Saturday, January 31, 2009

Design to Sell Using Microsoft Publisher to Inform Motivate and Persuade or Visio 2007 Bible

Design to Sell Using Microsoft Publisher to Inform, Motivate and Persuade: Use Microsoft Publisher to Plan, Write and Design Great Marketing Pieces

Author: Roger C Parker

Not a designer? Don't have a big marketing budget? Now you can design effective marketing materials yourself with this guide written by best-selling author and design expert Roger C. Parker. This one-stop guide to marketing gives you the basics for creating effective messages and step-by-step instruction for using Publisher 2003 to design compelling, easy-to-read marketing materials that deliver your message successfully.

Even if you're not a designer or you have no marketing experience, you'll get expert advice and learn how to:

  • Develop a market empathy, think like your market, and solve their problems using their language
  • Format your message so it's attractive and easy to read-by taking a crash course in graphic design
  • Save time and money by using Publisher to create several different types of effective marketing pieces-including postcards to promote your business and newsletters that keep you in touch with your customers
  • Use techniques for quickly harnessing powerful Publisher capabilities
  • Do it right from the start and avoid common pitfalls and design mistakes

Each chapter includes an interactive exercise as well as review questions with answers on the author's companion Web site. Also on the Web site are downloadable worksheets and templates, more illustrations of the projects in the book, additional before-and-after project makeovers, and other resources.



Look this: Women in Medieval English Society or Innovation New Technologies

Visio 2007 Bible

Author: Bonnie Biafor

Whether you’re designing a network, a business plan, or an office building, Visio 2007 can transform your vision into sophisticated diagrams and drawings and this comprehensive reference shows you how. You’ll discover how to use Visio for IT, architecture, engineering, and business projects; explore the new features of Visio 2007; learn to publish Visio diagrams to the Web; and much more. If you want to develop your skills in Visio, this is the book you need to succeed.



Table of Contents:
Acknowledgments.

Introduction.

Part I: Understanding Visio Fundamentals.

Chapter 1: Getting Started with Visio.

Chapter 2: Getting Started with Drawings.

Chapter 3: Working with Visio Files.

Chapter 4: Working with Shapes.

Chapter 5: Connecting Shapes.

Chapter 6: Working with Text.

Chapter 7: Enhancing Diagram Appearance with Formatting.

Part II: Integrating Visio Drawings.

Chapter 8: Inserting, Linking, and Embedding Objects.

Chapter 9: Importing, Exporting, and Publishing to the Web.

Chapter 10: Linking Shapes with Data.

Part III: Using Visio for Office Productivity.

Chapter 11: Collaborating with Others.

Chapter 12: Building Block Diagrams.

Chapter 13: Constructing Charts and Graphs.

Chapter 14: Working with Organization Charts.

Chapter 15: Building Visio Flowcharts.

Chapter 16: Documenting Processes, Workflows, and Data Flows.

Chapter 17: Scheduling Projects with Visio.

Chapter 18: Documenting Brainstorming Sessions.

Chapter 19: Analyzing Results with PivotDiagrams.

Part IV: Using Visio in Information Technology.

Chapter 20: Modeling and Documenting Databases.

Chapter 21: Building UML Models.

Chapter 22: Building Software Development Diagrams.

Chapter 23: Mapping Web Sites.

Chapter 24: Creating Network Diagrams.

Part V: Using Visio for Architecture and Engineering.

Chapter 25: Working with Scaled Drawings.

Chapter 26: Creating and Managing Scaled Drawings.

Chapter 27: Laying Out Architectural and Engineering Plans.

Chapter 28: Planning Space and Managing Facilities.

Chapter 29: Integrating CAD and Visio.

Chapter 30: Working with Engineering Drawings.

Part VI: Customizing Stencils, Templates, and Shapes.

Chapter 31: Creating and Customizing Templates.

Chapter 32: Creating and Customizing Stencils.

Chapter 33: Creating and Customizing Shapes.

Chapter 34: Customizing Shapes Using ShapeSheets.

Chapter 35: Formatting with Styles.

Chapter 36: Customizing Toolbars and Menus.

Chapter 37: Automating Visio.

Part VII: Quick Reference.

Chapter 38: Installing Visio 2007.

Chapter 39: Visio Help Resources.

Chapter 40: Additional Resources for Templates and Stencils.

Chapter 41: Keyboard Shortcuts.

Chapter 42: Template and Stencil Reference.

Index.

Friday, January 30, 2009

Google Apps or Professional Web Design

Google Apps: The Missing Manual

Author: Nancy Conner

Among its many amazing applications, Google now has web-based alternatives to many of the applications in Microsoft Office. This comprehensive and easy-to-follow new book enables you to explore Google's new office applications in detail. Once you do, you'll be in good company—more than 100,000 small businesses and some corporations are already looking to take advantage of these free Google offerings. Google Apps: The Missing Manual teaches you how to use three relatively new applications from Google: "Docs and Spreadsheets," which provide many of the same core tools that you find in Word and Excel; and Google Calendar and Gmail, the applications that offer an alternative to Outlook. This book demonstrates how these applications together can ease your ability to collaborate with others, and allow you access to your documents, mail and appointments from any computer at any location. Of course, as remarkable as these applications are, Google's office suite is definitely a work-in-progress. Navigating what you can and can't do and—more importantly—understanding how to do it isn't always easy. And good luck finding enough help online. Google Apps: The Missing Manual is the one book you need to get the most out of this increasingly useful part of the Google empire. This book: Explains how to create, save and share each of Google's web-based office applications Offers separate sections for Docs and Spreadsheets, Google Calendar, and Gmail Demonstrates how to use these applications in conjunction with one another Gives you crystal-clear and jargon-free explanations that will satisfy users of all technical levels Many of you already use Gmail, but do you knowits full potential? Do youknow how you can increase its power by using Gmail with Doc and Spreadsheets and Google Calendar? You'll find out with Google Apps: The Missing Manual. You'll also come to understand why large corporations such as General Electric and Proctor & Gamble are taking a long, hard look at these applications.



Table of Contents:

The Missing Credits

Introduction

Part I Docs: Google's Productivity Suite

1 Getting Started with Google Apps 3

Signing Up for a Google Account 3

You're All Signed Up-Now What? 9

Managing Your Google Account 12

The Google Toolbar 20

2 Word Processing with Google Docs 41

Before You Start: Browser Requirements 41

Welcome to Google Docs: A Quick Tour 42

Customize Your Setup with Google Docs Settings 47

Getting Your Docs into Google 51

Ready, Set, Write: Working with Documents 56

Editing Documents Offline 79

Sharing and Collaborating on Documents 86

Organizing and Finding Documents 105

3 Working with Docs Spreadsheets 115

Getting Started with Google Docs Spreadsheets 115

Creating a Spreadsheet 116

Formatting a Spreadsheet 126

Adding and Deleting Rows and Columns 129

Working with Multiple Sheets 131

Adjusting Cell Sizes 134

Timesaving Data Entry Tricks 135

Checking Your Spelling 139

Inserting Images 139

Sorting Data 141

Formulas and Functions 145

Labeling Cells and Columns with Range Names 152

Working with Charts 154

Displaying Data with Gadgets 161

Printing a Spreadsheet 163

Deleting a Spreadsheet 166

Sharing and Collaborating on Spreadsheets 166

Turn Back Time: Your Spreadsheet's Revision History 182

4 Creating Slideshow Presentations 185

Getting Started with Google Docs Presentations 185

Creating a Presentation 186

Editing a Presentation 192

Previewing a Presentation 213

Printing a Presentation 213

Deleting a Presentation 215

Sharing and Collaborating on Presentations 216

Turn Back Time: Your Presentation's Revision History 224

Part II Communicating and Scheduling

5 Gmail:Email Google-Style 229

Welcome to Gmail: A Quick Tour 229

Reading and Filtering Email 234

Writing and Sending Email 249

Organizing and Searching Your Email 262

Dealing with Spam 272

Contacts: Your Gmail Address Book 273

Customizing Gmail: Your Settings Options 284

6 Keeping in Touch with Google Talk 295

Getting Started with Google Talk 296

Launching Google Talk Manually 315

Working with Your Friends List 316

Sending and Receiving Messages 321

Transferring Files 326

Inviting Web Site Visitors to Chat with You 329

Signing Out of Google Talk 330

The Google Talk Gadget: Taking Talk with You 331

Google Talk and Gmail 338

Making Free Voice Calls over the Internet 342

7 Tracking Schedules with Google Calendar 349

Getting Started with Google Calendar 349

Creating a Calendar 353

Working with Calendars 375

Using Google Calendar with Other Calendar Programs 394

Google Calendar on the Go 400

Calendar Tricks for Google Apps Users 403

Part III Creating Web Pages

8 iGoogle: Google Your Way 411

Creating an iGoogle Page 411

Customizing iGoogle 414

Customizing, Sharing, and Creating Gadgets 429

Organizing iGoogle Pages with Tabs 437

Making iGoogle Your Home Page 442

iGoogle and Google Applications 445

9 One-Click Web Design with Page Creator 447

Getting Started with Page Creator 447

Creating Your First Web Page 450

Site Manager 452

Editing and Designing Web Pages 456

Publishing a Web Page 473

Creating Multiple Web Sites 477

Part IV Google Apps for Organizations

10 Putting Google Apps to Work 481

Signing Up for Google Apps 482

Signing In and Learning Your Way Around 498

Customizing Your Domain 507

Adding Users 526

Getting Started with Email 533

Adding Domain Aliases 539

Getting Support 540

11 Administering Google Apps 545

Managing Users 545

Managing Apps 555

Managing Your Domain 588

12 Bring Your Team Together with Google Sites 593

Signing In and Creating a Site 593

Adding Content to Your Pages 599

Moving a Page Within the Site 633

Change Notifications: Finding Out What's New 634

Printing a Page 635

Adjusting a Page's Settings 635

Deleting a Page 636

Customizing Your Site 636

Managing Your Sites 644

13 Beefing Up Google Apps 657

The Google Solutions Marketplace 657

Google Apps APIs 663

Part V Appendix

Appendix Keyboard Shortcuts 673

Index 681

New interesting book: Saving Your Skin or Tamilee Webbs Defy Gravity Workout

Professional Web Design: Techniques and Templates (CSS and XHTML)

Author: Clint Eccher

Whether you are an intermediate Web designer looking to take your sites to the next level or a more experienced designer looking to improve your professional skills, you will find the tools to meet your needs in Professional Web Design: Techniques and Templates, Second Edition. This completely updated version of the best-selling book features the 50 professional-quality, license-free Web design templates from the original, as well as 15 new templates, all of which can be easily customized and extended. Each ready-to-use design includes a homepage, and one second-level page, and the framework to build subsequent pages. All of the specific techniques that are required for building these and other highly usable sites have been updated to cover the latest technologies, including HTML, XHTML, JavaScript, CSS, Photoshop CS, and PHP. Also included are five new HTML e-mail templates, an increasingly important marketing tool. Detailed tutorials and hands-on projects teach both basic and sophisticated design concepts, including how to create designs for low, medium, or high content sites and the strengths and weaknesses of each. The new edition also includes four new chapters on Cascading Style Sheets, using client-side scripting, creating dynamic sites, and an overview of the new Web designs. It covers important topics such as client- and server-side scripting, security, and using databases to update a site's content.
 
KEY FEATURES
* Covers the entire design process, from gathering requirements and creating a comp, to enhancing usability, designing for scalability, developing architecture, and simplifying navigation
* Explains technical and aesthetic graphics issues, from when to use GIF or JPEG images to which design will best suit your content
* Teaches you how to upload your site to a server and test for compatibility with Web browsers
 
On The CD-ROM
* EXAMPLES - Includes all of the samples from the book
* SOFTWARE - Includes an Open Source Web server package (containing Apache, MySQL, PHP, and Perl), trial versions of Adobe Photoshop CS and Macromedia Dreamweaver MX 2004, and JavaScript CD Cookbook 3rd Edition and The HTML/CSS Developer's Resource Guide software
* WEB SITE TEMPLATES - Provides the 50 license-free, ready-to-use templates from the original edition, 15 new templates, and 5 HTML e-mail templates
 
SYSTEM REQUIREMENTS
PC: 600 MHz Intel Pentium III processor or equivalent; Windows 98 SE (4.10.2222 A), Windows 2000, Windows XP, or Windows Server 2003; 192MB RAM (256 MB recommended); 280MB available disk space; Color monitor with 16-bit color or greater video card; 1024x768 or greater monitor resolution; CD-ROM drive; MAC: Mac OS X 10.2.6 and later, 10.3; 500 MHz Power PC G3 processor; 192MB computer RAM (256MB recommended); 320MB available disk space; Color monitor with 16-bit color or greater video card; 1024x768 or greater monitor resolution; CD-ROM drive

Booknews

This book/CD-ROM package presents 50 ready-to-use, license-free Web design templates; the source files are on the CD-ROM along with two free software packages and demo versions of third party software. Coverage includes the entire design process and the technical issues. Numerous projects and case studies help readers—beginners to intermediate level—develop and enhance their skills. Eccher is an experienced Web designer. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Thursday, January 29, 2009

Guide to Elliptic Curve Cryptography or Software Architect Bootcamp

Guide to Elliptic Curve Cryptography

Author: Darrel R Hankerson

A broad-ranging expository guidebook on EEC cryptosystems and technology, written by leading EEC researchers and authorities. All aspects of the topic are clearly presented (accessible technical level, i.e., B.S. degree), with plenty of supporting real-world examples. An essential reference for practitioners or professionals in computer science, computer engineering, network design, and network/data security, as well as a useful self-study resource for researchers.



Table of Contents:
List of Algorithms
List of Tables
List of Figures
Acronyms
Preface
1Introduction and Overview1
2Finite Field Arithmetic25
3Elliptic Curve Arithmetic75
4Cryptographic Protocols153
5Implementation Issues205
ASample Parameters257
BECC Standards267
CSoftware Tools271
Bibliography277
Index305

New interesting book: Fundamentals de Dirección de Inversión con S&P ligan - en tarjeta

Software Architect Bootcamp

Author: Mowbray

  • Become a great software architect—hands-on!
  • Define architectures that leverage today's best design patterns
  • Maximize scalability and technical flexibility
  • Lead your technical organization to successful implementation

Your hands-on "field manual" for becoming a great software architect!

This hands-on "field manual" gives developers the essential skills they need to survive and thrive as software architects! You'll find insightful, real-world coverage of everything from design patterns to prototyping, business case development to leadership.

Leading software architects Raphael Malveau and Thomas Mowbray share profound insights and practical solutions for all the key challenges of architectures using objects, components, and distributed Internet computing, showing how to avoid time-consuming pitfalls and costly errors. You'll master proven methods for:

  • Identifying the best architectural model for any project
  • Executing heavyweight or lightweight approaches to software architecture
  • Addressing scalability and long-term business flexibility
  • Making the most of abstraction, refactoring, and architectural prototyping
  • Leveraging superior design patterns to improve your implementations

With hands-on exercises, real-life war stories, and a take-no-prisoners attitude, Software Architect Bootcamp won't just help you become a great software architect: it'll help you become a true technical leader of your organization.



Tuesday, January 27, 2009

Secure Coding in C and C or Edisons Eve

Secure Coding in C and C++

Author: Robert C Seacord

The CERT Coordination Center (CERT/CC) was formed by the Defense Advanced Research Projects Agency (DARPA) in November 1988 in response to the Morris worm incident, which brought ten percent of Internet systems to a halt in November 1988. The CERT/CC is located in Pittsburgh, Pennsylvania, at the Software Engineering Institute (SEI), a federally funded research and development center sponsored by the U.S. Department of Defense.

The initial focus of the CERT/CC was incident response and analysis. Incidents include successful attacks such as compromises and denial of service, as well as attack attempts, probes, and scans. Since 1988, the CERT/CC has received more than 22,665 hotline calls reporting computer security incidents or requesting information, and has handled more than 319,992 computer security incidents. The number of incidents reported each year continues to grow.

Responding to incidents, while necessary, is insufficient to secure the Internet and interconnected information systems. Analysis indicates that the majority of incidents are caused by trojans, social engineering, and the exploitation of software vulnerabilities, including software defects, design decisions, configuration decisions, and unexpected interactions between systems. The CERT/CC monitors public sources of vulnerability information and regularly receives reports of vulnerabilities. Since 1995, more than 16,726 vulnerabilities have been reported. When a report is received, the CERT/CC analyzes the potential vulnerability and works with technology producers to inform them of security deficiencies in their products and to facilitate and track their response to those problems.

Similar to incidentreports, vulnerability reports continue to grow at an alarming rate. While managing vulnerabilities pushes the process upstream, it is again insufficient to address the issues of Internet and information system security. To address the growing number of both vulnerabilities and incidents, it is increasingly apparent that the problem must be attacked at the source by working to prevent the introduction of software vulnerabilities during software development and ongoing maintenance. Analysis of existing vulnerabilities indicates that a relatively small number of root causes account for the majority of vulnerabilities. The goal of this book is to educate developers about these root causes and the steps that can be taken so that vulnerabilities are not introduced.Audience

Secure Coding in C and C++ should be useful to anyone involved in the development or maintenance of software in C and C++.

  • For a C/C++ programmer, this book will teach you how to identify common programming errors that result in software vulnerabilities, understand how these errors are exploited, and implement a solution in a secure fashion.
  • For a software project manager, this book identifies the risks and consequences of software vulnerabilities to guide investments in developing secure software.
  • For a computer science student, this book will teach you programming practices that will help you to avoid developing bad habits and enable you to develop secure programs during your professional career.
  • For a security analyst, this book provides a detailed description of common vulnerabilities, identifies ways to detect these vulnerabilities, practical avoidance strategies.
Organization and Content

Secure Coding in C and C++ provides practical advice on secure practices in C and C++ programming. Producing secure programs requires secure designs. However, even the best designs can lead to insecure programs if developers are unaware of the many security pitfalls inherent in C and C++ programming. This book provides a detailed explanation of common programming errors in C and C++ and describes how these errors can lead to code that is vulnerable to exploitation. The book concentrates on security issues intrinsic to the C and C++ programming languages and associated libraries. It does not emphasize security issues involving interactions with external systems such as databases and web servers, as these are rich topics on their own. The intent is that this book be useful to anyone involved in developing secure C and C++ programs regardless of the specific application.

Secure Coding in C and C++ is organized around functional capabilities commonly implemented by software engineers that have potential security consequences, such as formatted output and arithmetic operations. Each chapter describes insecure programming practices and common errors that can lead to vulnerabilities, how these programming flaws can be exploited, the potential consequences of exploitation, and secure alternatives. Root causes of software vulnerabilities, such as buffer overflows, integer type range errors, and invalid format strings, are identified and explained where applicable. Strategies for securely implementing functional capabilities are described in each chapter, as well as techniques for discovering vulnerabilities in existing code.

This book contains the following chapters:

  • Chapter 1 provides an overview of the problem, introduces security terms and concepts, and provides insight as to why so many vulnerabilities are found in C and C++ programs.
  • Chapter 2 describes string manipulation in C and C++, common security flaws, and resulting vulnerabilities including buffer overflow and stack smashing. Both code and arc injection exploits are examined.
  • Chapter 3 introduces arbitrary memory write exploits that allows an attacker to write a single address to any location in memory. This chapter describes how these exploits can be used to execute arbitrary code on a compromised machine. Vulnerabilities resulting from arbitrary memory writes are discussed in later chapters.
  • Chapter 4 describes dynamic memory management. Dynamically allocated buffer overflows, writing to freed memory, and double-free vulnerabilities are described.
  • Chapter 5 covers integral security issues (security issues dealing with integers) including integer overflows, sign errors, and truncation errors.
  • Chapter 6 describes the correct and incorrect use of formatted output functions. Both format string and buffer overflows vulnerabilities resulting from the incorrect use of these functions are described.
  • Chapter 7 describes common vulnerabilities associated with file I/O including race conditions and time of creation, time of use (TOCTOU) vulnerabilities.
  • Chapter 8 recommends specific development practices for improving the overall security of your C / C++ application. These recommendat the recommendations included in each chapter for addressing specific vulnerability classes.

Secure Coding in C and C++ contains hundreds of examples of secure and insecure code as well as sample exploits. Almost all of these examples are in C and C++, although comparisons are drawn with other languages. The examples are implemented for Windows and Linux operating systems. Unless otherwise stated, Microsoft Windows examples are compiled using Visual C++ .NET and tested on Windows 2000 Professional platform with an Intel Pentium 4 processor while Linux examples are compiled with GNU gcc/g++ and tested running Red Hat Linux 9 on an Intel Pentium 4 processor.

While the specific examples have typically been compiled and tested in one or more of these environments, vulnerabilities are evaluated to determine whether they are specific to or generalizable across compiler version, operating system, microprocessor, applicable C or C++ standards, little or big endian architectures, and execution stack architecture.

This book focuses on programming flaws in C and C++ that are the most common causes of software vulnerabilities. However, because of size and space constraints, not every potential source of vulnerabilities is covered.



Table of Contents:
Preface.
1. Running with Scissors.
Gauging the Threat.
Security Concepts
C and C++.
Development Platforms.
Summary.
For Further Reading.
2. Strings.
String Characteristics.
Common String Manipulation Errors.
String Vulnerabilities.
Process Memory Organization.
Stack Smashing.
Code Injection.
Arc Injection.
Mitigation Strategies.
Notable Vulnerabilities.
Summary.
For Further Reading.
3. Pointer Subterfuge.
Data Locations.
Function Pointers.
Data Pointers.
Modifying the Instruction Pointer.
Global Offset Table.
The .dtors Section.
Virtual Pointers.
The atexit() and on_exit() Functions.
The longjmp() Function.
Exception Handling.
Mitigation Strategies.
Summary.
For Further Reading.
4. Dynamic Memory Management.
Dynamic Memory Management.
Common Dynamic Memory Management Errors.
Doug Lea's Memory Allocator.
RtlHeap.
Mitigation Strategies.
Notable Vulnerabilities.
Summary.
For Further Reading.
5. Integer Security.
Integers.
Integer Conversions.
Integer Error Conditions.
Integer Operations.
Vulnerabilities.
Non-Exceptional Integer Logic Errors.
Mitigation Strategies.
Notable Vulnerabilities.
Summary.
For Further Reading.
6. Formatted Output.
Variadic Functions.
Formatted Output Functions.
Exploiting Formatted Output Functions.
Stack Randomization.
Mitigation Strategies.
Notable Vulnerabilities.
Summary.
For Further Reading.
7. File I/O.
Concurrency.
Time of Check, Time of Use.
Files as Locks and File Locking.
File System Exploits.
Mitigation Strategies.
Summary.
8. Recommended Practices.
Secure Software Development Principles.
Systems Quality Requirements Engineering.
Threat Modeling.
Use/Misuse Cases.
Architecture and Design.
Off-the-Shelf Software.
Compiler Checks.
Input Validation.
Data Sanitization.
Static Analysis.
Quality Assurance.
Memory Permissions.
Defense in Depth.
TSP-Secure.
Summary.
Further Reading.
References.
Acronyms.
Index.

Look this: Cooking with the Original Search Engine or Pick of the Crop Two

Edison's Eve: A Magical History of the Quest for Mechanical Life

Author: Gaby Wood

"Could an eighteenth-century mechanical duck really digest and excrete its food? Was "the Turk," a celebrated chess-playing and -winning machine fabricated in 1769, a dazzling piece of fakery, or could it actually think? Why was Thomas Edison obsessed with making a mechanical doll - a perfect woman, mass-produced? Can a twenty-first-century robot express human emotions of its own?" Taking up themes long familiar from the realms of fairy tales and science fiction, Gaby Wood traces the hidden prehistory of a modern idea - the thinking, hoaxes, and inventions that presaged contemporary robotics and the current experiments with artificial intelligence. Informed by the author's scientific and historical research, Edison's Eve is also a brilliant literary, cultural, and philosophical examination of the motives that have driven human beings to pursue the creation of mechanical life, and the effects of that pursuit - both in its successes and in its failures - on our sense of what makes us human.

The New York Times

Tracing the human fascination with robotics to the sophisticated mechanical toys of the Enlightenment, the author conjures a menagerie of bizarre and quixotic automatons, including chess-playing machines, artificial defecating ducks and Thomas Edison's doomed venture to mass-produce talking dolls.

The New Yorker

Embodying the confusions between what is "lifelike" and what is alive, robots have always held an anxious fascination. When eighteenth-century physicians described the body as a complex piece of machinery, the stage was set for inventors like Jacques de Vaucanson, who thrilled Paris with a flute-playing android, and Wolfgang von Kempelen, whose chess-playing automaton took on the best players of its time. Deftly balancing historical detail with provocative meditations on the reception accorded such marvels, Wood then traces the development of subsequent imitations of life, such as the talking doll designed by Thomas Edison and the magic-filled films of Georges Méliès. Her contention that in the twentieth century human freaks came to seem more uncanny than machines may not entirely persuade, but the exotic particulars -- especially those pertaining to a group of circus midgets called the Doll Family -- more than make up for this inconsistency.

John Glassie - Forbes

Our fear of human cloning and uppity, thinking computers may seem unique to our age, but this book shows that people have been trying to create artificial life, or play God, for a long time. Archytas of Tarentum, a contemporary of Plato, is said to have built a flying wooden pigeon, and Hero of Alexandria created a simulated human that, thanks to a special neck mechanism, defied all attempts at decapitation. Things really got busy in the Age of Reason, when sci-ence began to suggest that men were machines (with souls). In the 1730s, Jacques de Vaucanson built an elaborate flute-playing automaton that actually "breathed" air and delighted Parisian audiences with 12 different melodies. (Diderot saw the show and coined the term "androA de.") He soon topped himself with a mechanical duck that "ate food out of the exhibitor's hand, swallowed it, digested it and excreted it" before the likes of Louis XV and Voltaire. The Hungarian Wolfgang von Kempelen subsequently created a mechanical chess player that toured internationally over many decades, taking on Napoleon (who lost), Catherine the Great (who was disqualified for cheating) and Benjamin Franklin (out-come undocumented). This baffling wooden "Turk" rolled his eyes and moved game pieces with an ingeniously engi-neered arm. It (he) made ladies faint, whipped up widespread philosophical debate about the nature of intelligence and stirred Edgar Allan Poe into writing an exposA in which he asserted, rightly, that a human being had to be inside. Need-less to say, the area between science and spectacle, experiment and amusement, metaphysics and fun has historically been rather gray. There's even evidence that Thomas Edison developed thephonograph as a component for a talking doll he wanted to mass-produce. He did in fact create a metal doll with a tiny phonograph inside, the Eve of this book's title, but it was a huge commercial flop. (Recording technology, on the other hand, has done pretty well.) Simulations of life have always been creepy, if not downright frightening, even when meant to entertain. One day in 1895, in Paris, the first paying audience sat down to experience the Cinematograph. When the moving image of a train came rushing to-ward them, they ran right out of the theater. In the end, the author says, each of these inventions has been "a riddle, a fundamental challenge to our perception of what makes us human." And there are more of them on the way.

Publishers Weekly

In five entertaining chapters, British journalist Wood describes the ways humans have built machines to resemble themselves over the past three centuries. Wood begins with the dynamic creations of the 18th-century Frenchman Jacques de Vaucanson, explaining how his elaborate automatons, most notably a mechanical flute player and a mechanical duck apparently capable of eating and defecating, fascinated onlookers throughout Europe. She then moves to Wolfgang von Kempelen's chess-playing machine, constructed to look like a Turkish gentleman and capable of beating virtually any chess player in the 18th century, and Thomas Alva Edison's unsuccessful attempt to capture the American toy market by incorporating a version of his phonograph into the first talking doll. In her fourth chapter, Wood switches her attention from machines that look like humans to humans who look like machines. To wit, the Doll family: four midgets who toured with Ringling Brothers' Circus and appeared in The Wizard of Oz, in addition to other lesser known Hollywood productions. Some audiences refused to believe the Dolls were alive, assuming instead that they were sophisticated toys. Wood's anecdotes are delightful, though the book as a whole feels somewhat repetitive and short on analysis. She frequently reminds readers that these historical vignettes show the continuous struggle to determine what makes us human, but that's about as far as her commentary goes. (Aug.) Copyright 2002 Cahners Business Information.

Karen Reeds - KLIATT

It quacked like a duck, it flapped like a duck, it even pooped like a duck. So, how was this metal clockwork creature different from a real duck? The question perplexed its 18th-century audiences, and the quest to create imitations of life continues to bemuse and unnerve us. Gaby Wood, a staff writer for the London Observer, leads us through a splendid tour of modern robots, mechanical automata, Edison's talking dolls, Barnum & Bailey's living Doll Family, and the illusionary automata of Kempelen's Chess-Playing Turk, early photographers, movies, and magicians. Her research has turned up a remarkable range of historical and fictional examples of technology simulating life and vice versa. (I only regret the omission of Robertson Davies's use of the Talking Head tradition in The Deptford Trilogy). They are all fascinating in themselves, and her perceptive analysis connects them in wonderful ways. But it is the unfailing grace of Wood's writing and her willingness to put herself into the story that makes this a truly memorable book. Put this into the hands of high-school students as a model of first-rate prose and cultural history. If I were teaching English, history, film, sociology, psychology, philosophy, science, or computers-from middle school through grad school-I'd read parts aloud just for the fun of seeing where the discussion would go. Keep it in mind for adult book groups, too. KLIATT Codes: A-Recommended for advanced students and adults. 2002, Random House, Anchor, 304p. bibliog. index., Ages 17 to adult.

Booknews

Borrowing her title from the name of the talking doll manufactured by Thomas Edison, essayist Wood examines historical automata and the often-anxious reaction of the humans that came into contact with them. Recalling a mechanical duck that digested food; "The Turk," a mechanical chess player (secretly controlled by a human being); and Edison's Eve, she suggests that human reaction to these pre-robotic forms may offer clues to how we as a species will deal with the advent of advanced robotics and artificial intelligence. Annotation c. Book News, Inc., Portland, OR

Kirkus Reviews

British journalist Wood profiles roboticists with castration complexes and other men, both real and fictional, who thought they might somehow be able to create life. From Icarus to Dr. Frankenstein and beyond, these inventors display a mechanical ingenuity that appeals to the author almost as much as the Freudian aura of all their endeavors. Despite the title, Wood's favorite seems to be Jacques de Vaucanson, a French designer who crafted bizarre automata in the mid-18th century. His moving musicians on pedestals were the toast of Europe (one flutist had a 12-song repertoire), but his crowning achievement was a quacking, waddling, clockwork duck that could gobble up bits of food and, after an appropriate interval, defecate. By the time it was revealed that possibly green-dyed breadcrumbs were stored within the duck for effective release, Vaucanson had moved on to revolutionize French silk manufacture. Mechanical humanoids that could write poetry, play chess, tell fortunes, etc., may not have much in common with today's software-driven laboratory robots, but Wood finds the sentiments of compulsion and fascination ("They register emotions but do they realize what emotions they're registering?") to be a constant passed from tinkerer to cyberneticist. She has her way with Thomas Edison, finding the Wizard of Menlo Park to be an opportunistic misogynist who stuffed his newly minted phonograph into the body of a "talking doll" that sold for $10, about a week's wages for a factory worker. In the same vein, she introduces an obscure French novel whose Edison-like protagonist creates the perfect woman for a love-crazed client, annotating it with quotations from the real Thomas A. to buttress hercontention that he looked at a woman and saw a product that could be improved. A rigorously researched, clever, and obliquely feminist look at what happens over the ages when the Pygmalion complex is closeted in a well-equipped workshop.



Monday, January 26, 2009

31 Days Before Your CCNA Exam or Kismet Hacking

31 Days Before Your CCNA Exam: A Day-by-Day Review Guide for the Cisco Networking Academy Program Student (Cisco Networking Academy Program Series)

Author: Scott Bennett

If you have completed or are about to complete the four courses of the CCNA version 3.1 curriculum in the Cisco Networking Academy Program, you are ready to make your knowledge official with a CCNA certification. 31 Days Before Your CCNA Exam offers you a personable and practical way to understand the certification process and commit to taking the 640-801 CCNA certification exam while the course material is fresh in your mind.

Use the day-by-day guide and checklist to organize, prepare, and review. The best motivation for studying is scheduling an actual test date, so sign up and declare, "I am going to take the CCNA exam in 31 days, and this is what I will do to prepare leading up to the exam."

Each day in this guide breaks down an exam topic into a manageable bit of information to review using short summaries from relevant parts of the four Networking Academy CCNA courses.

The features of the book empower you to fit exam preparation into an otherwise busy schedule:

  • -Visual calendar summarizing each day's study topic
  • -Checklist providing advice for preparation activities leading up to the exam
  • -Description of the 640-801 CCNA exam and how to sign up for it, including how to use a course voucher
  • -Strategies to be mentally, organizationally, and physically prepared for exam day
  • -Conversational tone, which makes your study time more enjoyable



Table of Contents:
Pt. I31-24 days before the exam - technology1
Day 31 : describe network communications using layered models3
Day 30 : describe the spanning tree process11
Day 29 : compare and contrast key characteristics of LAN environments15
Day 28 : evaluate the characteristics of routing protocols19
Day 27 : evaluate the TCP/IP communication process and its associated protocols27
Day 26 : describe the components of network devices35
Day 25 : evaluate rules for packet control39
Day 24 : evaluate key characteristics of WANs43
Pt. II23-18 days before the exam - planning and design47
Day 23 : design a simple LAN using Cisco Technology49
Day 22 : design an IP addressing scheme to meet design requirements57
Day 21 : select an appropriate routing protocol based on user requirements63
Day 20 : design a simple Internetwork using Cisco Technology69
Day 19 : develop an access list to meet user specifications73
Day 18 : choose WAN services to meet customer requirements77
Pt. III17-9 days before the exam - implementation and operation87
Day 17 : configure routing protocols given user requirements89
Day 16 : configure IP addresses, subnet masks, and gateway addresses on routers and hosts99
Day 15 : configure a router for additional administrative functionality105
Day 14 : configure a switch with VLANs and interswitch communication113
Day 13 : implement a LAN121
Day 12 : customize a switch configuration to meet specified requirements and manage system image and device configuration files (two objectives)125
Day 11 : perform an initial configuration on a router and perform an initial configuration on a switch (two objectives)133
Day 10 : implement an access list141
Day 9 : implement simple WAN protocols145
Pt. IV8-1 day(s) before the exam - troubleshooting153
Day 8 : utilize the OSI model as a guide for systematic troubleshooting155
Day 7 : perform LAN and VLAN troubleshooting159
Day 6 : troubleshoot routing protocols163
Day 5 : troubleshoot IP addressing and host configuration167
Day 4 : troubleshoot a device as part of a working network171
Day 3 : troubleshoot an access list175
Day 2 : perform simple WAN troubleshooting177
Day 1 : key points from each day for relaxed skimming181
Pt. VExam day and post-exam information203
Exam day : becoming a CCNA205
Post-exam information : after the CCNA207

See also: Confianza & Traición en el Lugar de trabajo:Edificio de Relaciones Eficaces en Su Organización

Kismet Hacking

Author: Brad Haines

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.

Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend.

*Wardrive Running Kismet from the BackTrack Live CD

*Build and Integrate Drones with your Kismet Server

*Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive



Sunday, January 25, 2009

Windows XP All in One Desk Reference for Dummies or Digital Photographers Guide to Adobe Lightroom

Windows XP All-in-One Desk Reference for Dummies

Author: Woody Leonhard

Windows is the number one operating system in the world.  There’s a lot to Windows XP, with office productivity applications, multimedia features, the Internet, and security upgrades. Now and then, you probably wish you could call Tech Support.

That’s when you’ll be grateful to have nine books about Windows XP in one — Windows XP All-in-One Desk Reference For Dummies, Second Edition.  It replaces a whole shelf of reference books and covers



• Windows XP basics

• Customization

• The Internet

• Internet Explorer

• Microsoft Network

• Hardware

• Multimedia

Windows Media Center

• Wired and wireless networks



Fully updated with the latest information on Microsoft’s improved security features, the newest on multimedia applications and Windows Media Center, and plenty of additional stuff to help you decide about broadband Internet connections, this edition of Windows XP All-in-One Desk Reference For Dummies makes Windows XP manageable.   It helps you



• Get started with Windows XP, search for files, use shortcuts, deal with common problems, and take advantage ofbuilt-in help

• Customize your desktop, menus, icons, and startup programs

• Protect your PC by using Windows Firewall, appropriate virus protection, and other security measures

• Compare browsers, connect to the Internet, choose the right e-mail program, and manage newsgroups and chats

• Work with digital images, download and play music, burn CDs, find out about digital camcorders, and create movies with Movie Maker

• Decide whether a Media Center PC is right for you

• Create a home network and troubleshoot any problems that come up



With thumbtabs that make it easy to find what you’re looking for and the famous For Dummies cheat sheet in the front, this book is designed to make life with Windows XP a lot easier, happier, safer, and a whole lot more fun.



Book review: Räume der Hoffnung

Digital Photographer's Guide to Adobe Lightroom

Author: John Beardsworth

Digital technology has transformed the entire photographic workflow—and Adobe™ Lightroom, the latest application from the creators of Photoshop®, is at the forefront of the revolution. With this in-depth guide, photographers can make the most of the cutting-edge software and understand the entire image-making process. It’s filled with expert tips and techniques, and comprehensively covers both professional essentials (setting up photo libraries, white balance) and advanced topics like studio branding. You’ll learn how to have a photo shoot, whittle it down to the best shots, and fine-tune their tone, balance, and exposure. Zoom in, zoom out, crop, and undo, all without altering the original. Put the file on CD or the web for clients or friends, then make picture-perfect prints, in color, mono, or sepia. The possibilities are amazing!



Saturday, January 24, 2009

Guide To Operating Systems Enhanced Edition or Workflow Management

Rescuing the Emotional Lives of Overweight Children: What Our Kids Go through - and how We Can Help

Author: Michael Palmer

Helping your child through a weight problem doesn't have to be a long, difficult process. In Rescuing the Emotional Lives of Overweight Children, Dr. Sylvia Rimm, one of America's most trusted family psychologists for more than 20 years, cuts to the heart of the issue with simple advice you can use today, even as you are still searching for ways to help your child lose weight.

You will discover:
* How to coach your child to success, rather than judge his shortcomings
* Why overweight girls feel pressure to have sex at an earlier age than their friends--and how to protect them
* How to set guidelines for television and computer time
* Ways to keep your child from getting bullied at school
* Conversations you can have with your child's siblings to get their support

Plus, meet dozens of adults who overcame their childhood weight problems. These real people show you the simple strategies that their parents used to help them to success--ideas you'll want to use in your own family, such as:
* Focusing your child on her strengths to take the sting out of getting teased at school
* Helping your child find the right clothes to fit in with her peers
* Using a special-interest camp or exercise group to build positive peer relationships
* Identifying other adults who can build your child's self-esteem
* The best ways to praise your child



Book about: Aprendizagem a Trabalho:Como Crianças de Classe de Trabalho Adquirem Empregos de Classe de Trabalho

Workflow Management: Models, Methods, and Systems

Author: Wil van der Aalst

This book offers a comprehensive introduction to workflow management, the management of business processes with information technology. By defining, analyzing, and redesigning an organization's resources and operations, workflow management systems ensure that the right information reaches the right person or computer application at the right time. The book provides a basic overview of workflow terminology and organization, as well as detailed coverage of workflow modeling with Petri nets. Because Petri nets make definitions easier to understand for nonexperts, they facilitate communication between designers and users. The book includes a chapter of case studies, review exercises, and a glossary. A special Web site developed by the authors, workflowcourse.com, features animation, interactive examples, lecture materials, exercises and solutions, relevant links, and other valuable resources for the classroom.



Friday, January 23, 2009

Exploring Microsoft Office Excel 2007 Comprehensive or Macromedia Fireworks 8

Exploring Microsoft Office Excel 2007 Comprehensive

Author: Robert Grauer

The Exploring series helps students master the How and Why of performing tasks in Office to gain a greater understanding of how to use the individual applications together to solve business problems. Exploring titles feature Perfect pages where every step of every hands-on exercise as well as every end-of-chapter problem begins on a new page and has its own screen shot to make it easier to follow. Each chapter contains Hands-on Exercises, Capstone Exercises, and Mini-Cases for practicing and reviewing skills acquired. Exploring Microsoft Office Excel 2007 Comprehensive, 1/e, covers the following topics: introduction to Excel; using formulas, functions, and charts; working with large worksheets and tables; converting data to information; consolidating data and linking files; What-If analysis, forecasting, and amortization; employing templates, themes, and web pages; collaboration and macros; data analysis; VBA. Ideal for students and individuals seeking a comprehensive introduction to Excel 2007.



Table of Contents:
Chapter 1 - Introduction to Excel

Section 1: Introduction to Spreadsheets
Defining Worksheets and Workbooks
Using Spreadsheets Across Disciplines
Planning for Good Workbook and Worksheet Design
Identifying Excel Window Components
Entering and Editing Data in Cells
Hands-On Exercise #1: Introduction to Microsoft Excel

Section 2: Mathematics and Formulas
Describing and Using Symbols and the Order of Precedence
Displaying Cell Formulas
Inserting and Deleting Rows and Columns
Using Cell Ranges, Excel Move, Copy, Paste and Paste Special, and AutoFill
Hands-On Exercise #2: Jakes Gym Continued

Section 3: Workbook and Worksheet Enhancements
Managing Worksheets
Formatting Worksheets
Hands-On Exercise #3: Formatting Jake's Gym Worksheet

Section 4: Page Setup and Printing
Selecting Page Setup Options for Printing
Managing Cell Comments
Hands-On Exercise #4: Printing Jake's Gym Worksheet

Summary
Key Terms
Multiple Choice
Practice Exercises
Mid-Level Exercises
Capstone Exercise
Mini Cases

Chapter 2 - Microsoft Excel: Formulas and Functions

Section 1: Formula Basics
Creating and Copying Formulas
Using Relative and Absolute Cell Addresses
Hands-On Exercise #1: Smithtown Hospital Radiology Department Payroll

Section 2:Function Basics
Using AutoSum
Inserting Basic Statistical Functions
Using Date Functions
Hands-On Exercise #2: Completing the Smithtown Hospital Radiology Department

Section 3: Logical and Lookup Functions
Using the IF Function
Using the VLOOKUP Function
Hands-On Exercise #3: Athletic Department Eligibility Gradebook

Section 4: Financial Functions
Using the PMT Function
Using the FV Function
Hands-On Exercise #4: Purchasing a Van for the School for Exceptional Children


Summary
Key Terms
Multiple Choice
Practice Exercises
Mid-Level Exercises
Capstone Exercise
Mini Cases

Chapter 3 - Microsoft Excel: Charts

Section 1: A Picture is the Message
Choosing A Chart Type
Creating a Chart
Hands-on Exercise 1: The First Chart

Section 2: Chart Enhancements
Modifying a Chart
Enhancing Charts with Graphic Shapes
Hands-on Exercise 2: Multiple Data Series

Section 3: Chart Distribution
Embedding Charts
Printing Charts
Hands-on Exercise 3: Embedding, Printing, And Saving Chart as a Web Page

Summary
Key Terms
Multiple Choice
Practice Exercises
Mid-Level Exercises
Capstone Exercise
Mini Cases

Chapter 4: Microsoft Excel: Working with Large Worksheets and Tables

Section 1: Large Worksheet Preparation
Freezing Rows and Columns
Hiding and Unhiding Rows, Columns, and Worksheets
Protecting a Cell, a Worksheet and a Workbook
Controlling Calculation
Printing Large Worksheets
Hands-On Exercise #1: Marching Band Roster

Section 2: Excel Data Tables
Exploring Basic Table Management
Sorting Data
Filtering and Totaling Data
Hands-On Exercise #2: Marching Band Roster Revisited

Summary
Key Terms
Multiple Choice
Practice Exercises
Mid-Level Exercises
Capstone Exercise
Mini Cases

Chapter 5 - Data to Information

Section 1 Table Management
Designing Tables Based on Table Data Theory
Importing Data from Text Files and Other Sources
Applying Conditional Formatting
Hands-on Exercise 1: Gee Airlines Human Resources Department

Section 2 Data Management
Applying Advanced Filtering and Sorting Methods
Creating and Using Range Names
Using Database Functions
Hands-on Exercise 2: Gee Airlines Human Resources Department Revisited

Section 3 Data Analysis with PivotTables and PivotCharts
Creating and Deleting PivotTables and PivotChart Reports
Formatting, Sorting, Filtering, Subtotaling, and Refreshing a PivotTable
Hands-on Exercise 3: Eye First Advertising Department Sales

Summary
Key Terms
Multiple Choice
Practice Exercises
Mid-Level Exercises
Capstone Exercise
Mini Cases

Chapter 6 — Data Tables and Amortization Tables

Section 1 Tables
Separating and Combining Text
Manipulating Text with Functions
Hands-on Exercise 1: IT Department String Manipulation

Section 2 Data Analysis and Windows
Identifying and Removing Duplicate Rows
Grouping and Subtotaling Data
Working with Windows
Hands-on Exercise 2: Ajax College Band

Section 3 Conditional and Logical Functions
Using Conditions in Functions
Creating Nested IF Functions
Using AND, OR, NOT and IFERROR Functions
Hands-on Exercise 3: Classic Cars and Security

Section 4 Amortization Table
Defining the Amortization Table
Using Functions in Amortization Tables
Hands-on Exercise 4: Purchase a New House

Summary
Key Terms
Multiple Choice
Practice Exercises
Mid-Level Exercises
Capstone Exercise
Mini Cases

Chapter 7 — Data Consolidation, Links, and Formula Auditing

Section 1 Data Consolidation
Consolidating Data from Multiple Worksheets
Defining the Three-Dimensional Workbook
Creating Three-Dimensional References in Formulas
Hands-on Exercise 1: Consolidating Best Restaurant Corporate Sales

Section 2 Workbook Linking and Documentation
Linking Workbooks
Creating the Documentation Worksheet
Hands-on Exercise 2: Consolidating Workbooks for Corporate Sales and Adding Documentation

Section 3 Workbook Auditing
Restricting Values to a Drop-Down List
Validating Data
Auditing Formulas
Setting up a Watch Window
Hands-on Exercise 3: JAS Manufacturing

Summary
Key Terms
Multiple Choice
Practice Exercises
Mid-Level Exercises
Capstone Exercise
Mini Cases

Chapter 8 — What-If Analysis

Section 1 One- and Two- Variable Data Tables
Creating a One-Variable Data Table
Creating a Two-Variable Data Table
Hands-on Exercise 1: Can You Afford It?

Section 2 Goal Seek and Scenario Manager
Defining Forecasting
Solving Problems with Goal Seek
Using Scenario Manager
Hands-on Exercise 2: Purchase Golf Cars and Manufacture Golf Clubs

Section 3 Solver
Loading the Solver Add-In
Solving Problems with Solver
Hands-on Exercise 3: FAL Computing Manufacturing

Summary
Key Terms
Multiple Choice
Practice Exercises
Mid-Level Exercises
Capstone Exercise
Mini Cases

Chapter 9 - Collaboration and Workbook Distribution

Section 1 Excel Collaboration and Workbook Sharing
Tracking Changes
Enabling Simultaneous Changes by Multiple Users
Saving Workbooks in Different Formats
Sending a Workbook by E-mail
Copying Data to Word and PowerPoint
Hands-on Exercise 1: Collaborate and Share

Section 2 Workbook Distribution
Finalizing Documents
Preparing Workbooks for Distribution
Hands-on Exercise 2: Distribute and Secure Workbooks

Section 3 Excel Options and Add-ins
Understanding Excel Options
Working with the Quick Access Toolbar
Adding Add-ins
Hands-on Exercise 3: Customizing Excel

Summary
Key Terms
Practice Exercises
Mid-Level Exercises
Capstone Project
Mini Cases

Chapter 10 — Templates, Styles, Web, and Macros

Section 1 Worksheet Automation
Working with Existing Templates, Themes, and Styles
Using Styles for Advanced Formatting
Creating a Template
Hands-on Exercise 1: Use and Create Themes, Styles, and Templates

Section 2 Web Pages and Queries
Creating a Web Page
Creating Web Queries
Hands-on Exercise 2: Query the Web and Create a Web Page

Section 3 Repetitive Tasks
Working with Macros
Creating Macro Buttons
Understanding the Basics of VBA
Hands-on Exercise 3: Work with Macros and Visual Basic for Applications

Summary
Key Terms
Multiple Choice
Practice Exercises
Mid-Level Exercises
Capstone Exercise
Mini Cases

Look this: Droidmaker or Foundations of Python Network Programming

Macromedia Fireworks 8: Training from the Source

Author: Patti Schulz

If you learn best by doing, and what you’re intent on doing is create stunning Web graphics with Macromedia Fireworks 8, this is the place to turn. The best-selling tutorial book on Fireworks has been completely updated to get you hands-on fast with all of the program’s most important features, including its newest: additional blend modes, support for special characters and AutoShape properties, workflow improvements, and more. Through project-based lessons that equal 16 to 20 hours of instruction, you’ll cover the entire process of creating Web graphics with Fireworks 8—from creating images to optimizing and exporting them. Simple step-by-step instructions, loads of screen shots, and a CD with media files and a trial version of the program will have you creating rollovers, pop-ups, and more in no time. Whether you’re new to the world of Fireworks graphics or a veteran user eager to tap the power of the latest version, you’ll find the trusted, Macromedia-certified instruction you need in these pages.



Thursday, January 22, 2009

CCNP BCMSN Official Exam Certification Guide or Professional LINQ

CCNP BCMSN Official Exam Certification Guide

Author: David Hucaby

CCNP BCMSN Official Exam Certification Guide

Fourth Edition

 
• Master all 642-812 exam topics with the official study guide
• Assess your knowledge with chapter-opening quizzes
• Review key concepts with foundation summaries
• Practice with hundreds of exam questions on the CD-ROM

David Hucaby, CCIE® No. 4594

CCNP BCMSN Official Exam Certification Guide, Fourth Edition, is a best of breed Cisco® exam study guide that focuses specifically on the objectives for the BCMSN exam. Successfully passing the BCMSN 642-812 exam certifies that you have knowledge and skills necessary to implement scalable multilayer switched networks.

CCNP BCMSN Official Exam Certification Guide, Fourth Edition, follows a logical organization of the BCMSN exam objectives. Material is presented in a concise manner, focusing on increasing readers’ retention and recall of exam topics. Lead network engineer and consultant David Hucaby shares preparation hints and test-taking tips, helping you identify areas of weakness and improve your switching knowledge through the use of the consistent features in each chapter. “Do I Know This Already?” quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists and Foundation Summary tables make referencing easy and give you a quick refresher whenever you need it. Scenario-based exercises help you think about exam objectives in real-world situations, thus increasing recall during exam time. Challenging chapter-ending review questions help you assess your knowledge and reinforce key concepts.

The companion CD-ROMcontains a powerful testing engine that enables you to focus on individual topic areas or take complete, timed exams. The assessment engine also tracks your performance and provides feedback on a module-by-module basis, presenting question-by-question remediation to the text.

Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this book helps you master the concepts and techniques that will enable you to succeed on the exam the first time.

David Hucaby, CCIE® No. 4594, is a lead network engineer for a large medical environment using Cisco multilayer switching and security products. He also is an independent networking consultant focusing on Cisco-based solutions for healthcare and banking clients.

The official study guide helps you master all the topics on the BCMSN exam, including
• Spanning Tree Protocol concepts
• Virtual LAN (VLAN), VLAN trunking, and inter-VLAN routing
• Gateway redundancy technologies and protocols
• Wireless LAN topologies, components, connectivity, and standards
• Implementing a Cisco Unified Wireless Network
• Wireless client access
• Access layer voice concepts
• Preventing and mitigating attacks against switched network security

Companion CD-ROM

The CD-ROM contains an electronic copy of the book and more than 200 practice questions for the BCMSN exam, including simulation-based questions, all available in study mode, test mode, and flash card format.

This volume is part of the Exam Certification Guide Series from Cisco Press®. Books in this series provide officially developed exam preparation materials that offer assessment, review, and practice to help Cisco Career Certification candidates identify weaknesses, concentrate their study efforts, and enhance their confidence as exam day nears.

Category: Cisco Certification

Covers: BCMSN Exam 642-812

$59.99 USA / $74.99 CAN

 



New interesting book: El Ambiente Legal de Negocio

Professional LINQ

Author: Scott Klein

Professional LINQ introduces experienced programmers and database developers to LINQ database queries in their native VB and C# languages. Some of the topics covered include:



• LINQ Queries

• LINQ and the Standard Query Operators

• Programming with XLinq

• Querying XML with XLinq

• Mixing XML and other data models

• DLinq and Queries

• LINQ over datasets

• Interoperating with ADO.NET

• LINQ and ASP.NET




Table of Contents:
Acknowledgments.

Introduction.

Part I: Introduction to Project LINQ.

Chapter 1: Project LINQ.

Chapter 2: A Look at Visual Studio 2008.

Chapter 3: LINQ Queries.

Chapter 4: LINQ Standard Query Operators.

Part II: LINQ to XML. 

Chapter 5: Understanding LINQ to XML.

Chapter 6: Programming with LINQ to XML.

Chapter 7: LINQ to XML and Other LINQ Data Models.

Chapter 8: Advanced LINQ to XML Programming Topics.

Chapter 9: LINQ to XML and Visual Basic .NET.

Part III: LINQ to SQL. 

Chapter 10: LINQ to SQL Overview.

Chapter 11: LINQ to SQL Queries.

Chapter 12: Advanced Query Concepts.

Chapter 13: More About Entity Classes.

Chapter 14: LINQ to DataSet.

Chapter 15: Advanced LINQ to SQL Topics.

Appendixes. 

Appendix A: Case Study.

Appendix B: LINQ to Entities: The ADO.NET Entity Framework.

Appendix C: LINQ to XSD.

Index.

Tuesday, January 20, 2009

Making a Movie in iMovie and iDVD or Windows XP Simplified Service Pack 2nd Edition

Making a Movie in iMovie and iDVD: Visual QuickProject Guide (Visual Quickproject Guide Series)

Author: Jeff Carlson

If you're like many users, you may just now be figuring out what Apple may have neglected to mention: A built-in movie studio-in the form of the free iMovie and iDVD apps included in Mac OS X-does not a moviemaker make. This book, however, does! Realizing that you won't want to waste a single minute reading about all you can do with iMovie and iDVD, best-selling author Jeff Carlson cuts straight to the chase in this compact, low-priced volume, using simple project-based instruction and big, colorful screen shots to guide you through the process of making your first movie with iMovie and iDVD. By focusing on a single goal (making that first movie) rather than exploring every option and feature, Jeff demonstrates the quickest, easiest, smartest route to cinematic success. Each short lesson builds on the last as you learn how to shoot, edit, and produce your own movies and then distribute them on DVDs to share with friends, family, and colleagues.



Table of Contents:
1Project overview1
2Create an iMovie project7
3Import video into iMovie11
4Assemble your movie17
5Add photos and music25
6Edit clips33
7Add transitions49
8Add titles55
9Add effects61
10Share your movie65
11Explore iDVD73
12Choose and customize a theme77
13Add more content to the DVD91
14Burn the DVD99

Read also Trade Plunder and Settlement or Understanding Industrial and Corporate Change

Windows XP Simplified Service Pack, 2nd Edition

Author: Paul McFedries

* The perfect guide for visual learners who are brand-new to Windows XP and want to be shown-rather than told-how to solve problems and work through tasks
* Features highly visual two-page tutorials and full-color step-by-step screen shots that walk Windows newcomers through tasks such as working with files, sharing a computer, browsing the Web, using e-mail, and even creating movies
* Covers new SP2 enhancements, including the new Windows Firewall and wireless interface as well as updates to Windows Update, Media Player, and Internet Explorer



Monday, January 19, 2009

Designing the User Interface or Reconfigurable Computing

Designing the User Interface: Strategies for Effective Human-Computer Interaction

Author: Ben Shneiderman

In 1996, recognizing this book, ACM's Special Interest Group on Documentation (SIGDOC) presented Ben Shneiderman with the Joseph Rigo Award. SIGDOC praised the book as one "that took the jargon and mystery out of the field of human-computer interaction" and attributed the book's success to "its readability and emphasis on practice as well as research."

In revising this best-seller, Ben Shneiderman again provides a complete, current, and authoritative introduction to user-interface design. The user interface is the part of every computer system that determines how people control and operate that system. When the interface is well designed, it is comprehensible, predictable, and controllable; users feel competent, satisfied, and responsible for their actions. In this book, the author discusses the principles and practices needed to design such effective interaction.

Based on 20 years experience, Shneiderman offers readers practical techniques and guidelines for interface design. As a scientist, he also takes great care to discuss underlying issues and to support conclusions with empirical results. Interface designers, software engineers, and product managers will all find here an invaluable resource for creating systems that facilitate rapid learning and performance, yield low error rates, and generate high user satisfaction. Coverage includes the human factors of interactive software (with added discussion of diverse user communities), tested methods to develop and assess interfaces, interaction styles (like direct manipulation for graphical user interfaces), and design considerations (effective messages, consistent screen design, appropriate color).

Booknews

In this revised and updated presentation of user interface design for designers, managers, and evaluators of interactive systems, Schneiderman (computer science, U. of Maryland) discusses the underlying issues, principles, and empirical results, and describes practical guidelines and techniques necessary to realize an effective design. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Go to: Introduction to Digital Photography or Programming with POSIX Threads

Reconfigurable Computing: The Theory and Practice of FPGA-Based Computation

Author: Scott Hauck

The main characteristic of Reconfigurable Computing is the presence of hardware that can be reconfigured to implement specific functionality more suitable for specially tailored hardware than on a simple uniprocessor. Reconfigurable computing systems join microprocessors and programmable hardware in order to take advantage of the combined strengths of hardware and software and have been used in applications ranging from embedded systems to high performance computing. Many of the fundamental theories have been identified and used by the Hardware/Software Co-Design research field. Although the same background ideas are shared in both areas, they have different goals and use different approaches.This book is intended as an introduction to the entire range of issues important to reconfigurable computing, using FPGAs as the context, or "computing vehicles" to implement this powerful technology. It will take a reader with a background in the basics of digital design and software programming and provide them with the knowledge needed to be an effective designer or researcher in this rapidly evolving field.

• Treatment of FPGAs as computing vehicles rather than glue-logic or ASIC substitutes
• Views of FPGA programming beyond Verilog/VHDL
• Broad set of case studies demonstrating how to use FPGAs in novel and efficient ways



Table of Contents:
Contents Preface Introduction Part One: Hardware Part I INTRO Chapter 1 - General-Purpose FPGA Architecture
Chapter 2 - Reconfigurable Computing Devices Chapter 3 - Reconfigurable Computing Systems Chapter 4 - Reconfiguration Management Part Two: Software Part II Intro Chapter 5 - Computer Models and System Architectures Andrй DeHon Chapter 6 - Hardware Description Languages (VHDL)
Chapter 7 - Compilation for Reconfigurable Computing Machines
Chapter 8 - Streaming Models
8.1 MATLAB/SIMULINK
8.2 SCORE Chapter 9 SIMD/Vector Chapter 10 - OS/Runtime Systems Chapter 11 - JHDL Chapter 12 -Technology Mapping Chapter 13 - Placement
13.1 General-purpose / FPGA
13.2 Datapath
13.3 Constructive Chapter 14 - Routing Chapter 15 - Retimin Chapter 16 - Bitstream Generation, JBits Chapter 17 - Fast Mapping Part Three: Application Development PART III INTRO Chapter 18 - Evaluating and Optimizing problems for FPGA implementations Chapter 19- Instance-specific design, Constant Propagation & Partial Evaluation
Chapter 20 - Precision Analysis & Floating Point Chapter 21 - Distributed Arithmetic Chapter 22 - CORDIC Chapter 23 - Task allocation: FPGA vs. CPU partitioning Part Four: Case Studies PART IV INTRO Chapter 24 - Image Processing, Variable Precision, Algorithm Alteration: SPIHT Compression Chapter 25 - Run-time reconfiguration: Automatic Target Recognition Chapter 26 - Problem-specific circuitry: SAT Solving
Chapter 27 - Multi-FPGA Systems: Logic Emulation Chapter 28- Floating Point Chapter 29 - FDTD Chapter 30 - Genetic Evolution
Chapter 31 - Packet Filtering (Networking application)
Chapter 32 - Active Pages [Memorycentric] Part Five:Theoretical Underpinnings and Future Directions
PART V INTRO Chapter 33- Theoretical Underpinnings, Metrics and Analysis Chapter 34 - Defect and Fault Tolerance Chapter 35 - Reconfigurable Computing and Nanotechnology

iSpeak German or JBoss 40

iSpeak German

Author: Alex Chapin

See it. Hear it. Speak it.

Turn your iPod into a portable translator and put 1,500 German phrases in your pocket.

Instead of just listening to the latest hits, you can use your iPod to hear and see 1,500 essential German phrases. It's as simple as listening to a song by your favorite artist:

  1. Go to “Artist”--Choose the theme you want.
  2. Go to “Album”--Select your topic within the theme.
  3. Select the phrase you want to hear—you will not only hear the phrase but see it on your iPod screen!

Traveling has never been so easy nor sounded so good!

Designed for use with iPod.
Also compatible with Zune and most MP3 players. See manual for details.
Contains one MP3 audio disc and 64-page booklet.



Interesting book: Downtown Girls Guide to Wine or Tell Me More

JBoss 4.0: The Official Guide

Author: Marc Fleury

If you need to understand how JBoss works, why not learn it from the people who created it? JBoss 4.0 — The Official Guide is the authoritative resource recognized as the official print documentation for JBoss 4.0. The only book for advanced JBoss users, this guide presents a complete understanding to configuring and using JBoss 4.0. It is fully up-to-date with the new features and changes in JBoss 4.0, including those used to integrate development with Eclipse, incorporate Aspect-Oriented Programming and implement J2EE 1.4 functionality months ahead of the commercial competition. Get under the hood and explore everything that JBoss 4.0 can offer you with JBoss 4.0 — The Official Guide.



Web Database Applications with PHP and MySQL 2E or Adobe Dreamweaver CS3 on Demand

Web Database Applications with PHP and MySQL 2E

Author: Hugh E Williams

There are many reasons for serving up dynamic content from aweb site:to offer an online shopping site, create customized information pages for users, or just manage a large volume of content through a database. Anyone with a modest knowledge of HTML and web site management can learn to create dynamic content through the PHP programming language and the MySQL database. This book gives you the background and tools to do the job safely and reliably.

Web Database Applications with PHP and MySQL, Second Edition thoroughly reflects the needs of real-world applications. It goes into detail on such practical issues as validating input (do you know what a proper credit card number looks like?), logging in users, and using templates to give your dynamic web pages a standard look.

But this book goes even further. It shows how JavaScript and PHP can be used in tandem to make a user's experience faster and more pleasant. It shows the correct way to handle errors in user input so that a site looks professional. It introduces the vast collection of powerful tools available in the PEAR repository and shows how to use some of the most popular tools.

Even while it serves as an introduction to new programmers, the book does not omit critical tasks that web sites require. For instance, every site that allows updates must handle the possibility of multiple users accessing data at the same time. This book explains how to solve the problem in detail with locking.

Through a sophisticated sample application—Hugh and Dave's Wine Store—all the important techniques of dynamic content are introduced. Good design is emphasized, such as dividing logic from presentation. The book introduces PHP 5 and MySQL 4.1 features, while providing techniques that can be used on older versions of the software that are still in widespread use.

This new edition has been redesigned around the rich offerings of PEAR. Several of these, including the Template package and the database-independent query API, are fully integrated into examples and thorougly described in the text. Topics include: Installation and configuration of Apache, MySQL, and PHP on Unix®, Windows®, and Mac OS® X systems Introductions to PHP, SQL, and MySQL administration Session management, including the use of a custom database for improved efficiency User input validation, security, and authentication The PEAR repository, plus details on the use of PEAR DB and Template classes Production of PDF reports



Book review: My New MAC or How to Do Everything with Access 2003

Adobe Dreamweaver CS3 on Demand

Author: Steve Johnson

FOR THOSE WHO WOULD RATHER BE SHOWN HOW THAN TOLD HOW.
SEE HOW TO:
- Understand and use the latest Web technologies to create sites
- Choose the right site structure and layout for sites
- Create and use Web page templates to quick create pages
- Create and maintain Cascading Style Sheets (CSS)
- Add Flash elements to Web pages
- Use JavaScript behaviors to implement page functionality
- Use coding tools to develop consistent and reusable code
- Manage collaboration with multiple developers
- Manage local, remote, and testing sites
- Transfer, synchronize, and validate sites
- Browse, organize, and process files using Adobe Bridge and Version Cue
- Test content on different target devices using Adobe Device Central
Includes ACE Courseware Objectives!

This book uses real world examples to give you a context in which to perform a task. This book also includes workshops to help you put together individual tasks into projects. The Dreamweaver example files that you need for project tasks are available at www.perspection.com.

Perspection has written and produced books on a variety of computer software, including Adobe Flash CS3 and 8, Adobe Photoshop CS3 and CS2, Microsoft Office 2007 and 2003, Microsoft Windows Vista and XP, Microsoft Expression Web, and Apple Mac OS X Panther. Perspection was founded in 1991, and is committed to providing information and training to help people use software more effectively. Perspection has written more than 80 computer books, and sold more than 5 million copies.

This courseware meets the objectives for the Adobe Certified Expert (ACE) Program. Upon completion of this courseware you may be prepared to take an exam for ACE qualification. To learn more about becoming an Adobe Certified Expert, visit www.adobe.com/support/certification/ace.htm



Table of Contents:

Introduction xvii

1.                 Preparing and Planning a Web Site       1

2.                 Getting Started with Dreamweaver CS3        13

3.                 Working Within the Dreamweaver Environment       41

4.                 Managing Web Site Files   69

5.                 Working with Web Page Text     93

6.                 Working with Web Page Images 131

7.                 Linking Web Pages 161

8.                 Creating Page Layouts Using Tables     185

9.                 Working with Cascading Style Sheets   215

10.                Creating Page Layouts Using CSS_P       245

11.                Creating Frames       265

12.                Working with Flash and Other Multimedia          285

13.                Creating Forms         313

14.                Viewing the HTML Behind the Page          335

15.                Working with Behaviors       357

16.                Using Spry Widgets and Effects     385

17.                Using Code Snippets and Libraries 405

18.                 Creating Templates   433

19.                Testing a Web Site    455

20.                Managing a Web Site 477

21.                Moving Your Site to the Internet   495

22.                Automating Dreamweaver  509

23.                Working Together with Adobe Programs 527

Index 563

Sunday, January 18, 2009

Building Online Stores with osCommerce or Publish and Prosper

Building Online Stores with osCommerce: Beginner Edition

Author: David Mercer

Building Online Stores with osCommerce: Beginner Edition will teach you how to build and maintain a working e-commerce Website using osCommerce. You will learn all the information required to set up, modify and maintain your own online store.

It is often hard to find well presented, clear, and helpful information regarding the many settings and complications associated with running an osCommerce store. This book is a boon for those who want to learn how to do things for themselves.

The book's business oriented approach focuses on using osCommerce to meet your business goals and requirements.

You will also learn how to get the most from the osCommerce community, and see how the open source nature of osCommerce can bring great benefits to the quality of your site.

By the end of this book, you will be confident in running your own store and possess enough know how to establish a strong online business.
There is a Professional Edition of this title available ISBN 1904811140



Book about: Stretching Basics or The Doctors Book of Home Remedies for Men

Publish and Prosper: Blogging for Your Business

Author: D L Byron

While personal blogs take up much of the blogosphere, blogs are quickly gaining popularity in business as an inexpensive and amazingly effective marketing tool. It’s time for a practical book about business blogging: this is the first book to demonstrate how businesses are blogging and how you can use blogging technology to converse with your customers to build your brand and sell your products.

Written from the business person/designer’s perspectives, this book shows how businesses can leverage current, real-world blogging techniques, tools, and platforms to promote and enhance their ventures. The key idea is that the conversation with your market is stronger and more meaningful with a blog. Filled with practical information and a how-to approach, this book provides case studies of companies as large as Boeing or General Motors and as small as Clip-’n-seal. Readers will learn about the types of business blogs, how companies use blogs, how to sell blogs to management and IT, effective blog design, content, and conversation, pitfalls to avoid, how to develop Web presence, and more.



Table of Contents:
1Meet the blogs1
2Determining your focus21
3How much blog - and how often?43
4Designing for readers57
5Tools and implementation83
6Writing your blog111
7Launching your blog and getting noticed131
8Monitoring and managing your blog149
9Beyond blogging165

Saturday, January 17, 2009

Computer Networking First Step or Designing Interactions

Computer Networking First-Step

Author: Wendell Odom

Your first step into the world of computer networking

  • No experience required
  • Includes clear and easily understood explanations
  • Makes learning easy

Your first step to computer networking begins here!

  • Learn basic networking terminology
  • Understand how information is routed from place to place
  • Explore Internet connectivity secrets
  • Protect your computer from intrusion
  • Build local-area networks (LANs)

Welcome to the world of networking!


Networking and the Internet touch our lives in untold ways every day. From connecting our computers together at home and surfing the net at high speeds to editing and sharing digital music and video, computer networking has become both ubiquitous and indispensable.

 

No experience needed!


Computer Networking First-Step explains the basics of computer networking in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up network and Internet traffic. Whether you are looking to take your first step into a career in networking or are interested in just gaining a conversational knowledge of the technology, this book is for you!

 

Slashdot.org

The best thing going for the book is its relaxed, you-can-do-it tone. ... If you are looking for a conceptual understanding of computer networking to untangle the underlying mystery, read this book. I think this is a great text for high school students, home computer users, and even computer professionals who do not deal with networking in their daily work.



Table of Contents:
Introduction
Pt. INetworking basics3
Ch. 1What is a network?5
Ch. 2A network's reason for existence17
Ch. 3Building a network : it all starts with a plan37
Pt. IIRunning the local department of (network) transportation63
Ch. 4How to build a local (network) roadway65
Ch. 5Rules of the road : how to use the local (network) roadway87
Ch. 6Reducing congestion and driving faster on the local (network) roadway107
Ch. 7Adding local (network) roadways for no extra money131
Pt. IIIShipping and logistics : commerce using the (network) roadways151
Ch. 8Shipping goods over a (network) roadway153
Ch. 9Choosing shipping options when transporting the goods over the (network) roadway181
Pt. IVNavigating the roadways to find the right street address205
Ch. 10Delivering the goods to the right street (IP) address207
Ch. 11Knowing where to turn at each intersection (router)235
Ch. 12Painting the road signs on your interstate (internetwork)263
Ch. 13People like names, but computers like numbers279
Pt. VBuilding an interstate (inter-LAN) highway system293
Ch. 14Leasing a (network) roadway between two points295
Ch. 15Leasing a (network) roadway between lots of places315
Ch. 16Driving from home onto the globally interconnected (internet) roadway333
Pt. VISecuring the network353
Ch. 17Accepting the right people and rejecting the wrong people355
Ch. 18Keeping a watchful eye over who drives into your (network) neighborhood373
Pt. VIIAppendixes391
App. A: Answers to chapter review questions393
App. B: Converting IP addresses between decimal and binary435
Glossary459
Index497

Go to: Economics of the Environment or Creative Problem Solving

Designing Interactions

Author: Bill Moggridg

Digital technology has changed the way we interact with everything from the games we play to the tools we use at work. Designers of digital technology products no longer regard their job as designing a physical object--beautiful or utilitarian--but as designing our interactions with it. In Designing Interactions, award-winning designer Bill Moggridge introduces us to forty influential designers who have shaped our interaction with technology. Moggridge, designer of the first laptop computer (the GRiD Compass, 1981) and a founder of the design firm IDEO, tells us these stories from an industry insider's viewpoint, tracing the evolution of ideas from inspiration to outcome. The innovators he interviews--including Will Wright, creator of The Sims, Larry Page and Sergey Brin, the founders of Google, and Doug Engelbart, Bill Atkinson, and others involved in the invention and development of the mouse and the desktop--have been instrumental in making a difference in the design of interactions. Their stories chart the history of entrepreneurial design development for technology.

Moggridge and his interviewees discuss such questions as why a personal computer has a window in a desktop, what made Palm's handheld organizers so successful, what turns a game into a hobby, why Google is the search engine of choice, and why 30 million people in Japan choose the i-mode service for their cell phones. And Moggridge tells the story of his own design process and explains the focus on people and prototypes that has been successful at IDEO--how the needs and desires of people can inspire innovative designs and how prototyping methods are evolving for the design of digitaltechnology.

Designing Interactions is illustrated with more than 700 images, with color throughout. Accompanying the book is a DVD that contains segments from all the interviews intercut with examples of the interactions under discussion.

Interviews with:

Bill Atkinson, Durrell Bishop, Brendan Boyle, Dennis Boyle, Paul Bradley, Duane Bray, Sergey Brin, Stu Card, Gillian Crampton Smith, Chris Downs, Tony Dunne, John Ellenby, Doug Englebart, Jane Fulton Suri, Bill Gaver, Bing Gordon, Rob Haitani, Jeff Hawkins, Matt Hunter, Hiroshi Ishii, Bert Keely, David Kelley, Rikako Kojima, Brenda Laurel, David Liddle, Lavrans Løvlie, John Maeda, Paul Mercer, Tim Mott, Joy Mountford, Takeshi Natsuno, Larry Page, Mark Podlaseck, Fiona Raby, Cordell Ratzlaff, Ben Reason, Jun Rekimoto, Steve Rogers, Fran Samalionis, Larry Tesler, Bill Verplank, Terry Winograd, and Will Wright

What People Are Saying


"This will be the book--the book that summarizes how the technology of interaction came into being and prescribes how it will advance in the future. Written by the designer who was there, who helped make it happen, who pioneered the digital revolution. Essential, exciting, and a delight for both eyes and mind."
—Don Norman, Nielsen Norman Group and Northwestern University, author of Emotional Design

"During the past forty years, interaction designers have powerfully transformed the daily lives of billions. Designing Interactions is a deeply knowing, intimate portrayal of these people: who they are, how they think, and precisely what they do. If you live or work with computers or cell phones--and who among us has any choice about that?--then you owe it to yourself to read this. A labor of love that was years in the making, this classic has no rival in its field."
—Bruce Sterling, author of Shaping Things