Iwork '05: The Missing Manual : 9780596100377

Introduced by Apple in January 2005, iWork '05 is an innovative new suite of document and presentation software that's the same caliber as Apple's groundbreaking digital media applications and that's wholly dedicated to what Mac users like you care about most: artistry and creativity. iWork '05 isn't about "office productivity"--it's about creating slick and stylish documents and cinema-quality digital presentations that say precisely what you want them to say.


While iWork '05 helps you create stunning documents and presentations, the suite doesn't come with any in-depth documentation of its own. That's where iWork '05: The Missing Manual comes in. The book that should have been in the box, it gives you everything you need to master iWork '05.


Seamlessly integrated with the wildly popular iLife '05 and designed to take advantage of the advanced typography and graphics engine of Mac OS X, iWork is actually two separate programs: Pages and Keynote 2. Pages is a brand-new, streamlined word processor and page layout program that allows nonprofessionals to quickly and painlessly produce gorgeous brochures, newsletters, letters, invitations, product data sheets, and more. You can start documents from scratch or use one of the 40 professionally designed templates as a starting point. Keynote 2 is a significant upgrade to Keynote, Apple's PowerPoint-like presentation software that allows you to build unique presentations, demonstrations, storyboard animations, interactive slideshows, and more.

Like every Missing Manual, this one is refreshingly entertaining and scrupulously detailed. iWork '05: The Missing Manual gives you all the essentials of Pages and Keynote 2, including an objective look at each program's capabilities, its advantages over similar programs, and its limitations. The book delivers countless goodies that you won't find anywhere else: undocumented tips, tricks, and secrets for getting the very best results from both exciting new applications.


With the iWork '05 suite and iWork '05: The Missing Manual, you are totally equipped to give your work the style it deserves.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Ivor Horton's Beginning Visual C++ 2005 (Programmer to Programmer) : 9780764571978

You'll learn the essentials of Visual C++ 2005 and get a thorough introduction to the techniques used for accessing data sources in both Microsoft® Foundation Classes and Windows® Forms applications. Plus, the exercises included at the end of most chapters will help you apply what you've learned as you make your way to becoming an effective C++ programmer.

What you will learn from this book



  • How to use the capabilities of Visual C++ 2005 to create applications

  • Unique aspects and new features of Visual C++ 2005

  • The basic ideas and techniques involved in debugging

  • Ways to build a graphical user interface for your application

  • How Microsoft Windows applications are structured

  • Tips for understanding the nuances of C++ without getting confused by the complexities of Windows GUI programming


Who this book is for


This book is for novice programmers who are looking to write C++ applications for the Microsoft Windows OS. No previous programming experience is required.


Wrox Beginning guides are crafted to make learning programming languages and technologies easier than you think, providing a structured, tutorial format that will guide you through all the techniques involved.

About the Author
Ivor Horton is one of the preeiminent authors of tutorials on the Java, C and C++ programming languages. He is widely known for the tutorial style of his books, which provides step-by-step guidance easily understood even by first-time programmers. Horton is also a systems consultant in private practice.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Ivor Horton's Beginning Java 2, JDK 5 Edition : 9780764568749

Combining simplicity with power, Java has become the object-oriented language of choice for Internet programming and cross-platform applications. This comprehensive and easy-to-use guide provides you with the essential information you'll need to know in order to develop dynamic programs using the Java 2 Standard Edition 5.0 or later.

You'll be introduced to the fundamental ideas about the structure of Java programs and how they work. You'll gain a clear understanding of all the latest features of the Java language as well as the key packages in the Java class library. And with the help of numerous working examples, you'll find out how to apply the material so you can write your own full-featured applications and applets.


This book teaches you how to start programming in Java, covering everything from putting together statements and performing calculations to applying the capabilities provided by the Java class libraries, and much more.


What you will learn from this book



  • The basics of how the Java language works

  • Ways to apply key language elements

  • Methods for storing data in a program

  • How to define and utilize classes

  • How to create applets for use in interactive Web pages

  • Techniques for implementing an application with a graphical user interface

  • How to use the JDBC capability to work with relational databases

  • All the skills to become a knowledgeable Java programmer


Who this book is for


This book is for anyone who wants to explore how Java works and discover how to write fully featured and effective Java programs. No previous Java experience is necessary.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

ITV Handbook: Technologies and Standards : 9780131003125

Interactive television (iTV)—an evolutionary merging of digital TV and the Internet—is set to take the world by storm! For consumers, iTV technology offers powerful new ways to interact with content providers and merchants. These include enjoying video on demand; participating in online shopping, banking, and gambling; and taking advantage of bonus multimedia features and controls added to news, sports, entertainment, and educational programming.


Organizations assembling the technologies and agents needed to deliver the content, though, find that providing iTV service is a monumental, multifaceted task. The sheer complexity also means that those proficient in one area of the service are often unfamiliar with the workings of other areas. iTV professionals seeking a better understanding of how it works and how it all fits together will find that iTV Handbook: Technologies and Standards, by topic authority Edward M. Schwalb, provides a welcome introduction to all the key issues, technology solutions, and standards surrounding the service.


This book covers:




  • Issues concerning the most links in the iTV "food chain"—content authors, producers, distributors, broadcasters, cable system operators, receiver manufacturers, and viewers




  • Details of the hardware, software, technologies, protocols, and standards that define iTV




  • Graphics, audio, video, and asset-management formats used in iTV, as well as security considerations, the broadcast file system, and more




iTV Handbook: Technologies and Standards provides a thorough overview of the iTV service and shows how everything fits together—it's the ideal introductory reference for technical managers, technical sales people, engineers, executives, content authors, and consumers interested in iTV technologies.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

It's Not About the Technology : 9780387233505

This book attempts to answer the question: “What is that mindset, that particular kind of thinking, that is required of us to be successful in a high technology company and why?”

To be sure, the “high” in the high technology does not accord the company any special place in the market. But a unique ingredient distinguishes a high technology company: the culture of innovation that leads to new, often highly complex, technologies. The flip side of this unique culture is the excessive fixation of these companies on the technology superiority. The baggage of this excessive fixation has quite often led these companies to disconnect from the end customer, unwittingly so. Hence our question and this book.

A series of semiconductor startup experiences spurred me to write. The bizarre life in the high technology profession, always precariously disconnected from the world at large, provided the problematic. And a rush to connect back lead to this book.

If you are not careful, this profession can make you feel isolated from the rest of the world. What starts off as a genuinely rewarding career of learning new technologies, creating new designs, coming up with products that people liked and bought, can quickly turn into a schizophrenia of a respectable sort. How we purport ourselves at work, the extreme stress we undergo to achieve that teamwork spirit, the unending project deadlines that we are always scrambling to meet, seem to put us on a tangential path from the every day life of our families, our children and parents. When this happens, the disconnect is near-complete.

Truly great corporations have become so by attending to this single trait. Leadership at these companies, at every level up and down the hierarchy, are unusually sensitive to this disconnect. Genuinely spirited startups are this way. But these sensibilities do not come packaged in best practices, nor found in the quality assurance manuals. None of this is part of any engineering or business school curriculum, at least not in a way that is impressive. Perhaps the simplicity of this sensibility is not rigorous enough to be included in the academics.

On the contrary, these sensibilities are a direct manifestation of a particular kind of mindset of a few random individuals. Drawn from their own personal experience, these leaders often are not, at first, conscious of the culture they germinate. Nor do they consult manuals to cross-check if their thinking is correct.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

It's Never Done That Before: A Guide to Troubleshooting Windows XP : 9781593270766

Most computer problems aren’t that violent or that dramatic, but the
immediate result is often the same: you sit there in a state of shock, staring at
the computer, saying to yourself, “What happened? What should I do now?
It’s never done that before!” This book will tell you how to understand and
fix most personal computer failures, whether they were caused by the
computer hardware, by the Windows operating system, or by some other
program running on the computer.

There’s not much you can do when your computer explodes except to
sweep up the remains and open a window to let the smoke out of the room.
But if Windows won’t start, or your hard drive breaks down, or you get a
cryptic Blue Screen error message, or any of a jillion other things go wrong,
you can almost always restore the machine to useful operation and recover
most of your data if you take an organized approach to troubleshooting.
The tools for understanding most computer problems are out there on the
Internet, in manuals and user guides, and through both on- and offline
communities of people who use similar equipment and programs. But they
won’t do you any good unless you know where to find them. That’s what this
book is for.

This is a book for people who use their computers all the time but who
don’t always know how to deal with the major and minor problems that
eventually seem to attack most computers. It will tell you how to apply
troubleshooting techniques and methods to evaluate and solve computer
problems, with an emphasis on computers running Windows XP. It won’t tell
you exactly what to do for every possible problem that might appear, but it will
tell you where to find detailed explanations of most problems and instructions
for fixing them. I will also show you how to recognize specific symptoms
and how to understand and use error messages, beep codes, and other
diagnostic tools that aren’t always clear on first inspection. I’ll also show you
where to find help from Microsoft, from other manufacturers and users, and
from the Combined Wisdom of the Internet. And finally, I will tell you how
to decide if the time and cost of a repair just isn’t worth the effort.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

iText in Action: Creating and Manipulating PDF : 9781932394795

Imagine a publisher who wants to "stamp" his ebooks on the fly with the name of the buyer (to discourage sharing). Such a publisher would (and we know one who does) use iText for the task. Developers looking to enhance web- and other applications with dynamic PDF document generation and/or manipulation will find this book unique in content and readability. Based on ongoing examples that encourage learning "in action," they will finally understand PDF and learn how to build applications that produce professional, high-quality PDF documents. While the basic functionality of iText is easy to acquire, this book lowers the learning curve for more advanced functionality. It explains how to use iText to create/manipulate PDF documents on-the-fly in one or more of the following situations:


  • Due to time or size, the PDF documents can't be produced manually

  • The content of the document must be calculated or based on user input.

  • The content needs to be customized or personalized.

  • The PDF content needs to be served in a web environment.

  • Documents are to be created in "batch process" mode.

    All the examples are written in Java, but they can be easily adapted to .NET by developers using one of the .NET ports: iTextSharp (C#) or iText.NET (#J). While iText is a free Java library and the examples are written from the point of view of the Java developer, nine out of ten examples can be run by .NET developers with only minimal changes.


  • Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    Iterating Infusion: Clearer Views of Objects, Classes, and Systems : 9781590595374

    Iterating Infusion: Clearer Views of Objects, Classes, and Systems is a one-of-a-kind book, not dependent on any single technology. Rather, it provides a way to integrate the most efficient techniques from a variety of programming methods, in a manner that makes designing and programming software look easy.


    Iterating Infusion presents comprehensive tools for you to best manage and work with object orientation. These include simplified fundamental concepts, popular language comparisons, advanced designing strategies, a broad usage progression, thorough design notations (interaction algebra), and data-oriented (fundamentally-OO) languages.


    The title, Iterating Infusion, alludes to the fact that any system has multiple, coexisting functional levels and that new levels--both lower and higher--are continually added to the same functional area. The practical effect is to bring processes into more focus, always clarifying the vague. The extreme form of this is when separate but compatible technologies are brought together to create advancements; these can be baby-steps or great leaps, with varying amounts of effort. In more general terms, the same thing in a different context can take on much more power. And actually, this phenomenon is at the heart of object-oriented software.


    Readers have been confirming that, compared to books on just low-level details, Iterating Infusion presents cohesive insights that allow you to solve more problems with the same effort in more key places.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    Iterated Function Systems for Real-Time Image Synthesis : 9781846286858

    Natural phenomena can be visually described with fractal-geometry methods, where iterative procedures rather than equations are used to model objects. With the development of better modelling algorithms, the efficiency of rendering, the realism of computer-generated scenes and the interactivity of visual stimuli are reaching astonishing levels. Iterated Function Systems for Real-Time Image Synthesis gives an explanation of iterated function systems and how to use them in generation of complex objects. Contents include: Discussion of the most popular fractal models applied in the field of image synthesis. Presentation of iterated function system models, including recent developments in IFS representation. Exploration of algorithms for creating and manipulating fractal objects, and techniques for implementing the algorithms. Use of practical examples to demonstrate the implementation and application of IFS models.

    The book contains both a description text and pseudo-code samples for the convenience of graphics application programmers.


    About the Author

    Slawomir S Nikiel is an assistant professor of Computer Science at the University of Zielona Gora in Poland. He received his MSC in computer and information science in 1991 and his Ph.D in computer vision in 1995 from the technical University of Wroclaw, Poland. In 1997-1998 he received a one year post-doc NATO fellowship in Hull, UK. His current research interests include fractals, rendering and animating complex structures for real-time computer graphics and virtual environments. His research area is related to Digital Cultural Heritage. Dr Nikiel is an author of over 30 papers in these fields.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    Itanium Architecture for Programmers: Understanding 64-Bit Processors and EPIC Principles : 9780131013728


    • Step-by-step guide to assembly language for the 64-bit Itanium processors, with extensive examples

    • Details of Explicitly Parallel Instruction Computing (EPIC): Instruction set, addressing, register stack engine, predication, I/O, procedure calls, floating-point operations, and more

    • Learn how to comprehend and optimize open source, Intel, and HP-UX compiler output


    Understand the full power of 64-bit Itanium EPIC processors

    Itanium® Architecture for Programmers is a comprehensive introduction to the breakthrough capabilities of the new 64-bit Itanium architecture. Using standard command-line tools and extensive examples, the authors illuminate the Itanium design within the broader context of contemporary computer architecture via a step-by-step investigation of Itanium assembly language. Coverage includes:



    • The potential of Explicitly Parallel Instruction Computing (EPIC)

    • Itanium instruction formats and addressing modes

    • Innovations such as the register stack engine (RSE) and extensive predication

    • Procedure calls and procedure-calling mechanisms

    • Floating-point operations

    • I/O techniques, from simple debugging to the use of files

    • Optimization of output from open source, Intel, and HP-UX compilers


    An essential resource for both computing professionals and students of architecture or assembly language, Itanium Architecture for Programmers includes extensive printed and Web-based references, plus many numeric, essay, and programming exercises for each chapter.


    About the Author

    JAMES S. EVANS is Professor of Computer Science and Chemistry and Director of Information Technology Planning at Lawrence University, Appleton, WI, where he teaches courses in computer architecture, hardware organization, and operating systems. He is also lead author of Alpha RISC Architecture for Programmers (Prentice Hall PTR). He holds a Ph.D. from Princeton University.


    GREGORY L. TRIMPER is Principal of viika, a consultancy specializing in portable technology and field computing, software design and implementation, and project management. He holds a B.A. from Lawrence University and pursues further studies at the University of Wisconsin-Madison.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IT Services Costs, Metrics, Benchmarking and Marketing : 9780130191953

    IT Services is the first 100% customer-focused guide to satisfying the consumers of your company’s IT services -- and building the loyalty your IT organization needs. In this book, three leading IT professionals present a fully integrated, comprehensive approach to service delivery in today’s global, distributed environments.


    You’ll discover how to establish processes, service and cost models, performance measurements, and "stretch" goals that achieve clear business benefits-and then transform those goals into reality.




    • Proven results, benchmarks, and case studies -- not just theory!




    • Linking goal-setting, process development, and metrics to the goals of the enterprise -- step-by-step




    • Gaining buy-in from management, internal customers, and external suppliers




    • Building stable, predictable and cost-effective application support infrastructures




    • Structuring support services for maximum effectiveness




    Applicable to both in-house and outsourced operations, IT Services offers a total roadmap for executives building enterprise-wide operations centers; practical help for managers seeking to deliver cost-effective support; and invaluable insight for IT "customers" who need to know what they can expect from their technology professionals.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IT Security: Risking the Corporation : 9780131011120

    Even the world's largest and most sophisticated networks are vulnerable to attack-and so is yours. The scenarios described in IT Security:Risking the Corporation expose crucial flaws in operating systems, networks, servers, and software-as well as the vulnerability caused by poor training, corporate politics, and careless management.


    In the previous version of this book, originally published as Intranet Security:Stories From the Trenches, Linda McCarthy drew on her experience penetrating thousands of corporate networks to identify key security risks and practical solutions. This timely update is even more compelling and offers a clear plan for improvinhg the security of your systems. You'll find useful tools and preventive measures you can take right now. In addition, McCarthy's security checklists and resource listings can help you tighten security throughout your entire IT infrastructure.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job : 9780471779872

    It's not a job. It's THE job, and here's how to get it.

    What does your ideal IT security job look like? What will prospective employers expect you to know? What affects how they view you and your skills? What if you haven't had much experience? What if you're not 30 anymore?


    Here's the crash course in how to discover, apply for, and land the IT security job you want. Written by a squad of highly credentialed security professionals, this guide prepares you with the technical knowledge, interview skills, strategies, and job search techniques you need to find and get the perfect job.


    Meet every job search challenge




    • What does — and doesn't — belong on your résumé


    • How to survive a telephone interview




    • All about firewall technologies, devices, deployment strategies, and management




    • A review of security essentials, regulations, legislation, and guidelines




    • The effects of state cyber security laws, Sarbanes-Oxley, and international standards




    • A refresher course in network fundamentals




    • Everything you should know about wireless, security posture, and tools




    • When and how to say "no"



    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IT Project+ Study Guide : 9780782140682

    Here's the book you need to prepare for the latest version of CompTIA's IT Project+ exam. This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and accessible instructional approach that has earned Sybex the "Best Study Guide" designation in the 2003 CertCities Readers Choice Awards, this book provides:

    * Clear and concise information on IT project management
    * Practical examples and insights drawn from real-world experience
    * Leading-edge exam preparation software, including a test engine and electronic flashcards
    You'll also find authoritative coverage of key exam topics, including:
    * IT Project Initiation and Scope Definition
    * IT Project Planning
    * IT Project Execution, Control and Coordination
    * IT Project Closure, Acceptance and Support

    This book has been reviewed and approved as CompTIA Authorized Quality Curriculum (CAQC). Students derive a number of important study advantages with CAQC materials, including coverage of all exam objectives, implementation of important instructional design principles, and instructional reviews that help students assess their learning comprehension and readiness for the exam.

    Note: On August 10, 2004 CompTIA changed the name of the IT Project+ certification to Project+, "in order to better reflect the title's application beyond IT professionals." Neither the exam objectives nor the exam questions were changed. The CAQC appoved content found in this edition of the IT Project+ Study Guide therefore remains valid and suitable for candidates preparing for the Project+ certification.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IT Project+ Study Guide, 2nd Edition (Exam PKO-002) : 9780782143188

    Here’s the book you need to prepare for the latest version of CompTIA’s IT Project+ exam. This Study Guide was developed to meet the exacting requirements of today’s certification candidates. In addition to the consistent and accessible instructional approach that has earned Sybex the “Best Study Guide” designation in the 2003 CertCities Readers Choice Awards, this book provides:



    • Clear and concise information on IT project management

    • Practical examples and insights drawn from real-world experience

    • Leading-edge exam preparation software, including a test engine and electronic flashcards


    You’ll also find authoritative coverage of key exam topics, including:



    • IT Project Initiation and Scope Definition

    • IT Project Planning

    • IT Project Execution, Control, and Coordination

    • IT Project Closure, Acceptance and Support


    Look to Sybex for the knowledge and skills needed to succeed in today’s competitive IT marketplace.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IT Project Portfolio Management : 9781580537810

    While consulting for a large company’s information technology (IT)
    department, I was asked to help find a way to better manage the various
    IT projects that were spread among all of its business units. The executives
    wanted me to research tools that would help them prioritize the
    projects so they would know which ones were healthy contributors to
    the corporate strategy and which ones could be axed. The market in
    which they were selling their products was slowing down, and they
    wanted to centralize corporate governance and trim unnecessary IT
    projects. Because they also knew that some IT projects were critical to
    the growth and ongoing operations of the company, they couldn’t simply
    eliminate a random sampling. Though we had experiences in IT
    program management and executive information systems (EISs), we
    had little experience in project portfolio management (PPM). After
    some research, we realized that implementing a project prioritization
    tool would be just the tip of the iceberg in providing a successful and
    lasting solution to their problem.

    This was a very project-centric company with over 250 ongoing IT
    projects running at one time. The market was constantly forcing the
    product line to change. Such pressures to decrease the life cycle and
    increase the quality of their products directly affected how the executives
    wanted IT to improve the efficiencies of their units. This ultimately
    made the company a prime candidate to adopt IT project-centric
    management techniques. Combining such a need with the realization
    that the company had dispersed IT governance across all of
    the business units highlighted the notion that this initiative would be
    an organizational change exercise similar in scale to an enterprise
    resource planning (ERP) or customer resources management (CRM)
    implementation. As it turns out, the long-term solution to centralizing
    IT project control was too much of a bite for them to take at
    once—organizational change needed to come piecemeal if it was going
    to succeed.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IT Project Management : On Track from Start to Finish, Second Edition : 9780072232028

    Get expert advice on planning and steering a successful IT project using PMBOK-driven principles. Expert author and PMI certified Project Management Professional, Joseph Phillips, walks you through each step of the IT project management process, and shares critical strategies that engender smoothly-run, on-time, and within-budget projects. Find the best path to initiate a project, uncover techniques for project planning, focus your managing skills on picking the most qualified team members, and discover ways to deal with management. Then, establish communication channels and realistic timetables and learn how to track financial obligations. These concepts are also illustrated through interviews with leading IT project managers.



    • Define a project goal and create the project charter

    • Create a feasibility plan and establish a priority list

    • Determine strategy and obtain budget dollars

    • Work with management and define their role

    • Determine project expenses—including estimated required hours

    • Organize a project team—assess internal skills as well as utilize external resources

    • Delegate responsibilities and manage project schedules

    • Resolve disagreements—as well as address delays and budget increases

    • Track progress and implement quality testing

    • Maintain leadership and keep your team focused

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IT Project Management Handbook : 9781567260984

    Now you can manage IT projects quickly, easily, on time, and on budget!

    IT project management has developed into a complex process with a broader scope of responsibilities than ever before. Here is the newest and most comprehensive book to offer winning insights and strategies on how to manage every step of the process. Written by two of this country’s leading experts on IT Project Management, this extensive yet easy-to-use volume will give you the tools you need to successfully navigate your next IT project.


    You’ll learn how to avoid cost overruns and schedule delays, meet customer requirements, take control of budgets and resource allocation, build a successful team, and put to use many more tried-and-true methods of project management. The handbook includes a completely up-to-date overview of the best Internet services, current software, and repositories available via the Internet along with networking, e-commerce, reuse, prototype, modeling and simulations.


    It’s all contained in this user-friendly handbook that will soon become the foundation for every IT project you manage … or take part in. Based on real-world practical experience and case studies, the Handbook will give you the framework to manage, improve, and build greater accuracy into every phase of your IT project management.


    Here are just some of the systems, methods, tools, case studies, and techniques covered:


    * IT Project Planning and Development Life Cycle Phases * Identifying Users, Customers, and Stakeholders * Customer Requirements Management * Project Modeling and Simulation * Customer Acceptance Criteria * Project Control and Recovery Mechanisms * Project Budgeting, Staffing, and Scheduling * Function Point and Earned Value Methods * The Gantt Chart, PERT Chart, and CPM * Risk Management – Assessment, Mitigation, Monitoring, and Reporting Plan * System Management Standard * Project Measurement Schema * Project management Tools – Microsoft Project, Kidasa Software’s Fast Track Schedule * Project Management Quality Control Mechanism * IT Networks and Internet Taxonomy * Wireless Technology, E-Commerce, and M-Commerce * System Software LifeCycle Model * System Integration Techniques * System Testing and Evaluation * Customer Satisfaction

    About the Author


    Jag Sodhi, MS, is a professor associated with the Defense Acquisition University. He has 32 years of combined experience as a well-known author, software developer, consultant, instructor, and project manager for defense products and commercial business applications. He has been a computer specialist and project manager and a member of DOD’s advanced technology team. He specializes in the best commercial practices and COTS tools for systems development and maintenance. Mr. Sodhi evaluated the Integrated Computer Aided Software Engineering (I-CASE) pilot project and is a member of the team for the DII COE project. He was the project leader for migration of his systems to the Joint Technical Architecture standard.


    Prince Sodhi is a senior management consultant for Proxicom Int'l Corp. He is an expert in project management, several programming languages, and in distributed computing applications in a multiple-tier, client-server environments. He is co-author of the books Software Reuse: Domain Analysis and Design Process (1999) and Object-Oriented Methods for Software Development (1996), McGraw-Hill. He has a bachelor’s degree in computer/mathematics from the University of Minnesota.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IT Project + CoursePrep ExamGuide : 9780619063498

    Provides the essential information you need to ace CompTIA?s IT Project+ Certification Exam. Each certification objective is covered in a unique two-page spread that highlights the key points of the objective.

    Prepare your students for CompTIA's new IT Project + exam in this prep guide. Devotes two full pages of material to every IT Project+ exam objective. Softcover.

    About the Author

    Kathy Schwalbe is an associate professor at Augsburg College in Minneapolis and teaches project management, problem solving for business, systems analysis and design, information systems projects, and electronic commerce. Kathy worked for 10 years in industry before entering academia in 1991. In addition, Kathy is an active member of PMI (Project Management Institute). Kathy earned her Ph.D. at the University of Minnesota, her MBA at Northeastern University, and her B.S. in mathematics at the University of Notre Dame.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IT Problem Management : 9780130307705

    The complete "best practices" guide to IT problem resolution!


    No matter how professional your IT organization, if you can't resolve problems quickly and effectively, you'll lose your stakeholders' confidence—and fail. Nowadays, help desk s aren't enough: companies want true service centers capable of delivering complex, strategic solutions. IT Problem Management is the first single source for building world-class problem management processes. Drawing upon his extensive consulting e xperience, Gary Walker presents specific improvements you can make to achieve breakthrough results in any help desk or service center—in-house or out-sourced. Coverage includes:



    • Problem identification, customer validation, problem lo gging, service delivery, knowledge capture and sharing, and management oversight

    • The Immediate Response Model: accounting for problem variability, complexity, and volume

    • Detailed metrics for measuring your responsiveness

    • Bett er ways to create and use service level agreements

    • State-of-the-art tools for customer interaction, service delivery, and proactive monitoring

    • New Internet and knowledge base systems: empowering users to solve their own problems

    • The human side: staffing, retention, and motivation


    IT Problem Management isn't just theory: it delivers real-world case studies, detailed benchmarks, and practical solutions for turning your help desk into a high-performance I T service center, starting today.


    About the Author

    GARY WALKER is a leading IT consultant, helping Fortune 500 and emerging growth companies focus on the people, processes, and technology required to operate a highly reliable and cost effective infrastructure.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IT Portfolio Management: Unlocking the Business Value of Technology : 9780471649847

    This book provides a pragmatic, step-by-step road map, describing IT portfolio
    management and its major elements. Chapter 1 provides an overview of IT
    portfolio management. Chapter 2 describes the planning aspects of IT portfolio
    management. It explains the IT portfolio management maturity model and the
    key people, process, and technology aspects at each of five levels within the model.
    Chapter 3 describes the IT governance aspects of the IT portfolio. It discusses the
    relationship between IT and corporate governance, and the impact of legislation
    and compliance rules, such as the Sarbanes-Oxley Act, on the IT portfolio. Chapter
    4 covers the IT life cycle and IT subportfolios. Chapter 5 provides step-by-step
    aspects of building the IT portfolio. Chapter 6 describes the request for information
    and the request for proposal parameters that companies should consider when
    evaluating and assessing IT portfolio management software providers. Chapter 7
    covers the way forward, discussing the impact that adaptability and new technologies
    have on IT portfolio management. The book concludes with detailed case
    studies of Cisco Systems, In-Q-Tel, and Xcel Energy, which are exemplar companies
    that actively practice IT portfolio management.

    About the Author
    Bryan Maizlish is Chief Technology Officer-Program Team at Lockheed Martin Integrated Systems & Solutions' GeoSpatial-Intelligence Solutions line of business. He is also the Chairman for the annual Strategic & Operational Portfolio Management conference cosponsored by the PDMA and IIR. He has served in management roles for companies that developed the Internet strategy, design and architecture, and systems integration and implementation for many global 2000 companies. He received his MBA from The Wharton School of Business, and was a member of the 1983 Rose Bowl Champion UCLA football team. He lives in Potomac, Maryland with his wife and three children.

    Robert Handler is Vice President at META Group, Inc., one of the leading IT research firms. Robert led the IT portfolio management research for META Group and is a sought-after speaker and author of numerous research papers on the topic. He has over fifteen years of experience in all aspects of information technology, and has worked at such esteemed organizations as IBM and Ernst & Young LLP. He holds a Bachelor of Science in Business Administration from Pepperdine University and an MBA in Information and Decision Systems from San Diego State University. He lives in San Diego with his wife, two children, and two golden retrievers.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IT Innovation for Adaptability and Competitiveness : 9781402079993

    IT Innovation for Adaptability and Competitiveness addresses the topic of IT innovations that can further an organization's ability to adapt and be competitive. Thus we address the problem at an earlier starting point, that is, the emergence of something innovative in an organization, applied to that organization, and its process of being diffused and accepted internally.
    Topics covered in the book include:



    • The role of IT in organizational innovation,

    • Innovating systems development & process,

    • Assessing innovation drivers,

    • Innovation adoption,

    • New environments, new innovation practices.


    This volume contains the edited proceedings of the Seventh Working Conference on IT Innovation for Adaptability and Competitiveness, which was sponsored by the International Federation for Information Processing (IFIP) Working Group 8.6 and held at Intel Corporation, Leixlip, Ireland in May-June 2004.


    IFIP WG 8.6 has as its focus diffusion of technological innovation. In this conference we have solicited papers on the topic of IT innovations that can further an organization’s ability to adapt and be competitive. Thus we address the problem at an earlier starting point, that is, the emergence of something innovative in an organization, applied to that organization, and its process of being diffused and accepted internally.


    A further extension of this would be the propagation of a successful innovation outside the originating organization as a product, service or example of technology use that builds the firm’s markets. In this discussion we are supposing that said innovations are indeed a contribution. In reality, an idea is only labeled an innovation once it is accepted. Before that time, it can be just an idea, a crackpot idea, a disturbance, obsession, distraction or dissatisfaction with the status quo. Many innovations are of course deliberately cultivated in research labs, but again their success is the determinant of their eventual designation as “innovative”.


    Conversely, some ideas really are crackpot concoctions or technologies in search of a use that linger in the environment as potential innovations long after their use is discredited. Case in point: voice recognition software, which does have some applications but has been over hyped and over applied for about 20 years. Today some call centers won’t let users punch a single button on their telephone sets; they MUST tell the voice recognition program what they want. Some of these systems will revert to an operator if the voice recognition system doesn’t understand, while others will just hang up. We were relieved to note the following title in the March 5 Financial Times: “To speak to an operator, start swearing now.” Someone has developed an innovation to recognize user frustration and bypass the prior innovation of persistent automated voice “response”!

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IT-Enabled Strategic Management: Increasing Returns for the Organization : 9781591409083

    We live in an age in which the value of information and knowledge has far surpassed that
    of physical goods. Information resources have become a key differentiator of successful
    businesses. Information technology (IT) and information systems (IS) are now integrated
    in almost every aspect of business, from planning to analysis and design,
    operations management and strategic decision making. Even for those businesses not
    in information industries, information plays a vital role in supporting their business
    functions, from routine operations to strategizing. John Naisbitt (1982) theorized that
    information would be the driving force for organizations. Companies that manage
    information well are more likely to maintain a competitive advantage against their peers.
    Because information has become a major force in driving business activities, Evans and
    Wurster (2000) proclaimed that every business is in the information business.

    IT and IS have experienced dramatic changes in the last few decades. Their major role in
    business has shifted from tools to support “back-office” operations to an integrated part
    of business strategies and the maintenance of core competencies. Strategic management,
    as the process of business strategy formulation and strategy implementation, is concerned
    with establishing goals and directions, and developing and carrying out plans to
    achieve those goals. As organizations evolve, so do their strategies and strategic
    management practices. In recent years, IT has become increasingly important in strategic
    management. IT and IT-enabled systems are now indispensable in supporting business
    strategies. In this chapter, we examine the evolution of information technology and
    strategic management, and their interplay in the last 50 years. We start with a review of
    major theories and development in both strategic management and IT, and then explore
    how IT has become an enabler for strategic management. We also discuss research issues
    in IT-enabled strategic management, and suggest future directions in this crossdisciplinary
    research field.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IT Auditing: Using Controls to Protect Information Assets : 9780072263435

    Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.


    Build and maintain an IT audit function with maximum effectiveness and value



    • Implement best practice IT audit processes and controls

    • Analyze UNIX-, Linux-, and Windows-based operating systems

    • Audit network routers, switches, firewalls, WLANs, and mobile devices

    • Evaluate entity-level controls, data centers, and disaster recovery plans

    • Examine Web servers, platforms, and applications for vulnerabilities

    • Review databases for critical controls

    • Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies

    • Implement sound risk analysis and risk management practices

    • Drill down into applications to find potential control weaknesses


    About the Authors


    Chris Davis, CISA, CISSP, leverages his experience auditing IT systems for Texas Instruments. Mr. Davis has trained and presented in information security, advanced computer forensic analysis, and hardware security design. He actively teaches auditing and certification curriculum for Southern Methodist University and is the author and contributor to several books and publications. His contributions include projects and presentations for SANS, Gartner, Harvard, BlackHat, and 3GSM. He has enjoyed positions at Texas Instruments, Austin Microsoft Technology Center, and Cisco Systems. He holds a bachelor's degree in nuclear engineering technologies from Thomas Edison, and a master's in business from the University of Texas at Austin. Chris was a U.S. Navy submariner, and served on the deep dive Submarine NR-1 and the ballistic missile OHIO class USS Nebraska, SSBN 739, Blue Crew.


    Mike Schiller, CISA, has 14 years of experience in the IT audit field, most recently as the worldwide IT audit manager at Texas Instruments(TI). Prior to that, Mike served as the IT audit manager at The Sabre Group, where he served as the company's first-ever IT audit manager, creating the IT audit function, team, and processes from the ground up. Mike also has several years of experience as a senior IT auditor, programmer/analyst, and manager of IT support teams. He is involved in multiple industry IT audit organizations and has been a presenter at IT conferences such as ASUG. In addition to his years of experience in corporate management, Mike is also heavily involved in leadership at his church, Richardson East Church of Christ. He has a bachelor's degree in business analysis from Texas A&M University.


    Kevin Wheeler, CISA, CISSP, NSA IAM/IEM, is the founder and CEO of InfoDefense, an information security consultancy. Mr. Wheeler's project and employment portfolio includes organizations such as Bank of America, EDS, McAfee, Southern Methodist University and the State of Texas. He has performed information security audits and assessments as well as information security design, computer incident response, business continuity planning, and IT security training for both government and commercial entities in the financial services, healthcare, and IT services industries. He holds a bachelor of business administration degree from Baylor University and is an active member of ISSA, ISACA, Infragard, the North Texas Electronic Crimes Task Force, and Greater Dallas Chamber of Commerce.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IT Administrator's Top Ten Introductory Scripts for Windows (Administrator's Advantage Series) : 9781584502128

    A key problem with Microsoft Windows is that its friendly user interface can get in the way of efficient system administration. There's no easy way, for example, to use the graphical administration tools to determine which of your users have passwords that will soon expire. The answers to such problems of administration come in the form of scripts written for the Windows Script Host (WSH), which are what IT Administrator's Top 10 Introductory Scripts for Windows aims to teach its readers about. It succeeds; Jeff Fellinge takes on 10 significant administration challenges (getting a list of a machine's local user accounts remotely, comparing successive weeks' computer rosters, getting a concise report of users and groups on Active Directory, and so on) and shows how to solve them. It's a handy resource for an administrator who's not fond of trooping across the office (or, all too frequently, the country) to do menial tasks.

    This book should also prove useful to programmers interested in integrating their products with Active Directory. Fellinge takes care to document his scripts in detail--he does not commit the popular sin of presenting the user with giant, unexplained code listings--and it's usually easy to figure out why he's designed his code as he as. Combined with a reference that details JScript for WSH, this book will prove especially valuable. --David Wall


    Topics covered: How to use JScript and the Windows Script Host (WSH) to write time-saving administrative scripts for Microsoft Windows 2000, Windows Server 2003, and (to a far lesser extent) Windows NT.

    The IT Administrator's Top 10 Introductory Scripts for Windows helps administrators learn, and quickly implement, new scripting tools to increase productivity and reduce redundancy. It teaches readers scripting basics by explaining and breaking down real-world examples, and focuses on harnessing scripting power for IT systems administrators and systems engineers. The book is built around 10 fully-functional scripts that will help IT administrators manage their environment right "out of the box." Administrators also learn the strategies and tactics surrounding the development and implementation of these real-world scripts. Additionally, the chapters cover hypothetical, real-world business needs and explain how to map a script-based solution, including a discussion of the preferred language, tools, and technologies.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    Issues of Human Computer Interaction : 9781591401919

    The interaction between humans and computers is evolving rapidly, impacting every aspect of human and organizational life. This book presents the latest developments in this field of Human Computer Interaction (HCI). It discusses issues related End User Computing, as well as issues related to the human side of IT. This book will set a framework for the social and organizational issues related to IT, giving emphasis to its role as facilitator of social relationships, enabling the development of the organizational and individual intelligence and helping to improve human conditions. In Issues of Human Computer Interaction, models and theories are presented together with practical cases that will help students, lecturers, researchers and managers to have a clear idea of what is going on in HCI, today.

    About the Author
    Anabela Sarmento is a professor at the Institute of Administration and Accountancy (ISCAP)/Polytechnic School of Porto (Portugal). She is also an invited researcher at the Algoritmi R & D Center, Information Systems Group, at the University of Minho (Portugal). She lectures courses related to business communication, information society, and interactive marketing. Her primary area of research is the impact of information systems on organizations, namely in the domain of communication, knowledge and organizational learning, as well as in the role of the context in the use of information systems. She is also interested in knowledge management and its relation with information systems. She received her doctorate in information systems from the University of Minho (Portugal) in 2002.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    Issues of Human Computer Interaction: Opportunities and Challenges : 9781591402350

    The interaction between humans and computers is evolving rapidly, impacting every aspect of human and organizational life. This book presents the latest developments in this field of Human Computer Interaction (HCI). It discusses issues related End User Computing, as well as issues related to the human side of IT. This book will set a framework for the social and organizational issues related to IT, giving emphasis to its role as facilitator of social relationships, enabling the development of the organizational and individual intelligence and helping to improve human conditions. In Issues of Human Computer Interaction, models and theories are presented together with practical cases that will help students, lecturers, researchers and managers to have a clear idea of what is going on in HCI, today.

    Human Computer Interaction (HCI) has its roots in the main areas of industrial engineering, human factors and cognitive psychology with the focus on the development of user-friendly IT. Traditionally, the research in this area has emphasised the technological aspect of this relationship (the Computer). More recently, other aspects concerning the organizational, social and human context also began to be considered (the Human). Today, one can say that any attempt to facilitate the relationship between the machine and the user must consider not only the technological perspective (e.g., promote the usability) but also, for instance, the way the user is going to use the technology and his or her purpose as well as the social and cultural context of this use (the Human and the Computer).

    Another issue that should be considered in this interaction is the impact that information systems/technology may have on humans and organizations. There is general consensus that the adoption of any IT/IS brings change. Furthermore, IT/IS and organizations have a mutual influence on each other, meaning that this technology affects organizations and that organizations necessarily affect, for instance, the design, the choice and the management of those systems. The adoption of an IT/IS is, thus, mediated by factors that will influence the interaction between the sectors involved. It is also generally agreed that the adoption of a certain IS by different organizations does not give rise to the same changes; that is, the same technology might engender different impacts and these differences are due not to the characteristics of the technology itself, but to the characteristics of the context and the relationships that are established among all the factors involved.

    About the Author
    Anabela Sarmento is a professor at the Institute of Administration and Accountancy (ISCAP)/Polytechnic School of Porto (Portugal). She is also an invited researcher at the Algoritmi R & D Center, Information Systems Group, at the University of Minho (Portugal). She lectures courses related to business communication, information society, and interactive marketing. Her primary area of research is the impact of information systems on organizations, namely in the domain of communication, knowledge and organizational learning, as well as in the role of the context in the use of information systems. She is also interested in knowledge management and its relation with information systems. She received her doctorate in information systems from the University of Minho (Portugal) in 2002.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    Issues and Trends in Technology and Human Interaction (Advances in Technology and Human Interaction) : 9781599042688

    purposes of humans. It often has unintended and unexpected effects on humans and can be used for purposes other than originally planned. While technology cannot exist without humans, one can equally well argue that humans cannot exist without technology. This relationship touches on many fundamental questions of anthropology, ontology, and epistemology. Due to the complexity of the field of technology and human interaction, we cannot hope to do it justice in a single volume. The chapters in this current book are therefore focused on a sub-sector, namely the area of information and communication technology. They discuss different topics and angles on the way in which humans interact with ICT. The book reflects a variety of approaches and problems that researchers have investigated in this area. It is meant to be multi-disciplinary and demonstrate the richness of these studies. The reference disciplines that the authors draw upon reflect this multi- and trans-disciplinary nature. They include information systems, computer science, sociology, philosophy, gender studies, and even theology.

    This book will provide the reader with a wide range of interesting and novel approaches to the relationship between technology and humans. It can be used for teaching as well as for research purposes, and it will contain insights that are of relevance for social and organisational use of ICT.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    Isometric Game Programming with DirectX 7.0 w/CD : 9780761530893

    Isometric Game Programming with DirectX takes you from zero to DirectX, literally! Beginning with game programming basics you will explore such topics as WIN32 programming basics, GDI fundamentals, fonts, regions and bitmaps, DirectDraw, and Game Logic. You'll then move on to Isometric fundamentals and methodology as well as advanced topics such as Random World Generation and Direct3D.This book is a comprehensive Isometric game programming guide ideal for any serious game developer!

    This book, as you are no doubt aware, is a book about programming games—how to do so, specifically—
    and it emphasizes use of the isometric view. This means that the program examples are mainly concerned
    with the graphical aspect of game programming.
    Contained herein is also quite a bit of information on the algorithms behind tile-based games. Isometric
    games tend to be tile-based. If you wanted to make overhead view tile-based games, the same algorithms
    apply.

    Why did I write this book, you ask? Because isometric game programming, and isometric algorithms, have
    been largely ignored by other game programming books. Sure, you can find plenty of books on how to
    program 3D games, and there are plenty of books on 2D games, but none of the in-between stuff, like
    isometric games.

    You will find the program examples (and there are a ton of them) that go along with the text on the CD
    in the back of the book; you will find instructions on how to load and run those examples in Appendix A.
    It is a good idea to turn to that appendix first, even before you start reading. That way, when the first mention
    of an example is made, you’ll be ready to go.

    About the Author


    Ernest S. Pazera started programming on a TRS-80 Color Computer 2 in 1986; he switched to PC permanently
    in 1990. He doesn’t have a computer science degree, just a high school diploma. Ernest served in
    the United States Navy from 1993 until 1996 but never forgot his first love, which was game programming.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    ISO 9001: 2000 Quality Management System Design : 9781580535267

    An effective ISO 9001:2000 quality management system, driven by a fully compliant quality manual, is key in meeting ISO 9000 quality standards and a must for obtaining ISO certification. Written by an RAB certified quality management systems lead auditor, with forty years of industrial experience – who has a 10-year track record in either the consultation or auditing support of over one-hundred ISO certified organizations – this book provides you with the design principles and techniques for implementing an effective quality management system.

    The book describes the design rules required to document, implement, and demonstrate quality management system effectiveness in compliance with the latest version of the ISO 9000 International Standard. This systematic and engineering approach simplifies the many complexities in maintaining compliance with ISO standards. This hands-on guide is packed with tips and insights the author has garnered from personally designing quality management systems that integrate organizational strategy with quality management. Moreover, the book helps you create meaningful documentation and a user-friendly, informative quality manual that together form the core of an effective and responsive quality management system.

    Text describes the design rules required to document, implement, and demonstrate quality management system effectiveness in compliance with the latest version of the ISO 9000 International Standard.


    The pursuit of product quality requires that an organization create a quality framework. The ISO 9001:2000 quality management system (QMS) is an internationally established quality framework. This book is designed to assist an organization to structure an ISO 9001:2000 QMS on some well-established documentation and implementation concepts that have been proven to be effective based on ten years of intensive consulting and auditing experiences with 106 ISO 9000–certified organizations. The intent of this exercise is to provide the reader with a reasonable probability of maximized organizational productivity when the ISO 9001:2000 system is implemented.


    About the Author
    Jay J. Schlickman is an RAB certified quality management systems lead auditor; an RAB qualified ISO 9001:2000 auditor; a certified Canadian medical devices conformity assessment system auditor; and quality management systems consultant based in Lexington MA. He received his B.S. and M.S. in physics from Northeastern University. He is a Life Member of the Institute of Electrical & Electronics Engineers (IEEE), a member of the American Physical Society (APS), and a member of the American Society for Quality (ASQ).

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IS-IS Network Design Solutions : 9781578702206

    The definitive IS-IS reference and design guide.





    • Extensive coverage of both underlying concepts and practical applications of the IS-IS protocol




    • Detailed explanation of how the IS-IS database works and relevant insights into the operation of the shortest path first (SPF) algorithm




    • Comprehensive tutorial on configuring and troubleshooting IS-IS on Cisco routers




    • Advanced information on IP network design and performance optimization strategies using IS-IS




    • Network design case studies provide a practical perspective of various design strategies




    • Comprehensive overview of routing and packet-switching mechanisms on modern routers




    • A collection of IS-IS packet formats and analyzer decodes useful for mastering the nuts and bolts of the IS-IS protocol and troubleshooting complex problems




    Interior gateway protocols such as Intermediate System-to-Intermediate System (IS-IS) are used in conjunction with the Border Gateway Protocol (BGP) to provide robust, resilient performance and intelligent routing capabilities required in large-scale and complex internetworking environments. Despite the popularity of the IS-IS protocol, however, networking professionals have depended on router configuration manuals, protocol specifications, IETF RFCs, and drafts. Mastering IS-IS, regardless of its simplicity, has been a daunting task for many.


    IS-IS Network Design Solutions provides the first comprehensive coverage available on the IS-IS protocol. Networking professionals of all levels now have a single source for all the information needed to become true experts on the IS-IS protocol, particularly for IP routing applications. You'll learn about the origins of the IS-IS protocol and the fundamental underlying concepts and then move to complex protocol mechanisms involving building, maintaining, and dissemination of the information found in the IS-IS database on a router. Subsequent discussions on IP network design issues include configuration and troubleshooting techniques, as well as case studies with practical design scenarios.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IS-IS: Deployment in IP Networks : 9780201657722

    IS-IS, the Intermediate System to Intermediate System protocol, has been used effectively as a routing protocol for many large-scale networks, including service provider backbone, telephone system management, and power equipment networks. Used in conjunction with the Border Gateway Protocol (BGP), IS-IS offers Internet Service Providers and the administrators of other large networks advanced flexibility and scalability. As a result, the number of complex networks employing the IS-IS protocol has grown tremendously.


    IS-IS: Deployment in IP Networks is a hands-on guide for network engineers deploying, maintaining, and building IS-IS networks. Based on both the best practices of current implementations and the specifications of the protocol, IS-IS provides highly valuable configuration examples using Cisco IOS Software combined with real-life, expert descriptions, analysis, and advice. Readers will also find case studies and operational theory about this powerful and popular routing protocol.


    Coverage includes:




    • A historical perspective on OSI protocols and addressing




    • Neighbor discovery, relationships, and pseudonodes




    • Flooding mechanisms, timers, and tuner timing




    • The division of the routing domain




    • Hierarchical network design and IS-IS deployment




    • The interaction between IS-IS and MPLS




    • Protocol enhancements, including dynamic host names, back door links, interaction with RPR, non-stop forwarding, and multitopology routing




    Examining the IS-IS protocol from its origins to the most recent innovations, this book covers all of the protocol's pieces, packets, deployment strategies, and issues. It is a valuable resource for networking students preparing for the CCIE(R) (Cisco Certified Internetwork Expert) exam.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    Is Human Nature Obsolete?: Genetics, Bioengineering, and the Future of the Human Condition : 9780262524285

    "Modifying ourselves through molecular biology is a humanitarian utopia to some, an imminent nightmare to others. But to all, the prospect should be a challenge because it touches on so many basic and unresolved questions. This excellent, probing collection of papers -- spanning philosophy, history, social science, and theology -- will be welcomed by professionals and lay readers alike."
    -- Edward Tenner, author of Why Things Bite Back: Technology and the Revenge of Unintended Consequences and Our Own Devices: How Technology Remakes Humanity

    "The conversation about what we want -- literally -- to make of ourselves is probably the most important conversation human beings will ever have. This carefully considered book is a fine entry into that dialogue, and it comes not a moment too soon."
    -- Bill McKibben, author of Enough: Staying Human in an Engineered Age

    "The greatest strength of this book is the philosophical ambition of many of the essays, which make use of a rich variety of thought and literature to explore the implications of the new genetics and new biology. The book draws interesting and unpredictable connections between large human themes and contemporary debates. Particular essays in the volume will have lasting value in the field and are deeply relevant to the current bioethical deliberations at the national level."
    -- Eric Cohen, Ethics and Public Policy Center, Washington,

    As our scientific and technical abilities expand at breathtaking speeds, concern that modern genetics and bioengineering are leading us to a posthuman future is growing. Is Human Nature Obsolete? poses the overarching question of what it is to be human against the background of these current advances in biotechnology. Its perspective is philosophical and interdisciplinary rather than technical; the focus is on questions of fundamental ontological importance rather than the specifics of medical or scientific practice.

    The authors -- all distinguished scholars in their fields -- take on questions about technology's goals and values that are often ignored or sidelined in the face of rapid scientific advances and the highly specialized nature of technical knowledge. The essays included represent a rich variety of thought, ranging from finely nuanced philosophical and theological arguments to historical studies and cultural commentaries. Several explore the historical background of today's biotechnology: Timothy Casey traces such developments as the emergence of cybernetic humanity from Cartesian dualism, and Diane Paul presents the history of "positive" versus coerced eugenics. Jean Bethke Elshtain discusses cloning as a "messianic project" to perfect the body and exclude natural diversity -- giving as an example the elimination of Down Syndrome as an acceptable human type -- while Harold Baillie calls for an examination of the metaphysical roots of personhood. Robert Proctor finds no evidence in paleontology for any "essence of humanity," and Tom Shannon argues against materialist reductionism. Addressing social concerns, Lisa Sowle Cahill finds the possibility of a political solution to the problems raised by genetic engineering in Catholic teachings on social justice, and Langdon Winner looks critically at the "scientific enthusiasts of a posthuman future." Taken as a whole, the book provides a humanistic overview of a subject too often considered only in its technological aspect.

    About the Author
    Harold W. Baillie is Professor of Philosophy at the University of Scranton. Timothy K. Casey is Professor of Philosophy at the University of Scranton.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    Irresistible! Markets, Models, and Meta-Value in Consumer Electronics : 9780131987586

    The consumer electronics industry is entering an era of extraordinary growth. The industry’s best companies will ride that wave to unprecedented success. But, today, many CE companies are struggling with business models that are simply untenable. They must change to survive: they must change even more dramatically to win.

     


    In this book, two world-renowned consultants preview the industry’s future–from online gaming to telehealthcare, and beyond. Next, they present a powerful new blueprint, offering indispensable guidance on everything from technology platforms to user interface design, branding to channel strategies. You’ll discover how to uncover new sources of value, design better models for doing business, and fuel growth by reaching new geographical markets. Whatever your role in the industry, this book will help you:


     


    ·   Make better decisions, find your differentiators, and focus on your key success drivers


    ·   Tap into the emergent “meta-value” that arises when technologies, devices, services, and content come together


    ·   Reach tomorrow’s smart, service-sensitive shopper: not just the “technology-hungry” customers


    ·   Widen margins by adding value consumers will pay for


    ·   Transform cost structures to support rapid growth and nonstop change


    ·   Sell into China, India, and other fast-growing emerging markets


    ·   Preview “telehealthcare”: the surprising application for the living room


    ·   Gain new insights into online gaming, smart home technology, and more


    ·   Discover the immense power of IBM’s Cell Broadband Engine processor–and the business opportunities it enables


    ·   Leverage embedded Linux to build more affordable, profitable, consumer-centric products


    ·   Develop higher-value software for connected consumer electronics


    ·   Differentiate products through state-of-the-art design and user interfaces


    ·   Discover what the industry’s “winners” will look like in five years–and how to be one of them  


     


    The consumer electronics industry continues to grow at breakneck speed: from MP3 players to home healthcare devices, consumers are adopting new technologies faster than ever before. But most consumer electronics companies are struggling with razor-thin margins, or even losses. Their traditional business models simply aren’t working anymore. In Irresistible! Markets, Models, and Meta-Value in Consumer Electronics, IBM’s leading consumer electronic industry consultants reveal powerful new opportunities to profit–and offer realistic advice for leveraging them.


     


    Drawing on their experience working with innovators from Helsinki to Osaka, the authors and contributors introduce revolutionary On Demand Business models for improving profitability, and identify tomorrow’s most profitable CE opportunities. They cover every element of success: technology, design, service, branding, channel strategies, and much more. Whether you’re an executive or engineer, strategist or entrepreneur, this book will help you find your differentiators, focus on your key success drivers–and become one of this industry’s big long-term winners!

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IRC Hacks : 9780596006877

    While IRC is easy to get into and many people are happy to use it without being aware of what's happening under the hood, there are those who hunger for more knowledge, and this book is for them. IRC Hacks is a collection of tips and tools that cover just about everything needed to become a true IRC master, featuring contributions from some of the most renowned IRC hackers, many of whom collaborated on IRC, grouping together to form the channel #irchacks on the freenode IRC network (irc.freenode.net).

    Internet Relay Chat (IRC) has continued to grow in popularity since its inception way back in 1988. Millions of people all over the world now use IRC to chat with friends, discuss projects, and collaborate on research. With a simple, clearly defined protocol, IRC has become one of the most accessible chat environments, with clients written for a multitude of operating systems.

    Users of alternative chat systems will find IRC pretty easy to pick up and may even be surprised to find that it is more powerful, allowing not just chat between pairs of users, but among groups of hundreds, even thousands. It is the scalable nature of IRC that has helped it to succeed and to make it the most mature chat system on this planet.


    This book presents an opportunity to learn how IRC works and how to make best use of some of its features. IRC Hacks delves deep into the possibilities, featuring contributions from some of the most renowned IRC hackers. Many of the contributors collaborated on IRC, grouping together to form the channel #irchacks on the freenode IRC network (irc.freenode.net). We look forward to seeing you there and hearing how you've used this book.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IPv6 Network Programming : 9781555583187

    Ipv6 Network Programming contains everything you need to make your application program support IPv6. This book covers Ipv6 with a focus on two of the most timely and relevant topics: security and portability. IPv6 socket APIs (RFC2553) are fully described with real-world examples. They are implemented with security in mind, leading you to write secure programs by recommending against the use of some of the inherently insecure IPv6 standard APIs. The examples in the book are also portable and applicable to any of UNIX based operating systems, MacOS X, and Windows XP.

    Features:
    * Covers the new protocol just adopted by the Dept of Defense for future systems
    * Deals with security concerns, including spam and email, by presenting the best programming standards
    * Fully describes IPv6 socket APIs (RFC2553) using real-world examples
    * Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP

    Jun-ichiro itojun Hagino is a Senior Researcher at IIJ research laboratory,
    a Core Researcher at KAME project and an IETF Internet Architecture Board
    member.
    He has been contributing to IPv6 protocol design, implementation and deployment
    through activities at KAME project, where the IPv6 stack is developed and
    maintained for 4.4BSD-variants.

    About the Author

    He has been contributing to IPv6 protocol design, implementation and deployment through activities at KAME project, where IPv6 stack is developed and maintained for 4.4BSD-variants.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IPv6 Network Administration : 9780596009342

    This essential guide explains what works, what doesn't, and most of all, what's practical about IPv6--the next-generation Internet standard. A must-have for network administrators everywhere looking to fix their network's scalability and management problems. Also covers other IPv6 benefits, such as routing, integrated auto-configuration, quality-of-services (QoS), enhanced mobility, and end-to-end security.

    IPv6 has evolved during the last dozen years or so, and the road has not been easy. The process has been driven primarily by the shortage of address space under IPv4, but also by the desire for new applications that don't fit within the older protocol's limitations. The address space crisis has been delayed by several new approaches to IP addressing, the most important of them being CIDR, NAT, and RFC1918 private address space. At the same time, it was clear that these solutions only postponed the inevitable, so efforts began to redesign the IP protocol. These efforts led to IPv6.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IPv6 in Practice: A Unixer's Guide to the Next Generation Internet : 9783540245247

    Handling IPv6 for the first time is a challenging task even for the experienced system administrator. New concepts and mechanisms make it necessary to rethink well-established methods of the IPv4 protocol.


    This book is a practical guide to IPv6 addressing Unix and network administrators with experience in TCP/IP(v4) but not necessarily any IPv6 knowledge. It focuses on reliable and efficient operation of IPv6 implementations available today rather than on protocol specifications. Consequently, it covers the essential concepts - using instructive and thoroughly tested examples - on how to configure, to administrate, and to debug IPv6 setups. These foundations are complemented by discussions of best practices and strategic considerations aimed at overall efficiency, reliability, maintainability, and interoperation.


    The examples in this book cover all relevant aspects concerning Debian GNU/Linux, FreeBSD, and Solaris. Examples about other Unix derivatives are available online at www.benedikt-stockebrand.de.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    Ipv6 Essentials : 9780596100582

    IPv6 Essentials, Second Edition provides a succinct, in-depth tour of all the new features and functions in IPv6. It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. The new IPv6 protocols offers extended address space, scalability, improved support for security, real-time traffic support, and auto-configuration so that even a novice user can connect a machine to the Internet. Aimed at system and network administrators, engineers, network designers, and IT managers, this book will help you understand, plan for, design, and integrate IPv6 into your current IPv4 infrastructure.


    Beginning with a short history of IPv6, author Silvia Hagen provides an overview of new functionality and discusses why we need IPv6. Hagen also shares exhaustive discussions of the new IPv6 header format and Extension Headers, IPv6 address and ICMPv6 message format, Security, QoS, Mobility and, last but not least, offers a Quick Start Guide for different operating systems. IPv6 Essentials, Second Edition also covers:




    • In-depth technical guide to IPv6




    • Mechanisms and Case Studies that show how to integrate IPv6 into your network without interruption of IPv4 services




    • Routing protocols and upper layer protocols




    • Security in IPv6: concepts and requirements. Includes the IPSEC framework and security elements available for authentication and encryption




    • Quality of Service: covers the elements available for QoS in IPv6 and how they can be implemented




    • Detailed discussion of DHCPv6 and Mobile IPv6




    • Discussion of migration cost and business case




    • Getting started on different operating systems: Sun Solaris, Linux, BSD, Windows XP, and Cisco routers




    Whether you're ready to start implementing IPv6 today or are planning your strategy for the future, IPv6 Essentials, Second Edition will provide the solid foundation you need to get started.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IPv6 Essentials : 9780596001254

    IPv6, the next generation Internet Protocol, has been in the works since the early 90s when the rapid growth of the Internet threatened to exhaust existing IP addresses. Drawing on 20 years--operational experience with the existing protocol (IPv4), the new protocol offers scalability, increased security features, real-time traffic support, and auto-configuration so that even a novice user can connect a machine to the Internet. But what does this mean for IT professionals? Having learned all the strengths and weaknesses of the old protocol, will you need to start from scratch with the new? IPv6 Essentials provides a succinct, in-depth tour of all the new features and functions in IPv6, guiding you through everything you?ll need to know to get started, including how to configure IPv6 on hosts and routers, and which applications currently support IPv6. Aimed at system and network administrators, engineers, network designers, and IT managers, this book will help you plan for, design, and integrate IPv6 into your current IPv4 infrastructure. Beginning with a short history of IPv6, author Silvia Hagen provides an overview of the new functionality and describes some live test and production networks that are using the new protocol. Hagen then shares exhaustive discussions of the new IPv6 header format and Extension Headers, IPv6 address format, and IPv6 message format. IPv6 Essentials also covers:


    • Security in IPv6: concepts, requirements, and solutions. Includes the IPSEC framework and security elements available for authentication and encryption

    • Quality of Service: covers the types of QoS in IPv6 and how they can be implemented

    • Networking: Layer 2 support for IPv6 with sample network designs that show how to integrate IPv6 into your network without interruption of IPv4 services

    • Routing protocols and upper layer protocols

    • Getting started on different operating systems: Sun Solaris, Linux, Windows 2000 and Windows XP


    Whether you're ready to start implementing IPv6 today or are planning your strategy for the future, IPv6 Essentials will provide the solid foundation you need to get started.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IPv6 Core Protocols Implementation (The Morgan Kaufmann Series in Networking) : 9780124477513

    The authoritative reference text on KAME and IPv6!

    IPv6 was introduced in 1994 and has been in development at the IETF for over 10 years. It has now reached the deployment stage. KAME, the de-facto open-source reference implementation of the IPv6 standards, played a significant role in the acceptance and the adoption of the IPv6 technology. The adoption of KAME by key companies in a wide spectrum of commercial products is a testimonial to the success of the KAME project, which concluded not long ago.

    This book is the first and the only one of its kind, which reveals all of the details of the KAME IPv6 protocol stack, explaining exactly what every line of code does and why it was designed that way. Through the dissection of both the code and its design, the authors illustrate how IPv6 and its related protocols have been interpreted and implemented from the specifications. This reference will demystify those ambiguous areas in the standards, which are open to interpretation and problematic in deployment, and presents solutions offered by KAME in dealing with these implementation challenges.

    Key Features:

    *Extensive line-by-line code listings with meticulous explanation of their rationale and use

    *Numerous diagrams and illustrations help in visualizing the implementation

    *In-depth discussion of the standards provides intrinsic understanding of the specifications

    *Two CD-ROMs filled with the complete KAME IPv6 protocol stack and FreeBSD software

    About the Author

    Qing Li
    is a senior architect at Blue Coat Systems, Inc. leading the design and development efforts of the next-generation IPv6 enabled secure proxy appliances. Qing holds multiple US patents. Qing is a contributing author of the book titled Handbook of Networked and Embedded Control Systems published in June 2005. He is the author of the embedded systems development book titled Real-Time Concepts for Embedded Systems published in April 2003.

    Tatuya Jinmei, Ph.D, is a research scientist at Corporate Research & Development Center, Toshiba Corporation. He had been a core developer of the KAME project since the launch of the project through its conclusion. In 2003, he received the Ph.D degree from Keio University, Japan, based on his work at KAME.

    Keiichi Shima
    is a senior researcher at Internet Initiative Japan Inc. He was a core developer of the KAME project from 2001 to the end of the project and developed Mobile IPv6/NEMO Basic Support protocol stack. He is now working on the new mobility stack (the SHISA stack) for BSD operating systems.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IPv6 Advanced Protocols Implementation (The Morgan Kaufmann Series in Networking) : 9780123704795

    "I would purchase the books... since I am Ipv6 connected it would be a nice reference."..."I do think that if you buy one you will buy the other, assuming that the chapters are setup correctly." -Randall Stewart, Cisco Systems

    "My immediate reaction was that I thought it would be better in one volume, BUT then I saw the level of detail that he is intending to include, and the subsequent size of the work. Now, I agree entirely with the author that it should be split into 2 volumes as he suggests."..."This will be a real reference manual for IPv6."..."I think that the sort of people who buy Volume I will also buy Volume II. They are closely linked, and in order to have the complete guide to IPv6, you need both." -Martin Potts, Martel Consulting

    "I think the two-volume approach is suitable.I recommend this publication and I would like to buy both volumes when these are achieved." -Jun Murai, KEIO University

    This book is the second installment of a two-volume series on IPv6 and the KAME implementation. This book discusses those protocols that are found in more capable IPv6 devices, are commonly deployed in more complex IPv6 network environments, or are not specific to IPv6 but are extended to support IPv6. Specifically, this book engages the readers in advanced topics such as routing, multicasting, DNS, DHCPv6, mobility, and security.

    This two-volume series covers a wide spectrum of the IPv6 technology, help the readers establish solid and empirical understanding on IPv6 and the KAME reference implementation paralleled by none.

    Key Features:

    * Extensive code listings with meticulous line-by-line explanation of rationale and use for KAME snapshot implementations on advanced IPv6 related protocols, including:
    -Unicast and multicast routing and DNS client based on KAME snapshot dated April 2003, which are a base of more recent versions of BSD variants
    -Mobile IPv6 based on KAME snapshot dated July 2004, a predecessor version of the "SHISA" implementation
    -DHCPv6 based on KAME snapshot dated May 2005, a base of the WIDE-DHCPv6 implementation available at SourceForge today
    * Numerous diagrams and illustrations help in visualizing the implementation
    * In-depth discussion of the standards provides intrinsic understanding of the specifications
    * An introduction to the IP security protocols along with the use of the racoon key exchange daemon
    * Two CD-ROMs filled with the complete KAME IPv6 protocol stack and FreeBSD software

    * The only authoritative reference "cookbook" for anyone interested in advanced IPv6 topics and protocols.
    * Line-by-line walk through of real code helps the reader master IPv6 implementation
    * Comprehensive in scope, based on a working standard, and thoroughly illustrated to bring the protocols alive.

    About the Author

    Qing Li
    is a senior architect at Blue Coat Systems, Inc. leading the design and development efforts of the next-generation IPv6 enabled secure proxy appliances. Qing holds multiple US patents. Qing is a contributing author of the book titled Handbook of Networked and Embedded Control Systems published in June 2005. He is the author of the embedded systems development book titled Real-Time Concepts for Embedded Systems published in April 2003. Tatuya Jinmei Ph.D. is a research scientist at Corporate Research & Development Center, Toshiba Corporation. He had been a core developer of the KAME project since the launch of the project through its conclusion. In 2003, he received the Ph.D. degree from Keio University, Japan, based on his work at KAME. Keiichi Shima is a senior researcher at Internet Initiative Japan Inc. He was a core developer of the KAME project from 2001 to the end of the project and developed Mobile IPv6/NEMO Basic Support protocol stack. He is now working on the new mobility stack (the SHISA stack) for BSD operating systems.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IPTV and Internet Video: Expanding the Reach of Television Broadcasting (NAB Executive Technology Briefings) : 9780240809540

    IPTV and Internet Video clearly explains and demystifies the functions, markets, and future impact of this exploding technology. This book contains an overview of hardware, software, and Internet technologies, case studies, and covers a range of products and services. It is a guide to help leaders master the key trends and drivers transforming the world of broadcast television and the Web. Each piece of the puzzle is discussed in detail, from head ends, Web portals and VOD servers through advanced IP networks, DSLAMs and xDSL lines to viewers set-top boxes and multimedia PCs. Youll get a working knowledge of IPTV, enabling both non-technical and technical professionals to accurately analyze the emerging technology and business opportunities. Written by two leading digital media experts with, each with 25 years technology development experience and global insight, this book also looks ahead to IPTVs rapid deployment and future growth.

    * Part of the NAB Executive Technology Briefing series which brings you industry technology information in a non-technical fashion
    * Comprehensive introduction to IPTV and Internet Video networks and applications
    * Quickly get up to speed on terms, market, and the business as IPTV and Internet broadcast distribution
    * Reality Check perspectives in each chapter tie theory to real-world case studies

    About the Author

    Wes Simpson is President of Telecom Product Consulting, an independent consulting firm that focuses on video and telecommunications products. He has more than 25 years experience in the design, development and marketing of products for telecommunication applications. He is a frequent speaker at industry events such as IBC, NAB and VidTrans and is author of the book Video Over IP. Wes was a founding member of the Video Services Forum. Howard Greenfield is a digital media strategist, industry columnist, and President of Go Associates, a leading global strategic business development consulting firm. Howard has held senior management and consulting positions with Sun Microsystems, Informix Software, British Telecom, and Apple Computer. He was the creator and leader of Sun's first Media Lab, and completed graduate studies at Stanford University. He is a frequent contributor to technology and business publications and conferences world-wide.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google

    IPSec VPN Design : 9781587051111

    Master IPSec-based Virtual Private Networks with guidance from the Cisco Systems® VPN Solutions group




    • Understand how IPSec VPNs are designed, built, and administered




    • Improve VPN performance through enabling of modern VPN services such as performance, scalability, QoS, packet processing, multicast, and security




    • Integrate IPSec VPNs with MPLS, Frame Relay, and ATM technologies




    As the number of remote branches and work-from-home employees grows throughout corporate America, VPNs are becoming essential to both enterprise networks and service providers. IPSec is one of the more popular technologies for deploying IP-based VPNs. IPSec VPN Design provides a solid understanding of the design and architectural issues of IPSec VPNs. Some books cover IPSec protocols, but they do not address overall design issues. This book fills that void.


    IPSec VPN Design consists of three main sections. The first section provides a comprehensive introduction to the IPSec protocol, including IPSec Peer Models. This section also includes an introduction to site-to-site, network-based, and remote access VPNs. The second section is dedicated to an analysis of IPSec VPN architecture and proper design methodologies. Peer relationships and fault tolerance models and architectures are examined in detail. Part three addresses enabling VPN services, such as performance, scalability, packet processing, QoS, multicast, and security. This book also covers the integration of IPSec VPNs with other Layer 3 (MPLS VPN) and Layer 2 (Frame Relay, ATM) technologies; and discusses management, provisioning, and troubleshooting techniques. Case studies highlight design, implementation, and management advice to be applied in both service provider and enterprise environments.

    Download Firefox For Free
    Google Tool Bar. No Virus, Free From Virus
    Google