Sunday, December 6, 2009

Spinning the Semantic Web or Comprehensive Functional Verification

Spinning the Semantic Web: Bringing the World Wide Web to Its Full Potential

Author: Dieter Fensel

As the World Wide Web continues to expand, it becomes increasingly difficult for users to obtain information efficiently. Because most search engines read format languages such as HTML or SGML, search results reflect formatting tags more than actual page content, which is expressed in natural language. Spinning the Semantic Web describes an exciting new type of hierarchy and standardization that will replace the current "web of links" with a "web of meaning." Using a flexible set of languages and tools, the Semantic Web will make all available information -- display elements, metadata, services, images, and especially content -- accessible. The result will be an immense repository of information accessible for a wide range of new applications.

This first handbook for the Semantic Web covers, among other topics, software agents that can negotiate and collect information, markup languages that can tag many more types of information in a document, and knowledge systems that enable machines to read Web pages and determine their reliability. The truly interdisciplinary Semantic Web combines aspects of artificial intelligence, markup languages, natural language processing, information retrieval, knowledge representation, intelligent agents, and databases.



Table of Contents:
Foreword
1Introduction1
2SHOE : a blueprint for the Semantic Web29
3DAML-ONT : an ontology language for the Semantic Web65
4Ontologies and schema languages on the Web95
5UPML : the language and tool support for making the Semantic Web alive141
6Ontologies come of age171
7Sesame : an architecture for storing and querying RDF data and schema information197
8Enabling task-centered knowledge support through semantic markup223
9Knowledge mobility : semantics for the Web as a white knight for knowledge-based systems253
10Complex relationships for the Semantic Web279
11SEmantic portAL - the SEAL approach317
12Semantic gadgets : ubiquitous computing meets the Semantic Web363
13Static and dynamic semantics of the Web377
14Semantic annotation for Web content adpatation403
15Task-achieving agents on the World Wide Web431

Go to: Annapurna or Newcomers Handbook for Moving to and Living in Los Angeles

Comprehensive Functional Verification: The Complete Industry Cycle

Author: Bruce Wil

One of the biggest challenges in chip and system design is determining whether the hardware works correctly. That is the job of functional verification engineers and they are the audience for this comprehensive text from three top industry professionals.

As designs increase in complexity, so has the value of verification engineers within the hardware design team. In fact, the need for skilled verification engineers has grown dramatically--functional verification now consumes between 40 and 70% of a project's labor, and about half its cost. Currently there are very few books on verification for engineers, and none that cover the subject as comprehensively as this text.

A key strength of this book is that it describes the entire verification cycle and details each stage. The organization of the book follows the cycle, demonstrating how functional verification engages all aspects of the overall design effort and how individual cycle stages relate to the larger design process. Throughout the text, the authors leverage their 35 plus years experience in functional verification, providing examples and case studies, and focusing on the skills, methods, and tools needed to complete each verification task. Additionally, the major vendors (Mentor Graphics, Cadence Design Systems, Verisity, and Synopsys) have implemented key examples from the text and made these available on line, so that the reader can test out the methods described in the text.

* Comprehensive overview of the complete verification cycle
* Combines industry experience with a strong emphasis on functional verification fundamentals
* Includes industry examples and real-world case studies



Saturday, December 5, 2009

Object Oriented Data Structures Using Java or Advanced PHP Programming

Object-Oriented Data Structures Using Java

Author: Nell B Dal

Data Structures in Java is a continuation of Nell Dale's best-selling Introduction to Java and Software Design text. Data Structures is designed for students who have already taken one semester of computer science and are able to take a problem of medium complexity, write an algorithm to solve the problem, code the algorithm in a programming language, and demonstrate the correctness of their solution. The focus is on teaching computer science principles with chapter concepts being reinforced by case studies. The object-oriented concepts of encapsulation, inheritance, and polymorphism are covered, while the book remains centered on abstract data types.

Booknews

Written to present the algorithmic, programming, and structuring techniques of traditional data structures courses in an object- oriented context, this text presents the familiar topics, but with an emphasis on defining structures using Java interfaces and encapsulating them as Java classes. Chapters cover software engineering, data design and implementation, unsorted and sorted lists, stacks and queues, linked structures, programming with recursion, and sorting and searching algorithms. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Table of Contents:
1Software Engineering1
2Data Design and Implementation69
3ADTs Unsorted List and Sorted List139
4ADTs Stack and Queue249
5Linked Structures341
6Lists Plus405
7Programming with Recursion475
8Binary Search Trees529
9Priority Queues, Heaps, and Graphs611
10Sorting and Searching Algorithms673
App. AJava Reserved Words749
App. BOperator Precedence750
App. CPrimitive Data Types751
App. DASCII Subset of Unicode752
Answers to Selected Exercises753
Index793

See also: Whole Foods or Perfect Party Planner

Advanced PHP Programming

Author: George Schlossnagl

Over the past three years PHP has evolved from being a niche language used to add dynamic functionality to small sites to a powerful tool making strong inroads into large-scale, business-critical Web systems.

The rapid maturation of PHP has created a skeptical population of users from more traditional "enterprise" languages who question the readiness and ability of PHP to scale, as well as a large population of PHP developers without formal computer science backgrounds who have learned through the hands-on experimentation while developing small and midsize applications in PHP.

While there are many books on learning PHP and developing small applications with it, there is a serious lack of information on "scaling" PHP for large-scale, business-critical systems. Schlossnagle's Advanced PHP Programming fills that void, demonstrating that PHP is ready for enterprise Web applications by showing the reader how to develop PHP-based applications for maximum performance, stability, and extensibility.

Slashdot.org
George Schlossnagle has written a great book on PHP programming which ought to generate some enthusiasm. But it's not just about PHP5: the book includes great information on everything from coding style to high-level problem-solving. I met George through a friend of mine who works for the Developers Library, and I'm glad to have finally gotten a look at his book. ... Definitely recommended.



Thursday, December 3, 2009

Multivariate Public Key Cryptosystems or Introduction to Computational Physics

Multivariate Public Key Cryptosystems

Author: Jintai Ding

Multivariate Public Key Cryptosystems systematically presents the subject matter for a broad audience. Information security experts in industry can use the book as a guide for understanding what is needed to implement these cryptosystems for practical applications, and researchers in both computer science and mathematics will find it a good starting point for exploring this new field. It is also suitable as a textbook for advanced-level students. Written more from a computational perspective, the authors provide the necessary mathematical theory behind MPKC; students with some previous exposure to abstract algebra will be well-prepared to read and understand the material.



Table of Contents:
1Overview1
2Matsumoto-Imai cryptosystems11
3Oil-vinegar signature schemes63
4Hidden field equations99
5Internal perturbation113
6Triangular schemes137
7Direct attacks191
8Future research233

Go to: Onions and Other Vegetable Alliums or Piece of Cake

Introduction to Computational Physics

Author: Tao Pang

Thoroughly updated and revised for its second edition, this advanced textbook provides an introduction to the basic methods of computational physics, and an overview of recent progress in several areas of scientific computing. Tao Pang presents many step-by-step examples, including program listings in JavaTM, of practical numerical methods from modern physics and related areas. Now including many more exercises, the volume can be used as a textbook for either undergraduate or first-year graduate courses on computational physics or scientific computation. It will also be a useful reference for anyone involved in computational research.



Wednesday, December 2, 2009

Legal Guide to Web and Software Development or IBM DB2 Version 9 New Features

Legal Guide to Web and Software Development

Author: Stephen Fishman

Protect your rights, and your hard work!

The laws covering website and software development are complex and confusing, but if you don't untangle them, it could cost you thousands of dollars in attorneys' fees and lawsuits.

Fortunately, Legal Guide to Web & Software Development decodes this complex area of the law, thoroughly and in reader-friendly English. It also provides contracts, agreements and legal forms on CD-ROM, with step-by-step instructions for filling them out, so you can protect your software and website without paying a lawyer's ransom.

Use Legal Guide to Web & Software Development to learn:

• what kind of legal protection you need
• the strengths and limitations of each type of protection
• how to avoid infringement
• which provisions you need when drafting an agreement
• how to obtain permission to use other people's materials

You'll find complete, step-by-step instructions to draft:

• employment agreements
• contractor and consultant agreements
• development agreements
• license agreements

The 5th edition of Legal Guide to Web & Software Development is completely update to provide the latest case law and statutory revisions.

Entrepreneur

Covers every imaginable detail important to such a rapidly growing and intangible medium.

What People Are Saying

Jeff Duntemann
"This book passes my own personal test for legal guides -- that it be easily readable for people who detest lawyers -- and passes it with higher marks than any other legal guide I've come across."--(Jeff Duntemann, Editor, PC Techniques Magazine)


John Dvorak
"An amazing book! A must for anyone in the software business... Answers nearly every legal question you can imagine and some you would have never thought of Highest recommendation!"--(John Dvorak, PC Magazine)




Read also Pajama Day or Skippyjon Jones Lost in Spice

IBM DB2 Version 9 New Features

Author: Paul Zikopolous

Get up to speed quickly on the new features in IBM DB2 9

In this book, the IBM expert authors provide you with comprehensive technical details and real-world business uses for all of the exciting new features in the current release of DB2 9. You’ll learn about the capabilities found in pureXML™ as well as administrative enhancements in areas such as self management, high availability, and security. Also covered are features for the developer from a Ruby on Rails toolkit to the Developer Workbench and enhanced .NET developer support.

Paul C. Zikopoulos, BA, MBA, is on the IBM Database Competitive Technology team. He is the coauthor of DB2:The Complete Reference.

George Baklarz, B Math, M Sc, is a senior manager in the DB2 Worldwide Pre-sales Support Group.

Leon Katsnelson works in the IBM Toronto Lab where he manages a team of IBM DB2 UDB product managers.

Chris Eaton is the senior product manager for DB2 Universal Database.

 



Table of Contents:
Letters from Executives     xvii
Acknowledgments     xx
Introduction     xxiii
XML in the DB2 Hybrid Storage Engine
What Is XML?     3
Components of on XML Document     5
Parsing and Serialization     6
Well-Formed and Valid XML     7
XML Schema Definition Documents and DTDs     8
Namespaces: Your Guide to Element Naming Collisions     11
Helping a Namespace: A Universal Resource Identifier     12
Default Namespaces     13
XPath Expressions     13
Examples of Navigating XML with an XPath Expression     13
Defining How Your XML Looks     15
Wrap Up     16
When Do I Use pureXML?     17
Why XML?     18
Typical Use Cases for XML     19
Why XML in a Relational Database?     20
pureXML Solves Your Data Problems     21
XML and Relational Rules of Thumb     23
Our Rule of Thumb for When to Use an XML Model     23
Our Rule of Thumb for When to Use a Relational Model     24
Traditional Methods for Storing XML     24
Why the Large Object Approach Doesn't Work     25
Why Shredding XML to Relational Doesn'tWork     26
Wrap Up     29
pureXML: The DB2 9 XML Database     31
XML in DB2 9 in a Nutshell     32
DB2 9 and Your XML Data     33
Wrap Up     52
Tuning XML Performance     53
XML Performance Topics for Database Administrators     54
Optimizing XML Data Storage     54
Measuring XML Performance Using Snapshot Monitor     56
Indexing Strategies for XML Performance     57
Collecting Statistics for XML Data and Indexes     59
Bulk Loading of XML Data     59
XML Performance Topics for Database Programmers     60
Adjusting the Structure of XML Documents to Improve Performance     60
To Validate or Not to Validate: That Is the Question     61
Better Performing XPath Expressions     63
Use Predicates to Filter Your XML Data     64
Use Parameter Markers     66
Minimize Code Page Conversions     67
Wrap Up     68
Autonomics and Manageability
Up and Running Enhancements     71
New Preconfigured Features in DB2 9     72
Automatic Selection of Default I/O Prefetchers and Page Cleaners     72
Configuration Advisor      73
Self Tuning Memory Manager     73
Statistics Collection     74
Table and Index Reorganization     75
Automatic Storage     75
Copying Database Schemas     75
Installation Enhancements in DB2 9     76
Multiple DB2 Versions and Releases on a Server     76
Installation and Maintenance Features for Windows     77
New DB2 Client Packaging     77
New Standalone ODBC Driver     78
Wrap Up     79
The Self Tuning Memory Manager     81
The DB2 Memory Model 101     83
Operating System Memory Management and STMM     84
How Memory Was Tuned in Earlier DB2 Versions     85
DB2 Memory Tuning in DB2 7     85
DB2 Memory Tuning in DB2 8     85
The STMM in DB2 9     87
How STMM Works     87
Using STMM in DB29     96
Turn On STMM     96
Define the Amount of Memory Allocated to DB2     97
Configure Each Heap Supported by STMM     98
STMM Enablement and Configurotion Parameters     100
Disabling STMM     101
DB2 9 Memory Model Changes in Support of STMM     101
Getting STMM Details      102
Reaping the Benefits of STMM     102
Hitting a Home Run: Best Environments for STMM     102
Hitting a Double: Next Best Environments for STMM     104
How Well Does STMM Work?     104
The Dropped Index Test     105
The Two Databases Same Server Test     106
The Poorly Tuned Buffer Pool Test     107
Wrap Up     108
Automatic Storage     109
Table Space and Container Basics     110
Automatic Storage Table Spaces in 8.2.2     111
Automatic Storage Databases in 8.2.2     111
Database Partitioning Feature Support in DB2 9     112
Storage Paths and Expressions     113
Adding Storage Paths in DPF     114
Adding a Database Partition     115
Automatic Growth in DPF     115
Backup and Restore Considerations     116
Monitoring Space Utilization     117
Wrap Up     118
Other Autonomic and Manageability Enhancements     119
Autonomic Enhancements     120
Automatic Defaults for Page Cleaners and Prefetchers     120
Automatic Defaults for Table Space Characteristics     121
Autonomics by Default      122
Enhancements to Monitoring and Database Health     125
New and Updated Monitor UDFs and Views     125
SQL Access to Notification Logs     128
Manageability Enhancements     130
Copy and Drop Schema     131
In-Place Alter Table Operations     133
Database Administration Through SQL     134
Get Error Messages in SQL PL via SQLERRM     134
Storage Paths for Creating a Database in Windows     135
MQTs Considered by the Optimizer but Not Chosen     136
Wrap Up     138
Application Development
Rational Data Architect     141
Data Modeling     144
Putting Theory into Practice     145
Wrap Up     148
DB2 and the .NET Developer     151
.NET and the Database Programmer     152
The DB2 and .NET Stack     154
DB2 Implementation of AD0.NET     155
Implementing DB2 CLR Procedures     159
DB2 and Microsoft Visual Studio     160
Versions     161
Server Explorer and IBM Explorer     162
Organizing and Managing Assets     168
DB2 and .NET in the Palm of Your Hand     170
Wrap Up     170
DB2 and the Java Developer     171
Evolving with Java     172
JDBC, SQU, and Drivers that Implement Them     173
Driver Types     174
Stronger, More Functional Java     175
Development Tools     176
Java Meets XML     181
Wrap Up     183
DB2 and the Scripting Languages Developer     185
DB2 on Rails     186
Ruby, a Gem of a Language     186
The Rails Framework for Web Applications     188
Getting Started with DB2 on Rails     192
Perl     200
PHP     203
Wrap Up     205
DB2 and the XML Developer     207
Getting Ready to Store XML     209
XML and All That CRUD     211
Creating Data     211
Retrieving Data with SQL and XQuery     213
Updating and Deleting Data     215
Self-Describing XML     217
The Other Way to Store XML Data     218
The Other Way to Produce XML Data     221
Wrap Up     221
The DB2 Developer Workbenth     223
The Eclipse Platform     224
About the DB2 Development Center     224
A Tour of the Developer Workbench Views and Features     225
The Database Explorer View     226
The Data Project Explorer View     232
SQL Development     233
Routine Development     235
SQLJ Support     239
Comparison Utility     242
XML Development     243
Teaming Support     249
Visual Explain Facility     249
Wrap Up     249
Other Application Development Topics     251
Toad: It's Not Just for Oracle Anymore     252
Other Enhancements for Application Developers     254
Deploying Your Applications     256
Wrap Up     259
Security Enhancements
Label-Based Access Control     263
Security Levels     264
LBAC Overview     266
What LBAC Does Not Prevent     267
SECADM Authority     268
Defining Security Label Components     269
Security Labels     269
Defining Security Policies     270
Set Label Comparisons     271
Array Label Comparisons     272
Tree-Label Comparisons     273
Defining a Security Policy     274
Defining Security Labels     275
Creating Protected Tables     276
Column Security     277
Row Security     278
Row and Column Security     278
Table Security     279
Granting Security Labels to Users     280
LBAC Exemptions     280
Bringing It All Together: Using Protected Tables     283
Inserting with Protected Rows     283
Selecting from Tables with Protected Rows     286
Inserting with Protected Columns     288
Selecting from Tables with Protected Columns     289
Removing or Modifying LBAC Definitions     291
Modifying Security Definitions     292
Referential Integrity and Constraint Checking     292
Referential Integrity     292
Check Constraints     292
Primary and Unique Key Constraints     293
Wrap Up     293
Additiond Security Enhancements     295
SECADM Authority     296
LDAP Security Plug-in     297
LDAP Plug-in Availability     297
Implementing LDAP     298
Transfer Ownership     298
SETSESSIONUSER Privilege     299
RESTRICT on Database Create      300
Wrap Up     302
Sharp Enhancements
Table Partitioning     305
Table Partitioning: What Is It and Why Use It?     306
Creating a Range-Partitioned Table     309
Defining Ranges     310
Partition Elimination     311
Inserts and Updates     311
Open-Ended Ranges     312
Special Values     312
Inclusive and Exclusive Bounds     313
Implicit Bounds     314
Naming Partitions     314
Handling NULL Values     315
Computing Ranges: Short Syntax     316
Open-Ended Ranges with Computed Ranges     317
Partitioning on Multiple Columns     318
Storage Mapping of Range-Partitioned Tables     318
New Operations for Roll-Out and Roll-In     321
Adding Partitions to an Existing Table     321
Set Integrity Processing     323
Data Availability During Attach and Set Integrity Processing     324
Deleting Partitions from on Existing Table     325
Data Availability During Attach and Set Integrity Processing     327
Asynchronous Index Cleanup ofter DETACH     328
Additional Considerations for Range Partitioning      329
Migration from a UNION ALL View     329
Using MDC with Table Partitioning     330
Compression and Table Partitioning     331
Wrap Up     332
Larger Table Space Support     333
Table Spaces     334
Original Row Identifier Format     334
DB2 9 Row Idenfifiers     336
Creating Large Table Spaces     337
Migrating to Large Table Spaces     341
Considerations for Using Table Spaces     345
Indexes     346
Allow Reverse Scans     346
Considerations for Using Large Indexes     347
Wrap Up     347
Row Compression     349
Row Compression Basics     351
How Compression Works     351
Compressing Tables     352
How Best to Create Compressed Tables     354
Statistical Information on Compressed Tables     355
Estimating Storage Sovings from Compression     355
Dictionary Storage and Size     357
Adding Data to a Compressed Table     357
Using Compression with Table Partitioning     358
Using Compression with the Database Partitioning Feature     358
Compression Restrictions      359
Rules of Thumb for Compressed Tables     360
Wrap Up     360
Storage Savings     361
Performance Benefits     361
High-Availability Enhancements     363
Minimizing Unplanned Outages     364
Connection Timeout     364
Rebuild Partial Database     367
Redirected Restore Scripting     369
Engine Trap Data Collection     374
Server Hang Data Collection     375
Catch Errors and Gather Problem Determination Data     376
Change Point in Time for Recover     377
Rollforward Output Shows UTC or Local Time     378
Minimizing Planned Outages     380
In Place Alter Table     380
Retrieve List of Files for Comprehensive Backup     383
ADMIN_CMD for Wore Commond/Utility Processing     385
Wrap Up     388
Additional SHARP Enhancements     389
Internet Protocol Version 6     390
Operating System Support     391
Migration Support     393
Statistical Views     394
Enabling Statistical Views     395
Statistical View Example     395
MQT Enhancements      397
MQT Design     398
MQT Performance Enhancements     400
MQT Maintenance     401
MQT and NULL Columns     401
Large Page Size on AIX     401
Fast Communication Manager     402
SAP Optimization Enhancements     402
SAP Optimizotion     402
Automatic AVG_APPLS     403
Limiting Query Temp Space     403
Wrap Up     404
Index     405

Tuesday, December 1, 2009

Condemned or Office 2003 Bible

Condemned: Criminal Origins: Prima Official Game Guide

Author: Prima Temp Authors

Condemned: Criminal Origins - PRIMA Official Game Guide will reveal the complete game experience for the player. With info on all weapons and comparisons of their efficacy, locations of every Achievement, and all forensic tools detailed the customer will learn all they need to survive the game. Plus enemy info and strategies, and how to unlock each of the four endings will be included.



Office 2003 Bible

Author: Allen Wyatt

Targets how to effectively and efficiently use data, text, and graphics from one Office application in another Office application.



• Features less emphasis on macros and programming and more focus on enhancements.

• Improved content and topical selection compared to previous editions.




Table of Contents:
Preface
Pt. IGetting Started
Pt. IIUsing Word
Pt. IIIUsing Excel
Pt. IVUsing Outlook
Pt. VUsing PowerPoint
Pt. VIUsing Access
Pt. VIIOffice and the Web
Pt. VIIICollaborating in Office
Pt. IXCustomizing and Automating Office
App. A: Describes the content of the accompanying CD-ROM
App. B: "Optimizing Your Office Installation," provides a few tips on using Office Setup

Monday, November 30, 2009

InDesign CS2 for Macintosh Windows or Microsoft Works 2000 for Dummies

InDesign CS2 for Macintosh & Windows: Visual QuickStart Guide

Author: Sandee Cohen

You already know why it makes sense for you to learn Adobe InDesign: because major magazines, newspapers, book publishers, ad agencies, graphic-design firms, and corporate creative groups worldwide use it to increase productivity and refine creative results. And you need to get up to speed on the very newest version--Adobe InDesign CS2--today! Enter Adobe InDesign CS2 for Macintosh and Windows: Visual QuickStart Guide. Using the task-based, visual approach that has become the hallmark of Peachpit's popular Visual QuickStart Guides, this volume provides a fast, easy, comprehensive introduction to everything InDesign. You'll learn about all aspects of the InDesign interface, including its tools and palettes, as well as how to create documents and master pages, import and style text and objects, automate your work, manage long documents, use the Bezier pen tools,create interactive PDF elements, and work with color.  You'll also learn how to use the new Adobe Bridge file browser to locate, manage, and drag and drop assets easily into your InDesign layouts. You’ll find a new chapter on working with InCopy, complete coverage of more advanced topics (like preflighting and advanced text control) and a thorough introduction to all of InDesign's productivity-enhancing features and tools.



Table of Contents:
Ch. 1Getting started1
Ch. 2Document setup17
Ch. 3Basic text49
Ch. 4Working with objects81
Ch. 5Working in color117
Ch. 6Styling objects147
Ch. 7Pen and beziers179
Ch. 8Imported graphics193
Ch. 9Text effects231
Ch. 10Pages and books251
Ch. 11Layers289
Ch. 12Libraries and snippets297
Ch. 13Tabs and tables305
Ch. 14Automating your work341
Ch. 15Text and object styles367
Ch. 16Typography controls399
Ch. 17Color management415
Ch. 18Interactive PDF elements423
Ch. 19Output459
Ch. 20Exporting491
Ch. 21Customizing inDesign519

Interesting book: Dishes of Africa or Slice of Life

Microsoft Works 2000 for Dummies

Author: David Kay

Congratulations! Instead of blowing several hundred bucks on the biggest and most muscle-bound word processor, database program, spreadsheet program, graphics, and communications software you can find, you're using Microsoft Works 2000 – a program that can do probably everything you need for a lot less trouble and money.

Now it's time to stretch out your fingers and get ready to put this software to work. This step-by-step guide is for those people who



• Want to learn about their software without being bored silly

• Feel as though there should be a manual to explain the software manual

• Actually want to get some work done. Soon. Like today.

• Don't want to wade through a lot of technical gibberish/

• Don't think the way computer software engineers seem to think.



This book describes how to use all the programs of Microsoft Works 2000, separately and together, plus some introductory things on Windows, disks, and other basics. In this book, you'll explore the following topics and more:



• Window basics (opening, closing, and painting them shut)

• Word processing (like food processing, only messier)

• Spreadsheets (for soft, comfortable naps on your spreadbed)

• Databases (for storing all your baseless data)

• Graphics (for charting uncharted waters and general doodling)

• Calendarification, Calendarizing? (Using a calendar program)

• Web browsing (for schmoozing the Internet's World Wide Web)

• Newsgroups (for ranting about your petpeeves)

• E-mail (for sending and receiving messages and files)

• "Mail merge" of letters, envelopes, and labels (for doing your very own junk mail)



Unlike software manuals, this book doesn't have to deliver a positive message about the software, so it doesn't breathlessly try to show you everything you could possibly do. Nor does it describe, as a manual does, every button and command. Instead, it focuses on the everyday things you have to do, gives you some background, points you toward shortcuts, and steers you around some of the stuff you probably don't need.



Sunday, November 29, 2009

Hands on Guide to Flash Video or JavaServer Faces

Hands-on Guide to Flash Video: Web Video and Flash Media Server

Author: Stefan Richter

The Hands-On Guide to Flash Video is a professional reference book written by industry experts that are currently helping professionals produce Web video and implement Flash Media Server. This book covers Flash Video production from soup to nuts, beginning with how to configure your camcorder and ending to advanced server techniques like bandwidth detection and FMS logging and reporting. Real word lessons from case studies of successful Flash Video deployments are also included.

Supplemental files located at: flashvideobook.com

By reading this book, you'll learn to:

* Shoot high quality video for streaming
* Choose the best encoder and encoding techniques for producing Flash Video
* Deploy Flash Video via progressive download or via the Flash Media Server.
* Create and light a compression friendly set
* Deinterlace and preprocess your video prior to encoding
* Choose encoding parameters like data rate, resolution and frame rate
* Optimize encoding with Sorenson Squeeze, Flix Pro and the Adobe Flash Video Encoder
* Shoot and produce chromakey video for alpha channel delivery
* Customize a Flash player via skinning, and use Cue Points for navigation
* Setup, install, and maintain Flash Media Server



Key Features Include:

* Advanced Flash Media Server guidance and support
* Tecniques for shooting Web video specifically for Flash streaming
* Author tips from "in the trenches" experiences from two industry experts
* Case studies show you real-world examples of successful Flash video deployment



New interesting book: Secrets of Pilates or Trans Fats

JavaServer Faces: The Complete Reference

Author: Chris Schalk

Ideal for the 3+ million Java developers, this fast-paced tutorial offers in-depth coverage of JavaServer Faces (JSF) -- Sun Microsystem's Web application architecture for the future. Co-written by the #1 JSF expert in the Java community, this book offers the most complete resource on JSF available. * Extensive coverage on JSF custom component development* Serves as a thorough introduction to AJAX technology and techniques* Numerous custom JSF component examples including AJAX enabled components provided

Chris Schalk is a principal product manager and lead JSF evangelist for Oracle's application server and development tools division.

Ed Burns is a senior staff engineer at Sun Microsystems, Inc., and has led the development of JavaServer Faces technology since its inception. He currently co-leads a team of experts from across the industry in the continued development of JSF.  

James Holmes is a leading Java Web development authority. He is a committer on the Struts project and the author of Struts: The Complete Reference.  

Edited by Herbert Schildt, Java authority and bestselling author of Java: The Complete Reference.

 



Table of Contents:

PART I: The JavaServer Faces Framework

Chapter 1: Introduction to JavaServer Faces

Chapter 2: Building a Simple JavaServer Faces Application

Chapter 3: The JavaServer Faces Request Processing Lifecycle

Chapter 4: Managed Beans and the JSF Expression Language

Chapter 5: The Navigation Model

Chapter 6: The User Interface Component Model

Chapter 7: Converting and Validating Data

Chapter 8: The JSF Event Model

PART II: Extending JavaServer Faces

Chapter 9: Applying JSF: Introducing the Virtual Trainer Application

Chapter 10: Building Custom UI Components

Chapter 11: Building AJAX JSF Components

Chapter 12: Building Non-UI Custom Components

Chapter 13: Alternate View Description Technology and Facelets

Part III: Applying JavaServer Faces

Chapter 14: Localization and Accessibility with JavaServer Faces

Chapter 15: Securing JavaServer Faces Applications

Chapter 16: Automated Testing and Debugging of JavaServer Faces Applications

Part IV: JavaServer Faces Tools and Libraries

Chapter 17: Developing JSF Applications with Visual Development Environments

Chapter 18: The JavaServer Faces Configuration File

Chapter 19: The Standard JSF Component Library

Chapter 20: The MyFaces Implementation and Component Library

Part V: Appendices

Appendix A: Faces Console Quick Reference

Appendix B: Third-Party JSF Component Libraries

Appendix C: Migrating from Struts to Faces

Appendix D: JSF Futures: Apache Shale

INDEX

Friday, November 27, 2009

Web Design for ROI or SQL Third Edition

Web Design for ROI: Turning Browsers into Buyers and Prospects into Leads

Author: Lance Loveday

This book, intended for online marketers, web site managers, business professionals, programmers, and information architects, focuses on designing web sites to achieve organizational objectives. The strategic role of various page types (home page, product page, category page, landing page, shopping cart, etc.) are discussed along with examples and case studies of each. Lists of design considerations and specific recommendations for what works are also included. This book demonstrates the relationship between design, user experience, and site/business metrics.



Look this: Public Opinion or Grover Cleveland

SQL, Third Edition (Visual QuickStart Guide Series)

Author: Chris Fehily

SQL is a standard interactive and programming language for querying and modifying data and managing databases. This task-based tutorial and reference guide takes the mystery out learning and applying SQL. After going over the relational database model and SQL syntax in the first few chapters, veteran author Chris Fehily immediately launches into the tasks that will get readers comfortable with SQL. In addition to covering all the SQL basics, this thoroughly updated reference contains a wealth of in-depth SQL knowledge and serves as an excellent reference for more experienced users.



Thursday, November 26, 2009

The Laws of Cool or The Economics of Information Technology

The Laws of Cool: Knowledge Work and the Culture of Information

Author: Alan Liu

Knowledge work is now the reigning business paradigm and affects even the world of higher education. But what perspective can the knowledge of the humanities and arts contribute to a world of knowledge work whose primary mission is business? And what is the role of information technology as both the servant of the knowledge economy and the medium of a new technological cool? In The Laws of Cool, Alan Liu reflects on these questions as he considers the emergence of new information technologies and their profound influence on the forms and practices of knowledge.



Table of Contents:
Introduction : literature and creative destruction1
Pt. IThe new enlightenment
Preface : "unnice work" : knowledge work and the academy14
1The idea of knowledge work23
Pt. IIIce ages
Preface : "we work here, but we're cool"76
2Automating81
3Informating105
4Networking141
Pt. IIIThe laws of cool
Preface : "what's cool?"176
5The ethos of information181
6Information is style195
7The feeling of information231
8Cyber-politics and bad attitude239
Pt. IVHumanities and arts in the age of knowledge work
Preface : "more"286
9The tribe of cool289
10Historicizing cool : humanities in the information age301
11Destructive creativity : the arts in the information age317
12Speaking of history : toward an alliance of new humanities and new arts (with a prolegomenon on the future literary)373
App. ATaxonomy of knowledge work391
App. BChronology of downsizing (through the 1990s)394
App. C"Ethical hacking" and art396

Look this: Anlagengebäude & Gemeinschaftsentwicklung

The Economics of Information Technology: An Introduction (The Raffaele Mattioli Lectures Series)

Author: Hal R Varian

The Economics of Information Technology is a concise and accessible review of important economic factors affecting information technology industries. These industries are characterized by high fixed costs and low marginal costs of production, large switching costs for users, and strong network effects. Hal Varian outlines the basic economics of these industries while Joseph Farrell and Carl Shapiro describe the impact of these factors on competition policy. The volume is an ideal introduction for undergraduate and graduate students in economics, business strategy, law and related areas.



Wednesday, November 25, 2009

Play Between Worlds or Clinical Decision Support

Play Between Worlds: Exploring Online Game Culture

Author: T L Taylor

In Play Between Worlds, T. L. Taylor examines multiplayer gaming life as it is lived on the borders, in the gaps--as players slip in and out of complex social networks that cross online and offline space. Taylor questions the common assumption that playing computer games is an isolating and alienating activity indulged in by solitary teenage boys. Massively multiplayer online games (MMOGs), in which thousands of players participate in a virtual game world in real time, are in fact actively designed for sociability. Games like the popular Everquest, she argues, are fundamentally social spaces.

Taylor's detailed look at Everquest offers a snapshot of multiplayer culture. Drawing on her own experience as an Everquest player (as a female Gnome Necromancer)--including her attendance at an Everquest Fan Faire, with its blurring of online-and offline life--and extensive research, Taylor not only shows us something about games but raises broader cultural issues. She considers "power gamers," who play in ways that seem closer to work, and examines our underlying notions of what constitutes play--and why play sometimes feels like work and may even be painful, repetitive, and boring. She looks at the women who play Everquest and finds they don't fit the narrow stereotype of women gamers, which may cast into doubt our standardized and preconceived ideas of femininity. And she explores the questions of who owns game space--what happens when emergent player culture confronts the major corporation behind the game.



Interesting book: Poor Eaters or Aromaterapia Libro Practico

Clinical Decision Support: The Road Ahead

Author: Robert A Greenes

This book examines the nature of medical knowledge, how it is obtained, and how it can be used for decision support. It provides complete coverage of computational approaches to clinical decision-making. Chapters discuss data integration into healthcare information systems and delivery to point of care for providers, as well as facilitation of direct to consumer access. A case study section highlights critical lessons learned, while another portion of the work examines biostatistical methods including data mining, predictive modelling, and analysis. This book additionally addresses organizational, technical, and business challenges in order to successfully implement a computer-aided decision-making support system in healthcare delivery.



Sunday, February 22, 2009

Alan Simpsons Windows Vista Bible Desktop Edition or Schaums Outline of Programming with FORTRAN 77

Alan Simpson's Windows Vista Bible, Desktop Edition

Author: Alan Simpson

Check out the best of Windows Vista in this handy desktop-size resource. This convenient reference is drawn from the very best of bestselling author Alan Simpson’s Alan Simpson’s Windows Vista Bible. You’ll discover how to master the basics of PCs and operating systems, get started on Vista, and move ahead to multimedia, adding security, building a network, and more. You’ll even find special tips, workarounds, and advice on how to deal with Vista’s quirkier aspects.



Table of Contents:
Acknowledgments.

Introduction.

Part I: Beginner’s Crash Course.

Chapter 1: Getting Started.

Chapter 2: Workin’ It.

Chapter 3: Getting Help When You Need It.

Part II: Programs, Documents, and Folders.

Chapter 4: Running Programs.

Chapter 5: Navigating Your Folders.

Chapter 6: Working with Documents.

Chapter 7: Type, Edit, Copy, and Paste.

Chapter 8: Printing Documents.

Part III  Using the Internet.

Chapter 9: Getting Online.

Chapter 10: Browsing the World Wide Web.

Chapter 11: Sending and Receiving E-mail.

Chapter 12: Chatting and Interacting Using the Internet.

Chapter 13: Keeping It Safe.

Part IV: Fun with Multimedia.

Chapter 14: Using Your Camera and Scanner.

Chapter 15: Playing with Pictures and the Photo Gallery.

Chapter 16: Music and Video with Media Player 11.

Chapter 17: Managing Music, Making CDs.

Chapter 18: Making Home Movies.

Part V: Getting Organized, Staying Organized.

Chapter 19: Managing Files and Folders.

Chapter 20: Finding Things on Your Computer.

Chapter 21: Using Your Hard Drive.

Chapter 22: Using Floppies, Thumb Drives, CDs, and DVDs.

Chapter 23: Working with Compressed (Zip) Files.

Chapter 24: Managing Your Time, Tasks, and Appointments.

Part VI: Have ItYour Way.

Chapter 25: Creating and Managing User Accounts.

Chapter 26: Personalizing Your Desktop.

Chapter 27: Using Parental Controls.

Chapter 28: Speech, Writing, and Other Accessibility.

Chapter 29: Expanding Your System.

Chapter 30: Disaster Prevention and Recovery.

Part VII: Connecting Your Computers.

Chapter 31: Design and Create Your Own Network.

Chapter 32: Sharing Things on a Network.

Appendix A: Installing Windows Vista.

Appendix B: Shortcut Key Quick Reference.

Index.

New interesting textbook: Mathematics for 3D Game Programming and Computer Graphics Second Edition or Magic Lantern Guides

Schaum's Outline of Programming with FORTRAN 77

Author: Willam E Mayo

If you want fast mastery of Fortran 77 and top grades, this powerful study tool is the best tutor you can have! Inside, you will find: 326 detailed problems, with step-by-step solutions; hundreds of additional practice problems, with answers supplied; clear explanations of algorithm development, program design, control structures, loops, arrays, subprograms, and data files; and plenty of example code, as well as thorough coverage of debugging techniques. Whether used alone for independent study or with a class text, this popular SchaumÕs Outline is your ticket to a fast learning curve with Fortran 77!

He has been an active ATM Forum board member and technical committee chairperson. Recognized as a leader in ATM traffic management, McDysan is a frequent speaker and teacher at industry conferences. He lives in Richardson, Texas.Darren L. Spohn is Chief Technology Officer of NetSolve, Inc., whre he manages the company’s engineering, product development, and business development efforts. Previously he worked at MCI, where he held a number of critical engineering, marketing, and management positions in the development of advanced data networks. He lives in Austin, Texas.David E. McDysan is Director of Strategic Planning of ATM Services at MCI.



Saturday, February 21, 2009

Foundation Form Creation with Adobe LiveCycle Designer ES or How to Write and Publish Your Own eBook in as Little as 7 Days

Foundation Form Creation with Adobe LiveCycle Designer ES

Author: Kelly Wardrop

In this book, you'll learn how to use the advanced features in LiveCycle Designer ES, including ways to encourage your form users to return data correctly and promptly and with minimal effort on their behalf. You will discover how to create compelling and efficient forms and how to integrate forms with data using XML and WSDL technologies. You'll see and understand just how simply and quickly an intuitive form can be created and then customized and implemented or dispatched to the user using JavaScript and FormCalc scripting techniques.



See also: Comportamento organizzativo di comprensione ed in carico

How to Write and Publish Your Own eBook in as Little as 7 Days

Author: Jim Edwards

How to write and publish your own OUTRAGEOUSLY Profitable eBook in as little as 7 days even if you can't write, can't type and failed high school English class! Discover the secrets to having your own, outrageously profitable ebook written and published as quickly as ... only 7 days from today!



Friday, February 20, 2009

Software Systems Architecture or PostgreSQL

Software Systems Architecture: Working with Stakeholders Using Viewpoints and Perspectives

Author: Nick Rozanski

Software Systems Architecture is a practitioner-oriented guide to designing and implementing effective architectures for information systems. It is both a readily accessible introduction to software architecture and an invaluable handbook of well-established best practices. It shows why the role of the architect is central to any successful information-systems development project, and, by presenting a set of architectural viewpoints and perspectives, provides specific direction for improving your own and your organization's approach to software systems architecture.

With this book you will learn how to
• Design an architecture that reflects and balances the different needs of its stakeholders
• Communicate the architecture to stakeholders and demonstrate that it has met their requirements
• Focus on architecturally significant aspects of design, including frequently overlooked areas such as performance, resilience, and location
• Use scenarios and patterns to drive the creation and validation of your architecture
• Document your architecture as a set of related views
• Use perspectives to ensure that your architecture exhibits important qualities such as performance, scalability, and security

The architectural viewpoints and perspectives presented in the book also provide a valuable long-term reference source for new and experienced architects alike.

Whether you are an aspiring or practicing software architect, you will find yourself referring repeatedly to the practical advice in this book throughout the lifecycle of your projects.

A supporting Web site containing further information can be found atwww.viewpoints-and-perspectives.info



Go to: Arthritis or Not in My Family

PostgreSQL

Author: Korry Douglas

The second edition of the best-selling PostgreSQL has been updated to completely cover new features and capabilities of the 8.0 version of PostgreSQL. You will be lead through the internals of the powerful PostgreSQL open source database chapter, offering an easy-to-read, code-based approach that makes it easy to understand how each feature is implemented, how to best use each feature, and how to get more performance from database applications. This definitive guide to building, programming and administering the powerful PostgreSQL open-source database system will help you harness one of the most widely used open source, enterprise-level database systems.



Table of Contents:
1Introduction to PostgreSQL and SQL9
2Working with data in PostgreSQL77
3PostgreSQL SQL syntax and use139
4Performance189
5Introduction to PostgreSQL programming241
6Extending PostgreSQL253
7PL/pgSQL305
8The PostgreSQL C API - libpq361
9A simpler C API - libpgeasy405
10The new PostgreSQL C++ API - libpqxx421
11Embedding SQL commands in C programs - ecpg465
12Using PostgreSQL from an ODBC client application501
13Using PostgreSQL from a Java client application543
14Using PostgreSQL with Perl573
15Using PostgreSQL with PHP613
16Using PostgreSQL with Tcl and Tcl/Tk645
17Using PostgreSQL with Python683
18Npgsql : the .NET data provider707
19Other useful programming tools743
20Introduction to PostgreSQL administration777
21PostgreSQL administration783
22Internationalization and localization881
23Security899
24Replicating PostgreSQLData with Slony925
25Contributed modules947

Thursday, February 19, 2009

Adobe InDesign CS3 Bible or The Elder Scrolls IV

Adobe InDesign CS3 Bible

Author: Galen Gruman

While QuarkXPress has been the most-widely used page-layout program in the world, Adobe InDesign is rapidly gaining ground with better typography and transparency features, speedier performance, and more overall control. Learn InDesign now from respected InDesign and QuarkXPress expert Galen Gruman. He packs this book with real-world insights from publishing pros who use InDesign in critical projects, shows you the program's innovative architecture and functionality, and tells you everything you need to know to get up to speed. Whether an experienced designer, a novice, or somewhere in between, you'll find all the real-world tips and techniques you're looking for in this comprehensive reference.



Table of Contents:
Foreword: Your Guide to InDesign's Challenge
Foreword: Getting the Most from InDesign
Foreword: The InDesign Mission
Preface
Acknowledgments
Pt. IWelcome to InDesign1
Ch. 1What InDesign Can Do for You3
Ch. 2A Tour of InDesign23
Ch. 3Getting InDesign Ready to Go63
Ch. 4Creating, Opening, and Saving Documents97
Pt. IIFrame and Line Fundamentals115
Ch. 5Adding Text Frames, Picture Frames, and Lines117
Ch. 6Manipulating Frames and Lines127
Ch. 7Orchestrating Objects149
Ch. 8Time-Saving Techniques163
Pt. IIIText Fundamentals171
Ch. 9Preparing Text Files for Import173
Ch. 10Working with Text189
Ch. 11Flowing Text Through a Document213
Ch. 12Specifying Character Formats235
Ch. 13Specifying Paragraph Formats257
Ch. 14Setting Up Tabs and Tables275
Ch. 15Setting Up Styles293
Pt. IVTypography Fundamentals309
Ch. 16Fundamental Typography311
Ch. 17Creating Special Text Formatting337
Ch. 18Working with Special Characters359
Ch. 19Treating Text as Artwork371
Pt. VPicture Fundamentals381
Ch. 20Preparing Picture Files for Import383
Ch. 21Importing Pictures395
Ch. 22Modifying Imported Pictures409
Ch. 23Special Effects for Pictures427
Pt. VIDrawing Fundamentals441
Ch. 24Drawing Free-Form Shapes and Curved Paths443
Ch. 25Modifying Shapes and Paths457
Ch. 26Special Effects for Drawings469
Pt. VIIColor Fundamentals479
Ch. 27Defining Colors and Gradients481
Ch. 28Preparing for Color Prepress503
Pt. VIIIPage Fundamentals519
Ch. 29Creating Layout Standards521
Ch. 30Working with Layers547
Ch. 31Working with Pages563
Pt. IXOutput Fundamentals577
Ch. 32Preparing for Printing579
Ch. 33Printing Techniques611
Ch. 34Creating Output Files629
Pt. XWeb Fundamentals647
Ch. 35Web-Page Setup649
Ch. 36Converting from Print to Web671
Pt. XIAdvanced Issues691
Ch. 37Working with Others693
Ch. 38Using Plug-Ins707
Ch. 39The Right Toolkit713
App. AInstalling Adobe InDesign743
App. BMost Useful Shortcuts753
App. CTop Tips for Using InDesign769
App. DSwitching from QuarkXPress or PageMaker781
App. EWhat's on the CD-ROM795
Index801
End-User License Agreement821
CD-ROM Installation Instructions824

Books about: Plain Lives in a Golden Age or Travel Perspectives

The Elder Scrolls IV: Shivering Isles: Prima Official Game Guide

Author: Bethesda Softworks

A New Realm, A New Path . . .

·Complete maps for the Main Quest and the realm of Sheogorath.

·Walkthroughs for every quest in the expansion, including the Main Quest and Freeform Quests.

·Detailed bestiary chapter to help you best deal with the strange denizens of the Shivering Isles.

·Complete sections for all new items, ingredients, and more.

·Includes full coverage on Knights of the Nine and Oblivion Downloadable Content.



Tuesday, February 17, 2009

Solaris 9 For Dummies or Linux Kernel Development

Solaris 9 For Dummies

Author: David Taylor

Discover new security features and easier installation

Light up your system with a new resource manager, volume manager, and directory server

In the dark about Solaris 9? Open this book and let the sun shine in! It'll help you chart a course for StarOffice, explore CDE and GNOME desktops, and harness Solaris power to configure Web servers, access Internet services, build great Web sites, manage files and directories, and a galaxy of other tasks.

The Dummies Way



• Explanations in plain English

• "Get in, get out" information

• Icons and other navigational aids

• Tear-out cheat sheet

• Top ten lists

• A dash of humor and fun




Table of Contents:
Foreword
Introduction1
Pt. IGetting Acquainted with Solaris9
Ch. 1Logging in and Poking Around11
Ch. 2Graphical Window Managers25
Ch. 3Interacting with the Shell55
Ch. 4Managing Files and Directories81
Pt. IIThe Inevitable Internet Section105
Ch. 5Doin' That E-Mail Thing107
Ch. 6Exploring the World Wide Web129
Ch. 7Creating Web Pages153
Ch. 8Accessing Internet Services167
Pt. IIIBecoming Productive with StarOffice183
Ch. 9Composing Documents with Writer185
Ch. 10The Rest of StarOffice199
Pt. IVEditing and Controlling Programs213
Ch. 11Exploring Text Files215
Ch. 12Editing Files233
Ch. 13Controlling Processes253
Ch. 14Finding Files263
Pt. VAdministration and Security Issues279
Ch. 15Connecting to the Network281
Ch. 16Essential System Administration293
Ch. 17Keeping Your System Secure309
Pt. VIThe Part of Tens323
Ch. 18Ten Best Web Sites325
Ch. 19Ten Key Security Features329
Ch. 20Ten Great Free Add-Ons333
Index337

Interesting textbook: Che Guevara Reader or Modern Utopia

Linux Kernel Development

Author: Robert Lov

The Linux kernel is one of the most important and far-reaching open-source projects. That is why Novell Press is excited to bring you the second edition of Linux Kernel Development, Robert Love's widely acclaimed insider's look at the Linux kernel. This authoritative, practical guide helps developers better understand the Linux kernel through updated coverage of all the major subsystems as well as new features associated with the Linux 2.6 kernel. You'll be able to take an in-depth look at Linux kernel from both a theoretical and an applied perspective as you cover a wide range of topics, including algorithms, system call interface, paging strategies and kernel synchronization. Get the top information right from the source in Linux Kernel Development.




Monday, February 16, 2009

Multithreaded Programming with Java Technology or The Essential Guide to Digital Set Top Boxes and Interactive TV

Multithreaded Programming with Java Technology

Author: Bil Lewis

Multithreaded Programming with Java Technology is the first complete guide to multithreaded development with the Java 2 platform. Multithreading experts Bil Lewis and Daniel J. Berg cover the underlying structures upon which threads are built; thread construction; and thread lifecycles, including birth, life, death, and cancellation. Next, using extensive code examples, they cover everything developers need to know to make the most of multithreading.



New interesting textbook: Amministrazione della forza di vendite

The Essential Guide to Digital Set-Top Boxes and Interactive TV

Author: Gerard ODriscoll

Everything you need to know about the coming digital interactive TV revolution!

There's a revolution coming to your TV: a digital, interactive, Internet-enabled revolution that will make possible services you've never imagined! The next TV revolution comes with new technologies, new standards, new architectures, and new business paradigms. Finally, there's a single source for up-to-the-minute insight into every aspect of next-generation digital TV: The Essential Guide to Digital Set-Top Boxes and Interactive TV!

From MPEG-4 to middleware, webcasting to Java OS, Gerard O'Driscoll covers the state-of-the-art, comparing the strategies and technologies-and cutting through the hype. Coverage includes all this, and more:

  • Digital TV building blocks: compression, encoding, modulation, conditional access, transmission, and management
  • Advanced digital set-tops: features, components, installation, and troubleshooting
  • Set-top operating systems: JavaOS, Windows CE, David OS-9, PowerTV, VxWorks, pSOS+, Linux, and more
  • Internet-based TV: set-top Web browsing, webcasting, email, online chat, broadband applications, video on demand, parental controls, and more
  • Electronic program guides (EPGs): 21st century TV portals
  • Development, server architecture, middleware, network management, smartcards, MPEG-4, and much more

Whether you're an investor, manager, marketing or PR professional, software developer, or consumer, you need to know where TV is headed, and only one book can show you: The Essential Guide to Digital Set-Top Boxes and Interactive TV!

Booknews

The author explores the various industry initiatives and standard bodies that are defining open set-top box technologies, describes the operating systems and middleware products available, and looks at the servers and technologies that are needed to support broadband Internet, intranet and TV-centric applications. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Table of Contents:
1. Overview of Digital TV.
Terminology. What is Digital Television? International Standard Bodies and Agreements. European Telecommunications Standards Institute (ETSI). Digital Video Broadcasting (DVB). Advanced Television Systems Committee (ATSC). Digital Audio Visual Council (DAVIC). European Cable Communications Association (ECCA). CableLabs. W3 Consortium (W3C). Federal Communications Commission (FCC). Building blocks of a Digital TV system. Compression and Encoding. Modulation. Conditional Access System. Network Transmission Technologies. Network Management. Summary.

2. Set-top Hardware Architecture.
Evolution of Advanced Digital Set-tops. Set-top Box Computing Paradigm. Basic Concepts. How a set-top Works. Under the Hood. System Board. Tuner(s). Modulator and Demodulator. Demultiplexer and Decryptor. Decoders. Graphics Processor. Central Processing Unit. Memory Configuration. Storage Devices. Physical Interfaces. Installing a digital set-top. Troubleshooting an installation. Summary.

3. Set-top Real-time Operating Systems.
Architecture of a Set-top OS. Choice of Set-top OSs. PowerTV OS. VxWorks. pSOSystem. Microware's DAVID OS-9. Microsoft's Windows CE. Java OS for Consumers. Linux. Summary.

4. Set-top Middleware and APIs.
Middleware concepts. Virtual machines. HTML Virtual Machine. JavaScript Virtual Machine. Personal Java Virtual Machine. MHEG-5. Middleware Standards. Multimedia Home Platform (MHP). DTV Application Software Environment (DASE). AdvancedTelevision Enhancement Forum (ATVEF). Set-top Middleware Choices. OpenTV. PowerTV. WebTV for Microsoft's TVPAK Platform. MediaHighway. Liberate eNavigator. PlanetWeb. Summary.

5. Set-top Specifications and Platforms.
Categories of digital set-tops. Eurobox. OpenCable. Sky Series 2200. CT5000+. Nokia MediaMaster T. Motorola Streamaster. The Explorer Set-top Family from Scientific-Atlanta. Implementations. Summary.

6. Set-top Application Development.
Developing for a set-top environment versus a PC environment. Set-top Application Development Cycle. Application Development Environments. OpenTV Application Development. Windows CE Application Development. Personal Java Application Development. Developing DVB Java Applications. Developing MediaHighway applications. Developing PowerTV applications. Developing MHEG-5 applications. Developing Liberate applications. Summary.

7. Set-top Internet Applications.
About the Internet. Understanding TCP/IP. About Internet Addresses. Subnetting an IP Broadband Network. Future of IP Addressing. Domain Name System. Assigning IP Addresses to Set-tops. Security policies and Firewalls. Introduction to Web browsing. Set-top Browsers. Functional Overview. Set-top Web Browser Application. Web Server. Set-top Proxy Server Software. High-speed Internet connection. How Set-top Web Browsing Works. Choosing a Set-top Browser Platform. Introduction to Set-top E-mail. How Set-top E-mail Works. Set-top E-mail Clients. Set-top E-mail Security. The Set-top E-mail Marketplace. Online Chat. Webcasting. How Webcasting Works? Summary.

8. Set-top Intranet Applications.
About Intranets. Choice of broadband Intranet applications. Client/Server Computing. Set-top Home Banking. Set-top E-commerce. Set-top Education. Set-top Gaming. Set-top Weather. TV Broadcast Services. Electronic Program Guides. Interactive Channel Browser. Pay Per View (PPV). Video on Demand. Near Video on Demand. Teletext. Parental Control. Summary.

9. Electronic Program Guides.
Basic EPGs. Advanced EPGs. Why EPGs look the way they do. Future EPG Developments. The Mediators (1997). TV-internet EPG Project. Case Study. Summary.

10. Set-top Server Architecture.
Overview of server architecture. Application Server(s). Database Server(s). Web Server(s). Transaction Server(s). Commerce Server(s). Personalization and Membership Servers. Broadcast Server. OpenTV. Application Streamer. Broadcast Streamer. Microsoft TV Server. Windows 2000 Server Family. Site Server (Commerce Edition). SQL Server 7.0. TVPAK Server. Microsoft Commercial Internet Server. MSN Portal Services. Network Management. Summary.

11. Set-top Smart Card Technologies.
Architecture of set-top Smart Cards. CPU. RAM. ROM. EEPROM. I/O Serial Interface. Smart card Security. Smart card Software. Java Card from Sun Microsystems. MultOS from MasterCard. Microsoft's Smart Card for Windows. Visa Open Platform. Summary.

12. Set-top Enhanced TV.
Fundamentals. Benefits of enhanced TV. General Principles of Designing for a TV environment. Screen Resolution. Navigation. Font Dimensions, Colors, and Lines. Computer and Multimedia Standards. Audiences. Download Times. Content Standardization for Set-tops. Authoring Enhanced TV Content for ATVEF-compliant Set-tops. Authoring Enhanced TV Content for DASE-compliant Set-tops. Authoring Enhanced TV Content for MHP-compliant Set-tops. Delivering Enhanced TV Content. Levels of Interactivity. Basic Interactivity. Advanced Interactivity. Summary.

13. Advanced Set-top Features.
MPEG-4 Support. Home Networks. Wireline Home Networks. Wireless Home Networks. Set-top Home Networking Middleware. Voice Recognition. Personalization Technologies. Summary. For Further Information. Further Reading.

Index.

Sunday, February 15, 2009

Improve NET Design Your Own Compilers or Digital Gehry

Improve .NET! Design Your Own Compilers

Author: Edward G Nilges

All software developers use languages, which are the fundamental tool of the trade. Despite curiosity about how languages work, few developers actually understand how. Unfortunately, most texts on language and compiler development are hard to digest, written from academic platforms for use in college-level computer science programs. On the other hand, Build Your Own .NET Language and Compiler demystifies compiler and language development, and makes the subjects palatable for all programmers.

This practical book presents techniques that you can apply to everyday work. You'll learn to add scripts and macro languages to your applications, add runtime expression evaluation to their applications, and generate code immediately. Further, you will learn parsing techniques, which are essential to extract information from any structured form of data--like text files, user input, XML, or HTML. As a bonus, the book includes a complete QuickBasic compatible compiler with source code that works. The compiler illustrates the book's techniques and acts as a versatile .NET language.



Look this: Aldo Leopold or Supreme Court Opinions of Clarence Thomas 1991 2006

Digital Gehry: Material Resistance, Digital Construction

Author: Bruce Lindsay

Frank O. Gehry, born in 1929, founded his own architectural firm in Los Angeles in 1962, and since the building of the Guggenheim Museum in Bilbao, he is undoubtedly among the ranks of international architecture superstars. His buildings are complex constructions, with curves and distortions, skilful plastic shapes which never cease to surprise with their breath-taking spatial effects.

To create these daring designs, Gehry makes extensive use of the latest electronic tools, physical models are transformed into digital models using software and hardware which has been adapted from the space industry and medical research. This book provides a colourful insight into Gehry's design methods and the creative process behind his fantastic buildings.

Author Biography: Bruce Lindsay studied at the Yale School of Architecture; he is now Associate Head at the School of Architecture at Carnegie Mellon University in Pittsburgh (USA).



Thursday, February 12, 2009

Microsoft Office Word 2003 or Malicious Bots

Microsoft Office Word 2003: Comprehensive Concepts and Techniques, CourseCa

Author: Gary B Shelly

For the past three decades, the Shelly Cashman Series® has effectively introduced computers to millions of students, consistently providing the highest quality, most up-to-date, and innovative materials in computer education. Enjoy the proven step-by-step style and improved office 2003 updates of the Shelly Cashman Series® Word 2003 textbook to enhance your Office application skills today!



Interesting textbook: Cafe Food at Home or Chicken Etc

Malicious Bots: An Inside Look Into the Cyber-Criminal Underground of the Internet

Author: Ken Dunham

Originally designed to sabotage or annihilate websites, computerized "Bots" are increasingly used in mass spamming events, fraud, extortion, identity theft, and software theft. Once they are loose on the Internet there is no controlling the harm they can inflict. With more than 26 years of information security experience between them, Dunham and Melnick provide a much needed a resource for understanding the scope, sophistication, and criminal uses of bots and how to more proactively protect against them. They examine the top bot attacks against financial and government networks over the last four years and reveal the who, how, and why behind them.



Table of Contents:
Preface     ix
Acknowledgments and Permissions     xi
About the Authors     xiii
Introduction to Bots     1
Thr34t Security Krew and the TK Worm     7
The Investigation of the Thr34t Krew   Lance Mueller     9
First DYNDNS Account (BestIce)     12
Second DYNDNS Account (Phreeze)     16
Third DYNDNS Account (D00M)     19
Seth Fogie     21
Help with Additional Technical Details     23
A Trip Across the Pond     23
Sitexec     25
DiSice     26
XaNiTH     28
Sitexec     30
Second Search Warrant Sweep     30
Jadaka     30
Mr40     31
Thr34t Krew Investigation: Concluding Comments     31
Demonstration: How a Hacker Launches a Botnet Attack     33
Step 1: Find, Modify, and Build a Bot     33
Step 2: Customize the Binary for Attack     35
Step 3: Launch the Attack     37
Step 4: Managing the Botherd     37
Step 5: Payloads, with an Emphasis on "Pay"     39
Introduction to the Use of Botnets in Criminal Activity     41
Timeline     41
Bots: A Pathway to Criminalization of the Information Age     44
Bots: The Integrated Business Solution for Criminals     45
"Botmasters" Who Were Caught     46
International Botnet Task Force Conferences     47
Operation "Bot Roast" I and II     47
How Big Do Botnets Need to Be to Pose a Serious Threat?     48
Peering Inside the IRC Botnet     50
Post-IRC-Based Bots     50
Botnet Attack Statistics     52
Botnet Features and the Criminal Enterprise     54
A Modular Approach to Botnets: A Major Aid to Criminals     54
Granular Spreading Capabilities     55
A "Service Bot"     55
The Degradation Feature of Botnets and Its Impact on Criminal Activity     56
Botherds Through the Eyes of a Criminal Mind     57
Criminal Vectors Utilizing Bots     57
Theft of Sensitive Information     57
DDoS Attacks and Extortion     58
Bot for Rent or Hire     60
Spam     63
Spam Bots and Criminalization     65
Pump-and-Dump Fraud     66
Covert Communications     67
Click Fraud and Affiliate Abuse     68
Adware Abuse      69
Taking Out the Competition     70
Botnets and the eCrime Cycle: The iSIGHT Partners' Approach     71
Technical Introduction to Bots     75
Common Ports     75
Command and Control Strategies     76
IRC C&C     76
Peer-to-Peer C&C     79
Web-Based C&C     80
Use of Encryption or Obfuscation     84
Types of Distributed Denial of Service (DDoS) Attacks     85
Introduction to Selected Bots     86
AgoBot     89
SDBot     91
PhatBot     96
The Infamous Hang-UP Team and IRC-Based Fraud Operations     98
Reptile     101
ZoTob     102
PBot     103
Tsunami     105
Kelvir     106
MetaFisher     107
Storm     113
Mitigation     123
Concluding Thoughts     125
USA Today: Botnets Used for Blackmail in Cyber Extortions     125
The Kraken Botnet     126
A Botnet That Targets .edu and .mil Servers     126
"Poisoning" the Storm Botnet     126
The Battle Is Joined!     127
The "Cyber Parasites" of the Internet     127
On the Edge of a Precipice     128
Glossary     131
Bibliography     135
Index     145