Sunday, February 22, 2009

Alan Simpsons Windows Vista Bible Desktop Edition or Schaums Outline of Programming with FORTRAN 77

Alan Simpson's Windows Vista Bible, Desktop Edition

Author: Alan Simpson

Check out the best of Windows Vista in this handy desktop-size resource. This convenient reference is drawn from the very best of bestselling author Alan Simpson’s Alan Simpson’s Windows Vista Bible. You’ll discover how to master the basics of PCs and operating systems, get started on Vista, and move ahead to multimedia, adding security, building a network, and more. You’ll even find special tips, workarounds, and advice on how to deal with Vista’s quirkier aspects.



Table of Contents:
Acknowledgments.

Introduction.

Part I: Beginner’s Crash Course.

Chapter 1: Getting Started.

Chapter 2: Workin’ It.

Chapter 3: Getting Help When You Need It.

Part II: Programs, Documents, and Folders.

Chapter 4: Running Programs.

Chapter 5: Navigating Your Folders.

Chapter 6: Working with Documents.

Chapter 7: Type, Edit, Copy, and Paste.

Chapter 8: Printing Documents.

Part III  Using the Internet.

Chapter 9: Getting Online.

Chapter 10: Browsing the World Wide Web.

Chapter 11: Sending and Receiving E-mail.

Chapter 12: Chatting and Interacting Using the Internet.

Chapter 13: Keeping It Safe.

Part IV: Fun with Multimedia.

Chapter 14: Using Your Camera and Scanner.

Chapter 15: Playing with Pictures and the Photo Gallery.

Chapter 16: Music and Video with Media Player 11.

Chapter 17: Managing Music, Making CDs.

Chapter 18: Making Home Movies.

Part V: Getting Organized, Staying Organized.

Chapter 19: Managing Files and Folders.

Chapter 20: Finding Things on Your Computer.

Chapter 21: Using Your Hard Drive.

Chapter 22: Using Floppies, Thumb Drives, CDs, and DVDs.

Chapter 23: Working with Compressed (Zip) Files.

Chapter 24: Managing Your Time, Tasks, and Appointments.

Part VI: Have ItYour Way.

Chapter 25: Creating and Managing User Accounts.

Chapter 26: Personalizing Your Desktop.

Chapter 27: Using Parental Controls.

Chapter 28: Speech, Writing, and Other Accessibility.

Chapter 29: Expanding Your System.

Chapter 30: Disaster Prevention and Recovery.

Part VII: Connecting Your Computers.

Chapter 31: Design and Create Your Own Network.

Chapter 32: Sharing Things on a Network.

Appendix A: Installing Windows Vista.

Appendix B: Shortcut Key Quick Reference.

Index.

New interesting textbook: Mathematics for 3D Game Programming and Computer Graphics Second Edition or Magic Lantern Guides

Schaum's Outline of Programming with FORTRAN 77

Author: Willam E Mayo

If you want fast mastery of Fortran 77 and top grades, this powerful study tool is the best tutor you can have! Inside, you will find: 326 detailed problems, with step-by-step solutions; hundreds of additional practice problems, with answers supplied; clear explanations of algorithm development, program design, control structures, loops, arrays, subprograms, and data files; and plenty of example code, as well as thorough coverage of debugging techniques. Whether used alone for independent study or with a class text, this popular SchaumÕs Outline is your ticket to a fast learning curve with Fortran 77!

He has been an active ATM Forum board member and technical committee chairperson. Recognized as a leader in ATM traffic management, McDysan is a frequent speaker and teacher at industry conferences. He lives in Richardson, Texas.Darren L. Spohn is Chief Technology Officer of NetSolve, Inc., whre he manages the company’s engineering, product development, and business development efforts. Previously he worked at MCI, where he held a number of critical engineering, marketing, and management positions in the development of advanced data networks. He lives in Austin, Texas.David E. McDysan is Director of Strategic Planning of ATM Services at MCI.



Saturday, February 21, 2009

Foundation Form Creation with Adobe LiveCycle Designer ES or How to Write and Publish Your Own eBook in as Little as 7 Days

Foundation Form Creation with Adobe LiveCycle Designer ES

Author: Kelly Wardrop

In this book, you'll learn how to use the advanced features in LiveCycle Designer ES, including ways to encourage your form users to return data correctly and promptly and with minimal effort on their behalf. You will discover how to create compelling and efficient forms and how to integrate forms with data using XML and WSDL technologies. You'll see and understand just how simply and quickly an intuitive form can be created and then customized and implemented or dispatched to the user using JavaScript and FormCalc scripting techniques.



See also: Comportamento organizzativo di comprensione ed in carico

How to Write and Publish Your Own eBook in as Little as 7 Days

Author: Jim Edwards

How to write and publish your own OUTRAGEOUSLY Profitable eBook in as little as 7 days even if you can't write, can't type and failed high school English class! Discover the secrets to having your own, outrageously profitable ebook written and published as quickly as ... only 7 days from today!



Friday, February 20, 2009

Software Systems Architecture or PostgreSQL

Software Systems Architecture: Working with Stakeholders Using Viewpoints and Perspectives

Author: Nick Rozanski

Software Systems Architecture is a practitioner-oriented guide to designing and implementing effective architectures for information systems. It is both a readily accessible introduction to software architecture and an invaluable handbook of well-established best practices. It shows why the role of the architect is central to any successful information-systems development project, and, by presenting a set of architectural viewpoints and perspectives, provides specific direction for improving your own and your organization's approach to software systems architecture.

With this book you will learn how to
• Design an architecture that reflects and balances the different needs of its stakeholders
• Communicate the architecture to stakeholders and demonstrate that it has met their requirements
• Focus on architecturally significant aspects of design, including frequently overlooked areas such as performance, resilience, and location
• Use scenarios and patterns to drive the creation and validation of your architecture
• Document your architecture as a set of related views
• Use perspectives to ensure that your architecture exhibits important qualities such as performance, scalability, and security

The architectural viewpoints and perspectives presented in the book also provide a valuable long-term reference source for new and experienced architects alike.

Whether you are an aspiring or practicing software architect, you will find yourself referring repeatedly to the practical advice in this book throughout the lifecycle of your projects.

A supporting Web site containing further information can be found atwww.viewpoints-and-perspectives.info



Go to: Arthritis or Not in My Family

PostgreSQL

Author: Korry Douglas

The second edition of the best-selling PostgreSQL has been updated to completely cover new features and capabilities of the 8.0 version of PostgreSQL. You will be lead through the internals of the powerful PostgreSQL open source database chapter, offering an easy-to-read, code-based approach that makes it easy to understand how each feature is implemented, how to best use each feature, and how to get more performance from database applications. This definitive guide to building, programming and administering the powerful PostgreSQL open-source database system will help you harness one of the most widely used open source, enterprise-level database systems.



Table of Contents:
1Introduction to PostgreSQL and SQL9
2Working with data in PostgreSQL77
3PostgreSQL SQL syntax and use139
4Performance189
5Introduction to PostgreSQL programming241
6Extending PostgreSQL253
7PL/pgSQL305
8The PostgreSQL C API - libpq361
9A simpler C API - libpgeasy405
10The new PostgreSQL C++ API - libpqxx421
11Embedding SQL commands in C programs - ecpg465
12Using PostgreSQL from an ODBC client application501
13Using PostgreSQL from a Java client application543
14Using PostgreSQL with Perl573
15Using PostgreSQL with PHP613
16Using PostgreSQL with Tcl and Tcl/Tk645
17Using PostgreSQL with Python683
18Npgsql : the .NET data provider707
19Other useful programming tools743
20Introduction to PostgreSQL administration777
21PostgreSQL administration783
22Internationalization and localization881
23Security899
24Replicating PostgreSQLData with Slony925
25Contributed modules947

Thursday, February 19, 2009

Adobe InDesign CS3 Bible or The Elder Scrolls IV

Adobe InDesign CS3 Bible

Author: Galen Gruman

While QuarkXPress has been the most-widely used page-layout program in the world, Adobe InDesign is rapidly gaining ground with better typography and transparency features, speedier performance, and more overall control. Learn InDesign now from respected InDesign and QuarkXPress expert Galen Gruman. He packs this book with real-world insights from publishing pros who use InDesign in critical projects, shows you the program's innovative architecture and functionality, and tells you everything you need to know to get up to speed. Whether an experienced designer, a novice, or somewhere in between, you'll find all the real-world tips and techniques you're looking for in this comprehensive reference.



Table of Contents:
Foreword: Your Guide to InDesign's Challenge
Foreword: Getting the Most from InDesign
Foreword: The InDesign Mission
Preface
Acknowledgments
Pt. IWelcome to InDesign1
Ch. 1What InDesign Can Do for You3
Ch. 2A Tour of InDesign23
Ch. 3Getting InDesign Ready to Go63
Ch. 4Creating, Opening, and Saving Documents97
Pt. IIFrame and Line Fundamentals115
Ch. 5Adding Text Frames, Picture Frames, and Lines117
Ch. 6Manipulating Frames and Lines127
Ch. 7Orchestrating Objects149
Ch. 8Time-Saving Techniques163
Pt. IIIText Fundamentals171
Ch. 9Preparing Text Files for Import173
Ch. 10Working with Text189
Ch. 11Flowing Text Through a Document213
Ch. 12Specifying Character Formats235
Ch. 13Specifying Paragraph Formats257
Ch. 14Setting Up Tabs and Tables275
Ch. 15Setting Up Styles293
Pt. IVTypography Fundamentals309
Ch. 16Fundamental Typography311
Ch. 17Creating Special Text Formatting337
Ch. 18Working with Special Characters359
Ch. 19Treating Text as Artwork371
Pt. VPicture Fundamentals381
Ch. 20Preparing Picture Files for Import383
Ch. 21Importing Pictures395
Ch. 22Modifying Imported Pictures409
Ch. 23Special Effects for Pictures427
Pt. VIDrawing Fundamentals441
Ch. 24Drawing Free-Form Shapes and Curved Paths443
Ch. 25Modifying Shapes and Paths457
Ch. 26Special Effects for Drawings469
Pt. VIIColor Fundamentals479
Ch. 27Defining Colors and Gradients481
Ch. 28Preparing for Color Prepress503
Pt. VIIIPage Fundamentals519
Ch. 29Creating Layout Standards521
Ch. 30Working with Layers547
Ch. 31Working with Pages563
Pt. IXOutput Fundamentals577
Ch. 32Preparing for Printing579
Ch. 33Printing Techniques611
Ch. 34Creating Output Files629
Pt. XWeb Fundamentals647
Ch. 35Web-Page Setup649
Ch. 36Converting from Print to Web671
Pt. XIAdvanced Issues691
Ch. 37Working with Others693
Ch. 38Using Plug-Ins707
Ch. 39The Right Toolkit713
App. AInstalling Adobe InDesign743
App. BMost Useful Shortcuts753
App. CTop Tips for Using InDesign769
App. DSwitching from QuarkXPress or PageMaker781
App. EWhat's on the CD-ROM795
Index801
End-User License Agreement821
CD-ROM Installation Instructions824

Books about: Plain Lives in a Golden Age or Travel Perspectives

The Elder Scrolls IV: Shivering Isles: Prima Official Game Guide

Author: Bethesda Softworks

A New Realm, A New Path . . .

·Complete maps for the Main Quest and the realm of Sheogorath.

·Walkthroughs for every quest in the expansion, including the Main Quest and Freeform Quests.

·Detailed bestiary chapter to help you best deal with the strange denizens of the Shivering Isles.

·Complete sections for all new items, ingredients, and more.

·Includes full coverage on Knights of the Nine and Oblivion Downloadable Content.



Tuesday, February 17, 2009

Solaris 9 For Dummies or Linux Kernel Development

Solaris 9 For Dummies

Author: David Taylor

Discover new security features and easier installation

Light up your system with a new resource manager, volume manager, and directory server

In the dark about Solaris 9? Open this book and let the sun shine in! It'll help you chart a course for StarOffice, explore CDE and GNOME desktops, and harness Solaris power to configure Web servers, access Internet services, build great Web sites, manage files and directories, and a galaxy of other tasks.

The Dummies Way



• Explanations in plain English

• "Get in, get out" information

• Icons and other navigational aids

• Tear-out cheat sheet

• Top ten lists

• A dash of humor and fun




Table of Contents:
Foreword
Introduction1
Pt. IGetting Acquainted with Solaris9
Ch. 1Logging in and Poking Around11
Ch. 2Graphical Window Managers25
Ch. 3Interacting with the Shell55
Ch. 4Managing Files and Directories81
Pt. IIThe Inevitable Internet Section105
Ch. 5Doin' That E-Mail Thing107
Ch. 6Exploring the World Wide Web129
Ch. 7Creating Web Pages153
Ch. 8Accessing Internet Services167
Pt. IIIBecoming Productive with StarOffice183
Ch. 9Composing Documents with Writer185
Ch. 10The Rest of StarOffice199
Pt. IVEditing and Controlling Programs213
Ch. 11Exploring Text Files215
Ch. 12Editing Files233
Ch. 13Controlling Processes253
Ch. 14Finding Files263
Pt. VAdministration and Security Issues279
Ch. 15Connecting to the Network281
Ch. 16Essential System Administration293
Ch. 17Keeping Your System Secure309
Pt. VIThe Part of Tens323
Ch. 18Ten Best Web Sites325
Ch. 19Ten Key Security Features329
Ch. 20Ten Great Free Add-Ons333
Index337

Interesting textbook: Che Guevara Reader or Modern Utopia

Linux Kernel Development

Author: Robert Lov

The Linux kernel is one of the most important and far-reaching open-source projects. That is why Novell Press is excited to bring you the second edition of Linux Kernel Development, Robert Love's widely acclaimed insider's look at the Linux kernel. This authoritative, practical guide helps developers better understand the Linux kernel through updated coverage of all the major subsystems as well as new features associated with the Linux 2.6 kernel. You'll be able to take an in-depth look at Linux kernel from both a theoretical and an applied perspective as you cover a wide range of topics, including algorithms, system call interface, paging strategies and kernel synchronization. Get the top information right from the source in Linux Kernel Development.




Monday, February 16, 2009

Multithreaded Programming with Java Technology or The Essential Guide to Digital Set Top Boxes and Interactive TV

Multithreaded Programming with Java Technology

Author: Bil Lewis

Multithreaded Programming with Java Technology is the first complete guide to multithreaded development with the Java 2 platform. Multithreading experts Bil Lewis and Daniel J. Berg cover the underlying structures upon which threads are built; thread construction; and thread lifecycles, including birth, life, death, and cancellation. Next, using extensive code examples, they cover everything developers need to know to make the most of multithreading.



New interesting textbook: Amministrazione della forza di vendite

The Essential Guide to Digital Set-Top Boxes and Interactive TV

Author: Gerard ODriscoll

Everything you need to know about the coming digital interactive TV revolution!

There's a revolution coming to your TV: a digital, interactive, Internet-enabled revolution that will make possible services you've never imagined! The next TV revolution comes with new technologies, new standards, new architectures, and new business paradigms. Finally, there's a single source for up-to-the-minute insight into every aspect of next-generation digital TV: The Essential Guide to Digital Set-Top Boxes and Interactive TV!

From MPEG-4 to middleware, webcasting to Java OS, Gerard O'Driscoll covers the state-of-the-art, comparing the strategies and technologies-and cutting through the hype. Coverage includes all this, and more:

  • Digital TV building blocks: compression, encoding, modulation, conditional access, transmission, and management
  • Advanced digital set-tops: features, components, installation, and troubleshooting
  • Set-top operating systems: JavaOS, Windows CE, David OS-9, PowerTV, VxWorks, pSOS+, Linux, and more
  • Internet-based TV: set-top Web browsing, webcasting, email, online chat, broadband applications, video on demand, parental controls, and more
  • Electronic program guides (EPGs): 21st century TV portals
  • Development, server architecture, middleware, network management, smartcards, MPEG-4, and much more

Whether you're an investor, manager, marketing or PR professional, software developer, or consumer, you need to know where TV is headed, and only one book can show you: The Essential Guide to Digital Set-Top Boxes and Interactive TV!

Booknews

The author explores the various industry initiatives and standard bodies that are defining open set-top box technologies, describes the operating systems and middleware products available, and looks at the servers and technologies that are needed to support broadband Internet, intranet and TV-centric applications. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Table of Contents:
1. Overview of Digital TV.
Terminology. What is Digital Television? International Standard Bodies and Agreements. European Telecommunications Standards Institute (ETSI). Digital Video Broadcasting (DVB). Advanced Television Systems Committee (ATSC). Digital Audio Visual Council (DAVIC). European Cable Communications Association (ECCA). CableLabs. W3 Consortium (W3C). Federal Communications Commission (FCC). Building blocks of a Digital TV system. Compression and Encoding. Modulation. Conditional Access System. Network Transmission Technologies. Network Management. Summary.

2. Set-top Hardware Architecture.
Evolution of Advanced Digital Set-tops. Set-top Box Computing Paradigm. Basic Concepts. How a set-top Works. Under the Hood. System Board. Tuner(s). Modulator and Demodulator. Demultiplexer and Decryptor. Decoders. Graphics Processor. Central Processing Unit. Memory Configuration. Storage Devices. Physical Interfaces. Installing a digital set-top. Troubleshooting an installation. Summary.

3. Set-top Real-time Operating Systems.
Architecture of a Set-top OS. Choice of Set-top OSs. PowerTV OS. VxWorks. pSOSystem. Microware's DAVID OS-9. Microsoft's Windows CE. Java OS for Consumers. Linux. Summary.

4. Set-top Middleware and APIs.
Middleware concepts. Virtual machines. HTML Virtual Machine. JavaScript Virtual Machine. Personal Java Virtual Machine. MHEG-5. Middleware Standards. Multimedia Home Platform (MHP). DTV Application Software Environment (DASE). AdvancedTelevision Enhancement Forum (ATVEF). Set-top Middleware Choices. OpenTV. PowerTV. WebTV for Microsoft's TVPAK Platform. MediaHighway. Liberate eNavigator. PlanetWeb. Summary.

5. Set-top Specifications and Platforms.
Categories of digital set-tops. Eurobox. OpenCable. Sky Series 2200. CT5000+. Nokia MediaMaster T. Motorola Streamaster. The Explorer Set-top Family from Scientific-Atlanta. Implementations. Summary.

6. Set-top Application Development.
Developing for a set-top environment versus a PC environment. Set-top Application Development Cycle. Application Development Environments. OpenTV Application Development. Windows CE Application Development. Personal Java Application Development. Developing DVB Java Applications. Developing MediaHighway applications. Developing PowerTV applications. Developing MHEG-5 applications. Developing Liberate applications. Summary.

7. Set-top Internet Applications.
About the Internet. Understanding TCP/IP. About Internet Addresses. Subnetting an IP Broadband Network. Future of IP Addressing. Domain Name System. Assigning IP Addresses to Set-tops. Security policies and Firewalls. Introduction to Web browsing. Set-top Browsers. Functional Overview. Set-top Web Browser Application. Web Server. Set-top Proxy Server Software. High-speed Internet connection. How Set-top Web Browsing Works. Choosing a Set-top Browser Platform. Introduction to Set-top E-mail. How Set-top E-mail Works. Set-top E-mail Clients. Set-top E-mail Security. The Set-top E-mail Marketplace. Online Chat. Webcasting. How Webcasting Works? Summary.

8. Set-top Intranet Applications.
About Intranets. Choice of broadband Intranet applications. Client/Server Computing. Set-top Home Banking. Set-top E-commerce. Set-top Education. Set-top Gaming. Set-top Weather. TV Broadcast Services. Electronic Program Guides. Interactive Channel Browser. Pay Per View (PPV). Video on Demand. Near Video on Demand. Teletext. Parental Control. Summary.

9. Electronic Program Guides.
Basic EPGs. Advanced EPGs. Why EPGs look the way they do. Future EPG Developments. The Mediators (1997). TV-internet EPG Project. Case Study. Summary.

10. Set-top Server Architecture.
Overview of server architecture. Application Server(s). Database Server(s). Web Server(s). Transaction Server(s). Commerce Server(s). Personalization and Membership Servers. Broadcast Server. OpenTV. Application Streamer. Broadcast Streamer. Microsoft TV Server. Windows 2000 Server Family. Site Server (Commerce Edition). SQL Server 7.0. TVPAK Server. Microsoft Commercial Internet Server. MSN Portal Services. Network Management. Summary.

11. Set-top Smart Card Technologies.
Architecture of set-top Smart Cards. CPU. RAM. ROM. EEPROM. I/O Serial Interface. Smart card Security. Smart card Software. Java Card from Sun Microsystems. MultOS from MasterCard. Microsoft's Smart Card for Windows. Visa Open Platform. Summary.

12. Set-top Enhanced TV.
Fundamentals. Benefits of enhanced TV. General Principles of Designing for a TV environment. Screen Resolution. Navigation. Font Dimensions, Colors, and Lines. Computer and Multimedia Standards. Audiences. Download Times. Content Standardization for Set-tops. Authoring Enhanced TV Content for ATVEF-compliant Set-tops. Authoring Enhanced TV Content for DASE-compliant Set-tops. Authoring Enhanced TV Content for MHP-compliant Set-tops. Delivering Enhanced TV Content. Levels of Interactivity. Basic Interactivity. Advanced Interactivity. Summary.

13. Advanced Set-top Features.
MPEG-4 Support. Home Networks. Wireline Home Networks. Wireless Home Networks. Set-top Home Networking Middleware. Voice Recognition. Personalization Technologies. Summary. For Further Information. Further Reading.

Index.

Sunday, February 15, 2009

Improve NET Design Your Own Compilers or Digital Gehry

Improve .NET! Design Your Own Compilers

Author: Edward G Nilges

All software developers use languages, which are the fundamental tool of the trade. Despite curiosity about how languages work, few developers actually understand how. Unfortunately, most texts on language and compiler development are hard to digest, written from academic platforms for use in college-level computer science programs. On the other hand, Build Your Own .NET Language and Compiler demystifies compiler and language development, and makes the subjects palatable for all programmers.

This practical book presents techniques that you can apply to everyday work. You'll learn to add scripts and macro languages to your applications, add runtime expression evaluation to their applications, and generate code immediately. Further, you will learn parsing techniques, which are essential to extract information from any structured form of data--like text files, user input, XML, or HTML. As a bonus, the book includes a complete QuickBasic compatible compiler with source code that works. The compiler illustrates the book's techniques and acts as a versatile .NET language.



Look this: Aldo Leopold or Supreme Court Opinions of Clarence Thomas 1991 2006

Digital Gehry: Material Resistance, Digital Construction

Author: Bruce Lindsay

Frank O. Gehry, born in 1929, founded his own architectural firm in Los Angeles in 1962, and since the building of the Guggenheim Museum in Bilbao, he is undoubtedly among the ranks of international architecture superstars. His buildings are complex constructions, with curves and distortions, skilful plastic shapes which never cease to surprise with their breath-taking spatial effects.

To create these daring designs, Gehry makes extensive use of the latest electronic tools, physical models are transformed into digital models using software and hardware which has been adapted from the space industry and medical research. This book provides a colourful insight into Gehry's design methods and the creative process behind his fantastic buildings.

Author Biography: Bruce Lindsay studied at the Yale School of Architecture; he is now Associate Head at the School of Architecture at Carnegie Mellon University in Pittsburgh (USA).



Thursday, February 12, 2009

Microsoft Office Word 2003 or Malicious Bots

Microsoft Office Word 2003: Comprehensive Concepts and Techniques, CourseCa

Author: Gary B Shelly

For the past three decades, the Shelly Cashman Series® has effectively introduced computers to millions of students, consistently providing the highest quality, most up-to-date, and innovative materials in computer education. Enjoy the proven step-by-step style and improved office 2003 updates of the Shelly Cashman Series® Word 2003 textbook to enhance your Office application skills today!



Interesting textbook: Cafe Food at Home or Chicken Etc

Malicious Bots: An Inside Look Into the Cyber-Criminal Underground of the Internet

Author: Ken Dunham

Originally designed to sabotage or annihilate websites, computerized "Bots" are increasingly used in mass spamming events, fraud, extortion, identity theft, and software theft. Once they are loose on the Internet there is no controlling the harm they can inflict. With more than 26 years of information security experience between them, Dunham and Melnick provide a much needed a resource for understanding the scope, sophistication, and criminal uses of bots and how to more proactively protect against them. They examine the top bot attacks against financial and government networks over the last four years and reveal the who, how, and why behind them.



Table of Contents:
Preface     ix
Acknowledgments and Permissions     xi
About the Authors     xiii
Introduction to Bots     1
Thr34t Security Krew and the TK Worm     7
The Investigation of the Thr34t Krew   Lance Mueller     9
First DYNDNS Account (BestIce)     12
Second DYNDNS Account (Phreeze)     16
Third DYNDNS Account (D00M)     19
Seth Fogie     21
Help with Additional Technical Details     23
A Trip Across the Pond     23
Sitexec     25
DiSice     26
XaNiTH     28
Sitexec     30
Second Search Warrant Sweep     30
Jadaka     30
Mr40     31
Thr34t Krew Investigation: Concluding Comments     31
Demonstration: How a Hacker Launches a Botnet Attack     33
Step 1: Find, Modify, and Build a Bot     33
Step 2: Customize the Binary for Attack     35
Step 3: Launch the Attack     37
Step 4: Managing the Botherd     37
Step 5: Payloads, with an Emphasis on "Pay"     39
Introduction to the Use of Botnets in Criminal Activity     41
Timeline     41
Bots: A Pathway to Criminalization of the Information Age     44
Bots: The Integrated Business Solution for Criminals     45
"Botmasters" Who Were Caught     46
International Botnet Task Force Conferences     47
Operation "Bot Roast" I and II     47
How Big Do Botnets Need to Be to Pose a Serious Threat?     48
Peering Inside the IRC Botnet     50
Post-IRC-Based Bots     50
Botnet Attack Statistics     52
Botnet Features and the Criminal Enterprise     54
A Modular Approach to Botnets: A Major Aid to Criminals     54
Granular Spreading Capabilities     55
A "Service Bot"     55
The Degradation Feature of Botnets and Its Impact on Criminal Activity     56
Botherds Through the Eyes of a Criminal Mind     57
Criminal Vectors Utilizing Bots     57
Theft of Sensitive Information     57
DDoS Attacks and Extortion     58
Bot for Rent or Hire     60
Spam     63
Spam Bots and Criminalization     65
Pump-and-Dump Fraud     66
Covert Communications     67
Click Fraud and Affiliate Abuse     68
Adware Abuse      69
Taking Out the Competition     70
Botnets and the eCrime Cycle: The iSIGHT Partners' Approach     71
Technical Introduction to Bots     75
Common Ports     75
Command and Control Strategies     76
IRC C&C     76
Peer-to-Peer C&C     79
Web-Based C&C     80
Use of Encryption or Obfuscation     84
Types of Distributed Denial of Service (DDoS) Attacks     85
Introduction to Selected Bots     86
AgoBot     89
SDBot     91
PhatBot     96
The Infamous Hang-UP Team and IRC-Based Fraud Operations     98
Reptile     101
ZoTob     102
PBot     103
Tsunami     105
Kelvir     106
MetaFisher     107
Storm     113
Mitigation     123
Concluding Thoughts     125
USA Today: Botnets Used for Blackmail in Cyber Extortions     125
The Kraken Botnet     126
A Botnet That Targets .edu and .mil Servers     126
"Poisoning" the Storm Botnet     126
The Battle Is Joined!     127
The "Cyber Parasites" of the Internet     127
On the Edge of a Precipice     128
Glossary     131
Bibliography     135
Index     145

Wednesday, February 11, 2009

The Call Center Handbook or Game Development Essentials

The Call Center Handbook: The Complete Guide to Starting, Running, and Improving Your Call Center

Author: Keith Dawson

Need to know how to buy a phone switch for your call center? How to measure the productivity of agents? How to choose from two cities that both want your center? No problem. The Call Center Handbook is a complete guide to starting, running, and improving your call center. It explains it all: everything that goes into the connection between a company and its customers. From technology primers to details about choosing and using specific products, this handbook is an indispensable guide for the call center manager. Tips for what works and what doesn't. Help with operational problems, like managing people and technology, for without tools call centers fail to thrive. Includes information on switches, IVR, voice processing, call center peripherals, software, long distance and toll-free services, outsourcing, agent training, monitoring, the Internet, and disaster prevention.

New and expanded topics in this edition include:

  • IP technology in small and mid-sized centers--what it means for the manager, and how to coordinate with the IT department
  • The impact of the economy on an industry once thought to be "recession-proof"--what it means for hiring, service levels, and technology development
  • What to do when your vendor goes belly up
  • The offshore revolution--India, Philippines, Australia, and other low-labor cost areas that are altering the cost equations for service delivery and site selection



Look this: The Killing of Reinhard Heydrich or Disobedience and Democracy

Game Development Essentials: Game Project Management

Author: John Hight

Game Development Essentials: Game Project Management is the only book on the market that offers a comprehensive introduction to game project management in an informal and accessible style, while concentrating on both theory and practice. This book offers an overview of the game project management process including: roles and responsibilities of team members; phases of production; concept development; testing, marketing; scheduling; and budgeting. The fast-growing game industry has fueled rapid upward movement of game production staff into the ranks of management. This book will train readers in the tools and techniques necessary to become effective team leaders.



Table of Contents:
Chapter 1 - History of Game Project Management
Chapter 2 - Concept Development
Chapter 3 - Game Design
Chapter 4 - Technical Design
Chapter 5 - Art Style Guide, Sound Design
Chapter 6 - Production Plan
Chapter 7 - Team Management
Chapter 8 - External Relationships

Monday, February 9, 2009

Discovering AutoCAD 2008 or iMovie 6 iDVD

Discovering AutoCAD 2008

Author: Mark Dix

Designed for introductory AutoCAD users, Discovering AutoCAD 2008 offers a hands-on, activity-based approach to the use of AutoCAD as a drafting tool—complete with techniques, tips, shortcuts, and insights that improve efficiency. Topics and tasks are carefully grouped to lead users logically through the AutoCAD command set, with the level of difficulty increasing steadily as skills are acquired through experience and practice. Straightforward explanations focus on what is relevant to actual drawing procedures, and illustrations show exactly what to expect on the computer screen.  Introduces readers to the AutoCAD commands using a structured, intuitive approach. Provides a simple overview of basic command procedures in a step-by-step format. Demonstrates what users should expect to see on their screen and encourages self-paced study. Includes drawing suggestions, timesaving tips, and meaningful explanations of how to use techniques in actual applications. Working drawings accompany drawing problems. Designed for introductory AutoCAD users.



Books about: The Murder of Nikolai Vavilov or The Anatomy of Fascism

iMovie 6 & iDVD: The Missing Manual

Author: David Pogu

While the last version of iMovie HD gave moviemakers the ability to capture and edit widescreen High Definition Video (HDV) from the new generation of HDV camcorders, iMovie HD 6 is all about the ease of moviemaking itself. iMovie HD 6 includes five professionally designed themes with backgrounds, motion graphics, titles and effects that act as building blocks for your projects. You can preview effects in real time using the full screen, and add sound effects with a built-in sound studio. And now you can work on multiple iMovie projects at once (and drag & drop clips among them), and output your creations to the Web with the new iWeb application, to an iPod, and even as a video Podcast. Magic iDVD offers easy-to-use themes including new widescreen options.

For professional and amateur moviemakers, this is amazing stuff. But if you want to learn the full capabilities of these applications, Apple documentation won't make the cut. Instead, "iMovie HD 6 & iDVD 6: The Missing Manual is the ideal third-party authority that covers all of these changes through an objective lens. This witty and entertaining guide from celebrated author David Pogue details every step of iMovie HD video production, from choosing and using a digital camcorder to burning the finished work onto DVDs or posting it online. The book also provides a firm grounding in basic film technique so that the quality of your video won't rely entirely on magic.



Table of Contents:
Ch. 1The DV camcorder13
Ch. 2Turning home video into pro video31
Ch. 3Special event filming63
Ch. 4Camcorder meets Mac81
Ch. 5Building the movie119
Ch. 6Transitions and special effects149
Ch. 7Titles, captions, and credits185
Ch. 8Narration, music, and sound217
Ch. 9Still pictures and QuickTime movies247
Ch. 10Professional editing techniques265
Ch. 11Back to the camcorder275
Ch. 12From iMovie to QuickTime285
Ch. 13Movies on the Web, the iPod, and the phone315
Ch. 14QuickTime player339
Ch. 15From iMovie to iDVD355
Ch. 16iDVD projects by hand389
Ch. 17Designing iDVD themes411
Ch. 18iDVD secrets425
App. AiMovie 6, menu by menu443
App. BTroubleshooting461
App. CMaster keyboard shortcut list479

Sunday, February 8, 2009

Grand Theft Auto or Eternal Sonata

Grand Theft Auto: Liberty City Stories Official Strategy Guide (PS2)

Author: BradyGames

BradyGames' Grand Theft Auto: Liberty City Stories (PS2) Official Strategy Guide includes the following:
A complete walkthrough of every mission.
Extensive area maps of Liberty City plot the precise location of weapons, armor, health, bribes, adrenaline and more.
A virtual showroom of every mode of transportation available.
Secret locations and items revealed!

Platform: PlayStation 2

Genre: Action/AdventureThis product is available for sale worldwide.



Book about: Comportamiento Organizativo en Educación:Mando Adaptable y Reforma Escolar

Eternal Sonata

Author: Jennifer Sims

A World of Vivid Colors. A World That Feels Real. Is This Just a Dream?

 

SIDE QUESTS

Maximize the fun by learning everything there is to know about the game’s side quests. This guide has a complete listing of every Score Piece in the game!

 

AREA MAPS

Find every treasure chest in the game and safely navigate through each area. Every map comes loaded with item callouts and screenshots!

 

COMPREHENSIVE WALKTHROUGH

Game-tested strategies and detailed tips for each area in the game. Learn specific strategies for fighting in the light and dark! Fear no boss, as each foe’s attacks and weaknesses are revealed.

 

ITEM & EQUIPMENT LISTINGS

Tons of statistical information for armor, accessories, and weapons. Includes a complete listing of every item!

 

ALL-INCLUSIVE BESTIARY

Get the lowdown on every monster and boss with a wide range of essential data, including a foe’s morphing ability.

 

Platform: Xbox 360

Genre: Role-Playing Game

This product is available for sale in North America only.



Saturday, February 7, 2009

Windows Home Server Bible or Beginning PERL

Windows Home Server Bible

Author: Greg Kettell

Transform digital chaos into a well-organized home network

When was the last time you backed up your home computer? If your household is a hodge-podge of unconnected laptops, desktops, and printers, it's time to bring order and peace of mind by creating your own secure home network with Windows Home Server (WHS) and this comprehensive guide. From protecting your data against hardware failures to organizing all of your family's digital media onto one central hub, this practical reference covers all the techniques and step-by-step instruction you need to succeed.



• Choose the out-of-the-box WHS solution or repurpose a spare PC

• Go wired or wireless, run Ethernet cable, and configure a router

• Walk through installation and get up to speed on the WHS Console

• Establish user accounts, set up shared folders, and create a print server

• Schedule backups for PCs or Macs and recover from crashes

• Build a media hub and stream to computers, Xboxes, and PlayStations

• Monitor your home remotely with a webcam




Look this: Développement et Changement Social :une Perspective Globale

Beginning PERL: From Novice to Professional

Author: James Le

Beginning Perl, Second Edition is a well-named text that starts exactly where it claims...This book is a fine place to start.


— James Edward Gray II, Slashdot contributor


...there are great examples, and projects assigned after each chapter to help you really understand and remember how to code in Perl.


— Mark Spritzler, JavaRanch Bartender


This book is a well-conceived introduction to Perl in tutorial form... A Very Good Book. :) :) :) :) of 5.


— George Woolley of Oakland Perl Mongers


The Perl (this book) teaches is strong industry-standard Perl that is...considered best practice.


— Jack Herrington, Editor, Code Generation Network

Originally created as a powerful text processing tool, Perl has since evolved into a multi-purpose, multi-platform language capable of implementing a variety of tasks such as system administration, CGI and network programming, XML processing, and more. Beginning Perl, Second Edition provides valuable insight into Perl's role regarding all of these tasks and more.

Commencing with a comprehensive overview of language basics, you'll learn all about important concepts such as Perl's data types and control flow constructs. This material sets the stage for a discussion of more complex topics, such as writing custom functions, using regular expressions, and file input and output. Next, we move on to the advanced topics of object oriented programming, modules, CGI programming, and database administration with Perl's powerful database interface module, DBI. The examples and code provided offer you all of the information you need to start writing your ownpowerful scripts to solve the problems listed above, and many more.

Whether you are a complete novice or an experienced programmer, Beginning Perl, Second Edition offers an ideal guide to learning Perl.



Table of Contents:
Ch. 1First steps in Perl1
Ch. 2Scalars13
Ch. 3Control flow constructs51
Ch. 4Lists and arrays77
Ch. 5Hashes111
Ch. 6Subroutines/functions127
Ch. 7Regular expressions149
Ch. 8Files and data177
Ch. 9String processing205
Ch. 10Interfacing to the operating system213
Ch. 11References229
Ch. 12Object-oriented Perl253
Ch. 13Modules287
Ch. 14Introduction to CGI315
Ch. 15Perl and DBI347

Friday, February 6, 2009

Mathematical Techniques in Multisensor Data Fusion or Network Management

Mathematical Techniques in Multisensor Data Fusion

Author: David L Hall

"Since the publication of the first edition of Mathematical Techniques in Multisensor Data Fusion, advances in algorithms, logic, and software tools have transformed the field of data fusion. This updated edition covers these areas as well as smart agents, human computer interaction, cognitive aides to analysis, and data system fusion control." Besides assisting practitioners in selecting the appropriate algorithm for implementing a data, fusion system, this book offers guidance in determining the trade-offs among competing data fusion algorithms, selecting commercial off-the-shelf (COTS) tools, and understanding when data fusion improves systems processing. Completely new chapters in this second edition explain data fusion system control and the latest applications of data fusion in data warehousing, medical equipment, and defense systems.

Booknews

Research into how to combine data from multiple (and sometimes different) sensors to find out what is going on, has been split between military (battlefield surveillance, etc.) and non-military (robotics, etc.) concerns. The two groups don't speak to each other, and have developed different approaches, techniques, and terminology. Here is a distillation of the mathematics they both use for data- fusion reduced to the bare bones to be comprehensible to researchers and application engineers in many fields. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Read also Middle Path Cookbook or Margaret Fultons Kitchen

Network Management: Accounting and Performance Strategies

Author: Benoit Clais

Network Management: Accounting and Performance Strategies

 

The definitive guide to collecting usage information from Cisco networks

 

Benoit Claise, CCIE® No. 2868

Ralf Wolter

 

Understanding network performance and effectiveness is now crucial to business success. To ensure user satisfaction, both service providers and enterprise IT teams must provide service-level agreements (SLA) to the users of their networks–and then consistently deliver on those commitments. Now, two of the Cisco® leading network performance and accounting experts bring together all the knowledge network professionals need to do so.

 

Network Management: Accounting and Performance Strategies imparts a deep understanding of Cisco IOS® embedded management for monitoring and optimizing performance, together with proven best strategies for both accounting and performance management.

 

Benoit Claise and Ralf Wolter begin by introducing the role of accounting and performance management in today’s large-scale data and voice networks. They present widely accepted performance standards and definitions, along with today’s best practice methodologies for data collection.

 

Next, they turn to Ciscodevices and the Cisco IOS Software, illuminating embedded management and device instrumentation features that enable you to thoroughly characterize performance, plan network enhancements, and anticipate potential problems and prevent them. Network standards, technologies, and Cisco solutions covered in depth include Simple Network Management Protocol (SNMP) and Management Information Bases (MIB), Remote Monitoring (RMON), IP accounting, NetFlow, BGP policy accounting, AAA Accounting, Network Based Application Recognition (NBAR), and IP SLA (formerly known as SAA). For each, the authors present practical examples and hands-on techniques.

 

The book concludes with chapter-length scenarios that walk you through accounting and performance management for five different applications: data network monitoring, capacity planning, billing, security, and voice network performance.

 

Network Management: Accounting and Performance Strategies will be indispensable to every professional concerned with network performance, effectiveness, or profitability, especially NMS/OSS architects, network and service designers, network administrators, and anyone responsible for network accounting or billing.

 

Benoit Claise, CCIE® No. 2868, is a Cisco Distinguished Engineer working as an architect for embedded management and device instrumentation. His area of expertise includes accounting, performance, and fault management. Claise is a contributor to the NetFlow standardization at the IETF in the IPFIX and PSAMP Working Groups. He joined Cisco in 1996 as a customer support engineer in the Technical Assistance Center network management team and became an escalation engineer before joining the engineering team.

 

Ralf Wolter is a senior manager, consulting engineering at Cisco. He leads the Cisco Core and NMS/OSS consulting team for Europe, works closely with corporate engineering, and supports large-scale customer projects. He specializes in device instrumentation related to accounting and performance management.

 

  • Compare accounting methods and choose the best approach for you
  • Apply network performance best practices to your network
  • Leverage built-in Cisco IOS network management system components to quantify performance
  • Uncover trends in performance statistics to help avoid service degradation before it occurs
  • Identify under use of network paths, so you can improve overall network efficiency
  • Walk through hands-on case studies that address monitoring, capacity planning, billing, security, and voice networks
  • Understand Cisco network performance, deliver on your SLAs, and improve accounting and billing

 

This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.



Table of Contents:
Introduction     xxvi
Data Collection and Methodology Standards     3
Understanding the Need for Accounting and Performance Management     5
Definitions and the Relationship Between Accounting and Performance Management     11
Defining Accounting Management     11
Defining Performance Management     13
The Relationship Between Accounting and Performance     17
A Complementary Solution     20
The Purposes of Accounting     22
Network Monitoring     22
User Monitoring and Profiling     24
Application Monitoring and Profiling     26
Capacity Planning     31
Link Capacity Planning     31
Network-Wide Capacity Planning     32
Traffic Profiling and Engineering     34
Peering and Transit Agreements     37
Billing     43
Volume-Based Billing     49
Destination-Sensitive Billing     50
Destination and Source-Sensitive Billing     52
Quality-of-Service Billing     53
Application and Content-Based Billing     55
Time/Connection-Based Billing     55
Voice over IP (VoIP) and IP Telephony (IPT) Billing     55
Security Analysis     57
Purposes of Performance     61
Device Performance Monitoring     62
Network Element Performance Monitoring     63
System and Server Performance Monitoring     64
Network Performance Monitoring     65
Service Monitoring     66
Baselining     68
Fault Management     70
Applying the Information to the Business     74
Summary     80
Data Collection Methodology     85
Data Collection Details: What to Collect     86
What Are the Keys?     89
What Are the Values?     89
Value Versus Key Example: DiffServ Code Point     90
Value Versus Key Example: BGP Autonomous System Path     91
What Are the Required Versus Nice-to-Have Types of Data?     93
Data Types List     93
Example: Application Monitoring     94
Example: Traffic Matrix     98
Example: SLA Monitoring     99
Defining the User     100
Metering Methods: How to Collect Data Records     102
Active Versus Passive Monitoring     103
Passive Monitoring Concepts     104
Full Collection      104
Partial Collection     105
Filtering Versus Sampling     105
Sampling Methods     107
Filtering at the Network Element     118
Active Monitoring Concepts     120
Concepts for Generating Synthetic Traffic     120
Active Monitoring Technologies and Tools: ping, traceroute, and IP SLA     126
Best Practice: How to Position Active and Passive Monitoring     128
Outlook: Passive Monitoring for One-Way Delay Analysis     129
Metering Positions: Where to Collect Data Records     130
Network Element Versus End Device Collection     130
Edge Versus Core Collection     132
Embedded Versus External Device Collection     136
Ingress Versus Egress Collection     138
Flow Destination or Source Lookup     140
Technology-Dependent Special Constraints     141
Collection Infrastructure: How to Collect Data Records     144
Pull Versus Push Model     144
Event-Based Model     145
Export Protocols     146
SNMP     148
NetFlow     149
FTP     150
Authentication, Authorization, and Accounting (AAA) Architecture     151
Network Design for the Collection Infrastructure     151
Communication Concepts     152
Collection Server Concepts     154
Placing the Collection Server (Centralized, Distributed)     154
Real-Time Requirements     156
Mediation Device Functionality: How to Process Data Records     157
Filtering     157
Estimation from Sampling     159
Threshold Monitoring     159
Data Aggregation     160
Data Record Correlation and Enrichment     164
Flow De-Duplication     165
Data Record Formatting and Storage     165
Security Considerations: How to Ensure Data Authenticity and Integrity     167
Source Authentication     167
Ensuring Data and Device Integrity     168
Denial-of-Service (DoS) Attacks     169
Summary     170
Accounting and Performance Standards and Definitions     173
Understanding Standards and Standards Organizations     173
Architectural and Framework Standards: The TMN/FCAPS Model (ITU-T)     176
Fault Management     180
Configuration Management     181
Accounting Management     181
Performance Management     182
Security Management     183
The TMN Framework     184
Architectural and Framework Standards: the eTOM Model (TMF)     185
Informational IETF Standards     189
IETF RFC 2924, Accounting Attributes and Record Formats     189
IETF RFC 2975, Introduction to Accounting Management     189
Information Modeling     190
Data Collection Protocols: SNMP, SMI, and MIB     191
Internet Management Model and Terminology     191
MIB Modules and Object Identifiers     193
SMI Definitions     194
SNMP Versions     196
References for SMIv1 and SMIv2     199
Data Collection Protocols: NetFlow Version 9 and IPFIX Export Protocols     201
NetFlow Version 9 Export Protocol     202
The Template Mechanism     202
The Export Protocol     204
NetFlow Version 9 Export Protocol Example     206
IPFIX     208
The IPFIX Export Protocol     209
Work in Progress     211
IPFIX References     211
Data Collection Protocols: PSAMP     212
PSAMP Protocol Specifications     212
PSAMP References     213
Data Collection Protocols: AAA (Radius, Diameter, and TACACS+)     214
Radius     214
TACACS+     216
Diameter     216
Data Collection Protocols: IPDR     217
Data Collection Protocols: CMISE/CMIP and GDMO     218
Service Notions     219
Summary     222
Implementations on the Cisco Devices     225
SNMP and MIBs     227
MIBs     228
IOS Support for SNMP Versions     229
Net-snmp Utilities     229
CLI Operations and Configuration Example for SNMPv2c     230
SNMPv2c Configuration Example     230
SNMPv2c Data Retrieval     231
Displaying SNMPv2c Statistics     231
CLI Operations and Configuration Examples for SNMPv3     231
authNoPriv SNMP Example     233
authPriv SNMP Example     235
MIB Table Retrieval Example     235
MIB Functional Area Comparison Table     237
General-Purpose MIBs for Accounting and Performance     239
MIB-II (RFC 1213), IF-MIB (RFC 2863), and CISCO-IF-EXTENSION-MIB     240
CISCO-PING-MIB     241
Relevant MIB Objects (Read-Write)     241
Relevant MIB Objects (Read-Only)      242
CISCO-PROCESS-MIB     242
CISCO-ENVMON-MIB and CISCO-HEALTH-MONITOR-MIB     244
CISCO-MEMORY-POOL-MIB     244
CISCO-DATA-COLLECTION-MIB     244
Advanced Device Instrumentation     247
Technology-Specific MIBs for Accounting and Performance     247
Frame Relay     247
MPLS     249
MPLS Label Switch Router (LSR) MIB (RFC 3813)     249
MPLS Traffic Engineering MIB (RFC 3812)     250
IPv6     251
Multicast     252
Interface Group MIB (RFC 2863)     253
RMON-MIB (RFC 1757)     253
Multicast Routing MIB for IPv4 (RFC 2932)     253
VLAN     253
Community String Indexing     254
Additional Monitoring Parameters     254
Traffic Management and Control     255
CISCO-CAR MIB     255
CISCO-CLASS-BASED-QOS-MIB     256
Telephony     257
Dial Control Management MIB (RFC 2128)     259
CISCO-VOICE-DIAL-CONTROL-MIB     260
CISCO-VOICE-COMMON-DIAL-CONTROL-MIB     261
CISCO-CALL-HISTORY-MIB     261
SIP MIB     262
Creating New MIB Objects: EXPRESSION-MIB      265
EXPRESSION-MIB Examples     266
EVENT-MIB Associated with EXPRESSION-MIB     268
Obtaining MIBs     269
RMON     273
RMON 1 and RMON 2 MIBs     273
RMON Principles     277
Supported Devices and IOS Versions     277
Cisco NAM Modules     278
CLI Operations     279
SNMP Operations     280
RMON Row Concept     280
Operations to Activate the Network Layer Host Group from the RMON 2 MIB     282
Examples     282
Initial Configuration     282
Collection Monitoring     282
DSMON MIB     284
DSMON MIB Principles     286
Supported Devices and IOS Versions     286
CLI Operations     286
SNMP Operations     286
Examples     287
SMON MIB     287
Supported Devices and IOS Versions     288
CLI Operations     288
SNMP Operations     288
Examples     289
Collection Monitoring     289
APM MIB and ART MIB     289
Supported Devices and IOS Versions     291
CLI Operations      291
SNMP Operations     291
Examples     291
Collection Monitoring     291
Applicability     292
Further Reading     293
IP Accounting     297
IP Accounting (Layer 3)     298
IP Accounting (Layer 3) Principles     298
Supported Devices and IOS Versions     299
CLI Operations     299
SNMP Operations     300
Examples (CLI and SNMP)     301
Initial Configuration     302
Collection Monitoring     302
IP Accounting Access Control List (ACL)     303
IP Accounting ACL Principles     304
Supported Devices and IOS Versions     304
CLI Operations     304
SNMP Operations     305
Examples (CLI and SNMP)     305
Initial Configuration     305
Collection Monitoring     306
IP Accounting MAC Address     308
IP Accounting MAC Address Principles     308
Supported Devices and IOS Versions     309
CLI Operations     309
SNMP Operations     310
Examples (CLI and SNMP)     311
Initial Configuration     311
Collection Monitoring     311
IP Accounting Precedence     312
IP Accounting Precedence Principles     313
Supported Devices and IOS Versions     313
CLI Operations     314
SNMP Operations     314
Examples (CLI and SNMP)     315
Initial Configuration     315
Collection Monitoring     315
Applicability     317
NetFlow     319
Fundamentals of NetFlow     322
Flow Definition     322
Cache Concept     325
Aging Flows on a Router     327
Aging Flows on a Catalyst     328
Export Version and Related Information Elements     329
The Beginning     330
The Foundation     330
Catalyst-Specific     330
Router-Based Aggregation     332
Flexible and Extensible     336
IPFIX     337
Comparison of Information Elements and NetFlow Version     338
Supported Interfaces     339
Export Protocol: UDP or SCTP     340
NetFlow Device-Level Architecture: Combining the Elements     342
Cisco NetFlow Collector     344
CLI Operations      345
SNMP Operations with the NETFLOW-MIB     346
Example: NetFlow Version 5 on a Router     347
Example: NetFlow Configuration on the Catalyst     348
Example: NetFlow Version 8     350
Example: NetFlow Version 9     350
New Features Supported with NetFlow Version 9     351
SCTP Export     351
Sampled NetFlow     353
Packet-Based Sampling on the Routers     354
Flow-Based Sampled NetFlow on the Catalyst     356
NetFlow Input Filters     358
MPLS-Aware NetFlow     360
BGP Next-Hop Information Element     362
NetFlow Multicast     363
NetFlow Layer 2 and Security Monitoring Exports     365
Top Talkers     366
Flexible NetFlow     370
Fields in Flexible NetFlow     372
Packet Sections     374
Flexible NetFlow Cache Types     374
Comparison of Original NetFlow and Flexible NetFlow     375
CLI Operations     377
Flexible NetFlow Examples     379
Deployment Guidelines     385
Supported Devices and IOS Versions     387
BGP Policy Accounting     389
Input BGP Policy Accounting      390
Output BGP Policy Accounting     391
Summary of All Four BGP Policy Accounting Combinations     392
Fundamentals     393
BGP Policy Accounting Commands     394
SNMP Operations     395
Examples (CLI and SNMP)     396
Initial Configuration     396
Collection Monitoring     397
Destination-Sensitive Services     398
Destination-Sensitive Billing     398
Destination-Sensitive Billing Example     399
Destination-Sensitive Traffic Shaping (DSTS)     399
Destination-Sensitive Traffic Shaping Example     400
Applicability     400
AAA Accounting     403
Fundamentals of AAA Accounting     405
High-Level Comparison of Radius, TACACS+, and Diameter     406
Radius     407
Radius Attributes     409
Radius CLI Operations     415
Voice Extensions for Radius     416
Concept of Call Legs     416
Radius Accounting with the Vendor-Specific Attribute     419
Radius Accounting with the Overloaded Acct-Session-Id     423
Comparing the Vendor-Specific Attribute and the Acct-Session-Id     424
CLI Operations for VoIP Accounting with Radius     425
Diameter Details     428
NBAR     433
NBAR Functionality     434
Distributed NBAR     435
NBAR Classification Details     435
Classification of HTTP by URL, Host, or MIME     436
Classification of Citrix ICA Traffic by Application Name     437
NBAR Packet Description Language Module (PDLM)     437
NBAR Scope     438
Supported Devices and IOS Versions     438
NBAR Protocol Discovery (PD) MIB     439
NBAR Supported Protocols     440
NBAR Protocol Discovery Statistics     440
NBAR Top-N Statistics     441
NBAR Protocol Discovery Thresholds, Traps, and History     442
NBAR Configuration Commands     443
NBAR show Commands     443
NBAR Examples (CLI and SNMP)     445
Basic NBAR Configuration     445
Custom Application Example     446
Limiting Peer-to-Peer Traffic     447
HTTP Requests Payload Inspection     447
NBAR Applicability     449
IP SLA     451
Measured Metrics: What to Measure     453
Network Delay     454
Jitter      454
Packet Loss     455
Measurement Accuracy     455
TCP Connect     456
DHCP and DNS Response Time     456
HTTP Response Time     456
Linking Metrics to Applications     456
Operations: How to Measure     457
Operations Parameters     457
Frequency     457
Number of Packets     458
Interpacket Interval     458
Packet Size     458
Timeout     458
Lifetime     459
Start Time     459
MPLS VPN Awareness     459
IP SLA Responder     459
Operation Types     463
ICMP Operations     464
UDP Operations     468
TCP Connect Operation     470
FTP Operation     470
DHCP Operation     471
DNS Operation     471
HTTP Operation     472
Frame Relay Operation     473
ATM Operation     475
VoIP Gatekeeper Registration Delay Monitoring Operation     476
VoIP Call Setup (Post-Dial Delay) Monitoring Operation     477
RTP-Based VoIP Operation     477
DLSw+ Operation      479
IP SLA CLI Operations     480
SNMP Operations with the CISCO-RTTMON-MIB     482
Application-Specific Scenario: HTTP     483
Application-Specific Scenario: VoIP     486
Advanced Features     488
Scheduling     488
Recurring Function     489
Multiple Operation Scheduling     489
Random Scheduling     491
Distribution of Statistics     491
History Collection     494
Thresholds and Notifications     495
Enhanced Object Tracking for IP SLA     499
Implementation Considerations     501
Supported Devices and IOS Versions     501
Performance Impact     503
Accuracy     504
Security Considerations     506
IP SLA Deployment     507
IP SLA Architecture and Best Practices     508
NMS Applications     511
Summary of Data Collection Methodology     515
Applicability     515
Assigning Technologies to Solutions     523
Monitoring Scenarios     525
Network Blueprint for Monitoring     525
Device and Link Performance     526
Network Connectivity and Performance     530
Application Monitoring     534
Service Monitoring and Routing Optimization     536
Capacity Planning Scenarios     541
Link Capacity Planning     541
Network Blueprint for Capacity Planning     543
Problem Space     544
Capacity Planning Tools     546
Methods for Generating the Core Traffic Matrix     548
NetFlow BGP Next Hop ToS Aggregation     551
Flexible NetFlow     552
MPLS-Aware NetFlow     553
BGP Passive Peer on the NetFlow Collector     554
BGP Policy Accounting     555
Other Methods     556
Additional Considerations: Peer-to-Peer Traffic     557
Summary     557
Voice Scenarios     559
Network Blueprint for IP Telephony     560
Voice Performance Measurement     561
Standards and Technology     561
Mean Opinion Scores (MOS)     562
Impairment/Calculated Planning Impairment Factor (ICPIF)     563
Network Elements in the Voice Path     564
Passive Voice Performance Measurement     564
Active Voice Performance Measurement     565
Cisco CallManager (CCM)     565
Application Examples     570
Network Analysis Module     571
CiscoWorks Unified Operations Manager     572
Voice Accounting     573
Standards and Technology     573
Network Elements in the Voice Path     574
Gateway, Gatekeeper, Multimedia Conference Manager     575
Cisco CallManager (CCM)     575
Application Example     575
Is Your Network Ready for IP Telephony?     577
Security Scenarios     579
Network Blueprint for Security Management     580
Security Management Process     582
Preparation     583
Identification     584
Classification     587
NetFlow     587
Network-Based Application Recognition (NBAR)     589
Network Analysis Module (NAM)     589
Other Attack Classification Features     590
Trace Back     591
Reaction     593
Postmortem     594
Summary     596
Billing Scenarios     599
Network Blueprint for Billing     600
Billing Approaches     602
Time-Based Billing      602
pWLAN     602
Dial-In     603
Volume-Based Billing     603
Residential Broadband Access (DSL or Cable)     603
Transit and Peering Agreements     604
Destination-Sensitive Billing     606
Time- and Distance-Based Billing     606
Service-Based Billing     607
Video on Demand (VoD)     608
Enterprise Departmental Charge Back     608
Flat Rate Billing     609
Summary     609
Index     612

Thursday, February 5, 2009

Microsoft Expression Web Illustrated Introductory or Joomla Cash

Microsoft Expression Web-Illustrated Introductory

Author: Julie Riley

This Microsoft Office 2007 Illustrated Series book covers the introductory information that you need to know now for Microsoft Expression Web. Our signature two-page spread design has been updated and refreshed to take full advantage of the new features of the software. This practical, easy to navigate book provides you with the essential knowledge you need to succeed at both work and beyond.



Read also Introductory Foods or Taste of American Place

Joomla! Cash

Author: Brandon Dawson

This book for business people with a medium level of technical skill is a fast and easy-to-read primer on how to implement a cash-generating! website, taking the reader from the inception of an idea to a fully working cash-generating website built on Joomla!. Joomla! is an award-winning freely available open-source Content Management System (CMS) that helps you build websites and other powerful online applications. Joomla! is used all over the world to power everything from simple, personal homepages to complex corporate web applications and includes features such as page caching to improve performance, RSS feeds, printable versions of pages, news flashes, blogs, polls, searching, and internationalization. The emphasis of this book is on Using Joomla! for e-commerce; it gives the reader a valuable knowledge base on search-engine ranking, website layout and design, shopping cart setup using VirtueMart, marketing the website, affiliate marketing with the iDevAffiliate system, and more.



Wednesday, February 4, 2009

Customer Data Integration or Curriculum Webs

Customer Data Integration: Reaching a Single Version of the Truth

Author: Don Peppers

"Customers are the heart of any business. But we can't succeed if we develop only one talk addressed to the 'average customer.' Instead we must know each customer and build our individual engagements with that knowledge. If Customer Relationship Management (CRM) is going to work, it calls for skills in Customer Data Integration (CDI). This is the best book that I have seen on the subject. Jill Dyché is to be complimented for her thoroughness in interviewing executives and presenting CDI."
-Philip Kotler, S. C. Johnson

Distinguished Professor of International Marketing Kellogg School of Management, Northwestern University

"In this world of killer competition, hanging on to existing customers is critical to survival. Jill Dyché's new book makes that job a lot easier than it has been."
-Jack Trout, author, Differentiate or Die

"Jill and Evan have not only written the definitive work on Customer Data Integration, they've made the business case for it. This book offers sound advice to business people in search of innovative ways to bring data together about customers-their most important asset-while at the same time giving IT some practical tips for implementing CDI and MDM the right way."

-Wayne Eckerson, The Data Warehousing Institute author of Performance Dashboards: Measuring, Monitoring, and Managing Your Business

Whatever business you're in, you're ultimately in the customer business. No matter what your product, customers pay the bills. But the strategic importance of customer relationships hasn't brought companies much closer to a single, authoritative view of their customers. Written from both business andtechnicalperspectives, Customer Data Integration shows companies how to deliver an accurate, holistic, and long-term understanding of their customers through CDI.



Interesting textbook: Access Denied or Programming the Microsoft Windows Driver Model Second Edition

Curriculum Webs: Weaving the Web into Teaching and Learning

Author: Craig Cunningham

Curriculum Webs helps educators, curriculum developers, and teachers build and use the World Wide Web as a central resource to facilitate learning. A curriculum web is a Web page or web site designed to support a unit of curriculum. This text describes the process of building curriculum webs from the early planning stages through design of the Web pages, using the finished product in classrooms, reflecting on the results, and revising for further use. Readers will see how successful Web-based curricula can be developed based on the stages of curriculum development and the needs of learners.



Table of Contents:
Ch. 1Planning curriculum for the Web1
Ch. 2Creating a simple curriculum Web20
Ch. 3Identifying curriculum goals35
Ch. 4Laying out an effective Web page70
Ch. 5Choosing learning activities92
Ch. 6Planning instruction and assessment116
Ch. 7Gathering Web-based resources136
Ch. 8Designing an effective Web site163
Ch. 9Using multimedia179
Ch. 10Constructing interactivity196
Ch. 11Evaluating and maintaining curriculum Webs222
Ch. 12Teaching with curriculum Webs233
AppAn overview of Web technologies249