Sunday, February 22, 2009

Essential C for Engineers and Scientists or Health Information Technology

Essential C++ for Engineers and Scientists

Author: Jeri Hanly

Essential C++ for Engineers and Scientists focuses readers on the key elements of good programming and C++ using a multitude of engineering and scientific examples that are relevant to future engineers. The book covers the features of C++ needed for writing engineering programs, including many features of object-oriented programming. Early on, it makes some simplifying assumptions that allow the use of C++ topics without lengthy explanation, and then later discusses the intricacies of the features. Readers will come away with the confidence needed to solve problems with C++.

THIS SECOND EDITION FEATURES:

  • Over 50% more programming projects than in the first edition.
  • Two new case studies with complete algorithm development.
  • Over 80 engineering and scientific examples and programming projects drawn from interesting areas such as solar heating, environmentally sound power production, water conservation, automated manufacturing, pipeline and power grid modeling, and others.
  • Updated and enhanced coverage of many topics including member operators and member functions, files, and structs.
  • Reference appendices on using the C programming language and about both the Borland and Visual C++ integrated development environments.
  • Fundamentals of numerical methods that represent commonly used techniques for solving engineering and scientific problems.



New interesting book: Last Campaign or Blueprint for Action

Health Information Technology

Author: Nadinia Davis

This book is designed to meet the needs of students at the beginning of their course of study in health information technology - both as a work-based task-oriented function and as a part of a larger profession of health information management. Individuals who wish to acquire basic knowledge of health information technology and how it fits into the health care arena will find this text useful.

  • Chapter learning objectives are tied to the American Health Information Management Association's (AHIMA) domains and sub-domains of the Health Information Technology (HIT) curriculum to allow instructors to teach to the credentialing exam and to help students prepare for the exam.
  • Provides job descriptions in every chapter to give students a broader view of the field and show them they many options they have upon graduation.
  • Includes application-oriented exercises and activities in each chapter to make learning more interactive for students and to also fulfill the AHIMA HIT curriculum requirements.
  • Each chapter builds on the previous chapter and encourages the application of key concepts to support comprehensive learning of the material.
  • A clear writing style and easy reading level is appropriate for two-year postsecondary students to make their reading and studying more time-efficient.
  • A comprehensive Instructor's Resource Manual with CD-ROM makes it easier for instructors to develop and teach the course.
  • Evolve provides an interactive learning environment instructors can utilize to work with the text.
  • Workbook exercises are incorporated into the text to keep the core content and review material close together.
  • Materialon statistics have been broken out into a new, separate chapter to give new students a better foundation for learning.
  • New Special Health Records chapter includes information on accreditation and major Health Information Management (HIM) issues.
  • Includes a computer-based health systems chapter to address how HIM is moving to an increasingly electronic environment.
  • A new Confidentiality and Compliance chapter covers HIPAA Privacy regulations.


  • Table of Contents:
    Environment of Health Information
    Health Care Delivery Systems     2
    Health Care Professionals     4
    Health Information Management     11
    Comparison of Facilities     13
    Legal and Regulatory Environment     22
    Chapter Activities     29
    Paying for Health Care     32
    Reimbursement     34
    Insurance     37
    Government Influence on Reimbursement     47
    Chapter Activities     51
    Collecting Health Care Data     54
    Basic Concepts     56
    Key Data Categories     59
    Medical Decision Making     62
    Describing Data     65
    Organization of Data Elements in a Health Record     67
    Data Quality     74
    Chapter Activities     82
    Content, Structure, and Processing of Health Information
    Acute Care Records     86
    Clinical Flow of Data     88
    Clinical Data     92
    Data Quality     102
    Accreditation     104
    Chapter Activities     106
    Health Information Management Processing     108
    Data Quality     110
    Postdischarge Processing     114
    OtherHealth Information Management Roles     124
    Chapter Activities     126
    Coding and Reimbursement     128
    Coding     130
    Prospective Payment Systems     136
    Billing     150
    Impact of Coding     154
    Chapter Activities     158
    Health Information Management Issues in Alternative Settings     161
    Ambulatory Care     163
    Ambulatory Care: Radiology and Laboratory     169
    Ambulatory Care: Ambulatory Surgery     172
    Long-Term Care     173
    Behavioral Health Facilities     175
    Rehabilitation Facilities     177
    Hospice     178
    Home Health Care     180
    Other Specialty Facilities     181
    Chapter Activities     185
    Maintenance and Analysis of Health Information
    Storage     188
    The Paper Perspective     190
    Master Patient Index     191
    Filing     197
    Alternative Storage Methods     218
    Chart Locator Systems     225
    Security of Health Information     229
    Chapter Activities     236
    Statistics     238
    Organized Collection of Data      240
    Data Retrieval     245
    Reporting of Data     252
    Statistical Analysis of Patient Information     254
    Routine Institutional Statistics     264
    Chapter Activities     277
    Quality and Uses of Health Information     279
    The Quality of Health Care     281
    Quality Management Theories     282
    History and Evolution of Quality in Health Care     283
    Monitoring the Quality of Health Information     288
    Health Information in Quality Activities     293
    Organization and Presentation of Data     301
    Health Care Facility Committees     307
    Uses of Health Information     310
    Chapter Activities     320
    Legal and Supervisory Issues in Health Information
    Confidentiality and Compliance     324
    Confidentiality     326
    Health Insurance Portability and Accountability Act     328
    Access     333
    Consent     339
    Release of Information     342
    Preparing a Record for Release     345
    Internal Requests for Information     348
    Sensitive Records     349
    Federal, Corporate, and Facility Compliance     349
    Chapter Activities     353
    Electronic Health Records     355
    The Evolution of the Electronic Health Record     357
    Government and Private Sector Intervention     363
    Advantages of and Barriers to Implementing an Electronic Health Record     366
    Electronic Health Record Management     368
    Career Opportunities     375
    Chapter Activities     378
    HIM Department Management     380
    Human Resources     382
    Organization Charts     384
    Health Information Management Department Workflow     389
    Department Planning     393
    Prioritization of Department Functions     396
    Evaluation of Department Operations and Services     397
    Department Policies and Procedures     398
    Health Information Personnel     400
    Employee Productivity     403
    Employee Evaluations     406
    Hiring Health Information Management Personnel     409
    Fair Employment Practices     416
    Department Equipment and Supplies     417
    Ergonomics     420
    Chapter Activities     423
    Training and Development     425
    Orientation     427
    Training      432
    Inservice Education     436
    Educating the Public     436
    Continuing Education     436
    Communication     439
    Department Meetings     442
    Chapter Activities     447
    Sample Paper Records     450
    Sample Electronic Medical Record     466
    Minimum Data Set     472
    Using Microsoft Excel to Perform Calculations     486
    Glossary     493

    Saturday, February 21, 2009

    C or Microsoft Visual C 2005 Express Edition Programming for the Absolute Beginner

    C++: The Core Language

    Author: Gregory Satir

    A first book for C programmers transitioning to C++, an object-oriented enhancement of the C programming language. Designed to get readers up to speed quickly, this book thoroughly explains the important concepts and features and gives brief overviews of the rest of the language. Covers features common to all C++ compilers, including those on UNIX, Windows NT, Windows, DOS, and Macs



    Book about: Services Marketing or Organization Modeling

    Microsoft Visual C++ 2005 Express Edition Programming for the Absolute Beginner

    Author: Premier Development

    Microsoft Visual C++ 2005 Express Edition Programming for the Absolute Beginner focuses on teaching first time programmers how to program using Visual C++ 2005 Express Edition as a foundation language. Written for the entry-level user, the book assumes no prior programming or scripting experience. Whether you are a new or experienced C++ developer, this book delivers the tools and libraries you need to write a variety of programs. Written in a straight-forward style, using a games-based approach that makes learning beginning-level programming fun and easy, Microsoft Visual C++ 2005 Express Edition Programming for the Absolute Beginner is the perfect introductory programming book.



    Table of Contents:
    Ch. 1An introduction to Visual C++ 2005 express1
    Ch. 2Navigating the Visual C++ 2005 express edition environment27
    Ch. 3Creating an application interface63
    Ch. 4Working with menus and toolbars101
    Ch. 5Storing and retrieving data in memory141
    Ch. 6Applying conditional logic177
    Ch. 7Processing lots of data with loops207
    Ch. 8Enhancing code structure and organization241
    Ch. 9Getting comfortable with object-oriented programming279
    Ch. 10Integrating graphics and audio307
    Ch. 11Debugging Visual C++ applications335

    Friday, February 20, 2009

    Teach Yourself VISUALLY Adobe Photoshop Lightroom 2 or Harvard Business Review on Knowledge Management

    Teach Yourself VISUALLY Adobe Photoshop Lightroom 2

    Author: Lynette Kent

    The amateur and home photographers today take many more photos than they ever would have with film cameras, and the sorting process alone can be an ominous and time consuming chore. Unlike Photoshop, Lightroom enables the photographer to organize, process, and output large numbers of files and effectively streamline the so called digital workflow, reducing the work and enhancing the flow of processing digital photographs. All the features of Lightroom such as moving the cursor directly on the image to adjust it, which are intended to simplify digital editing for the professional photographer, also make the photo editing process easier for the amateur. For once the professional level application is easier to use for everyone. This book provides the general photo enthusiast easy to follow steps to get past the intimidation factor of "a professional tool." Teach Yourself Visually Adobe Photoshop Lightroom will simplify the "photo geek speak," explain the interface and tools so the average person with a digital camera will feel comfortable and be able to start organizing, editing, and outputting photos right away.



    Book review: Workplace Communications for Engineering Technicians and Technologists or Accounting Information Systems

    Harvard Business Review on Knowledge Management

    Author: Harvard Business Review

    The Harvard Business Review paperback series is designed to bring today's managers and professionals the fundamental information they need to stay competitive in a fast-moving world. Here are the landmark ideas that have established the Harvard Business Reviewas required reading for ambitious businesspeople in organizations around the globe. The eight articles in Harvard Business Review on Knowledge Management highlight the leading-edge thinking and practical applications that are defining the field of knowledge management. Includes Peter Drucker's prophetic "The Coming of the New Organization" and Ikujiro Nonaka's "Knowledge-Creating Company." A Harvard Business Review Paperback.

    Library Journal

    This collection of eight Harvard Business Review articles are written by leading business authors (including a contribution from management guru Peter Drucker), and together they present a solid introduction to and overview of the practice of knowledge management. Copyright 1999 Cahners Business Information.

    Booknews

    A collection of eight articles first published in the during the 1980s-90s, focusing on the way companies generate, communicate, and leverage their intellectual assets. Each article is preceded by a summary. Topics include teaching smart people how to learn, doing research that reinvents the corporation, and managing professional intellect. Annotation c. Book News, Inc., Portland, OR (booknews.com)



    Table of Contents:
    The Coming of the New Organization1
    The Knowledge-Creating Company21
    Building a Learning Organization47
    Teaching Smart People How to Learn81
    Putting Your Company's Whole Brain to Work109
    How to Make Experience Your Company's Best Teacher137
    Research That Reinvents the Corporation153
    Managing Professional Intellect: Making the Most of the Best181
    About the Contributors207
    Index213

    Thursday, February 19, 2009

    Design and Launch Your Ecommerce Business in a Week or Blogs Wikis Myspace and More

    Design and Launch Your eCommerce Business in a Week

    Author: Jason R Rich

    WWW.(Your Online Store).COM

    Have you fantasized about your own retail store-selling your own specialty items, showcasing unique products or better promoting existing products? Or have you dreamed of working from home, setting your own hours and still making great money? Today's technology makes it easier than ever to take your retail dreams to the world's largest marketplace-the Internet. In just days, you can build your own eCommerce website, reach potential customers by the millions, process orders 24/7 and accept payments from all over the world-with no technical background or graphic design skills!

    • Design a professional eCommerce site using inexpensive, turnkey solutions from established companies like Google, Yahoo! and Go Daddy that require no programming or graphic design knowledge
    • Create content and online deals that capture shoppers and keep them coming back
    • Use surefire online tools that work 24/7 to handle payments and accept orders
    • Drive traffic using Search Engine Optimization and other marketing and advertising techniques
    • Skillfully handle inventory, order fulfillment, customer service and all other operations

    The world's largest marketplace is at your fingertips…take advantage of it!

    Jason R. Rich is a bestselling author of more than 35 books, including several e-commerce guides; a frequent contributor to several national magazines and daily newspapers; and a consultant to individuals and businesses looking to launch a successful e-commerce website.



    New interesting textbook: The Russian Roots of Nazism or The California Gold Rush and the Coming of the Civil War

    Blogs, Wikis, Myspace, and More: Everything You Want to Know about Using Web 2. 0 but Are Afraid to Ask

    Author: Terry Burrows

    For both internet gurus and online novices, this handy mini-encyclopedia explores the useful and interesting sites—big and small, popular and obscure—that make up Web 2.0, the new online community. From YouTube and Flickr to eBay and Facebook, each website and online application is explained through step-by-step screen shots and examines what each site does, why people use it, how to get started, and any special features. Simple yet thorough definitions for commonly used internet elements—such as tags, bookmarks, blogs, and podcasts—are provided as well as little-known usage tips for expert surfers. Grouped by type, this detailed guide also offers dozens of alternative URLs that cover similar online territory, but with their own unique takes.



    Tuesday, February 17, 2009

    The Hacker Crackdown or Network Maturity Model

    The Hacker Crackdown: Law and Disorder on the Electronic Frontier

    Author: Bruce Sterling

    The AT&T long-distance network crashes, and millions of calls go unanswered. A computer hacker reprograms a switching station, and calls to a Florida probation office are shunted to a New York phone-sex hotline. An underground computer bulletin board publishes a pilfered BellSouth document on the 911 emergency system, making it available to anyone who dials up. How did so much illicit power reach the hands of an undisciplined few - and what should be done about it? You are about to descend into a strange netherworld - one that sprang into existence when computers were first connected to telephones. This place has no physical location; it exists only in the networks that bind together its population. Like any frontier, it is home to a wide range of personalities, from legitimate computer professionals to those known only by their noms de net; denizens like Knight Lightning, Leftist, Compu-Phreak, Major Havoc, and Silver Spy; groups like the Lords of Chaos, Phantom Access Associates, Shadow Brotherhood, and the Coalition of Hi-Tech Pirates. This is not normal space, but "cyberspace." And if you use a computer, cyberspace is moving inexorably closer to you with each passing day. Your guide on this journey is bestselling science fiction author and longtime computer user Bruce Sterling, who was galvanized into action following the massive "hacker crackdowns" of 1990, in which law enforcement officers executed search warrants across the country against lawbreakers - and suspected lawbreakers - in the computer underground. In The Hacker Crackdown, Sterling - respected by hackers, law officers, and civil libertarians alike - uses his unique reportorial access and his considerable powers as a novelist to weave a startling narrative that informs, compels, and appalls. Sterling has researched all corners of this challenging and controversial new world for this book. In it we meet outlaws and cops, bureaucrats and rebels, geniuses and grifters: all denizens of a dazzling e

    Publishers Weekly

    Cyberpunk novelist Sterling (Involution Ocean) has produced by far the most stylish report from the computer outlaw culture since Steven Levy's Hackers. In jazzy New Journalism proE;e, sounding like Tom Wolfe reporting on a gunfight at the Cybernetic Corral, Sterling makes readers feel at home with the hackers, marshals, rebels and bureaucrats of the electronic frontier. He opens with a social history of the telephone in order to explain how the Jan. 15, 1990, crash of AT&T's long-distance switching system led to a crackdown on high-tech outlaws suspected of using their knowledge of eyberspace to invade the phone company's and other corporations' supposedly secure networks. After explaining the nature of eyberspace forms like electronic bulletin boards in detail, Sterling makes the hackers-who live in the ether between terminals under noms de nets such as VaxCat-as vivid as Wyatt Earp and Doe Holliday. His book goes a long way towards explaining the emerging digital world and its ethos. (Oct.)

    Library Journal

    This well-written history of ``cyberspace'' and computer hackers begins with the failure of AT&T's long-distance telephone switching system in January 1990 (the subject of Leonard Lee's The Day the Phones Stopped , LJ 7/91). Subsequently, a number of hackers were accused of being responsible, although AT&T formally acknowledged otherwise. In detailing various formal efforts to prosecute the ``phone phreaks'' and hackers, cyberpunk sf author Sterling ( Islands in the Net , LJ 6/15/88) avoids attributing the near-mystical genius qualities that too many authors have bestowed upon the computer and telephone ``outlaws.'' Instead, he realistically describes their biases and philosophical shortcomings. Sterling's concern for the Steve Jackson Games prosecution, which occurred erroneously in conjunction with several legitimate raids in Austin, leads him to the Electronic Frontier Foundation, and he concludes with a well-balanced look at this new group of civil libertarians. Written with humor and intelligence, this book is highly recommended. See also Katie Hafner and John Markoff's Cyperpunk , LJ 6/1/91.--Ed.-- Hilary D. Burton, Lawrence Livermore National Lab, Livermore, Cal.

    BookList

    Sterling collaborated with William Gibson on "The Difference Engine" (BKL D 1 90), about what might have resulted had Charles Babbage's 1842 prototype of the computer succeeded. That novel seems to have impelled Sterling toward the present effort, a feisty survey of the dilemmas electronic technologies present for software firms, law enforcement agencies, hackers, and civil libertarians. He begins with a colorful portrait of Alexander Graham Bell and the Bell System, since Bell's divestiture in 1982 heralded much of the contemporary confusion, and it was with the telephone that cyberspace, that place somewhere between speakers, became "real." He discusses the Computer Fraud and Abuse and the Electronic Communications and Privacy acts of 1986. But his attentions center on the AT&T long-distance crash of 1990 and subsequent federal raids on hackers such as NuPrometheus, which once stole a jealousy guarded piece of Apple software, and Knight Lightning, actually tried for software piracy. Nineteen ninety was a year of raids, arrests, and trials, the upshot of which is that a host of groups have dug in on the battle for the free flow of electronic information. At the same time, electronic crimes are likely to become more sophisticated and international. Sterling relates all this with an insider's grasp of detail, and with irreverent humor. Offbeat and brilliant.

    Booknews

    Father of "cyberpunk" science fiction and techno-journalist, Sterling writes in his popular style for this nonfiction book that looks at computer hacking from both sides of the law. He interviews outlaw hackers and phone phreaks, law enforcement personnel, and civil libertarians, and presents a look at the people involved in the world of cyberspace and the politics of the new technological world. No references. Annotation c. Book News, Inc., Portland, OR (booknews.com)



    New interesting textbook: Collège Estimant 1-13

    Network Maturity Model

    Author: William J Baumann

    The Network Maturity Model (NMM) addresses the need for a process-based approach to ensuring network quality. Application of the model to enterprise networks provides gains in terms of over all quality, process reliability and positive impacts on customers.

    The extensive background in academia and real-world industry of the engineer authors has produced a work which synergistically integrates a myriad of disciplines and experience relevant to an effective network quality system. For example, within the model the authors have crafted network activities related to Enterprise business models, and integrated Enterprise Management with Network Engineering and Network Operations.

    The Network Maturity Model (NMM) provides a process model for a network management system. Compliance to the NMM ensures that processes are defined, established and continuously improved to support the development of quality networks in a repeatable manner. Unique to the NMM is it provides a strong focus on stakeholder satisfaction, and the integration of network management, development and operations processes to provide higher quality networks. Another unique feature of the NMM is its components which address the security, acquisition, hardware, customer, and other activities unique to networks.

    The model describes a comprehensive quality and process capability across all aspects of computer networks. It is designed as a stand-alone model which provides quality system elements for network management, engineering, and operational components. It encompasses a multi-discipline approach which integrates elements of quality standards including ISO 9000, TL 9000 and Baldrige. Use of the modelprovides network quality managers and professionals with a single integrated maturity model, eliminating the need to use separate models for different network activities such as the software CMM for network software development.



    Monday, February 16, 2009

    Adobe PageMaker 70 Basics or Building High Availability Windows Server 2003 Solutions

    Adobe PageMaker 7.0 BASICS

    Author: Rick Braveheart

    This book from our BASICS series provides a step-by-step introduction to Adobe PageMaker 7 software. Everything from creating a publication and working with styles and graphics to working with tables and templates is covered in this text.



    Interesting textbook: GNU Autoconf Automake and Libtool or Mistake Proofing for Operators

    Building High Availability Windows Server 2003 Solutions

    Author: Jeffrey A Shapiro

    This is the definitive resource for every network administrator, consultant, and architect who needs to maximize availability, scalability, and performance in Windows server environments.

    Drawing on two decades of Windows server experience, Jeffrey Shapiro and Marcin Policht have written the most realistic, comprehensive, and independent Windows high availability guide ever published. One step at, a time, they help you plan, implement, and manage clustering, load balancing, fault tolerance, SQL Server, Exchange Server, and much more. Along the way, they address crucial high availability topics that are virtually ignored by most books, such as disaster recovery, performance monitoring, and operations management.

    Shapiro and Policht offer a clear, concise roadmap for keeping Windows servers running 24x7 and delivering on even the most challenging service-level agreements. They provide real-world case studies and easy-to-use instructions designed to help readers make better decisions more rapidly.

    Coverage includes

    • Building the foundations for a highly available Active Directory and network architecture

    • Selecting and integrating high-performance hardware, storage, and networks

    • Installing and configuring Windows Clustering Services for both scale-out and failover

    • Leveraging the Microsoft Operations Framework (MOF) and Microsoft Systems Architecture (MSA)

    • Delivering high-performance, high availability file- and print-server solutions

    • Using clustering to maximize SQL Server and Exchange Server availability

    • Restoring failed servers: best practices and step-by-step techniques for recovering from downtime or disaster

    • Deploying Network Load Balancing (NLB) IIS and application servers

    • Administering Windows Server 2003 high-performance systems—including performance monitoring and alerts with Microsoft Operations Manager

    • Avoiding the pitfalls associated with Windows high availability solutions



    Table of Contents:
    Pt. IHigh-performance Windows computing
    Ch. 1The world of high-performance, high availability Windows computing3
    Ch. 2Choosing high-performance hardware25
    Ch. 3Storage for highly available systems35
    Ch. 4Highly available networks71
    Ch. 5Preparing the platform for a high-performance network97
    Ch. 6Building the foundations for a highly available architecture163
    Pt. IIBuilding high availability Windows server 2003 solutions
    Ch. 7High-performance print-server solutions217
    Ch. 8High-performance file-server solution225
    Ch. 9High availability, high-performance SQL server solutions245
    Ch. 10High availability, high-performance exchange297
    Ch. 11Load balancing335
    Ch. 12Internet information server373
    Ch. 13Looking for trouble : setting up performance monitoring and alerts401

    Friday, February 13, 2009

    Conquest in Cyberspace or Learning Red Hat Linux

    Conquest in Cyberspace: National Security and Information Warfare

    Author: Martin C Libicki

    With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve.



    Table of Contents:
    List of Figures     x
    Acknowledgments     xi
    Introduction     1
    What Does Conquest Mean in Cyberspace?     4
    Precis     10
    Hostile Conquest as Information Warfare     15
    An Ideal-Type Definition of Information Warfare     16
    Control at One Layer Is Not Control at Another     24
    Applying the Ideal-Type Definition     27
    There Is No Forced Entry in Cyberspace     31
    Information Warfare Only Looks Strategic     37
    IW Strategy and Terrorism     43
    Conclusions     49
    Information Warfare as Noise     50
    Disinformation and Misinformation     51
    Defenses against Noise     55
    Redundancy     55
    Filtration     57
    What Tolerance for Noise?     59
    Tolerance in Real Environments     60
    Castles and Agoras     62
    Hopping from Agoras to Castles?     64
    Castling Foes     66
    Concluding Observations     71
    Can Information Warfare Be Strategic?     73
    Getting In     75
    Mucking Around     79
    Spying     79
    Denial of Service     80
    Corruption     81
    Distraction     83
    Countermeasures     84
    Redundancy     84
    Learning     85
    Damage Assessment     87
    Prediction     90
    Intelligence Is Necessary     90
    Intelligence Alone Is Hardly Sufficient     93
    Is Information Warfare Ready for War?     95
    The Paradox of Control     96
    Other Weaponization Criteria     97
    Conclusions     100
    Information Warfare against Command and Control     102
    The Sources of Information Overload     103
    Its Effect on Conventional Information Warfare Techniques     105
    Coping Strategies     107
    Who Makes Decisions in a Hierarchy?     107
    Responses to Information Overload     111
    Know the Enemy's Information Architecture     116
    Elements of Information Culture     117
    Elements of Nodal Architecture     118
    Injecting Information into Adversary Decision Making     118
    Ping, Echo, Flood, and Sag     121
    Ping and Echo     121
    Flood and Sag     122
    Conclusions     124
    Friendly Conquest in Cyberspace      125
    A Redefinition of Conquest     126
    The Mechanisms of Coalitions     128
    The Particular Benefits of Coalitions     130
    Information and Coalitions     131
    The Cost of Coalitions in Cyberspace     136
    Enterprise Architectures and Influence     142
    Alliances with Individuals     148
    The Special Case of Cell Phones     151
    Alliances of Organizations     155
    Ecologies of Technological Development     155
    DoD's Global Information Grid (GIG)     159
    Merging the Infrastructures of Allies     164
    Conclusions     166
    Friendly Conquest Using Global Systems     169
    Geospatial Data     170
    Coping with Commercial Satellites     175
    Manipulation through Cyberspace     178
    Getting Others to Play the Game     180
    Some Conclusions about Geospatial Services     182
    National Identity Systems     182
    Two Rationales for a National Identity System     183
    Potential Parameters for a Notional System     184
    Constraints from and Influences over Foreign Systems     187
    Compare, Contrast, and Conclude     191
    Retail Conquest in Cyberspace     193
    Information Trunks and Leaves     194
    Where Does Cheap Information Come From?     195
    Surveillance in Cyberspace     198
    Making Information Global     203
    Privacy     204
    Amalgamating Private Information     206
    Using the Information     208
    General Coercion     208
    Specific Coercion     209
    Persuasion     211
    Some Limits of Retail Warfare in Cyberspace     214
    Using Retail Channels to Measure Wholesale Campaigns     215
    Conclusions     218
    From Intimacy, Vulnerability     220
    Do the Walls Really Come Down?     220
    Intimacy as a Target     222
    The Fecklessness of Friends     225
    Betrayal     228
    Conclusions     230
    Talking Conquest in Cyberspace     231
    Four Layers of Communications     232
    Human Conversation in Layers     232
    Cyberspace in Layers     236
    Complexity Facilitates Conquest     240
    Complexity and Hostile Conquest     241
    Complexity and Friendly Conquest     242
    Semantics     245
    Pragmatics      249
    Lessons?     255
    Managing Conquest in Cyberspace     256
    Conducting Hostile Conquest in Cyberspace     257
    Warding Off Hostile Conquest in Cyberspace     262
    Byte Bullies     262
    Headless Horsemen     265
    Perfect Prevention     268
    Total Transparency     270
    Nasty Neighborhoods     272
    Exploiting Unwarranted Influence     276
    Against Unwarranted Influence     281
    In Microsoft's Shadow     282
    Microsoft and Computer Security     285
    Conclusions     289
    Why Cyberspace Is Likely to Gain Consequence     291
    More Powerful Hardware and Thus More Complex Software     292
    Cyberspace in More Places     294
    Fuzzier Borders between Systems     297
    Accepted Cryptography     299
    Privatized Trust     301
    The Possible Substitution of Artificial for Natural Intelligence     303
    Conclusions     306
    Index     307

    Book review: The Anatomy of Hope or Cardio Free Diet

    Learning Red Hat Linux

    Author: Bill McCarty

    New users are flocking to Linux literally by the millions. Yet most of these new users draw from Microsoft Windows as their primary computing experience; for them an operating system from the UNIX family is an unfamiliar experience. In Learning Red Hat Linux, Bill McCarty has written a book aimed specifically at this new audience.

    Learning Red Hat Linux will guide any new user of Linux through the installing and use of Red Hat Linux, the free operating system that is shaking up the commercial world of software. It demystifies Linux in terms familiar to Windows users and gives readers only what they need to start being successful users of Linux.

    Built around the popular Red Hat distribution of Linux, Learning Red Hat Linux takes the reader step by step through the process of installing and setting up a Red Hat Linux system, and provides a thorough but gentle introduction to the basics of using Red Hat Linux.

    Because the book is written specifically for the enclosed CD, the reader needs nothing else to get started with this exciting new operating system.

    Booknews

    This second edition of a book/CD-ROM guide to installing and running Red Hat Linux on a PC has been upgraded to cover installation and configuration of Red Hat version 7.2, with improved sections on how to use the GNOME and KDE desktop environments and the use of the Red Hat Package Manager. The two CD-ROMs contain tools needed to install and configure a Red Hat Linux system. The book is written for first-time Linux users. McCarty teaches management information systems at Azusa Pacific University. Annotation c. Book News, Inc., Portland, OR (booknews.com)



    Thursday, February 12, 2009

    Approximate Dynamic Programming or Teaching and Learning with Technology

    Approximate Dynamic Programming: Solving the Curses of Dimensionality

    Author: Warren Buckler Powell

    A complete and accessible introduction to the real-world applications of approximate dynamic programming

    With the growing levels of sophistication in modern-day operations, it is vital for practitioners to understand how to approach, model, and solve complex industrial problems. Approximate Dynamic Programming is a result of the author's decades of experience working in large industrial settings to develop practical and high-quality solutions to problems that involve making decisions in the presence of uncertainty. This groundbreaking book uniquely integrates four distinct disciplines—Markov design processes, mathematical programming, simulation, and statistics—to demonstrate how to successfully model and solve a wide range of real-life problems using the techniques of approximate dynamic programming (ADP). The reader is introduced to the three curses of dimensionality that impact complex problems and is also shown how the post-decision state variable allows for the use of classical algorithmic strategies from operations research to treat complex stochastic optimization problems.

    Designed as an introduction and assuming no prior training in dynamic programming of any form, Approximate Dynamic Programming contains dozens of algorithms that are intended to serve as a starting point in the design of practical solutions for real problems. The book provides detailed coverage of implementation challenges including: modeling complex sequential decision processes under uncertainty, identifying robust policies, designing and estimating value function approximations, choosing effective stepsize rules, and resolving convergence issues.

    With a focus on modeling andalgorithms in conjunction with the language of mainstream operations research, artificial intelligence, and control theory, Approximate Dynamic Programming:

    • Models complex, high-dimensional problems in a natural and practical way, which draws on years of industrial projects
    • Introduces and emphasizes the power of estimating a value function around the post-decision state, allowing solution algorithms to be broken down into three fundamental steps: classical simulation, classical optimization, and classical statistics
    • Presents a thorough discussion of recursive estimation, including fundamental theory and a number of issues that arise in the development of practical algorithms
    • Offers a variety of methods for approximating dynamic programs that have appeared in previous literature, but that have never been presented in the coherent format of a book

    Motivated by examples from modern-day operations research, Approximate Dynamic Programming is an accessible introduction to dynamic modeling and is also a valuable guide for the development of high-quality solutions to problems that exist in operations research and engineering. The clear and precise presentation of the material makes this an appropriate text for advanced undergraduate and beginning graduate courses, while also serving as a reference for researchers and practitioners. A companion Web site is available for readers, which includes additional exercises, solutions to exercises, and data sets to reinforce the book's main concepts.



    See also: Decision Support and Business Intelligence Systems or Programming Microsoft ASPNet 20 Core Reference

    Teaching and Learning with Technology

    Author: Judy Lever Duffy

    Written by teachers for teachers, this text offers a clear and current look at the range of educational technologies and how teachers can effectively use technology to enhance learning.

    Written by Teachers for Teachers, this text provides readers with a clear understanding of educational media and how it can be used effectively to enhance learning.  The text explores the current and emerging technologies and multimedia available to teachers while consistently maintaining an instructional focus. Pre-service and in-service teachers.



    Table of Contents:
    Foreword
    Preface
    Pt. 1Technologies for Teaching and Learning1
    Ch. 1Theoretical Foundations2
    Ch. 2Designing and Planning Technology-Enhanced Instruction32
    Pt. 2Applying Technologies for Effective Instruction71
    Ch. 3Introduction to Personal Computers in the Classroom72
    Ch. 4Digital Technologies in the Classroom102
    Ch. 5Administrative Software128
    Ch. 6Academic Software166
    Ch. 7Networks and the Internet200
    Ch. 8Using the Web for Teaching and Learning232
    Ch. 9Audio and Visual Technologies270
    Ch. 10Video Technologies308
    Pt. 3Technology in Schools, Changing Teaching and Learning339
    Ch. 11Distance Education: Using Technology to Redefine the Classroom340
    Ch. 12Issues in Implementing Technology in Schools374
    App. ANational Educational Technology Standards for Teachers and Students405
    App. BEducational Technology Resources and Organizations407
    Photo Credits408
    Glossary409
    References421
    Index429

    Wednesday, February 11, 2009

    The Second Self or Practical Computer Literacy

    The Second Self: Computers and the Human Spirit, Twentieth Anniversary Edition

    Author: Sherry Turkl

    In The Second Self, Sherry Turkle looks at the computer not as a "tool," but as part of our social and psychological lives; she looks beyond how we use computer games and spreadsheets to explore how the computer affects our awareness of ourselves, of one another, and of our relationship with the world. "Technology," she writes, "catalyzes changes not only in what we do but in how we think." First published in 1984, The Second Self is still essential reading as a primer in the psychology of computation. This twentieth anniversary edition allows us to reconsider two decades of computer culture--to (re)experience what was and is most novel in our new media culture and to view our own contemporary relationship with technology with fresh eyes. Turkle frames this classic work with a new introduction, a new epilogue, and extensive notes added to the original text.

    Turkle talks to children, college students, engineers, AI scientists, hackers, and personal computer owners--people confronting machines that seem to think and at the same time suggest a new way for us to think--about human thought, emotion, memory, and understanding. Her interviews reveal that we experience computers as being on the border between inanimate and animate, as both an extension of the self and part of the external world. Their special place betwixt and between traditional categories is part of what makes them compelling and evocative. (In the introduction to this edition, Turkle quotes a PDA user as saying, "When my Palm crashed, it was like a death. I thought I had lost my mind.") Why we think of the workings of a machine in psychological terms--how thishappens, and what it means for all of us--is the ever more timely subject of The Second Self.



    Read also Addiction Is a Choice or Caring for a Dying Loved One

    Practical Computer Literacy

    Author: June Jamrich Parsons

    Practical Computer Literacy integrates Computer Concepts, Office Applications, and Internet Concepts all in one book that will meet IC3 and other computer literacy exam standards.



    Table of Contents:
    1. Computer Hardware 2. Peripheral Devices 3. Software 4. Getting Started with Windows 5. Working with Files 6. Getting Started with Application Software 7. Creating a Document 8. Formatting a Document 9. Finalizing a Document 10. Creating a Worksheet 11. Formatting a Worksheet 12. Finalizing a Worksheet 13. Creating a Presentation 14. Finalizing a Presentation 15. Creating a Database 16. Finalizing a Database 17. Networks 18. Working with E-mail 19. Browsing the Web 20. Computer Risks and Benefits 21. Projects

    Monday, February 9, 2009

    Android Essentials or Practical Web 2 0 Applications with PHP

    Android Essentials

    Author: Chris Haseman

    This book covers the essential information required to build an Android application. It will help any developer, amateur, professional, or dabbler who is interested in developing for Android.



    New interesting textbook: Perinatal Stress Mood and Anxiety Disorders or Instyle Secrets of Style

    Practical Web 2. 0 Applications with PHP

    Author: Quentin Zervaas

    and thought I would post a quick review here. In this book the author takes us through creating a web application from concept to deployment. The ?Web 2.0? application used here is a blogging application supporting images, tagging, microformats and geographical data. To speed development existing libraries and frameworks are used including Zend framework, PEAR and Smarty on the server side and prototype and script.aculo.us on the client side. Chapter five is entirely dedicated to introducing the javascript libraries. Through the rest of the book the application is slowly built up. With a book like this it is easy to criticise the decisions taken. There are almost as many different ways to create a functioning web application as there are people developing them. This book can only ever present one approach to application development and it does this well. The book is dominated by code, as would be expected, but the supporting text is informative and easy to follow. Overall it is a solid introduction to putting together a complete web application with some real gems. The chapters on google maps and deployment I found to be particularly good. If you?re considering purchasing this book be sure to check out the publishers site as they have a sample chapter freely available for download.

    Sunday, February 8, 2009

    Devil May Cry 4 or Windows Server 2008 Bible

    Devil May Cry 4: Prima Official Game Guide

    Author: Dan Birlew

    •Complete step-by-step mission analyses, illustrated with maps and screenshots.
    •All hidden items and secret missions are exposed, with tips for completing strenuous side challenges.
    •Complete lists of bonus modes, attack combos, and other extras.
    •Full charts explore the mission ranking system, giving players the details and the exact scores needed to get the highest rank.



    Books about: Living with Rheumatoid Arthritis or Nearly Departed

    Windows Server 2008 Bible

    Author: Jeffrey R Shapiro

    This version of the Server Bible will be the largest yet, catering to what is certainly the most advanced operating system introduced by Microsoft. The book will cater to the needs of the server administration community and will be designed to be a critical reference. The book will extensively cover the most notable new feature of Windows Server known as the "Server Core." Server Core is a significantly scaled-back installation where no graphical shell (explorer.exe) is installed, and all configuration and maintenance is done entirely through the command-line windows, or by connecting to the machine remotely using Microsoft Management Console. Server Core will also not include the .NET Framework, Internet Explorer or many other features not related to core server features. A Server Core machine can be configured for four basic roles: Domain controller, DNS Server, DHCP Server, and file server. Chapters on setup and installation will also cover the new componentized operating system Image-based setup and deployment tools, using WIM.
    In addition to the already extensive Active Directory support this book will now fully cover the "Read-Only Domain Controller" operation mode in Active Directory, intended for use in branch office scenarios where a domain controller may reside in a low physical security environment, was introduced in Windows Server 2003 R2 and will be extended in the 2008 version. Chapters covering policy-based networking, branch management and enhanced end user collaboration will be extended. Windows Server 2008 will also ship Internet Information Services 7 and the current chapters on IIS will thus be extended. Coverage of Windows SharePoint Services 3.0 willalso be introduced into this part of the book. We will also include coverage of the improved hot patching technology, which is a feature that allows non-kernel patches to occur without the need for a reboot.
    A significantly upgraded Terminal Services component, supporting RDP 6.0. will be covered in the chapter on terminal services. The most notable improvement is the ability to share a single application over a Remote Desktop connection, instead of the entire desktop. This will be added to an already extended chapter on this remote access technology. In addition to these new features the book will also carry over existing features brought over from (SP1/R2) of Server 2003. These include covering of new security features of the operating system, Group Policy management, change control and service level, and administration practices.



    Saturday, February 7, 2009

    Python For Dummies or Photoshop Elements 5 for Windows

    Python For Dummies

    Author: Aahz Maruch

    Python is one of the most powerful, easy-to-read programming languages around, but it does have its limitations. This general purpose, high-level language that can be extended and embedded is a smart option for many programming problems, but a poor solution to others.

    Python For Dummies is the quick-and-easy guide to getting the most out of this robust program. This hands-on book will show you everything you need to know about building programs, debugging code, and simplifying development, as well as defining what actions it can perform. You’ll wrap yourself around all of its advanced features and become an expert Python user in no time. This guide gives you the tools you need to:



    • Master basic elements and syntax

    • Document, design, and debug programs

    • Work with strings like a pro

    • Direct a program with control structures

    • Integrate integers, complex numbers, and modules

    • Build lists, stacks, and queues

    • Create an organized dictionary

    • Handle functions, data, and namespace

    • Construct applications with modules and packages

    • Call, create, extend, and override classes

    • Access the Internet to enhance your library

    • Understand the new features of Python 2.5



    Packed with critical idioms and great resources to maximize your productivity, Python For Dummies is the ultimate one-stop information guide. In a matter of minutes you’ll be familiar with Python’s building blocks, strings, dictionaries, and sets; and be on your way to writing theprogram that you’ve dreamed about!



    Interesting textbook: Scots and Their Fish or Favorite Family Recipes

    Photoshop Elements 5 for Windows (Visual QuickStart Guide Series)

    Author: Jeff Carlson

    Photoshop Elements is geared for business users, students, educators, and home users who want professional-looking images for their print and Web projects, but don't want or need the advanced power of Adobe Photoshop. With Photoshop Elements 5 for Windows: Visual QuickStart Guide, readers can start reading from the beginning of the book to get a tour of the interface and start with image-editing basics, or they can look up specific tasks to learn just what they need to know. This task-based, visual reference guide uses step-by-step instructions and plenty of screenshots to show readers how to capture photos from traditional or digital cameras, reduce red eye, correct color, work with layers, erase backgrounds, create photo-illustrations and Web graphics, simulate painting and drawing techniques, apply artistic effects, and more.

    Newly updated to cover Photoshop Elements 5, it details the hottest new features: new advanced color and lighting controls, new customizable layouts, Flash-based web photo galleries, the new Flipbook feature, which lets you string together a series of still photos to create an eye-catching and fun flipbook, and the ability to download and edit photos directly from your mobile phone or handheld device. Both beginning and advanced users will find what they need here--in straightforward language and with readily accessible examples.



    Friday, February 6, 2009

    Cyberspace Law or Powering Office 2003 with XML

    Cyberspace Law: Cases and Materials

    Author: Raymond S Ku

    Early adopters of CYBERSPACE LAW: Cases and Materials were particularly pleased by how flexible, coherent, and practical the book is. Now strengthened and scrupulously updated for its Second Edition, this engaging casebook can help your students understand one of the most dynamic areas of law.

    Written and structured for maximum effectiveness, the book:

  • can be used successfully in both introductory and advanced courses
  • uses practical, classroom-tested їreal worldї problems to help students apply existing rules to cyberspace law
  • features a flexible, logical organization that allows instructors to emphasize selected perspectives
  • is designed for currency, with materials organized around competing approaches and theories for any given issue, rather than current leading cases
  • presents current Internet law as well as related policy concerns that will drive future legal analysis when new issues emerge—the only casebook to address both areas
  • offers a balanced presentation of competing approaches and theories for each issue
  • provides a sophisticated analysis of cutting-edge legal issues through an excellent selection of cases
  • simplifies class preparation with an extremely thorough Teacher's Manual that includes discussions of cases, teaching suggestions, and analysis of the issues raised by the problems
  • remains up-to-date with postings of new cases and important developments on the author website Look for these important changes in the Second Edition: ї new co-author Jacqueline Lipton, who brings significant teaching and writing experience in the areas of international and comparative law ї new and updated cases, including:Grokster, ACLU v. Ashcroft, U.S. v. American Library Association, Chamberlain v. Skylink, Lexmark v. Static Control Components, U.S. v. Elcomsoft, 321 Studios v. MGM Studios, Kremen v. Cohen, Blizzard v. Bnet, In re Verizon, Bosley v. Kremer, and People for the Ethical Treatment of Animals v. Doughney ї treatment of important developments, such as political cybersquatting legislation enacted in some states (for example, California's Political Cyberfraud Abatement Act) and changes to privacy laws enacted following the Patriot Act ї greatly expanded international coverage, including new international cases: ї Sony v. Stevens ї Telstra v. Desktop ї Gutnick v. Dow Jones ї recent Canadian cases on Internet defamation issues ї decisions from the European Court of Justice interpreting the database directive in 2004, including the appeal in British Horseracing Board v. William Hill ї various developments between French and Californian courts in Yahoo litigation regarding Nazi memorabilia as well as domestic legislation implemented by all E.U. member states which complies with the requirements of the Copyright Directives ї new section on the failed effort at private self-governance sponsored by ICANN and the scholarship surrounding that effort ї jurisdictional materials in the chapter on Regulating Cyberspace are consolidated for easier teaching and learning ї updated problems and notes When you consider casebooks for your next course, be sure to examine CYBERSPACE LAW: Cases and Materials, Second Edition, the cohesive, realistic, and accessible alternative.



    Look this: Liderança e Futuring:Visões Fazem Acontecem

    Powering Office 2003 with XML (Power Pack Series)

    Author: Peter G Aitken

    Find out how to



    • Understand XML specification and schemas

    • Set up and complete InfoPathTM forms

    • Design new forms from XML data files

    • Debug InfoPath scripts

    • Tackle real-world problems with the help of case studies

    • Work with data in each of the XML-supported Office applications



    You don’t need to be a programmer to enhance Office with XML

    XML support for Microsoft® Office 2003 has taken interoperability to a new level. Now you can share data among Office applications, across platforms, and over the Internet using built-in XML tools. In this clearly organized volume, Peter Aitken helps you define and standardize document data structure within your organization using XML. He explains XML technology, walks you through designing templates with InfoPath, and shows you how to use the XML tools built into Word, Excel, Access, and FrontPage® to facilitate data exchange throughout your enterprise.

    "...the real-world case studies are practical, offering detailed solutions to the scenarios outlined. I would recommend this book to anyone who plans to leverage the features found in the Office System 2003 for their business."
    —Dave Beauchemin, Microsoft MVP

    CD-ROM Includes



    • Trial versions of John Walkenbach’s Power Utility Pak, HotDog Professional, WinRARTM, and many others

    • Demo versions of BBEdit®, XML Pro, and more

    • Exclusive Office 2003 Super Bible eBook, with more than 500 pages ofinformation about how Microsoft Office components work together

    • Valuable author files and examples




    Table of Contents:
    Preface
    Pt. IEnhancing Office with XML
    Ch. 1Office and XML Technology3
    Ch. 2What Is XML?13
    Pt. IIGetting Going with XML and InfoPath
    Ch. 3Introduction to InfoPath23
    Ch. 4Designing InfoPath Forms, Part 149
    Ch. 5Designing InfoPath Forms, Part 279
    Ch. 6Scripting with InfoPath107
    Pt. IIIXML and Other Office Applications
    Ch. 7Word and XML135
    Ch. 8Excel and XML159
    Ch. 9Access and XML185
    Ch. 10FrontPage and XML207
    Pt. IVCase Studies
    Ch. 11Connecting Word and InfoPath227
    Ch. 12Connecting Excel and InfoPath245
    Ch. 13Connecting Access and InfoPath267
    Ch. 14Connecting FrontPage and InfoPath289
    Ch. 15Connecting Word and FrontPage299
    Ch. 16Connecting Web Publishing and InfoPath311
    App. A: What's on the Companion CD-ROM329
    App. BXML Fundamentals and Syntax335
    App. CData Modeling with XSD Schemas351
    App. DXSLT and XPath375
    Index401
  • Thursday, February 5, 2009

    Jython Essentials or Designing for Virtual Communities in the Service of Learning

    Jython Essentials: Rapid Scripting in Java

    Author: Samuele Pedroni

    Jython is an implementation of the Python programming language written in 100% pure Java, so it runs under any compliant Java Virtual Machine. The secret to Jython's popularity lies in the combination of Java's libraries and tools, with Python's rapid development capabilities. With Jython, you can write Python programs that integrate seamlessly with any Java code. And like Python, Jython can be used interactively, so you can get immediate results as you are programming. Jython Essentials provides a solid introduction to the Python language, offering a brief but thorough tour of the Python concepts you'll need to understand to use Jython effectively. The book makes frequent comparisons between Python and Java, with special emphasis on the different object-oriented semantics of the two languages, so Java programmers can quickly get up to speed with Jython. Jython Essentials also covers the various ways in which Jython and Java can interact. For example, Jython code can create instances of preexisting Java classes and call methods in those instances. You can write Jython classes that are direct subclasses of existing Java classes and use introspection to discern the capabilities of JavaBeans components. This book provides examples of how to use Jython with existing Java libraries, including the Swing GUI toolkit, the JDBC database API, the Servlet API, and various XML tools. And finally, the book shows how Jython can be used as a scripting language within a Java program. With Jython Essentials, you have everything you need to start creating applications that mix the best of Python's interactivity and Java's robust libraries.



    Table of Contents:
    Foreword
    Preface
    1Introduction to Jython1
    2Jython Basics16
    3Jython Control Flow46
    4Modules and Functions66
    5Object-Oriented Jython83
    6Using Java from Jython104
    7Inheriting from Java120
    8Reflection and JavaBeans131
    9Using Swing144
    10Using Java Libraries161
    11Jython Standard Library178
    12Embedding Jython Inside Java203
    13Compiling Jython218
    AInstalling Jython231
    BJython Options and Registry234
    CJython Exceptions240
    DJython and CPython Differences244
    EJava-to-Python Quick Reference250
    Index257

    Books about: Is There a God in Health Care or 100 Questions and Answers about Your Childs Attention Deficit Hyperactivity Disorder

    Designing for Virtual Communities in the Service of Learning

    Author: Sasha A Barab

    This volume explores the theoretical, design, learning, and methodological questions relevant to designing for and researching web-based communities to support the learning process. Coming from diverse academic backgrounds, the authors examine what we do and do not know about the processes and practices of designing communities to support educational processes. Taken as a collection, the chapters point to the challenges and complex tensions that emerge when designing for a web-supported community, especially when the focal practice of the community is learning.



    Tuesday, February 3, 2009

    Build Your Own Car PC or Cubase SX 3

    Build Your Own Car PC

    Author: Gavin D J Harper

    Everything you need to expertly install car PCs

    This is a heavily-illustrated, step-by-step guide to installing and controlling a car PC -- using commonly-available, off-the-shelf components. Numerous how-to photos and product shots allow you to easily navigate each step even if you have little "do it yourself" experience.

    • Includes parts and required tool lists, troubleshooting tips, and a list of manufacturers where you can purchase the parts best suited for your customized system
    • Companion website offers free software and demo versions of products to use with your car PC

    Gavin Harper is a member of a number of car clubs and online automobile hobbyist/enthusiast groups. He writes regularly for VIAarena.com, and started their Car PC Forum. Author of 50 Awesome Auto Projects for the Evil Genius (also from McGraw-Hill), as well as other forthcoming titles in the Evil Genius series, he has been building car computers and other automotive projects for years. He lives in Essex, United Kingdom.



    Table of Contents:

    Foreword

    Preface

    Acknowledgments

    Chapter 1: Why would I want to build a Car PC?

    Chapter 2: Buying your components

    Chapter 3: Building Your Car PC base unit

    Chapter 4: Installing the operating system, motherboard drivers and front end

    Chapter 5: Connecting your Car PC to the "Real World"

    Chapter 6: On-board diagnostics

    Chapter 7: In-car speech recognition

    Chapter 8: Killer software applications for your Car PC

    Chapter 9: Getting more out of your Car PC

    Chapter 10: In-Car GPS

    Epilogue

    Appendix A

    Appendix B

    Appendix C

    Appendix D

    Index

    About the Author

    Go to: Six Sigma Distribution Modeling or How to Do Everything with Microsoft Office Infopath 2003

    Cubase SX 3 (Ignite! Series)

    Author: Eric Grebler

    Get ready to understand, use, and explore the world of music sequencing with this one-stop guide to Cubase SX 3. This introductory book provides you with a solid foundation of Steinberg's powerful digital music production software. With "Cubase SX 3 Ignite!", you'll examine the many different tools Cubase has to offer. Screenshots and step-by-step instructions guide you through the various new features in SX 3. Hands-on exercises help you take your skills to the next level. From setting up SX on your computer to learning about VST connections and MIDI maps, you'll be up and running within Cubase in no time!



    Monday, February 2, 2009

    Pro MSMQ or Microsoft Expression Web

    Pro MSMQ: Microsoft Message Queue Programming

    Author: Arohi Redkar

    This book explores MSMQ so that you can initiate robust, asynchronous communication between applications. MSMQ provides three APIs to incorporate message queuing into different applications. These APIs include "C" from unmanaged C/C++ code; a COM component from VB or C++ code; and the System.Messaging namespace, which integrates MSMQ with managed C# or VB .NET applications.

    This is the only book on the market to cover all three APIs. Plus, this book discusses the newest features of MSMQ 3.0 (released with Windows Server 2003), and explains sending and receiving MSMQ messages on a PocketPC device.

    Author Info:
    Arohi Redkar is a software designer. She has a master's degree in software engineering from National University. She has worked extensively in the .NET environment and has a passion for studying human aspects of user interface design.

    et al. - Other authors also contributed to writing this book.



    Table of Contents:
    Ch. 1Introducing message queuing1
    Ch. 2System.Messaging55
    Ch. 3Administration137
    Ch. 4Transactional messaging211
    Ch. 5MSMQ triggers235
    Ch. 6MSMQ COM and win32 API269
    Ch. 7Msmq 3.0303
    Ch. 8MSMQ on pocket PC361

    New interesting book: What You Really Need to Know about Moles and Melanoma or Rainforest Remedies

    Microsoft Expression Web: Learn Expression Web the Quick and Easy Way! (Visual QuickStart Guide Series)

    Author: Nolan Hester

    Get a jump start on using this brand-new Web creation tool from Microsoft. Built from the ground up using current Web standards, Expression Web make it easy to create pages that look good in all browsers. Mirroring the program’s focus on standards, the book shows you how to use Cascading Style Sheets to build consistent, easy to navigate  designs. CSS newcomers will welcome the plain-spoken approach to a sometimes intimidating topic. Old hands at CSS will find plenty of tips on using Expression Web’s many style tools, which are some of the best available in any Web creation program. 

    Packed with more than 600 screenshots, the book goes beyond crafting good-looking single pages. Instead, it shows you how to use templates to generate whole sites with uniform, yet creative, layouts that can be reconfigured with the click of a button. You’ll also learn how to give sites extra polish with interactive behaviors and forms.  Microsoft Expression Web: Visual Quickstart Guide contains exactly what you need to get started building standards-compliant Web sites using this powerful tool.



    Sunday, February 1, 2009

    Power Tools for Synthesizer Programming or Print Like a Pro

    Power Tools for Synthesizer Programming: The Ultiumate Reference for Sound Design

    Author: Jim Aikin

    From hit records to home studios, synthesizers are used in almost every genre of music. This book fills the know-how gap left by skimpy or garbled owner's manuals. It maps out the components of contemporary synths in clear, concise detail, and discusses how they can be harnessed to achieve specific musical effects. Each chapter presents hands-on projects that help musicians hone their skills. The companion CDROM contains audio examples that teach programming techniques.



    New interesting textbook: Savour the Pacific or Cooking Alaska Style

    Print Like a Pro: A Digital Photographer's Guide

    Author: Jon Canfield

    Are you struggling to get good prints from your images? Are your digital photos hogging your hard drive instead of hanging out in snappy albums and archives? Looking for ways to improve your prints beyond simple snapshots?

    The popularity and convenience of digital photography has led to more pictures being taken, but fewer being turned into beautiful prints, framed, put in photo albums, and shared with others. The majority of users do nothing with their images for two reasons: the results are disappointing and the process of improving and preparing images for print is daunting. Written by popular photographer, columnist, and digital imaging expert Jon Canfield, this book shows you how to easily enhance and prepare your digital images for printing. Step-by-step instructions and tutorials coupled with full-color images and screenshots explain how to use Photoshop CS2 or Elements for color management and correction; editing images for printing, including properly sizing, sharpening, and converting to monochrome; to fix lighting; and more. You'll also learn how to take your printing to the next level by: using different print technologies, papers, and inks; selecting Raster Image Processors; framing and mounting their prints; self-publishing; and effectively working with print services for the best output possible.



    Table of Contents:
    1Understanding digital reproduction1
    2Setting up a print studio19
    3Keeping an eye on color47
    4Using printer settings75
    5Editing your photos115
    6Resizing and sharpening your images155
    7Printing your files203
    8Creating special print projects233
    9Working with service providers275
    10Presenting your work285