving data in memory141
    Ch. 6Applying conditional logic177
    Ch. 7Processing lots of data with loops207
    Ch. 8Enhancing code structure and organization241
    Ch. 9Getting comfortable with object-oriented programming279
    Ch. 10Integrating graphics and audio307
    Ch. 11Debugging Visual C++ applications335

    Friday, February 20, 2009

    Teach Yourself VISUALLY Adobe Photoshop Lightroom 2 or Harvard Business Review on Knowledge Management

    Teach Yourself VISUALLY Adobe Photoshop Lightroom 2

    Author: Lynette Kent

    The amateur and home photographers today take many more photos than they ever would have with film cameras, and the sorting process alone can be an ominous and time consuming chore. Unlike Photoshop, Lightroom enables the photographer to organize, process, and output large numbers of files and effectively streamline the so called digital workflow, reducing the work and enhancing the flow of processing digital photographs. All the features of Lightroom such as moving the cursor directly on the image to adjust it, which are intended to simplify digital editing for the professional photographer, also make the photo editing process easier for the amateur. For once the professional level application is easier to use for everyone. This book provides the general photo enthusiast easy to follow steps to get past the intimidation factor of "a professional tool." Teach Yourself Visually Adobe Photoshop Lightroom will simplify the "photo geek speak," explain the interface and tools so the average person with a digital camera will feel comfortable and be able to start organizing, editing, and outputting photos right away.



    Book review: Workplace Communications for Engineering Technicians and Technologists or Accounting Information Systems

    Harvard Business Review on Knowledge Management

    Author: Harvard Business Review

    The Harvard Business Review paperback series is designed to bring today's managers and professionals the fundamental information they need to stay competitive in a fast-moving world. Here are the landmark ideas that have established the Harvard Business Reviewas required reading for ambitious businesspeople in organizations around the globe. The eight articles in Harvard Business Review on Knowledge Management highlight the leading-edge thinking and practical applications that are defining the field of knowledge management. Includes Peter Drucker's prophetic "The Coming of the New Organization" and Ikujiro Nonaka's "Knowledge-Creating Company." A Harvard Business Review Paperback.

    Library Journal

    This collection of eight Harvard Business Review articles are written by leading business authors (including a contribution from management guru Peter Drucker), and together they present a solid introduction to and overview of the practice of knowledge management. Copyright 1999 Cahners Business Information.

    Booknews

    A collection of eight articles first published in the during the 1980s-90s, focusing on the way companies generate, communicate, and leverage their intellectual assets. Each article is preceded by a summary. Topics include teaching smart people how to learn, doing research that reinvents the corporation, and managing professional intellect. Annotation c. Book News, Inc., Portland, OR (booknews.com)



    Table of Contents:
    The Coming of the New Organization1
    The Knowledge-Creating Company21
    Building a Learning Organization47
    Teaching Smart People How to Learn81
    Putting Your Company's Whole Brain to Work109
    How to Make Experience Your Company's Best Teacher137
    Research That Reinvents the Corporation153
    Managing Professional Intellect: Making the Most of the Best181
    About the Contributors207
    Index213

    Thursday, February 19, 2009

    Design and Launch Your Ecommerce Business in a Week or Blogs Wikis Myspace and More

    Design and Launch Your eCommerce Business in a Week

    Author: Jason R Rich

    WWW.(Your Online Store).COM

    Have you fantasized about your own retail store-selling your own specialty items, showcasing unique products or better promoting existing products? Or have you dreamed of working from home, setting your own hours and still making great money? Today's technology makes it easier than ever to take your retail dreams to the world's largest marketplace-the Internet. In just days, you can build your own eCommerce website, reach potential customers by the millions, process orders 24/7 and accept payments from all over the world-with no technical background or graphic design skills!

    • Design a professional eCommerce site using inexpensive, turnkey solutions from established companies like Google, Yahoo! and Go Daddy that require no programming or graphic design knowledge
    • Create content and online deals that capture shoppers and keep them coming back
    • Use surefire online tools that work 24/7 to handle payments and accept orders
    • Drive traffic using Search Engine Optimization and other marketing and advertising techniques
    • Skillfully handle inventory, order fulfillment, customer service and all other operations

    The world's largest marketplace is at your fingertips…take advantage of it!

    Jason R. Rich is a bestselling author of more than 35 books, including several e-commerce guides; a frequent contributor to several national magazines and daily newspapers; and a consultant to individuals and businesses looking to launch a successful e-commerce website.



    New interesting textbook: The Russian Roots of Nazism or The California Gold Rush and the Coming of the Civil War

    Blogs, Wikis, Myspace, and More: Everything You Want to Know about Using Web 2. 0 but Are Afraid to Ask

    Author: Terry Burrows

    For both internet gurus and online novices, this handy mini-encyclopedia explores the useful and interesting sites—big and small, popular and obscure—that make up Web 2.0, the new online community. From YouTube and Flickr to eBay and Facebook, each website and online application is explained through step-by-step screen shots and examines what each site does, why people use it, how to get started, and any special features. Simple yet thorough definitions for commonly used internet elements—such as tags, bookmarks, blogs, and podcasts—are provided as well as little-known usage tips for expert surfers. Grouped by type, this detailed guide also offers dozens of alternative URLs that cover similar online territory, but with their own unique takes.



    Tuesday, February 17, 2009

    The Hacker Crackdown or Network Maturity Model

    The Hacker Crackdown: Law and Disorder on the Electronic Frontier

    Author: Bruce Sterling

    The AT&T long-distance network crashes, and millions of calls go unanswered. A computer hacker reprograms a switching station, and calls to a Florida probation office are shunted to a New York phone-sex hotline. An underground computer bulletin board publishes a pilfered BellSouth document on the 911 emergency system, making it available to anyone who dials up. How did so much illicit power reach the hands of an undisciplined few - and what should be done about it? You are about to descend into a strange netherworld - one that sprang into existence when computers were first connected to telephones. This place has no physical location; it exists only in the networks that bind together its population. Like any frontier, it is home to a wide range of personalities, from legitimate computer professionals to those known only by their noms de net; denizens like Knight Lightning, Leftist, Compu-Phreak, Major Havoc, and Silver Spy; groups like the Lords of Chaos, Phantom Access Associates, Shadow Brotherhood, and the Coalition of Hi-Tech Pirates. This is not normal space, but "cyberspace." And if you use a computer, cyberspace is moving inexorably closer to you with each passing day. Your guide on this journey is bestselling science fiction author and longtime computer user Bruce Sterling, who was galvanized into action following the massive "hacker crackdowns" of 1990, in which law enforcement officers executed search warrants across the country against lawbreakers - and suspected lawbreakers - in the computer underground. In The Hacker Crackdown, Sterling - respected by hackers, law officers, and civil libertarians alike - uses his unique reportorial access and his considerable powers as a novelist to weave a startling narrative that informs, compels, and appalls. Sterling has researched all corners of this challenging and controversial new world for this book. In it we meet outlaws and cops, bureaucrats and rebels, geniuses and grifters: all denizens of a dazzling e

    Publishers Weekly

    Cyberpunk novelist Sterling (Involution Ocean) has produced by far the most stylish report from the computer outlaw culture since Steven Levy's Hackers. In jazzy New Journalism proE;e, sounding like Tom Wolfe reporting on a gunfight at the Cybernetic Corral, Sterling makes readers feel at home with the hackers, marshals, rebels and bureaucrats of the electronic frontier. He opens with a social history of the telephone in order to explain how the Jan. 15, 1990, crash of AT&T's long-distance switching system led to a crackdown on high-tech outlaws suspected of using their knowledge of eyberspace to invade the phone company's and other corporations' supposedly secure networks. After explaining the nature of eyberspace forms like electronic bulletin boards in detail, Sterling makes the hackers-who live in the ether between terminals under noms de nets such as VaxCat-as vivid as Wyatt Earp and Doe Holliday. His book goes a long way towards explaining the emerging digital world and its ethos. (Oct.)

    Library Journal

    This well-written history of ``cyberspace'' and computer hackers begins with the failure of AT&T's long-distance telephone switching system in January 1990 (the subject of Leonard Lee's The Day the Phones Stopped , LJ 7/91). Subsequently, a number of hackers were accused of being responsible, although AT&T formally acknowledged otherwise. In detailing various formal efforts to prosecute the ``phone phreaks'' and hackers, cyberpunk sf author Sterling ( Islands in the Net , LJ 6/15/88) avoids attributing the near-mystical genius qualities that too many authors have bestowed upon the computer and telephone ``outlaws.'' Instead, he realistically describes their biases and philosophical shortcomings. Sterling's concern for the Steve Jackson Games prosecution, which occurred erroneously in conjunction with several legitimate raids in Austin, leads him to the Electronic Frontier Foundation, and he concludes with a well-balanced look at this new group of civil libertarians. Written with humor and intelligence, this book is highly recommended. See also Katie Hafner and John Markoff's Cyperpunk , LJ 6/1/91.--Ed.-- Hilary D. Burton, Lawrence Livermore National Lab, Livermore, Cal.

    BookList

    Sterling collaborated with William Gibson on "The Difference Engine" (BKL D 1 90), about what might have resulted had Charles Babbage's 1842 prototype of the computer succeeded. That novel seems to have impelled Sterling toward the present effort, a feisty survey of the dilemmas electronic technologies present for software firms, law enforcement agencies, hackers, and civil libertarians. He begins with a colorful portrait of Alexander Graham Bell and the Bell System, since Bell's divestiture in 1982 heralded much of the contemporary confusion, and it was with the telephone that cyberspace, that place somewhere between speakers, became "real." He discusses the Computer Fraud and Abuse and the Electronic Communications and Privacy acts of 1986. But his attentions center on the AT&T long-distance crash of 1990 and subsequent federal raids on hackers such as NuPrometheus, which once stole a jealousy guarded piece of Apple software, and Knight Lightning, actually tried for software piracy. Nineteen ninety was a year of raids, arrests, and trials, the upshot of which is that a host of groups have dug in on the battle for the free flow of electronic information. At the same time, electronic crimes are likely to become more sophisticated and international. Sterling relates all this with an insider's grasp of detail, and with irreverent humor. Offbeat and brilliant.

    Booknews

    Father of "cyberpunk" science fiction and techno-journalist, Sterling writes in his popular style for this nonfiction book that looks at computer hacking from both sides of the law. He interviews outlaw hackers and phone phreaks, law enforcement personnel, and civil libertarians, and presents a look at the people involved in the world of cyberspace and the politics of the new technological world. No references. Annotation c. Book News, Inc., Portland, OR (booknews.com)



    New interesting textbook: Collège Estimant 1-13

    Network Maturity Model

    Author: William J Baumann

    The Network Maturity Model (NMM) addresses the need for a process-based approach to ensuring network quality. Application of the model to enterprise networks provides gains in terms of over all quality, process reliability and positive impacts on customers.

    The extensive background in academia and real-world industry of the engineer authors has produced a work which synergistically integrates a myriad of disciplines and experience relevant to an effective network quality system. For example, within the model the authors have crafted network activities related to Enterprise business models, and integrated Enterprise Management with Network Engineering and Network Operations.

    The Network Maturity Model (NMM) provides a process model for a network management system. Compliance to the NMM ensures that processes are defined, established and continuously improved to support the development of quality networks in a repeatable manner. Unique to the NMM is it provides a strong focus on stakeholder satisfaction, and the integration of network management, development and operations processes to provide higher quality networks. Another unique feature of the NMM is its components which address the security, acquisition, hardware, customer, and other activities unique to networks.

    The model describes a comprehensive quality and process capability across all aspects of computer networks. It is designed as a stand-alone model which provides quality system elements for network management, engineering, and operational components. It encompasses a multi-discipline approach which integrates elements of quality standards including ISO 9000, TL 9000 and Baldrige. Use of the modelprovides network quality managers and professionals with a single integrated maturity model, eliminating the need to use separate models for different network activities such as the software CMM for network software development.



    Monday, February 16, 2009

    Adobe PageMaker 70 Basics or Building High Availability Windows Server 2003 Solutions

    Adobe PageMaker 7.0 BASICS

    Author: Rick Braveheart

    This book from our BASICS series provides a step-by-step introduction to Adobe PageMaker 7 software. Everything from creating a publication and working with styles and graphics to working with tables and templates is covered in this text.



    Interesting textbook: GNU Autoconf Automake and Libtool or Mistake Proofing for Operators

    Building High Availability Windows Server 2003 Solutions

    Author: Jeffrey A Shapiro

    This is the definitive resource for every network administrator, consultant, and architect who needs to maximize availability, scalability, and performance in Windows server environments.

    Drawing on two decades of Windows server experience, Jeffrey Shapiro and Marcin Policht have written the most realistic, comprehensive, and independent Windows high availability guide ever published. One step at, a time, they help you plan, implement, and manage clustering, load balancing, fault tolerance, SQL Server, Exchange Server, and much more. Along the way, they address crucial high availability topics that are virtually ignored by most books, such as disaster recovery, performance monitoring, and operations management.

    Shapiro and Policht offer a clear, concise roadmap for keeping Windows servers running 24x7 and delivering on even the most challenging service-level agreements. They provide real-world case studies and easy-to-use instructions designed to help readers make better decisions more rapidly.

    Coverage includes

    • Building the foundations for a highly available Active Directory and network architecture

    • Selecting and integrating high-performance hardware, storage, and networks

    • Installing and configuring Windows Clustering Services for both scale-out and failover

    • Leveraging the Microsoft Operations Framework (MOF) and Microsoft Systems Architecture (MSA)

    • Delivering high-performance, high availability file- and print-server solutions

    • Using clustering to maximize SQL Server and Exchange Server availability

    • Restoring failed servers: best practices and step-by-step techniques for recovering from downtime or disaster

    • Deploying Network Load Balancing (NLB) IIS and application servers

    • Administering Windows Server 2003 high-performance systems—including performance monitoring and alerts with Microsoft Operations Manager

    • Avoiding the pitfalls associated with Windows high availability solutions



    Table of Contents:
    Pt. IHigh-performance Windows computing
    Ch. 1The world of high-performance, high availability Windows computing3
    Ch. 2Choosing high-performance hardware25
    Ch. 3Storage for highly available systems35
    Ch. 4Highly available networks71
    Ch. 5Preparing the platform for a high-performance network97
    Ch. 6Building the foundations for a highly available architecture163
    Pt. IIBuilding high availability Windows server 2003 solutions
    Ch. 7High-performance print-server solutions217
    Ch. 8High-performance file-server solution225
    Ch. 9High availability, high-performance SQL server solutions245
    Ch. 10High availability, high-performance exchange297
    Ch. 11Load balancing335
    Ch. 12Internet information server373
    Ch. 13Looking for trouble : setting up performance monitoring and alerts401

    Friday, February 13, 2009

    Conquest in Cyberspace or Learning Red Hat Linux

    Conquest in Cyberspace: National Security and Information Warfare

    Author: Martin C Libicki

    With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve.



    Table of Contents:
    List of Figures     x
    Acknowledgments     xi
    Introduction     1
    What Does Conquest Mean in Cyberspace?     4
    Precis     10
    Hostile Conquest as Information Warfare     15
    An Ideal-Type Definition of Information Warfare     16
    Control at One Layer Is Not Control at Another     24
    Applying the Ideal-Type Definition     27
    There Is No Forced Entry in Cyberspace     31
    Information Warfare Only Looks Strategic     37
    IW Strategy and Terrorism     43
    Conclusions     49
    Information Warfare as Noise     50
    Disinformation and Misinformation     51
    Defenses against Noise     55
    Redundancy     55
    Filtration     57
    What Tolerance for Noise?     59
    Tolerance in Real Environments     60
    Castles and Agoras     62
    Hopping from Agoras to Castles?     64
    Castling Foes     66
    Concluding Observations     71
    Can Information Warfare Be Strategic?     73
    Getting In     75
    Mucking Around     79
    Spying     79
    Denial of Service     80
    Corruption     81
    Distraction     83
    Countermeasures     84
    Redundancy     84
    Learning     85
    Damage Assessment     87
    Prediction     90
    Intelligence Is Necessary     90
    Intelligence Alone Is Hardly Sufficient     93
    Is Information Warfare Ready for War?     95
    The Paradox of Control     96
    Other Weaponization Criteria     97
    Conclusions     100
    Information Warfare against Command and Control     102
    The Sources of Information Overload     103
    Its Effect on Conventional Information Warfare Techniques     105
    Coping Strategies     107
    Who Makes Decisions in a Hierarchy?     107
    Responses to Information Overload     111
    Know the Enemy's Information Architecture     116
    Elements of Information Culture     117
    Elements of Nodal Architecture     118
    Injecting Information into Adversary Decision Making     118
    Ping, Echo, Flood, and Sag     121
    Ping and Echo     121
    Flood and Sag     122
    Conclusions     124
    Friendly Conquest in Cyberspace      125
    A Redefinition of Conquest     126
    The Mechanisms of Coalitions     128
    The Particular Benefits of Coalitions     130
    Information and Coalitions     131
    The Cost of Coalitions in Cyberspace     136
    Enterprise Architectures and Influence     142
    Alliances with Individuals     148
    The Special Case of Cell Phones     151
    Alliances of Organizations     155
    Ecologies of Technological Development     155
    DoD's Global Information Grid (GIG)     159
    Merging the Infrastructures of Allies     164
    Conclusions     166
    Friendly Conquest Using Global Systems     169
    Geospatial Data     170
    Coping with Commercial Satellites     175
    Manipulation through Cyberspace     178
    Getting Others to Play the Game     180
    Some Conclusions about Geospatial Services     182
    National Identity Systems     182
    Two Rationales for a National Identity System     183
    Potential Parameters for a Notional System     184
    Constraints from and Influences over Foreign Systems     187
    Compare, Contrast, and Conclude     191
    Retail Conquest in Cyberspace     193
    Information Trunks and Leaves     194
    Where Does Cheap Information Come From?     195
    Surveillance in Cyberspace     198
    Making Information Global     203
    Privacy     204
    Amalgamating Private Information     206
    Using the Information     208
    General Coercion     208
    Specific Coercion     209
    Persuasion     211
    Some Limits of Retail Warfare in Cyberspace     214
    Using Retail Channels to Measure Wholesale Campaigns     215
    Conclusions     218
    From Intimacy, Vulnerability     220
    Do the Walls Really Come Down?     220
    Intimacy as a Target     222
    The Fecklessness of Friends     225
    Betrayal     228
    Conclusions     230
    Talking Conquest in Cyberspace     231
    Four Layers of Communications     232
    Human Conversation in Layers     232
    Cyberspace in Layers     236
    Complexity Facilitates Conquest     240
    Complexity and Hostile Conquest     241
    Complexity and Friendly Conquest     242
    Semantics     245
    Pragmatics      249
    Lessons?     255
    Managing Conquest in Cyberspace     256
    Conducting Hostile Conquest in Cyberspace     257
    Warding Off Hostile Conquest in Cyberspace     262
    Byte Bullies     262
    Headless Horsemen     265
    Perfect Prevention     268
    Total Transparency     270
    Nasty Neighborhoods     272
    Exploiting Unwarranted Influence     276
    Against Unwarranted Influence     281
    In Microsoft's Shadow     282
    Microsoft and Computer Security     285
    Conclusions     289
    Why Cyberspace Is Likely to Gain Consequence     291
    More Powerful Hardware and Thus More Complex Software     292
    Cyberspace in More Places     294
    Fuzzier Borders between Systems     297
    Accepted Cryptography     299
    Privatized Trust     301
    The Possible Substitution of Artificial for Natural Intelligence     303
    Conclusions     306
    Index     307

    Book review: The Anatomy of Hope or Cardio Free Diet

    Learning Red Hat Linux

    Author: Bill McCarty

    New users are flocking to Linux literally by the millions. Yet most of these new users draw from Microsoft Windows as their primary computing experience; for them an operating system from the UNIX family is an unfamiliar experience. In Learning Red Hat Linux, Bill McCarty has written a book aimed specifically at this new audience.

    Learning Red Hat Linux will guide any new user of Linux through the installing and use of Red Hat Linux, the free operating system that is shaking up the commercial world of software. It demystifies Linux in terms familiar to Windows users and gives readers only what they need to start being successful users of Linux.

    Built around the popular Red Hat distribution of Linux, Learning Red Hat Linux takes the reader step by step through the process of installing and setting up a Red Hat Linux system, and provides a thorough but gentle introduction to the basics of using Red Hat Linux.

    Because the book is written specifically for the enclosed CD, the reader needs nothing else to get started with this exciting new operating system.

    Booknews

    This second edition of a book/CD-ROM guide to installing and running Red Hat Linux on a PC has been upgraded to cover installation and configuration of Red Hat version 7.2, with improved sections on how to use the GNOME and KDE desktop environments and the use of the Red Hat Package Manager. The two CD-ROMs contain tools needed to install and configure a Red Hat Linux system. The book is written for first-time Linux users. McCarty teaches management information systems at Azusa Pacific University. Annotation c. Book News, Inc., Portland, OR (booknews.com)



    Thursday, February 12, 2009

    Approximate Dynamic Programming or Teaching and Learning with Technology

    Approximate Dynamic Programming: Solving the Curses of Dimensionality

    Author: Warren Buckler Powell

    A complete and accessible introduction to the real-world applications of approximate dynamic programming

    With the growing levels of sophistication in modern-day operations, it is vital for practitioners to understand how to approach, model, and solve complex industrial problems. Approximate Dynamic Programming is a result of the author's decades of experience working in large industrial settings to develop practical and high-quality solutions to problems that involve making decisions in the presence of uncertainty. This groundbreaking book uniquely integrates four distinct disciplines—Markov design processes, mathematical programming, simulation, and statistics—to demonstrate how to successfully model and solve a wide range of real-life problems using the techniques of approximate dynamic programming (ADP). The reader is introduced to the three curses of dimensionality that impact complex problems and is also shown how the post-decision state variable allows for the use of classical algorithmic strategies from operations research to treat complex stochastic optimization problems.

    Designed as an introduction and assuming no prior training in dynamic programming of any form, Approximate Dynamic Programming contains dozens of algorithms that are intended to serve as a starting point in the design of practical solutions for real problems. The book provides detailed coverage of implementation challenges including: modeling complex sequential decision processes under uncertainty, identifying robust policies, designing and estimating value function approximations, choosing effective stepsize rules, and resolving convergence issues.

    With a focus on modeling andalgorithms in conjunction with the language of mainstream operations research, artificial intelligence, and control theory, Approximate Dynamic Programming:

    • Models complex, high-dimensional problems in a natural and practical way, which draws on years of industrial projects
    • Introduces and emphasizes the power of estimating a value function around the post-decision state, allowing solution algorithms to be broken down into three fundamental steps: classical simulation, classical optimization, and classical statistics
    • Presents a thorough discussion of recursive estimation, including fundamental theory and a number of issues that arise in the development of practical algorithms
    • Offers a variety of methods for approximating dynamic programs that have appeared in previous literature, but that have never been presented in the coherent format of a book

    Motivated by examples from modern-day operations research, Approximate Dynamic Programming is an accessible introduction to dynamic modeling and is also a valuable guide for the development of high-quality solutions to problems that exist in operations research and engineering. The clear and precise presentation of the material makes this an appropriate text for advanced undergraduate and beginning graduate courses, while also serving as a reference for researchers and practitioners. A companion Web site is available for readers, which includes additional exercises, solutions to exercises, and data sets to reinforce the book's main concepts.



    See also: Decision Support and Business Intelligence Systems or Programming Microsoft ASPNet 20 Core Reference

    Teaching and Learning with Technology

    Author: Judy Lever Duffy

    Written by teachers for teachers, this text offers a clear and current look at the range of educational technologies and how teachers can effectively use technology to enhance learning.

    Written by Teachers for Teachers, this text provides readers with a clear understanding of educational media and how it can be used effectively to enhance learning.  The text explores the current and emerging technologies and multimedia available to teachers while consistently maintaining an instructional focus. Pre-service and in-service teachers.



    Table of Contents:
    Foreword
    Preface
    Pt. 1Technologies for Teaching and Learning1
    Ch. 1Theoretical Foundations2
    Ch. 2Designing and Planning Technology-Enhanced Instruction32
    Pt. 2Applying Technologies for Effective Instruction71
    Ch. 3Introduction to Personal Computers in the Classroom72
    Ch. 4Digital Technologies in the Classroom102
    Ch. 5Administrative Software128
    Ch. 6Academic Software166
    Ch. 7Networks and the Internet200
    Ch. 8Using the Web for Teaching and Learning232
    Ch. 9Audio and Visual Technologies270
    Ch. 10Video Technologies308
    Pt. 3Technology in Schools, Changing Teaching and Learning339
    Ch. 11Distance Education: Using Technology to Redefine the Classroom340
    Ch. 12Issues in Implementing Technology in Schools374
    App. ANational Educational Technology Standards for Teachers and Students405
    App. BEducational Technology Resources and Organizations407
    Photo Credits408
    Glossary409
    References421
    Index429