Saturday, January 31, 2009

C Cookbook or Remixers Bible

C++ Cookbook

Author: Jeff Cogswell

Despite its highly adaptable and flexible nature, C++ is also one of the more complex programming languages to learn. Once mastered, however, it can help you organize and process information with amazing efficiency and quickness.

The "C++ Cookbook" will make your path to mastery much shorter. This practical, problem-solving guide is ideal if you're an engineer, programmer, or researcher writing an application for one of the legions of platforms on which C++ runs. The algorithms provided in "C++ Cookbook" will jump-start your development by giving you some basic building blocks that you don't have to develop on your own.

Less a tutorial than a problem-solver, the book addresses many of the most common problems you're likely encounter--whether you've been programming in C++ for years or you're relatively new to the language. Here are just some of the time-consuming tasks this book contains practical solutions for:

Reading the contents of a directory

Creating a singleton class

Date and time parsing/arithmetic

String and text manipulation

Working with files

Parsing XML

Using the standard containers

Typical of O'Reilly's "Cookbook" series, "C++ Cookbook" is written in a straightforward format, featuring recipes that contain problem statements and code solutions, and apply not to hypothetical situations, but those that you're likely to encounter. A detailed explanation then follows each recipe in order to show you how and why the solution works. This question-solution-discussion format is a proven teaching method, as any fan of the "Cookbook" series can attest to. This book will move quickly to the top of your list of essential C++ references.



Table of Contents:
1Building C++ applications1
2Code organization105
3Numbers120
4Strings and text139
5Dates and times198
6Managing data with containers213
7Algorithms248
8Classes285
9Exceptions and safety330
10Streams and files351
11Science and mathematics394
12Multithreading446
13Internationalization466
14XML484
15Miscellaneous539

Book about: A Visão Populista

Remixer's Bible: Build Better Beats

Author: Francis Prev

The Remixer's Bible is a comprehensive collection of interviews and dance music production tips from Keyboard magazine. From downtempo and hip-hop to house and trance, this book is full of insider information on techniques the pros use to create world-class remixes and dance tracks. There's a section on getting started for beginners that details MIDI and sample clearance. For veterans there's instruction on how to craft infectious synth hooks and retro grooves, edit vocals, create loops, and compress bass tracks. A handy section delves into the distinctions of various dance music genres; loop tools, programming grooves, performing, and mixing are also explored. Plenty of software tips are also on hand, detailing popular programs like ReBirth, ACID, and Cakewalk.



Friday, January 30, 2009

Handbook of Networked and Embedded Control Systems or CEOs Guide to Health Care Information Systems

Handbook of Networked and Embedded Control Systems

Author: Dimitrios Hristu

The vast majority of control systems built today are embedded; that is, they rely on built-in, special-purpose digital computers to close their feedback loops. Embedded systems are common in aircraft, factories, chemical processing plants, and even in cars-a single high-end automobile may contain over eighty different computers. In such settings, controllers often use shared networks to communicate with each other and with large numbers of sensors and actuators scattered throughout the system. The design of embedded controllers and of the intricate, automated communication networks that support them raises many new questions-practical, as well as theoretical-about network protocols, compatibility of operating systems, and ways to maximize the effectiveness of the embedded hardware.

The Handbook of Networked and Embedded Control Systems, the first of its kind, provides engineers, computer scientists, mathematicians, and students a broad, comprehensive source of information and technology to address many questions and aspects of embedded and networked control. A carefully organized collection of important results, tools, software, and technology, this work unifies into a single reference many scattered articles, websites, and specification sheets-information that might otherwise be difficult to find.

Key topics and features include:

* Self-contained, sharply-focused articles; readers have easy access to specific answers to questions without having to read hundreds of pages

* Clear structure and presentation of concepts in intuitive order

* Separation of material into six main sections-Fundamentals, Hardware, Software, Theory, Networking, and Applications

* Casestudies, experiments, and examples that provide a multifaceted view of the subject, encompassing computation and communication considerations

* Information about commercially available tools and hardware

* Comprehensive bibliographies and index

This is an indispensable text for anyone interested in knowing more about embedded and networked control systems. Researchers will appreciate the handbook's up-to-date results in the theory of embedded control; developers and users will value its information on special-purpose computer hardware and operating systems modifications that support real-time control; students will find the systematic organization and wide coverage useful for learning and reference.



Table of Contents:
Fundamentals of dynamical systems3
Control of single-input single-output systems21
Basics of sampling and quantization45
Discrete-event systems71
Introduction to hybrid systems91
Finite automata117
Basics of computer architecture145
Real-time scheduling for embedded systems173
Network fundamentals197
Basics of data acquisition and control227
Programmable logic controllers259
Digital signal processors279
Microcontrollers295
SOPCs : systems on programmable chips323
Fundamentals of RTOS-based digital controller implementation353
Implementation-aware embedded control systems377
From control loops to real-time programs395
Embedded real-time control via MATLAB, Simulink, and xPC target419
LabVIEW real-time for networked/embedded control447
Control loops in RTLinux471
An introduction to hybrid automata491
An overview of hybrid systems control519
Temporal logic model checking539
Switched systems559
Feedback control with communication constraints575
Networked control systems : a model-based approach601
Control issues in systems with loop delays627
Network protocols for networked control systems651
Control using feedback over wireless ethernet and bluetooth677
Bluetooth in control699
Embedded sensor networks721
Vehicle applications of controller area network741
Control of autonomous mobile robots767
Wireless control with bluetooth779
The cornell RoboCup robot soccer team : 1999-2003793

Books about: Desenho de Produto

CEO's Guide to Health Care Information Systems

Author:

Written for top-level executives, this is the thoroughly revised and updated edition of the 1996 book that has become a classic in the field. A reliable resource of accurate and timely information, The CEO's Guide to Health Care Information Systems, Second Edition, expands on the first edition and includes a greater focus on the business value of new information technologies, a broader discussion of health care systems, and a completely new section on the information technology development lifecycle.

Doody Review Services

Reviewer: LouAnn Schraffenberger, RHIA, CCS, CCS-P (Univ of Illinois at Chicago School of Biomed & Health Info Mgmt)
Description: This is a second edition of a popular book that provides nontechnical information and tools to top-level executives on the major components, functions, capabilities, and life cycle of healthcare information systems. It discusses the role and function of leadership, management, organization, and issues related to healthcare information systems.
Purpose: The book's goal is to be a reliable resource for accurate and timely information to enable the top-level healthcare executive to understand and use health information technology for the benefit of the organization. Using this information, the executive can create and sustain a sold competency in the area of information technology within the healthcare organization.
Audience: The book is directed at the top-level or upper management executives in healthcare organizations. This could include chief executive officers, chief financial officers, chief medical officers and nurse executives. Any other healthcare manager who desires a better understanding of the workings of healthcare information technology systems is a potential reader of the book.
Features: The second edition of this book updates the original 1996 edition that was well received when it was published. The new edition expands on the first edition and includes a greater focus on the business value of new information technologies, a broader discussion of healthcare systems, and a completely new section on the information technology development lifecycle. The book informs executives about current and future trends in information technology which affect healthcare information systems. It presents a model for information technology visioning, planning, selection, development, implementation, and value attainment.
Assessment: Any healthcare executive who feels intimidated by the information technology department in their organization should read this book. It provides a nontechnical review of the healthcare information technology functions and should enable the healthcare executive to communicate and work more effectively with the information systems professionals in their organization.

Rating

3 Stars from Doody




Thursday, January 29, 2009

Systems Engineering with Sysml Uml or It Essentials

Systems Engineering with SysML/UML: Modeling, Analysis, Design

Author: Tim Weilkiens

UML, the Universal Modeling Language, was the first language designed to fulfill the requirement for "universality." However, it is a software-specific language, and does not support the needs of engineers designing from the broader systems-based perspective. Therefore, SysML was created. It has been steadily gaining popularity, and many companies, especially in the heavily-regulated Defense, Automotive, Aerospace, Medical Device and Telecomms industries, are already using SysML, or are plannning to switch over to it in the near future.

However, little information is currently available on the market regarding SysML. Its use is just on the crest of becoming a widespread phenomenon, and so thousands of software engineers are now beginning to look for training and resources. The proposed book will provide an introduction to SysML, and instruction on how to implement it, for all these new users.

*The first available book on SysML in English

*Insider information! The author is a member of the SysML working group and has written sections of the specification

*Special focus comparing SysML and UML, and explaining how both can work together



Interesting book: Der Globale Transformationsleser: Eine Einführung in die Globalisierungsdebatte

IT Essentials: PC Hardware and Software: Labs and Study Guide

Author: Patrick Regan

IT Essentials PC Hardware and Software

Labs and Study Guide, Third Edition

Patrick Regan

The IT Essentials: PC Hardware and Software version 4 course in the Cisco® Networking Academy® is designed to prepare you to take and pass the CompTIA A+ exams based on the 2006 objectives. You must pass both the A+ Essentials and one of the technician exams to earn the A+ certification. Chapters 1 through 10 cover the foundational knowledge that aligns with the CompTIA A+ Essentials exam (220-601). Chapters 11 through 16 explore more advanced concepts in greater depth to prepare you for the specialized CompTIA A+ technician exams (220-602 for IT Technician, 220-603 for Remote Support Technician, and 220-604 for Bench Technician).

IT Essentials: PC Hardware and Software Labs and Study Guide, Third Edition, is designed as a valuable teaching and learning tool, incorporating new features to improve your hands-on skills and reinforce the key topics of the course. Each chapter contains a Study Guide section and a Labs section.

The Study Guide section is designed to provide additional exercises and questions to reinforce your understanding of the course topics, preparing you for the course assessments and focusing on preparing for the associated certification exams.

The Labs section features the complete collection of the lab exercises and worksheets specifically designed by Cisco to give students hands-on experience in a particular concept or technology.

Chapters 1–10 cover the following skills and competencies:

  • Core competencies in the latest hardware and softwaretechnologies
  • Information security skills
  • Safety and environmental issues
  • Soft skills for career development

Chapters 11–16 cover the following skills and competencies:

  • Advanced troubleshooting skills
  • Preparation for all three CompTIA job environment certification exams
  • Advanced installation of computers, peripheral devices, networks, and security components

Use this book with:

IT Essentials: PC Hardware and Software

Companion Guide, Third Edition

ISBN-10: 1-58713-199-4

ISBN-13: 978-158713-199-8

Patrick Regan has been a PC technician, network administrator/engineer, design architect, and security analyst for 16 years. He holds many certifications, including the Microsoft MCSE, MCSA, and MCT; CompTIA’s A+, Network+, Server+, Linux+, Security+, and CTT+; Cisco CCNA®; and Novell’s CNE and CWNP Certified Wireless Network Administrator (CWNA).

This book is part of the Cisco Networking Academy Series from Cisco Press®. Books in this series support and complement the Cisco Networking Academy curriculum.



Table of Contents:

Introduction

Chapter 1 Introduction to the Personal Computer

Defining a Computer

    Vocabulary Exercise: Matching

Processors

    Vocabulary Exercise: Completion

Motherboards

    Concept Questions

RAM

    Vocabulary Exercise: Completion

Ports

    Identify Ports and Connectors

Expansion Slots and Boards

    Vocabulary Exercise: Completion

Cases

    Concept Questions

Power Supplies

Hard Drive

    Concept Questions

    Vocabulary Exercise: Completion

Video Systems

    Vocabulary Exercise: Matching

    Concept Questions

Study Questions

Worksheet 1.1.2: Job Opportunities

Worksheet 1.4.7: Research Computer Components

Chapter 2 Safe Lab Procedures and Tool Use

Electrostatic Discharge

    Concept Questions

PC Maintenance

    Concept Questions

Power Fluctuations

    Vocabulary Exercise: Matching

    Concept Questions

Fires and Fire Extinguishers

    Concept Questions

Material Safety and Data Sheets and Component Disposal

    Vocabulary Exercise: Completion

    Concept Questions

Maintenance Safety

    ConceptQuestions

Tools of the Trade

    Concept Questions

Study Questions

Worksheet 2.2.2: Diagnostic Software

Lab 2.3.4: Computer Disassembly

Chapter 3 Computer Assembly—Step by Step

Installing a Processor

    Concept Questions

Installing RAM

    Concept Questions

Installing the Motherboard

    Concept Questions

Installing a Power Supply

    Concept Questions

Installing Optical Drives

    Concept Questions

Installing Floppy Disk Drives

    Concept Questions

Installing a Hard Drive

    Vocabulary Exercise: Completion

BIOS and the BIOS Setup Program

    Concept Questions

Study Questions

Lab 3.2.0: Install the Power Supply

Lab 3.3.3: Install the Motherboard

Lab 3.5.2: Install the Drives

Lab 3.6.3: Install Adapter Cards

Lab 3.7.2: Install Internal Cables

Lab 3.8.2: Complete the Computer Assembly

Lab 3.9.2: Boot the Computer

Chapter 4 Basics of Preventive Maintenance and Troubleshooting

Preventive Maintenance

    Concept Questions

Troubleshooting

    Concept Questions

    Troubleshooting Example

Study Questions

Chapter 5 Fundamental Operating Systems

Introduction to Operating Systems

    Concept Questions

Installing Windows

    Vocabulary Exercise: Completion

    Concept Questions

    Vocabulary Exercise: Matching

Registry

    Concept Questions

Windows 98 Boot Sequence

    Concept Questions

Windows 2000/XP Boot Sequence

    Concept Questions

Windows 2000 and Windows XP Advanced Boot Menu

    Concept Questions

Windows File Systems

    Concept Questions

File Management

    Concept Questions

Control Panel

    Concept Questions

Troubleshooting Tools

    Concept Questions

Study Questions

Worksheet 5.2.2: Search NOS Jobs

Worksheet 5.3.2: Upgrade Hardware Components

Lab 5.4.2: Install Windows XP

Lab 5.4.5: Create Accounts and Check for Updates

Worksheet 5.4.9: Answer NTFS and FAT32 Questions

Lab 5.5.1: Run Commands

Lab 5.5.4: Install Third-Party Software

Lab 5.6.2: Restore Points

Lab 5.6.3: Windows Registry Backup and Recovery

Chapter 6 Fundamental Laptops and Portable Devices

Laptop Fundamentals

    Vocabulary Exercise: Completion

    Identify the Parts of a Laptop

Power Management

    Vocabulary Exercise: Matching

    Concept Questions

Laptop Maintenance

    Concept Questions

Troubleshooting Laptop Computers

    Concept Questions

Study Questions

Worksheet 6.1.2: Research Laptops, Smart Phones, and PDAs

Worksheet 6.2.3: Complete Docking Stations True or False Questions

Worksheet 6.3.4: Answer Laptop Expansion Questions

Worksheet 6.4.1: Match ACPI Standards

Worksheet 6.7.2: Research Laptop Problems

Chapter 7 Fundamental Printers and Scanners

    Printers

    Vocabulary Exercise: Matching

    Electrophoto (EP) Stages

    Vocabulary Exercise: Matching

    Vocabulary Exercise: Completion

    Printer Troubleshooting

Scanners

    Vocabulary Exercise: Completion

Study Questions

Lab 7.4.2: Install All-in-One Device and Software

Chapter 8 Fundamental Networks

Defining a Network

    Vocabulary Exercise: Matching

Network Devices

    Vocabulary Exercise: Completion

Cable Types and Connectors

    Vocabulary Exercise: Completion

Network Topologies

    Vocabulary Exercise: Matching

Networking Technology

    Concept Questions

Connecting to the Internet

    Vocabulary Exercise: Matching

Network Troubleshooting Tools

    Concept Questions

Study Questions

Worksheet 8.3.2: Identify IP Address Classes

Worksheet 8.9.1: Internet Search for NIC Drivers

Lab 8.9.2: Configure an Ethernet NIC to Use DHCP

Worksheet 8.10.3: Answer Broadband Questions

Worksheet 8.12.2: Diagnose a Network Problem

Chapter 9 Fundamental Security

Importance of Security

    Vocabulary Exercise: Matching

    Concept Questions

Wireless Security

    Vocabulary Exercise: Completion

Viruses

    Vocabulary Exercise: Completion

Denial of Service Attacks

    Vocabulary Exercise: Matching

Study Questions

Worksheet 9.1.0: Security Attacks

Worksheet 9.2.1: Third-Party Antivirus Software

Worksheet 9.4.2: Operating System Updates

Remote Technician 9.5.2: Gather Information from the Customer

Chapter 10 Communication Skills

Dealing with the Customer

    Concept Questions

Study Questions

Worksheet 10.1.0: Technician Resources

Class Discussion 10.2.2: Controlling the Call

Class Discussion 10.2.3: Identifying Difficult Customer Types

Class Discussion 10.3.0: Customer Privacy

Chapter 11 Advanced Personal Computers

Motherboards

    Concept Questions

RAM

    Concept Questions

Cooling the System

    Concept Questions

Power Supply

    Concept Questions

Hard Drive

    Concept Questions

Redundant Array of Inexpensive Disks (RAID)

    Concept Questions

Video Systems

    Concept Questions

Performance Bottlenecks

    Concept Questions

Study Questions

    Worksheet 11.1.0: Job Opportunities

Worksheet 11.3.7: Research Computer Components

Lab 11.4.1: Install a NIC

Lab 11.4.3: Install Additional RAM

Lab 11.4.4: BIOS File Search

Lab 11.4.5: Install, Configure, and Partition a Second Hard Drive

Lab 11.6.3: Repair Boot Problem

Remote Technician 11.6.3: Repair Boot Problem

Chapter 12 Advanced Operating Systems

Using the Command Prompt

    Concept Questions

Installing Windows 2000 and Windows XP

    Concept Questions

Windows Folder Structure

    Concept Questions

Control Panel and Administrative Tools

    Concept Questions

Fonts

    Concept Questions

Disk Management

    Concept Questions

Windows Boot Options

    Concept Questions

Troubleshooting Tools

    Concept Questions

Study Questions

Lab 12.2.2: Advanced Installation of Windows XP

Curriculum Lab 12.2: Creating a Partition in Windows XP Pro (12.2.3)

Lab 12.2.4: Customize Virtual Memory Settings

Lab 12.2.5: Install an Alternate Browser (Optional)

Lab 12.4.1: Schedule Task Using GUI and at Command

Lab 12.5.3: Fix an Operating System Problem

Remote Technician 12.5.3: Fix an Operating System Problem

Chapter 13 Advanced Laptops and Portable Devices

Processors and RAM

    Concept Questions

Expansion Cards

    Concept Questions

Mobile Wireless Devices

    Concept Questions

Batteries

    Vocabulary Exercise: Completion

    Concept Questions

Mobile Video Systems

    Concept Questions

Study Questions

Worksheet 13.2.0: Investigating Repair Centers

Worksheet 13.3.1: Laptop Batteries

Worksheet 13.3.2: Docking Station

Worksheet 13.3.3: Research DVD Drive

Worksheet 13.3.4: Laptop RAM

Worksheet 13.5.3: Verify Work Order Information

Chapter 14 Advanced Printers and Scanners

Printer Technology and Interfaces

    Concept Questions

Troubleshooting Printers

    Concept Questions

Printing in Windows

    Concept Questions

Scanners

    Concept Questions

Study Questions

Lab 14.2.4: Install an All-in-One Printer/Scanner

Lab 14.3.2: Share the All-in-One Printer/Scanner

Lab 14.4.2: Optimize Scanner Output

Worksheet 14.5.1: Search for Certified Printer Technician Jobs

Lab 14.6.3: Fix a Printer

Remote Technician 14.6.3: Fix a Printer Problem

Chapter 15 Advanced Networks

OSI Model

    Identify the OSI Layers

TCP/IP Protocol Suite

    Vocabulary Exercise: Matching

    Vocabulary Exercise: Matching

    Identify the TCP/IP Ports

IP Addressing

    Concept Questions

Configuring Windows

    Concept Questions

Troubleshooting Tools

    Concept Questions

Study Questions

Worksheet 15.2.2: Protocols

Worksheet 15.3.2: ISP Connection Types

Lab 15.4.2a: Configure Browser Settings

Lab 15.4.2b: Share a Folder, Share a Printer, and Set Share

Permissions

Lab 15.5.1: Install a Wireless NIC

Lab 15.5.2: Configure a Wireless Router

Lab 15.5.3: Test the Wireless NIC

Lab 15.8.3: Fix Network Problem

Remote Technician 15.8.3: Fix Network Problem

Chapter 16 Advanced Security

Access Control

    Concept Questions

NTFS and Share Permissions

    Concept Questions

Auditing

    Concept Questions

Wireless Security

    Concept Questions

Social Engineering

    Concept Questions

Denial of Services Attacks and Other Forms of Attacks

    Concept Questions

Study Questions

Worksheet 16.1.1: Answer Security Policy Questions

Worksheet 16.2.3: Research Firewalls

Lab 16.3.2: Configure Windows XP Firewall

Lab 16.5.3: Fix a Security Problem

Remote Technician 16.5.3: Fix a Security Problem

1587131986    TOC    12/19/2007

Tuesday, January 27, 2009

Life after the 30 Second Spot or MPLS and VPN Architectures

Life after the 30-Second Spot: Energize Your Brand with a Bold Mix of Alternatives to Traditional Advertising

Author: Joseph Jaff

The old media strategies advertisers used for decades no longer work. Here's what does!
Traditional advertising, in the form of print, radio, and most notably, television, is far less effective than it used to be. Advertising strategies using only these mediums no longer work. Life After the 30-Second Spot explains how savvy marketers and advertisers are responding with new marketing techniques to get their message out, get noticed, engage their audiences-and increase sales! Covering topics such as viral marketing, gaming, on-demand viewing, long-form content, interactive, and more, the book explains the new avenues marketers and advertisers must use to replace traditional print, TV, and radio advertising-and which strategies are most effective. This book is every marketer's road map to "new marketing."



Books about: Zur sprechenden Vorzüglichkeit: Der Michiganer Guide zur Maximierung Ihrer Leistung auf dem TSE-Test und Spricht Test

MPLS and VPN Architectures

Author: Ivan Pepelnjak

A practical guide to understanding, designing, and deploying MPLS and MPLS-enabled VPNs
• In-depth analysis of the Multiprotocol Label Switching (MPLS) architecture
• Detailed discussion of the mechanisms and features that constitute the architecture
• Learn how MPLS scales to support tens of thousands of VPNs
• Extensive case studies guide you through the design and deployment of real-world MPLS/VPN networks
• Configuration examples and guidelines assist in configuring MPLS on Cisco® devices
• Design and implementation options help you build various VPN topologies

Multiprotocol Label Switching (MPLS) is an innovative technique for high-performance packet forwarding. There are many uses for this new technology, both within a service-provider environment and within the enterprise network, and the most widely deployed usage today is the enabling of Virtual Private Networks (VPNs). With the introduction of MPLS-enabled VPNs, network designers are able to better scale their networks than with the methods available in the past.

Network engineers and administrators need quick, effective education on this technology to efficiently deploy MPLS-enabled VPNs within their networks. With that goal in mind, MPLS and VPN Architectures provides an in-depth discussion particular to Cisco's MPLS architecture. This book covers MPLS theory and configuration, network design issues, and case studies as well as one major MPLS application: MPLS-based VPNs. The MPLS/VPN architecture and all its mechanisms are explained with configuration examples, suggested design and deployment guidelines, and extensive case studies.

MPLS andVPN Architectures is your practical guide to understanding, designing, and deploying MPLS and MPLS-based VPNs.

Booknews

An overview of multiprotocol label switching (MPLS) architecture and configuration, as well as MPLS based virtual private networks (VPNs). Topics include frame- and cell-mode MPLS operation, running frame-mode MPLS across switched WAN media, VPN implementation options, architecture operation, provider edge to customer edge connectivity options, advanced topologies, guidelines for MPLS/VPN deployment, and an IP tunneling to MPLS/VPN migration case study. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Table of Contents:
Introduction
Pt. IMPLS Technology and Configuration3
Ch. 1Multiprotocol Label Switching (MPLS) Architecture Overview5
Ch. 2Frame-mode MPLS Operation23
Ch. 3Cell-mode MPLS Operation49
Ch. 4Running Frame-mode MPLS Across Switched WAN Media65
Ch. 5Advanced MPLS Topics73
Ch. 6MPLS Migration and Configuration Case Study97
Pt. IIMPLS-based Virtual Private Networks113
Ch. 7MPLS Troubleshooting115
Ch. 8Virtual Private Network (VPN) Implementation Options129
Ch. 9MPLS/VPN Architecture Overview161
Ch. 10MPLS/VPN Architecture Operation183
Ch. 11Provider Edge (PE) to Customer Edge (CE) Connectivity Options225
Ch. 12Advanced MPLS/VPN Topologies255
Ch. 13Advanced MPLS/VPN Topics269
Ch. 14Guidelines for the Deployment of MPLS/VPN339
Ch. 15Carrier's Carrier and Inter-provider VPN Solutions377
Ch. 16IP Tunneling to MPLS/VPN Migration Case Study407
Ch. 17MPLS VPN Troubleshooting425
App. A: Answers to Review Questions443
App. BTag-switching and MPLS Command Reference461
Index465

Monday, January 26, 2009

Silence on the Wire or Starting a Yahoo Business for Dummies

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

Author: Michal Zalewski

There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

"Silence on the Wire" dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.



Table of Contents:
Foreword
Pt. IThe source
1I can hear you typing3
2Extra efforts never go unnoticed21
3Ten heads of the Hydra51
4Working for the common good57
Pt. IISafe harbor
5Blinkenlights65
6Echoes of the past89
7Secure in switched networks95
8Us versus them103
Pt. IIIOut in the wild
9Foreign accent113
10Advanced sheep-counting strategies151
11In recognition of anomalies173
12Stack data leaks189
13Smoke and mirrors193
14Client identification : papers, please!199
15The benefits of being a victim219
Pt. IVThe big picture
16Parasitic computing, or how pennies add up227
17Topology of the network243
18Watching the void253

Books about: What Is a City or Why Parties

Starting a Yahoo! Business for Dummies

Author: Rob Snell

Turn browsers into buyers, boost traffic, and more

Build your store from scratch, or make the one you have more profitable

His online business has been paying his mortgage for years. Now Rob Snell is sharing his Yahoo! Store secrets for planning, building, and managing an online store that delivers the goods! Here's how to profit from keywords, handle credit-card payments, find out what's hot in other stores, maximize your marketing efforts, and much more.

Discover how to



• Use the Yahoo! Store Editor and Manager

• Plan effective store navigation

• Use better images to sell more products

• Build successful advertising strategies

• Generate more traffic from search engines




Sunday, January 25, 2009

Taming Java Threads or 3ds max 8

Taming Java Threads

Author: Allen Holub

A multithreaded application is one that appears to be doing two things at once; it is the key to taking full advantage of the Java language. In this book, Java expert Allen Holub takes you step-by-step through the key issues related to multithreaded programming. In order to write a real multithreaded application in Java, programmers need to supplement knowledge of the basic functionality of the language with both an in-depth understanding of how threads work and a significant library of helper classes. This book provides both: it explains how threads work and the problems that arise in multithreaded programs, and it implements a full-blown threading package that can be used to implement real multithreaded programs. It is also ideal for those writing Java applications based on AWT and SWING since a correct understanding of multithreading is vital for graphics intensive programming.



Read also Economía Financiera Cuantitativa:Reservas, Obligaciones y Mercado de divisas

3ds max 8: From Modeling to Animation

Author: Boris Kulagin

Designers and animators will learn skills from modeling a still life scene to animating photorealistic and fantasy characters in a variety of organic and mechanical backgrounds in this resource guide to 3D animation. Each lesson allows users not only to master the basic techniques of working with 3ds max, but also to create a professional project. Comments and tips at the end of each lesson advise on improving final products and avoiding common mistakes. The CD-ROM contains all files necessary to accomplishing the lessons in the book: intermediate and final versions of all projects and scenes; images, maps, and clips in AVI format; and free plug-ins and scripts.



Table of Contents:
Chapter 1: Still Life with a Rose
1.1
Modeling a Vase
1.2 Modeling a Rose
1.3 Modeling the Environment
1.4 Tuning Materials and Lights
1.5 Rendering
Chapter 2: Sea Dragon
2.1 Modeling the Dragon's Body
2.2 Creating and Assigning Materials
2.3 Skinning
2.4 Modeling and Animating an Attitude
2.5 Inserting the Dragon into a Photo
2.6 Rendering
Chapter 3: Martian Rally
3.1 Modeling a Jet Vehicle
3.2 Modeling the Landscape
3.3 Animating the Vehicle
3.4 Special Effects
3.5 Rendering
Chapter 4: Additional projects
Appendixes

Saturday, January 24, 2009

CYA or Art of Digital Audio

CYA: Securing Exchange Server 2003 and Outlook Web Access

Author: Mark Fugatt

Cover Your A** By Getting it Right the First Time

·         Prove You Did It Right the First Time

·         Be Responsible, Don't Be to Blame

·         Secure Your Network and Your Career

 

Don't lose your job over an ugly and porous MS Exchange Server 2003 installation. Read this book and cover your a** today! It contains easy-to-access coverage of just about every documented MS Exchange Server 2003 security setting. The following features ensure that you know exactly what you are reading at all times:

By the Book A clear presentation of Microsoft's recommended security configurations and policies based on the business needs of your network. Reality Check Warnings about the potential downside of certain "best practices" that you as the system administrator need to know. Your A** Is Covered A comprehensive checklist to all of the security-related configuration consoles in Exchange.

Best of all, it's written in a "get to the point" style that clearly explains exactly what you need to know about installing, managing, and troubleshooting.

 



New interesting textbook: The Divided West or The Responsible Administrator

Art of Digital Audio

Author: John Watkinson

Described as "the most comprehensive book on digital audio to date", it is widely acclaimed as an industry "bible". Covering the very latest developments in digital audio technology, it provides an thorough introduction to the theory as well as acting as an authoritative and comprehensive professional reference source. Everything you need is here from the fundamental principles to the latest applications, written in an award-winning style with clear explanations from first principles.



New material covered includes internet audio, PC audio technology, DVD, MPEG audio compression, digital audio broadcasting and audio networks.

Whether you are in the field of audio engineering, sound recording, music technology, broadcasting and communications media or audio design and installation, this book has it all. Written by a leading international audio specialist, who conducts professional seminars and workshops around the world, the book has been road tested for many years by professional seminar attendees and students to ensure their needs are taken into account, and all the right information is covered.

This new edition now includes:

Internet audio
PC Audio technology
DVD
MPEG Audio compression
Digital Audio Broadcasting
Audio networks

Digital audio professionals will find everything they need here, from the fundamental principles to the latest applications, written in an award-winning style with clear explanations from first principles.

John Watkinson is an international consultant in audio, video and data recording. He is a Fellow of the AES, a member of the British Computer Society and a chartered information systemspractitioner. He presents lectures, seminars, conference papers and training courses worldwide. He is the author of many other Focal Press books, including: the Kraszna-Krausz award winning MPEG-2; The Art of Digital Audio; An Introduction to Digital Video; The Art of Sound Reproduction; An Introduction to Digital Audio; TV Fundamentals and Audio for Television. He is also co-author, with Francis Rumsey, of The Digital Interface Handbook, and contributor to the Loudspeaker and Headphone Handbook, 3rd edition.

· The 'Bible' of Digital Audio
· Get everything you need on digital audio in just one book
· Gain a thorough understanding of all the latest technology



Table of Contents:
Preface
Ch. 1Why digital?1
Ch. 2Some essential principles31
Ch. 3Conversion93
Ch. 4Advanced digital audio processing173
Ch. 5Digital recording and transmission principles229
Ch. 6Error correction286
Ch. 7Transmission and broadcast systems348
Ch. 8Rotary-head recorders395
Ch. 9Stationary-head recorders441
Ch. 10Magnetic disk drives485
Ch. 11Digital audio editing534
Ch. 12Optical disks in audio557
Ch. 13Digital audio in video tape recorders641
Index673

Friday, January 23, 2009

Design Concepts in Programming Languages or Computer Security

Design Concepts in Programming Languages

Author: Franklyn A Turbak

Hundreds of programming languages are in use today--scripting languages for Internet commerce, user interface programming tools, spreadsheet macros, page format specification languages, and many others. Designing a programming language is a metaprogramming activity that bears certain similarities to programming in a regular language, with clarity and simplicity even more important than in ordinary programming. This comprehensive text uses a simple and concise framework to teach key ideas in programming language design and implementation. The book's unique approach is based on a family of syntactically simple pedagogical languages that allow students to explore programming language concepts systematically. It takes as its premise and starting point the idea that when language behaviors become incredibly complex, the description of the behaviors must be incredibly simple.

The book presents a set of tools (a mathematical metalanguage, abstract syntax, operational and denotational semantics) and uses it to explore a comprehensive set of programming language design dimensions, including dynamic semantics (naming, state, control, data), static semantics (types, type reconstruction, polymporphism, effects), and pragmatics (compilation, garbage collection). The many examples and exercises offer students opportunities to apply the foundational ideas explained in the text. Specialized topics and code that implements many of the algorithms and compilation methods in the book can be found on the book's Web site, along with such additional material as a section on concurrency and proofs of the theorems in the text. The book is suitable as a text for an introductory graduate or advancedundergraduate programming languages course; it can also serve as a reference for researchers and practitioners.



Interesting book: American Shaman or Invitation to Health

Computer Security: Art and Science

Author: Matt Bishop

"This is an excellent text that should be read by every computer security professional and student." —Dick Kemmerer, University of California, Santa Barbara.

"This is the most complete book on information security theory, technology, and practice that I have encountered anywhere!" —Marvin Schaefer, Former Chief Scientist, National Computer Security Center, NSA

This highly anticipated book fully introduces the theory and practice of computer security. It is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference filled with valuable information for even the most seasoned practitioner. In this one extraordinary volume the author incorporates concepts from computer systems, networks, human factors, and cryptography. In doing so, he effectively demonstrates that computer security is an art as well as a science.

Computer Security: Art and Science includes detailed discussions on:

  • The nature and challenges of computer security

  • The relationship between policy and security

  • The role and application of cryptography

  • The mechanisms used to implement policies

  • Methodologies and technologies for assurance

  • Vulnerability analysis and intrusion detection
  • Computer Security discusses different policy models, and presents mechanisms that can be used to enforce these policies. It concludes with examples that show how to apply the principles discussed in earlier sections, beginning with networks and moving on to systems, users, and programs.

    This important work is essential for anyone who needsto understand, implement, or maintain a secure network or computer system.

    0201440997B10252002



    Table of Contents:
    Preface
    Pt. 1Introduction1
    Ch. 1An Overview of Computer Security3
    Pt. 2Foundations29
    Ch. 2Access Control Matrix31
    Ch. 3Foundational Results47
    Pt. 3Policy93
    Ch. 4Security Policies95
    Ch. 5Confidentiality Policies123
    Ch. 6Integrity Policies151
    Ch. 7Hybrid Policies169
    Ch. 8Noninterference and Policy Composition187
    Pt. 4Implementation I: Cryptography215
    Ch. 9Basic Cryptography217
    Ch. 10Key Management245
    Ch. 11Cipher Techniques275
    Ch. 12Authentication309
    Pt. 5Implementation II: Systems339
    Ch. 13Design Principles341
    Ch. 14Representing Identity353
    Ch. 15Access Control Mechanisms381
    Ch. 16Information Flow407
    Ch. 17Confinement Problem439
    Pt. 6Assurance475
    Ch. 18Introduction to Assurance477
    Ch. 19Building Systems with Assurance497
    Ch. 20Formal Methods545
    Ch. 21Evaluating Systems571
    Pt. 7Special Topics611
    Ch. 22Malicious Logic613
    Ch. 23Vulnerability Analysis645
    Ch. 24Auditing689
    Ch. 25Intrusion Detection723
    Pt. 8Practicum771
    Ch. 26Network Security773
    Ch. 27System Security805
    Ch. 28User Security845
    Ch. 29Program Security869
    Pt. 9End Matter923
    Ch. 30Lattices925
    Ch. 31The Extended Euclidean Algorithm929
    Ch. 32Entropy and Uncertainty935
    Ch. 33Virtual Machines941
    Ch. 34Symbolic Logic947
    Ch. 35Example Academic Security Policy959
    Bibliography993
    Index1063

    Thursday, January 22, 2009

    AppleScript or More about Software Requirements

    AppleScript: The Definitive Guide

    Author: Matt Neuburg

    AppleScript: The Definitive Guide teaches not only how the AppleScript language works, but also how to use it in all sorts of contexts -- in everyday scripts to process automation, as well as in AppleScript Studio, in Cocoa, in CGI scripts, and in combination with Perl and Ruby. Once you know the ins and outs of AppleScript, there's a lot you can do with it, and this book unlocks the secrets of AppleScript.

    Slashdot.org
    I would recommend it to all Macintosh owners as the perfect way to unleash another powerful aspect of your system. For people who have no AppleScript or programming experience who want to be totally spoon fed this book is probably only a 5, for people with a little AppleScript experience, a fair amount of programming experience and a willingness to stick through to the end this book is probably a 9. It is certainly the best book on AppleScript I have seen.



    Table of Contents:
    Preface
    Pt. IAppleScript Overview
    1Ways to Use AppleScript3
    2Places to Use AppleScript16
    3The AppleScript Experience39
    4Basic Concepts65
    Pt. IIThe AppleScript Language
    5Introducing AppleScript97
    6Syntactic Ground of Being104
    7Variables113
    8Handlers140
    9Script Objects159
    10Objects184
    11References206
    12Control218
    13Datatypes243
    14Coercions264
    15Operators272
    16Global Properties285
    17Constants289
    18Commands292
    Pt. IIIAppleScript In Action
    19Dictionaries297
    20Scripting Additions332
    21Scriptable Applications349
    22Unscriptable Applications356
    23Unix362
    24Writing Applications370
    Pt. IVAppendixes
    AThe 'aeut' Resource405
    BTools and Resources424
    Index431

    Go to: What Did the Constitution Mean to Early Americans or Global Ethics

    More about Software Requirements: Thorny Issues and Practical Advice

    Author: Karl E Wiegers

    Have you ever delivered software that satisfied all of the project specifications, but failed to meet any of the customers' expectations? Without formal, verifiable requirements-and a system for managing them-the result is often a gap between what developers think they're supposed to build and what customers think they're going to get. Too often, lessons about software requirements engineering processes are formal or academic, and not of value to real-world, professional development teams. In More About Software Requirements: Thorny Issues And Practical Advice, the author of Software Requirements, Second Edition, describes even more practical techniques for gathering and managing the software requirements that help you meet project specifications and customer expectations. A leading speaker and consultant in the field of requirements engineering, Karl Wiegers takes questions raised by other professional software developers and architects as a basis for the practical solutions and best practices offered in this guide. Succinct and immediately useful, this book is a must-have for developers and architects.



    Tuesday, January 20, 2009

    Numerical Methods with Matlab or Wrox SQL Server 2005 Set

    Numerical Methods with Matlab

    Author: Amos Gilat

    A clear and concise guide to numerical methods and their application

    Mastering numerical methods has never been easier than with Gilat/Subramaniam's Numerical Methods For Engineers and Scientists: An Introduction with Applications Using MATLAB(r). Uniquely accessible and concise, this book takes an innovative approach that integrates the study of numerical methods with hands-on programming practice using the popular MATLAB environment to solve realistic problems in engineering and science.

    Ideal for both students and professionals who would like to become more adept at numerical methods, Numerical Methods For Engineers and Scientists familiarizes you with:
    * The mathematical background and fundamentals of numerical methods
    * Solving nonlinear equations
    * Solving a system of linear equations
    * Eigenvalues and Eigenvectors
    * Function approximation, curve fitting, and interpolation
    * Differentiation
    * Integration
    * First-order and higher-order ODEs
    * Initial and boundary value problems

    Using MATLAB's built-in functions as tools for solving problems, you will practice applying numerical methods for analysis of real-world problems. All the information is presented in manageable, step-by-step fashion, supported by a large number of annotated examples and end-of-chapter problems.

    Lucid, carefully structured, and flexibly designed to fulfill a wide range of academic and practical needs, this book will help you develop the skills in numerical methods that will serve you well as a practicing engineer.

    About the Authors:

    Amos Gilat, Ph.D., is Professor of Mechanical Engineering at The OhioState University. Dr. Gilat's main research interests are in plasticity, specifically, in developing experimental techniques for testing materials over a wide range of strain rates and temperatures and in investigating constitutive relations for viscoplasticity. Dr. Gilat's research has been supported by the National Science Foundation, NASA, Department of Energy, Department of Defense, and various industries.

    Vish Subramaniam, Ph.D., is Professor of Mechanical Engineering & Chemical Physics at The Ohio State University. Dr. Subramaniam's main research interests are in plasma and laser physics and processes, particularly those that involve non-equilibrium phenomena. Dr. Subramaniam's research is both experimental and computational, and has been supported by the Department of Defense, National Science Foundation, and numerous industries.



    Book review: Geschlecht und die Politik der Geschichte

    Wrox SQL Server 2005 Set

    Author: Robert Vieira

    Get a handle on the advanced abilities of SQL Server 2005 with the three titles contained in this invaluable box set. You’ll learn the power of SQL Server 2005’s capability to develop systems and applications that both meet your performance needs and store your data in a fashion that maintains the integrity of the data while keeping it reasonably usable. Plus, the books also address the various add-on services, backward compatibility issues with SQL Server 2000 and 7.0, ways to work with the completely rewritten SQL Server integration Servers, and more.



    Monday, January 19, 2009

    The Unofficial Tourists Guide to Second Life or AutoCAD 2000 For Dummies

    The Unofficial Tourists' Guide to Second Life

    Author: Paul Carr

    Imagine an enormous, breathtaking virtual world to explore, where land can be bought for less than a dollar and new construction is limited only by your imagination. An online tourist destination where you can shop for virtual designer clothes in a shopping mall atop a live volcano, teleport to an underwater gig by U2, before taking a new friend back to your personal spaceship for virtual coffee or...well, you get the idea.

    The Unofficial Tourists' Guide to Second Life is a fast, fun guidebook that introduces first-time visitors to the endless wonders offered by this exciting and rapidly developing online world. All of Second Life is here, including:

    • The Essentials. What to wear and how to behave.
    • The People. Finding likeminded souls—or soulmates.
    • The Major Destinations. Must-see tourist hotspots, shops, and shows.
    • Shopping and Nightlife. A guide to the lively virtual shopping scene, and all manner of debauchery.
    • For Entrepreneurs. How to buy land or start a Second Life business.



    Look this: Honey Does This Make My Butt Look Big or Peles Wish

    AutoCAD 2000 For Dummies

    Author: Mark Middlebrook

    With AutoCAD 2000 For Dummies, you'll quickly discover just how easy it is to create professional-quality designs and drawings. Authors Mark Middlebrook and Bud Smith show you how to set up a design, draw and edit lines, add text and dimensions, even incorporate AutoCAD documents into your Web pages-all while avoiding those common gotchas." Whether you're a new AutoCAD user or you've just upgraded to AutoCAD 2000, this easy-to-use reference delivers all the answers you need to get up to speed.

    Inside, find helpful advice on how to:

    • Discover the new AutoCAD 2000 features-and put them to work
    • Take full advantage of color and lineweight with the new AutoCAD 2000 approach
    • Use both menu and toolbar access to commands
    • Set up a drawing so that it prints without problems
    • Speed up your work by using the command line as an accelerator
    • Enhance your Web pages with the new AutoCAD 2000 Web access features
    • Increase accessibility of your AutoCAD drawings by using AutoCAD DesignCenter



    Mcts Self Paced Training Kit or MCTS

    MCTS Self-Paced Training Kit (Exam 70-643): Configuring Windows Server 2008 Application Platform

    Author: J C Mackin

    Announcing an all-new Self-Paced Training Kit designed to help maximize your performance on 70-643, the required exam for the new Microsoftr Certified Technology Specialist (MCTS): Windows Server 2008 Application Platform Configuration certification. This 2-in-1 kit includes the official Microsoft study guide, plus practice tests on CD to help you assess your skills. It comes packed with the tools and features exam candidates want most-including in-depth, self-paced training based on final exam content; rigorous, objective-by-objective review; exam tips from expert, exam-certified authors; and customizable testing options.

    It also provides real-world scenarios, case study examples, and troubleshooting labs for skills and expertise that you can apply to the job.Work at your own pace through the lessons and lab exercises. Focusing on Windows Server 2008 Application Platform technologies, this official study guide covers Terminal Services, Web Services infrastructure and security, Media Server, Microsoft Windowsr SharePointr Services server options, File Server, Print Services, network maintenance, and Simple Network Management Protocol.Then assess yourself using 300+ practice and review questions on the CD, which features multiple, customizable testing options to meet your specific needs. Choose timed or untimed testing mode, generate random tests, or focus on discrete objectives. You get detailed explanations for right and wrong answers-including pointers back to the book for further study. You also get an evaluation version of Windows Server 2008 and an exam discount voucher-making this kit an exceptional value and a great career investment.

    Key BookBenefits:
    •In-depth coverage of exam objectives and sub-objectives-plus instructive case studies and troubleshooting scenarios to enhance your performance on the job
    •300+ practice and review questions
    •Test engine that enables customized testing, pre-assessment and post-assessment, and automated scoring and feedback
    •Complete objective-by-objective review section, plus a handy exam-mapping grid
    •Evaluation version of Windows Server 2008
    •15 percent exam discount voucher from Microsoft (limited-time offer)
    •Entire study guide in searchable eBook format



    Interesting textbook: Machine at Work or Just a Housewife

    MCTS: Windows Server 2008 Active Directory Configuration Study Guide

    Author: William Panek


    • This comprehensive guide offers 100 percent coverage of the exam objectives, real-world scenarios, hands-on exercises, and challenging review questions
    • Prepares readers to configure active directory objects, group policy objects, server roles, the domain name system, and the active directory infrastructure
    • The newest set of Microsoft Certified Technology Specialist (MCTS) and Microsoft Certified Information Technology Professional (MCITP) certifications will include exams on Windows Server 2008, and this book is a must-have for those who are looking to upgrade their certifications



    Java and XML For Dummies or Contemporary Business and Online Commerce Law

    Java and XML For Dummies

    Author: Barry A Burd

    The seamless integration of source code and data from many different programming languages and platforms to build large, reliable software systems has been the Holy Grail of computing since the early 1970s. Now, with the marriage of the Java programming language and XML—the worldwide standard for representing data—that ideal has been realized. Together, Java and XML make up the backbone of a bold new generation of applications and Web services. As the sixties radicals used to say, “Either you’re part of the problem or part of the solution!” and no programmer worth his or her salt will want to pass up an opportunity to get in on the Java and XML revolution.

    Java and XML For Dummies offers you a fun, fast and easy way to get up to speed on all of Java’s XML tools. Barry Burd walks you through all the major APIs and standards –from JAXP and SAX to SOAP and UDDI—and shows you how to start programming with them right away. Using lots of real-world programming examples he puts you on track to:



    • Configure your computer to optimize Java and XML

    • Make sense of the complete Java XML toolset

    • Create and troubleshoot XML documents

    • Master Java XML Web services tools

    • Join the Web services revolution and make a million bucks



    Java and XML For Dummies is arranged in modular fashion, making it easy for you to zero-in on specific areas, tools or procedures that interest you, without having to wade through coverage stuff you already know about. From basic to advanced, it covers all the bases, including:



    •Scanning data with SAX, DOM and JDOM

    • Programming techniques using SAX API tools

    • Programming with DOM API tools

    • Viewing XML data on the Web

    • Creating custom code for your document using JAXB

    • Sending SOAP messages using JAXM

    • Working with XML registries

    • Automating Web-service processes



    Java and XML For Dummies is your road map for JAXP, JDOM, SOAP, WSDL, and all of Java’s powerful XML tools—and your passport to joining the Web services revolution!



    Book about: Michael Collins or Strictly Right

    Contemporary Business and Online Commerce Law: Legal, Internet, Ethical, and Global Environments

    Author: Henry R Cheeseman

    KEY BENEFIT: This book provides the richest selection of landmark (traditional) and contemporary (within the last three years) cases for business students, including more cases on information technology and e-commerce law than any other book. Topics present a summarized/brief approach to cases.


    KEY TOPICS: This edition contains over 75 new cases that have been decided in the past three years, including ones covering IT and e-Commerce — dedicated chapters cover Intellectual Property and Internet Law, and Electronic Commerce and Information Technology Licensing. Over 45 “Online Commerce & Internet Law” boxes focus on the legal issues businesses face as they either launch new Internet ventures or rise to the challenge of incorporating on-line technologies into their existing business models.


    MARKET: For those in Business Law professions.



    Table of Contents:
    Unit I–Legal, Ethical, and Digital Environment


     Chapter 1…Legal Heritage and the Information Age


     Chapter 2…Constitutional Law for Business and E-Commerce


     Chapter 3…Court Systems and Jurisdiction


     Chapter 4…Judicial, Administrative, Alternative, and Online Dispute Resolution


     Chapter 5…Torts and Cyber Torts


     Chapter 6…Criminal Law and White Collar Crime


     Chapter 7…Intellectual Property


     Chapter 8…Ethics of Managers and Social Responsibility of Business


     


    Unit II–Contracts and E-Commerce


     Chapter 9…Nature of Traditional and Online Commerce


    Chapter 10…Agreement and Consideration


    Chapter 11…Capacity and Legality


    Chapter 12…Genuineness of Assent and Statute of Frauds


    Chapter 13…Third Party Rights and Discharge


    Chapter 14…Remedies for Breach of Traditional and E-Contracts


    Chapter 15…Internet Law and E-Commerce


     


    Unit III–Sales Contracts, Leases, and Product Liability


    Chapter 16…Formation of Sales and Lease Contracts


    Chapter 17…Performance of Sales and Lease Contracts


    Chapter 18…Remedies for Breach of Sales and Lease Contracts


    Chapter 19…Warranties and Product Liability


     


    Unit IV–Negotiable Instruments and Electronic Banking


    Chapter 20…Negotiability and Transferability


    Chapter 21…Holder in Due Course and Liability ofParties


    Chapter 22…Checks, Banking System, and E-Money


     


    Unit V–Credit and Bankruptcy


    Chapter 23…Credit and Secured Transactions


    Chapter 24…Bankruptcy and Reorganization


     


    Unit VI–Business Organizations and Investor Protection


    Chapter 25…Agency Relationships


    Chapter 26…Sole Proprietorships, General and Limited Partnerships


    Chapter 27…Corporate Formation and Financing


    Chapter 28…Corporate Shareholders, Directors and Officers


    Chapter 29…Corporate Acquisitions and Multinational Corporations


    Chapter 30…Limited Liability Companies and Limited Liability Partnerships


    Chapter 31…Franchises and Special Forms of Business


    Chapter 32…Investor Protection and Online Securities Transactions


     


    Unit VII–Government Regulation and Employment Law


    Chapter 33…Antitrust Law


    Chapter 34…Consumer Protection and Environmental Law


    Chapter 35…Employment, Worker Protection, and Labor Law


    Chapter 36…Equal Opportunity in Employment


     


    Unit VIII–Property, Insurance, and Estates


    Chapter 37…Personal Property, Bailment, and Insurance


    Chapter 38…Real Property and Landlord-Tenant Law


    Chapter 39…Family Law, Wills, and Trusts


     


    Unit IX–Accounting Profession


    Chapter 40…Accountant’s Liability


     


    Unit X


    Chapter 41…International and World Trade Law


     

    Sunday, January 18, 2009

    Rendering with Mental Ray and 3ds Max or Network Study Guide Deluxe Edition

    Rendering with Mental Ray and 3ds Max

    Author: Joep Van Der Steen

    Realize your vision with stunning renders of your 3ds Max projects that can only be achieved with a powerful engine like mental ray. Beginning with a concise review of the essential concepts, you proceed to step-by-step tutorials that teach you how to render scenes with:
    * Indirect illumination options including Final Gather, Caustics, and Global Illumination
    * Render options such as Contour Line rendering, Camera Effects, Displacement, Depth of Field, and Motion Blur effects.
    * Lighting options including those provided within 3ds Max, as well as the four mr lights—Area Omni and Area Spot inside the Standard Light group, and mr Sky and mr Sun inside the Photometric Light group.
    * Material options that are available inside 3ds Max including Arch and Design and Car Paint, DGS and Glass materials, and Sub Surface Scattering materials.
    * Shader options including mr material-related shaders, the tiny shaders that control small specific effects, and shaders that are used to create water, with all its effects

    The companion CD includes tutorial files and sample files that demonstrate the possibilities.



    Table of Contents:
    Important information before we get started, Switching on Mental ray, mental ray render scene dialog Panels; Mental ray and lights, Introduction, mental ray renderer specific light options and Rollouts; mental ray with materials and Shaders, Introduction, Mental ray and standard materials, Mental ray and Architectural materials, Mental ray and mental ray materials, mental ray and mental ray Shaders

    Book about: Joy of Grilling or Williams Sonoma Savoring Meat and Poultry

    Network+ Study Guide, Deluxe Edition (N10-003)

    Author: David Groth

    If you're serious about getting your Network+ certification and advancing your career in the field of networking, this is the book you need.

    Revised for the new version of the Network+ exam, N10-003, this Deluxe Edition of the best-selling Network+ Study Guide was developed to meet the exacting requirements of today's IT certification candidates. In addition to the engaging and accessible instructional style that has made author David Groth a reader favorite for years, this updated edition provides:



    • In-depth coverage of every Network+ exam objective.

    • Practical instruction and insights drawn from real-world experience.

    • Leading-edge exam preparation software, including the Network+ Virtual Lab, as well as Sybex's custom test engine, electronic flashcards, and the entire book in PDF.



    In addition, you'll find authoritative coverage of all exam objectives, including:



    • Media and Topologies

    • Protocols and Standards

    • Network Implementation

    • Network Support



    Order your copy today.



    Saturday, January 17, 2009

    Microsoft Office XP for Dummies or Classic Shell Scripting

    Microsoft Office XP for Dummies

    Author: Wallace Wang

    Microsoft Office XP consists of several programs: a word processor (Word 2002), a spreadsheet program (Excel 2002), a presentation graphics program (PowerPoint 2002), a personal information organizer and e-mail client (Outlook 2002), and a database program (Access 2002). And depending on the version of Office XP that you get, you may have bonus programs that include a Web-page design and management application (FrontPage 2002).

    Having so many programs at your disposal can be very intimidating, especially for the beginning user. Which program do you use for which task? How can you get information from one program into another? Which programs do you really need, and which ones can you safely ignore? Your questions will abound and confound!

    Office XP For Dummies answers all these questions and more – in easy-to-understand terms and without all that computer-geek gibberish. It gently explains the basics for each program so that you can start using them right way. Here are a few of the topics covered in Office XP For Dummies:



    • Getting acquainted with the Office XP interface

    • Using Word to create reports and other fancy documents

    • Setting up spreadsheets in Excel to help you in your business

    • Creating slideshow presentations in PowerPoint

    • Managing your e-mail, calendar, and contact information in Outlook

    • Developing easy-to-use databases

    • Designing awesome Web pages quickly and hassle-free



    For beginners, Office XP For Dummies is the perfect overview of the entire Office XP suite; for more advanced users, itcontains many tips and tricks to make using all these different programs a breeze.



    Interesting textbook: The New Glucose Revolution Pocket Guide to Peak Performance or The Paranoids Pocket Guide to Mental Illnesses You Can Just Feel Coming On

    Classic Shell Scripting

    Author: Arnold Robbins

    Shell scripting skills never go out of style. It's the shellthat unlocks the real potential of Unix. Shell scripting isessential for Unix users and system administrators-a way toquickly harness and customize the full power of any Unixsystem. With shell scripts, you can combine the fundamentalUnix text and file processing commands to crunch data andautomate repetitive tasks. But beneath this simple promiselies a treacherous ocean of variations in Unix commands andstandards. Classic Shell Scripting is written to help youreliably navigate these tricky waters.

    Writing shell scripts requires more than just a knowledge ofthe shell language, it also requires familiarity with theindividual Unix programs: why each one is there, how to usethem by themselves, and in combination with the otherprograms. The authors are intimately familiar with the tipsand tricks that can be used to create excellent scripts, aswell as the traps that can make your best effort a bad shellscript. With Classic Shell Scripting you'll avoid hours ofwasted effort. You'll learn not only write useful shellscripts, but how to do it properly and portably.

    The ability to program and customize the shell quickly,reliably, and portably to get the best out of any individualsystem is an important skill for anyone operating andmaintaining Unix or Linux systems. Classic Shell Scriptinggives you everything you need to master these essentialskills.



    Table of Contents:
    1Background1
    2Getting started8
    3Searching and substitutions30
    4Text processing tools67
    5Pipelines can do amazing things87
    6Variables, making decisions, and repeating actions109
    7Input and output, files, and command evaluation140
    8Production scripts177
    9Enough awk to be dangerous223
    10Working with files267
    11Extended example : merging user databases308
    12Spellchecking325
    13Processes352
    14Shell portability issues and extensions381
    15Secure shell scripts : getting started413

    Friday, January 16, 2009

    Using OpenMP or Business Driven Information Technology

    Using OpenMP: Portable Shared Memory Parallel Programming

    Author: Barbara Chapman

    "I hope that readers will learn to use the full expressibility and power of OpenMP. This book should provide an excellent introduction to beginners, and the performance section should help those with some experience who want to push OpenMP to its limits."

    --from the foreword by David J. Kuck, Intel Fellow, Software and Solutions Group, and Director, Parallel and Distributed Solutions, Intel Corporation

    OpenMP, a portable programming interface for shared memory parallel computers, was adopted as an informal standard in 1997 by computer scientists who wanted a unified model on which to base programs for shared memory systems. OpenMP is now used by many software developers; it offers significant advantages over both hand-threading and MPI. Using OpenMP offers a comprehensive introduction to parallel programming concepts and a detailed overview of OpenMP.

    Using OpenMP discusses hardware developments, describes where OpenMP is applicable, and compares OpenMP to other programming interfaces for shared and distributed memory parallel architectures. It introduces the individual features of OpenMP, provides many source code examples that demonstrate the use and functionality of the language constructs, and offers tips on writing an efficient OpenMP program. It describes how to use OpenMP in full-scale applications to achieve high performance on large-scale architectures, discussing several case studies in detail, and offers in-depth troubleshooting advice. It explains how OpenMP is translated into explicitly multithreaded code, providing a valuable behind-the-scenes account of OpenMP program performance. Finally, Using OpenMP considerstrends likely to influence OpenMP development, offering a glimpse of the possibilities of a future OpenMP 3.0 from the vantage point of the current OpenMP 2.5.

    With multicore computer use increasing, the need for a comprehensive introduction and overview of the standard interface is clear. Using OpenMP provides an essential reference not only for students at both undergraduate and graduate levels but also for professionals who intend to parallelize existing codes or develop new parallel programs for shared memory computer architectures.



    Look this: Pregnancy For Dummies or Reconstructing Illness

    Business Driven Information Technology: Answers to 100 Critical Questions for Every Manager

    Author: David Laub

    Information technology is a critical element of virtually every business. But effectively aligning and using it to achieve business objectives is very difficult. That is because success requires so many elements to be done properly. Over 60 business leaders and university faculty members have collaborated to bring together insights from a broad spectrum of disciplines—from strategy and finance to information systems and project management. This information is contained in clearly written, concise answers to 100 questions that every manager needs to know to use information technology effectively. Each answer includes references to web and print resources for readers needing more detailed or the most current information. Business professionals will value the book because it covers a range of important areas that few know completely. University students will find the book a valuable source of necessary information for technology and management courses. Rarely is so much diverse expertise brought together and focused in a single book. It will become an essential resource for anyone working with information systems in an organization.



    Managing Contacts with Microsoft Outlook 2007 Business Contact Manager or Seam in Action

    Managing Contacts with Microsoft Outlook 2007 Business Contact Manager

    Author: Edward Kachinsk

    Want to learn how to manage customer, prospect, and vendor information in Microsoft Outlook 2007 Business Contact Manager? Want to use Microsoft Outlook to quickly and easily follow up on sales leads? Look no further! With minimal time investment, you can quickly and easily get up to speed on the powerful contact management functionality of Business Contact Manager. All you need is the information in this book. Managing Contacts with Microsoft Outlook 2007 Business Contact Manager clearly and concisely reviews the practical areas of Business Contact Manager, such as contact management, sales opportunity management, marketing and campaign management, and project management. It examines each area of functionality, including relevance to most businesses. Step-by-step instructions and easy-to-follow screenshots are provided throughout the book for you to easily learn the application. The book is set up in such a way that it's easy to use as you work, which facilitates a "learn by doing" approach. Managing Contacts with Microsoft Outlook 2007 Business Contact Manager is an ideal tool for all Microsoft Outlook users looking to easily manage their long lists of contacts, follow up on their leads, and increase their productivity!



    Table of Contents:

    Chapter 1. Installing Outlook BCM

    Chapter 2. Working with Contacts

    Chapter 3. Setting up Accounts

    Chapter 4. Searches & Filters

    Chapter 5. Managing Your Calendar

    Chapter 6. Working with Opportunities

    Chapter 7. Writing Letters & Campaigns

    Chapter 8. Managing Projects

    Chapter 9. Reports

    Chapter 10. Customizing Your Database

    Chapter 11. Setting up Offline Databases

    Chapter 12. Database Maintenance

    Chapter 13. Add-on Products & Web Resources

    Look this: The Art of Computer Programming or Linux Guide to Linux Certification Second Edition

    Seam in Action

    Author: Dan Allen

    Seam in action is a detailed introduction to Seam for Java EE developers. In the book, you'll use seam-gen to build a basic application and follow it to learn how Seam automates non-core tasks through configuration by exception, Java 5 annotations, and aspect-oriented programming. You'll master key techniques for Spring integration, JavaScript remoting, business processes (jBPM) and stateful page flows (jPDL), and more.



    Wednesday, January 14, 2009

    Darwin among the Machines or Exploring Microsoft Office Excel 2007 Comprehensive

    Darwin among the Machines: The Evolution of Global Intelligence

    Author: George B Dyson

    Darwin Among the Machines retraces the steps that led us into the digital wilderness, no less wild for being a universe of our own device. Introducing a cast of known and unknown characters, George B. Dyson traces the course of the information revolution, illuminating the lives and work of visionaries-from the time of Thomas Hobbes to the time of John von Neumann-who foresaw the development of artificial intelligence, artificial life, and artificial mind.This deep and elegant book derives both its title and its outlook from Samuel Butler’s 1863 essay “Darwin Among the Machines.” Observing the beginnings of miniaturization, self-reproduction, and telecommunication among machines, Butler predicted that nature’s intelligence, only temporarily subservient to technology, would resurface to claim our creations as her own. Updating Butler’s arguments, Dyson has distilled the historical record to chronicle the origins of digital telecommunications and the evolution of digital computers, beginning long before the time of Darwin and exploring the limits of Darwinian evolution to suggest what lies beyond.Weaving a cohesive narrative among his brilliant predecessors, Dyson constructs a straightforward, convincing, and occasionally frightening view of the evolution of mind in the global network, on a level transcending our own. Dyson concludes that we are in the midst of an experiment that echoes the prehistory of human intelligence and the origins of life. Just as the exchange of coded molecular instructions brought life as we know it to the early earth’s primordial soup, and as language and mind combined to form the culture in which we live, so, in thedigital universe, are computer programs and worldwide networks combining to produce an evolutionary theater in which the distinctions between nature and technology are increasingly obscured.Nature, believes Dyson, is on the side of the machines.



    Book about: Taste of Indonesia or Cal A Vie Living

    Exploring Microsoft Office Excel 2007, Comprehensive

    Author: Robert T Grauer

    For introductory Office Application courses that cover Excel 2007. 


     


    The goal of the Exploring Series has been to move students beyond the point and click, helping them understand the why and how behind each skill. Students go to college now with a different set of skills than they did 5 years ago.  The new edition of Exploring moves students beyond the basics of the software at a faster pace, without sacrificing fundamental skills to ensure that they will be engaged throughout the book.