Image technology is a continually evolving field with various applications such as image processing and analysis, biometrics, pattern recognition, object tracking, remote sensing, medicine diagnoses and multimedia. Significant progress has been made in the level of interest in image morphology, neural networks, full color image processing, image data compression, image recognition, and knowledge -based image analysis systems. Computer graphics has been mainly driven by engineering design processes and has established itself as a dominating methodology in computer aided design (CAD). Subsequently, computer graphics has found applications in information visualization, computer art, digital entertainment, user interfaces, visual programming, scientific visualization, education and training. Traditionally, the image technology and the computer graphics technology have subsumed slightly different goals. In computer graphics, computers are used to create pictures, animations and simulations. The image technology, on the other hand, consists of techniques and methodologies that modify or interpret existing pictures. Integrated Image and Graphics Technologies attempts to enhance the access points to both introductory and advanced material in this area, and to facilitate the reader with a comprehensive reference for the study of integrated technologies, systems of image and graphics conveniently and effectively. This edited volume will provide a collection of fifteen contributed chapters by experts, containing tutorial articles and new material describing in a unified way, the basic concepts, theories, characteristic features of the technology and the integration of image and graphics technologies, with recent developments and significant applications. Integrated Image and Graphics Technologies is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science and engineering.
Integrated Image and Graphics Technologies (The International Series in Engineering and Computer Science) : 9781402077746
Google Tool Bar. No Virus, Free From Virus
Integrated HTML and CSS: A Smarter, Faster Way to Learn : 9780782143782
Almost all web designers use Cascading Style Sheets to control the presentation of the websites they construct out of HTML. Why learn one and then the other when you can just as easily—and much more effectively—learn both at the same time? This book's integrated approach speeds your progress and leaves you with a stronger, more cohesive set of skills. Inside, you'll learn about:
- Writing well-structured HTML for use by any web-capable device
- Designing page layouts using CSS
- Controlling fonts, colors, backgrounds, borders, and margins
- Using lists to create attractive, button-like menus
- Using images as backgrounds, links, page content, and decoration
- Creating and styling forms
- Personalizing your weblog
- Understanding and applying design and usability principles
- Publishing and testing your pages
- Validating your code
- Making pages accessible to all visitors
Throughout the book you'll find real-world examples of effective CSS-based pages.
About the Author
Virginia DeBolt is an author, teacher, and web designer. She's taught HTML and Dreamweaver courses at Austin Community College, written six books, and maintains the Web Teacher blog (www.webteacher.ws).
Google Tool Bar. No Virus, Free From Virus
Integrated Cisco and UNIX Network Architectures (Cisco Press Networking Technology) : 9781587051210
UNIX gateways introduce massive performance possibilities at a fraction of the price of dedicated proprietary appliances by performing network tasks entirely in software. With Cisco Systems routers dominating the Internet and enterprise networking and UNIX routing and gateway solutions spreading from within server farms and data centers, new opportunities and possibilities arise for system and network administrators who understand the benefit of integrated designs. For example, the use of UNIX gateways can enable intrusion detection, firewalling, cable and DSL access, terminal servers and access concentrators, VPNs, roaming user support, and other LAN and WAN services. Far from being mutually exclusive, Cisco devices, UNIX operating systems, and open source applications can enjoy a peaceful, perhaps even inevitable, coexistence for years to come. Integrated Cisco and UNIX Network Architectures shows how Cisco routers, switches, and firewalls seamlessly work together with UNIX operating systems in an integrated networking and security environment.
Integrated Cisco and UNIX Network Architectures reveals not just the feasibility but also the desirability of Cisco/UNIX integrated routing with regard to systems integration, interoperability, and feature requirements. Detailed, progressively complex lab scenarios emphasize enterprise and ISP requirements, casting light on the similarities and differences of these two worlds. Platform issues, such as behavior of firewall filters, kernel features, and proper standards compliance, are discussed, analyzed with sniffers, and tested with handcrafted traffic from packet generators and test applications.
If you want to master and maximize the operation of your UNIX and Cisco network architectures, this book shows you how.
This book is part of the Networking Technology Series from Cisco Press¿ which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Google Tool Bar. No Virus, Free From Virus
Integrated Approach to Web Performance Testing: A Practitioner's Guide : 9781591407850
The performance testing of Web applications is not understood properly and no skill sets are available to address the challenges faced by practitioners. In addition, there is currently a lack of available research on the performance aspects of the application.
Integrated Approach to Web Performance Testing: A Practitioner's Guide fills this void and provides an integrated approach and guidelines to performance testing of Web-based systems. Based upon a mix of theoretical and practical concepts, this book provides a detailed understanding of the various aspects of performance testing in relation to the different phases of the software development life cycle. Using a rich mixture of examples, checklists, and templates, this book illustrates the different facets of application performance. Integrated Approach to Web Performance Testing: A Practitioner's Guide applies a practical approach to making appropriate choices of tools, methodologies and project management for performance testing.
The chapters are filled with real-life examples, as well as illustrative working code, to facilitate the reader’s understanding of different facets of the testing process. The discussion of testing methodology is anchored by a running case study which helps illustrate the application of test plans, strategies, and techniques. The case study and examples help demonstrate various approaches in developing performance testing strategies, benchmark designs, operation profiles and workloads. By bringing an experiential understanding into aspects of Web performance testing, the author is able to offer useful tips to effectively plan and execute testing activity. In addition, the book offers various guidelines and checklists to help practitioners conduct and analyze results using the various testing tools available for Web based applications.
The book provides a highly systematic approach to performance testing and offers an expert’s eye view of the testing and functionality of Web systems. Subraya is careful to provide broad, initial groundwork for the subject in his first three chapters, which makes this text accessible even to the beginner.
Integrated Approach to Web Performance Testing: A Practitioner’s Guide will prove to be a valuable tool for testing professionals, as well as for students, academicians and researchers.
About the Author
Dr. B. M. Subraya is an associate vice president, education and research, at Infosys Technologies Limited, India. He is currently working as principal researcher and head of the Global Education Center (GEC) at Mysore where he is responsible for foundation-level training of new employees. He has offered tutorials in Web Performance Testing in many pre-conference Tutorials including QAI, SEPG and PSQT international Conferences. He has published many papers in international conferences in the area of Performance Testing of Web applications. Dr. Subraya holds a Ph.D from the Indian Institute of Technology.
Google Tool Bar. No Virus, Free From Virus
Instructional Technologies: Cognitive Aspects of Online Programs : 9781591402374
Instructional Technologies: Cognitive Aspects of Online Programs provides insight into creating and utilizing successful online educational technologies and programs. Discussing the generalities of Web-based education and the specific technology applications and organizational support necessary to sustaining these programs, this important book will prove useful to scholars and students as they venture into this new educational arena.
The average student today is difficult to stereotype. Most will be in some form of employment, either part or full time, and many are professionals who find it difficult to balance work, education and family. Many working professionals are now returning to universities to either complete studies, or undertake new programs to further their skills. Above all is the requirement for flexibility. The ubiquitous nature of the Web has provided an almost perfect platform for hosting the online classroom environments and delivering the flexibility of access. The design of the online program itself can provide further flexibility, depending on the paradigm used. While online learning does not necessarily involve the Web, it has been predominately used in one form or another as a means for universal delivery.
There are issues such as quality of the program, how educationally sound the program is (not necessarily the same as quality), its effectiveness and of course its applicability. There are also concerns about the risks of such programs, should we embrace the online paradigm without caution. Many of the instructional technologies we now utilize allow us to address these issues and focus more on the cognitive aspects in online course design. However, when focusing on such issues it becomes clear that the courses must be designed around the major stakeholder, the student. While there are other stakeholders in the learning process, due to the essential individual nature of the online learner, it is vitally important that more focus be placed on the individual. This is often not practical in the counterpart on-ground course, and thus becomes a major challenge for the online developer.
In focusing on the individual, attention must be given from the initial development stages of the course to the rights, expectations and achievable outcomes of the students undertaking online study.
About the Author
Paul Darbyshire is a Lecturer in the School of Information Systems at Victoria University, Melbourne, Australia. He lectures in Object-Oriented systems, C, Java programming, Internet Programming, and has research interests in the application of Java and Web technologies to the support of teaching, as well as the application of AI to multi-agent systems. His current research is in the use of Reinforcement Learning and multi-agent systems to simulate land combat as a complex adaptive system.
Google Tool Bar. No Virus, Free From Virus
Instructional Engineering in Networked Environments (Tech Training Series) : 9780787964665
A Dynamic, Research-Based Approach to Knowledge Management
In this book, Gilbert Paquette–an internationally recognized expert in the field of technology-based training–offers IT professionals, trainers, and consultants a revolutionary method for going beyond simple information management. Instructional Engineering in Networked Environments introduces the instructional engineering method that elicits knowledge from subject matter experts to make information more widely available for training other people and transfering knowledge through formal and informal training using a variety of media and information sources. Throughout the book, Paquette shows that instructional engineering is based on the use of transferable graphic models that demonstrate how this engineering works in an environment with human networks and diversified information sources. This important book also includes illustrative examples of "artifacts"–the actual job aids that hold an organization’s knowledge–and provides numerous easily reproducible tools.
Praise for Instructional Engineering in Networked Environments
"The tools and methods developed by Dr. Paquette and his team at LICEF since 1992 are generally regarded by the International Board of Standards for Training, Performance and Instruction (IBSTPI) as world class in every respect. The board believes that an institution or organization embarking on serious efforts in distance and distributed learning would do well to consider these methods and tools as setting a standard."
–J. Michael Spector, professor and chair, instructional design, development, and evaluation, Syracuse University; and executive vice president, IBSTPI
"Gilbert Paquette’s work is truly world-leading and needs much more exposure. I was so impressed with his detailed models for knowledge engineering in telelearning systems. It was the first time in years that I thought someone had created a breakthrough."
–Anne Forster, director, innovation and technology, vice chancellor's office, University of Sydney, Australia
"Hydro-Quebec groups over 19,500 employees and employs a staff of around 300 trainers and instructional designers. We have been using the MISA method and the MOT knowledge editor for several years now, and we have not yet found a method as efficient, even though we have had many sales pitches by different vendors."
–Gilles Beaulieu, trans energie division, Hydro-Quebec
"In this book, Professor Paquette provides one of the most sophisticated tools yet developed for a true technology of instructional engineering. All serious instructional designers will find that this work significantly improves the efficiency and effectiveness of their instructional development efforts."
–M. David Merrill, professor, department of instructional technology, Utah State University
About the Author
Gilbert Paquette is a professor at Tele-universite du Quebec, acting as director of the CIRTA Research Centre, an interuniversity research center hosted by the LICEF research center at Tele-universite. He is leading two important Canadian projects in the field of e-learning: eduSource and LORNET. Paquette has published three books and numerous articles and has supervised and participated in a dozen multimedia teletraining courses and many computer-based training environments.
Google Tool Bar. No Virus, Free From Virus
Institutionalization of Usability : A Step-by-Step Guide : 9780321179340
At one time, computer hardware was the key differentiator in information technology—what gave an organization it's competitive edge. Then, as hardware prices fell, software took center stage. Today, software having become a broadly shared commodity, a new differentiator has emerged—usability. Applications, including Web sites, are usable if they are practical, useful, easy to work with, and satisfying. Usability is now the factor likeliest to give an organization a distinct advantage.
Institutionalization of Usability shows how to make user-centered design and development a routine practice within an enterprise. Other excellent books explain precisely how to make software usable; this book builds on that foundation, and focuses instead on how to get usability recognized and incorporated into an organization's values and culture. Based on author Eric Schaffer's extensive experience, the book provides a solid methodology for institutionalizing usability, guiding readers step-by-step with practical advice on topics like organizational change, milestones, toolsets, infrastructure, and staffing requirements needed to achieve fully mature usability engineering.
Learn how to:
Educate your organization about the importance of usability
Hire and coordinate usability staff and consultants
Plan the standards, design, and implementation phases
Retrofit a method that has added user-centered activities
Recruit participants for usability interviews and testing
Select the right staff and project to showcase-by timeline, user impact, and visibility
Evangelize, train and mentor staff, and support the community
Whether you are an executive leading the institutionalization process, a manager supporting the transition, or an engineer working on usability issues, Institutionalization of Usability will help you to build usability into your software practices.
Google Tool Bar. No Virus, Free From Virus
Instant SQL Server 2000 Applications : 9780072133202
The Ultimate Collection of Ready-to-Use Code and Expert Techniques
Build robust SQL Server 2000 database applications easily using the pre-built projects packed into this essential resource. Inside, you'll find step-by-step details for creating several practical tools that use SQL Server 2000 as the back-end. Every application, script, and code snippet is contained on the CD and is cross-referenced and explained in the text, making it easier to find exactly what you're looking for. Save yourself hundreds of programming hours with this invaluable toolkit.
With this book, you'll learn to create the following:
- Money Manager
- Personal Information Manager (PIM)
- Help Desk
- Network Management Tool
- Code Library
- Customer Tracking Application
- Event Manager
- Collection Manager
- Online Store
- E-books
Coverage includes:
- Triggers
- Stored Procedures
- Visual Basic.NET
- Active Server Pages (ASP)
- Access
- T-SQL
- SQL Server 2000 security features
On the value-packed CD-ROM:
- All of the book's source code
- Practical sample applications
About the Author
Greg Buczek (Flagstaff, AZ) is a Microsoft Certified Solutions Developer and a Microsoft Certified Trainer working as an independent consultant. He is the Webmaster of more than 25 Web sites where he strives to bring dynamic, data-driven content to the Internet. Greg is the author of the best-selling Instant ASP Scripts, as well as ASP Developer's Guide, Instant ASP Components, and Instant SQL Server 2000 Applications..
Google Tool Bar. No Virus, Free From Virus
Instant Messaging Rules: A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication : 9780814472538
Instant Messaging (IM) is quickly rivaling e-mail as the electronic communications tool of choice in offices worldwide. Already used by over 100 million people globally, IM will be used more often than e-mail by 2005. Employees at 70% of U.S. companies are expected to use IM this year -- whether for legitimate business reasons or for personal purposes. But while business and personal interest in IM is exploding, the potential for problems is growing just as fast.
Instant Messaging Rules addresses the potentially costly legal, regulatory, productivity, security, training, and management challenges that IM brings to the workplace. Complete with sample policies, this timely guide offers workable solutions for establishing and enforcing rules and policies that will let any company maximize the business potential of IM technology. A best practices toolkit for workplace IM usage, Instant Messaging Rules will help employers keep their organizations out of harm's way, while giving employees access to a cutting-edge, productivity-enhancing tool.
As instant messaging (IM) quickly gains popularity, organizations need to address the potentially costly challenges it brings to the workplace. Instant Messaging Rules helps you maximize the business potential of IM technology, while establishing and enforcing essential rules and policies to protect your company.
Because IM creates a written, legal record of what goes on in your organization—and its personal use can run the risk of negatively impacting office productivity--Instant Messaging Rules gives you sample policies and best practices for IM usage, covering essential areas like security, training, management, and legal issues. It is an essential, timely guide that will help you take control of this important, cutting edge-tool.
About the Author
Nancy Flynn is founder and executive director of the ePolicy Institute and the author of E-Mail Rules, The E-Policy Handbook, and several other books. She has been featured in US News & World Report, Fortune, The New York Times, The Wall Street Journal, and on CNBC and National Public Radio.
Google Tool Bar. No Virus, Free From Virus
Instant Messaging in Java: The Jabber Protocols : 9781930110465
Written as a mid-level programming guide, this book provides Java programmers with the information and tools needed to create their own Instant Messenger client and server software. This software can then be used to create personalized IM systems or integrate IM features into existing software. Focus is given to the open source Jabber XML-based IM protocols to create Java IM software. These open protocols allow IM software to seamlessly communicate with the larger number of other Jabber clients and servers available including commercial Jabber systems such as Disney's go.com IM.
My original background is in robotics and computer-integrated manufacturing. In
both, my interests centered on solving communication problems in mission-critical
systems. At the beginning, that meant assembly and C programming as well as
direct participation in the lowest levels of networking protocols. Forget TCP/IP
and Ethernet—we were generating packets by hand on ArcNET networks.
Networks quickly evolved and the problem shifted to an increasing need to
integrate the computerized factory floor into large-scale enterprise systems.
Unfortunately, manufacturing systems are horribly heterogeneous, with each
machine running completely proprietary software (often with one of a kind operating
systems and programming languages). In addition, it is common for manufacturing
machines to be kept in service for 20–30 years or longer. Long
equipment life-spans result in a surprising number of shops still using tape drives,
punch cards, and other ancient computer technology.
On systems where you have a full Java 2 Standard Edition (J2SE) or better environment,
Java Jini (http://www.jini.org) provides a perfect framework for gluing
the various bits together. In addition, it provides a common integration environment
(Java) and elegant, distributed computing facilities, such as self-healing
properties and distributed transactions. As J2SE begins to find its way onto more
and more devices, Jini becomes an increasingly attractive technology for system
integration and coordination.
Google Tool Bar. No Virus, Free From Virus
Installing, Troubleshooting, and Repairing Wireless Networks : 9780071410700
CD-ROM packed with diagnostic and troubleshooting software!
PRACTICAL, AUTHORITATIVE GUIDANCE ON KEEPING A WIRELESS NETWORK WORKING HARD FOR YOUR BUSINESS!
With annual equipment sales projected to grow to more than $5 billion by mid-decade, wireless networking is clearly a technology whose time has come. But with many wireless networks expected to be created at both small offices and home offices, where can people charged with maintaining them get comprehensive information to help them do just that? The answer is McGraw-Hill’s Installing, Troubleshooting, and Repairing Wireless Networks.
Written with insight by a noted IT expert and commentator, this book provides comprehensive coverage of this rapidly emerging technology, and in the process:
* Introduces all wireless components, both “off-the-shelf” and subscriber products
* Covers WiFi technologies as 802.11a and b
* Includes all scales of wireless networks, from home to office, cafes and campuses, airports and hotels, to MANs, and describes what’s best for different needs
* Shows how to integrate wired and wireless LANs
* Discusses the benefits and pitfalls of wireless technologies
* Advises how to set up and maintain security features
* And much, much more!
Basic enough for the hobbyist — and yet still detailed enough for the IT professional — Installing, Troubleshooting, and Repairing Wireless Networks is the essential survival guide for keeping a wireless network up and running.
About the Author
Jim Aspinwall has been the Windows Helpdesk columnist and feature editor for CNET.COM and author of three books on PC maintenance. He has worked for a variety of computer software and support companies and is currently providing PC support and web consulting services. A resident of Campbell, California, Jim is also an amateur radio operator and an OSHA certified tower climber, maintaining radio transmission sites in Northern California. You may send him e-mail via wireless@raisen.com
Google Tool Bar. No Virus, Free From Virus
InstallAnywhere Tutorial and Reference Guide : 9780321246103
Software installation and deployment made simple--that's the promise of InstallAnywhere from Zero G Software. Are you harnessing the full potential of InstallAnywhere in your software installation project? InstallAnywhere Tutorial and Reference Guide is the authoritative guide for users of InstallAnywhere. It helps you maximize your investment in this powerful deployment tool by taking you step by step through easy-to-follow exercises that will unleash the power and productivity of InstallAnywhere in your organization.
InstallAnywhere Tutorial and Reference Guide is perfect for developers of all knowledge levels. Whether you're just getting started or an experienced user of InstallAnywhere, this handy tutorial will help you build and reinforce the skills necessary to create reliable installations every time. And after you've mastered those skills, it is an ideal resource for troubleshooting the most common installation problems.
Highlights include:
Basic installer development strategies
Basic installer customization
Using advanced actions, interface options, and organization concepts
Managing installation locations and uninstaller issues
Source and resource management
Integrating InstallAnywhere with advanced build environments
Developing and using custom code actions
InstallAnywhere has been recognized as the preferred multiplatform software deployment and installation tool by developers worldwide. It is the recipient of prestigious industry accolades, including two consecutive Java Developer's Journal Readers' Choice Awards, the Jolt Product Excellence Award from Software Development, and JavaWorld's Editor's Choice Award.
Google Tool Bar. No Virus, Free From Virus
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft : 9781597490481
I was sitting at my desk when my phone rang. I answered the phone and it was a
large pharmaceutical company who was interested in consulting services.They
started off the conversation stating that they had some problems and thought that
my company might be able to help.They had noticed a trend with one of their foreign
competitors. Every time they went to release a new product (in this case a new
drug), one of their competitors would release a similar drug with a similar name several
weeks before them and would beat them to market. If you understand the drug
industry, you’ll know that this is a serious problem.The first company to get a
product to market usually is able to obtain a higher market share and higher demand
than its competitors.Therefore, this represented a huge monetary loss to the company
and the executives were concerned.
This initially sounded like a potential problem but I needed more details. My
follow-up question was how often had this occurred and over what time period.The
executive I was talking with said it had happened eight times over the prior 12
months. I was sitting there thinking:You think there is a problem? My next question
was,“Why did you wait so long to call someone?”Their answer was,“We figured it
was just a coincidence, because the only way this could have happened was if an
insider was giving the information to a competitor and we trust all of the employees
so this could not be the case.” Over the next several months they were going to
realize how wrong that previous statement was.
I led an internal assessment team and over the course of several months found
three different groups of people (each consisting of 2-4 people), working for two
different competitors. Actually, one group was working for a foreign competitor and
the other two groups were working for a foreign government.
The fact that this story is true is scary, but what makes it even more troubling is
that this happened more than 18 months ago and I have worked on and am aware of
at least 15 other similar cases.The average monetary loss of the case I worked on was
estimated at $350 million annually.
Google Tool Bar. No Virus, Free From Virus
Insider Power Techniques for Microsoft Windows XP : 9780735618961
Accept no limits! Tweak Windows XP for ultimate performance with the undocumented secrets and hidden gems of the experts who work with the technology every day. Three Microsoft Consulting Services (MCS) professionals have teamed with well-known Windows book author Paul McFedries to reveal their best from-the-field-techniques, practices, hacks, tricks, and workarounds for putting all of your PCs muscle to work. Smart, straightforward, and uncompromisingly practical, this book is the ultimate insider’s guide to pushing Windows XP as far as it can go!
Put professional-level practices to work for you:
- Tweak registry settings without getting burned
- Employ lethal techniques to help fight viruses, intruders, and spam
- Customize startup and shutdown—get work done behind the scenes
- Install devices and drivers—painlessly
- Learn 10 ways to help give your system rock-solid stability
- Write your own scripts—or run the ones inside
- Share your PC using group policies, account lock-outs, and other management tools
- Optimize memory, performance, and usability
- Easily synchronize files between your mobile and desktop PCs
- Troubleshoot problems the way experts do
Google Tool Bar. No Virus, Free From Virus
Inside XSLT : 9780735711365
Steve Holzner,award-winning author of the best-selling Inside XML,brings you a comprehensive and easy-to-understand resource on XSLT. Not only will you master the XSLT 1.0 Recommendation, the XSLT 1.1 Working Draft, and the XSLT 2.0 Requirements, you also get coverage of related specifications such as XPath.
With more than 400 complete examples, Inside XSLT shows you how to perform virtually every type of XSLT transformation there is. Besides seeing how to use the top four XSLT processors, you'll also master the XSL formatting objects and learn how to use XSLT in standalone processors, Web browsers, and on Web servers with Active Server Pages (ASP), Java Server Pages (JSP), and Java servlets. This book is specifically designed to be clear and complete, filled with examples, and includes references to hundreds of online resources, insights, and tips you just won't find anywhere else. Written for developers with XML experience, Inside XSLT is a resource that will take your programming to the next level.
Google Tool Bar. No Virus, Free From Virus
Inside XML : 9780735710207
The XML explosion hardly needs any introduction. It's everywhere and there just seems to be no end to what can be done with XML. While writing to the W3C standards, and keeping up with the pace for corporate implementation, you, the programmer or web developer, will need a comprehensive guide to get you started and show you what XML and its related technologies can do. A thorough guide is imperative to success because you will need to know and understand the full scope of XML from day one in order to work with it successfully. With your time constraints and impossible project schedules, you need a comprehensive guide that fulfills your needs in one complete book. Inside XML is an anchor book that covers both the Microsoft and non-Microsoft approach to XML programming. It covers in detail the hot aspects of XML; such as, DTDs vs. XML Schemas, CSS, XSL, XSLT, Xlinks, Xpointers, XHTML, RDF, CDF, parsing XML in Perl and Java, and much more.
Google Tool Bar. No Virus, Free From Virus
Inside Windows Storage: Server Storage Technologies for Windows Server 2003, Windows 2000 and Beyond : 9780321126986
"Dilip Naik's Inside Windows Storage is an invaluable reference for developers and customers alike and is a must-read for anyone wishing to implement Windows-based storage networking."
—Tom Clark, Director, Technical Marketing, Nishan Systems
The Windows and enterprise storage markets are converging. Migrating upwards from low-end servers, Windows is becoming a genuine platform for running mission-critical applications. The enterprise storage market is moving from high-end servers to also include medium range servers. Thanks to a slew of enterprise storage related features, Microsoft Windows storage technologies are rapidly gaining widespread acceptance. System administrators, programmers, and technical managers need to learn to appreciate and to tap the full potential of Windows enterprise storage.
Inside Windows Storage is the first book to provide a comprehensive look at new and emerging Microsoft storage technologies. The text begins with an overview of the enterprise storage industry and Windows Server architecture, including the Windows NT I/O subsystem. With that foundation in place, readers explore the ins and outs of current Windows offerings, upcoming Windows server releases, and third-party products.
Key topic coverage includes:
- Direct Attached Storage, including the new Windows Storport driver model
- Fibre Channel Storage Area Networks (SANs)
- Network Attached Storage (NAS), including the Windows NT network stack and an overview of CIFS
- Backup and restore technologies, including Windows XP and Windows Server 2003 Volume Shadow Copy Service
- File systems and disk virtualization, including a detailed overview of NTFS as well as a study of Windows cluster file systems
- Storage management, including the new Windows Virtual Disk Service
- IP Storage and Infiniband
- High availability, including RAID mirroring as well as multi path I/O solutions
This extensive guide concludes by tracing Windows NT storage features as they appear in Windows NT 4.0, Windows 2000, and Windows Server 2003, and by offering a preview of what to expect from future Windows server releases. In short, Inside Windows Storage will help IT professionals gear up for the major role that Windows servers will surely play in the future of enterprise storage.
Google Tool Bar. No Virus, Free From Virus
Inside Windows® Server 2003 : 9780735711587
Inside Windows .NET Server contains comprehensive information on deploying, managing, and troubleshooting systems using both Windows .NET and its predecessor. Readers get the in-depth, practical knowledge they need to master the hundreds of complex and often frustrating features found in Windows .NET Server. Inside Windows .NET Server is structured around a production deployment of Windows .NET in a global enterprise. Each chapter contains a lively feature description followed by extensively illustrated procedures for setting up and managing each service. All along the way, Boswell includes proven advice for improving stability, performance, and security. Readers of Boswell's Inside Windows 2000 Server declared it to be the best resource on the market. Inside Windows .NET Server improves coverage of existing features while expanding the scope to include the new features and improvements that make Windows .NET a must-have upgrade.
Google Tool Bar. No Virus, Free From Virus
Inside the Spam Cartel : 9781932266863
Since the explosion of Internet users during the late 1990’s, the unending spam scourge has shown no sign of abating. Statistics from large anti-spam companies that monitor millions of e-mails per hour show that the rates are actually still going up, and depending who you listen to, they are now rising between 50 and 70 percent. The new federal anti-spam (CAN-SPAM) law has already been dubbed the ‘Can’t Fight Spam Act.’ And it’s no wonder; the Net was not built with e-mail security and verification in mind, and ways to bypass and trick the system are plentiful. I heard someone explain it like this: “In trying to get rid of spam, we’re playing a game of chess, and the bad guys have white.” It is a constant game of technological leapfrog, and once a new anti-spam technology has been developed, the spammers do their best to break it, attack it or get around it. Even the brand new Sender ID initiative discussed in this book has proved to be ineffective. In fact, the spammers are adopting it even before the market at large.
As you start reading, the author throws a curve, leading you to believe you are dealing with a simple teenage script kiddie. But you’ll soon discover that the author is a very intelligent, technically sophisticated and resourceful young man. The data in this book is revealing. It shows the various ways that spammers get their messages across, and goes into great technical detail on how they do it. Most surprisingly, there is an underground cooperation between hackers and spammers, who have a common, nefarious goal to steal the email databases of companies and exploit these lists. This is a detailed handbook on how to spam, and get around the many barriers that have been thrown up by the anti-spam community. You could say that this is a bad thing, as now everyone will be able to do it. But this is not the time or place to throw coals on the raging fire of the “disclosure discussion” of network vulnerabilities.
This book is a must for any system and/or network administrator who runs mail servers, or anyone who must ensure their organization is as safe as possible against the many dangers lurking behind their firewall. Spam is a many-headed dragon. In its most innocuous form it affects productivity negatively by being a distraction and a nuisance, but it can be used as a vector for many more destructive purposes like drive-by installs of trojans, key loggers, viruses, and spyware.
A good defense against spam starts with knowing the enemy. This book reveals how your enemy thinks, how he operates, how he gets paid, the advanced state of dedicated automation he utilizes and what holes in the Net are being exploited. Having a resource like this is equal to catching the decryption code book of the opposition. Have fun in keeping the bad guys out!
Google Tool Bar. No Virus, Free From Virus
Inside the Security Mind: Making the Tough Decisions : 9780131118294
Organizations today commit ever-increasing resources to information security, but are scarcely more secure than they were four or five years ago! By treating information security like an ordinary technological practice—that is, by throwing money, a handful of the latest technologies, and a lineup of gurus at the problem—they invariably wind up with expensive, but deeply flawed, solutions. The only way out of this trap is to change one's way of thinking about security: to grasp the reasoning, philosophy, and logic that underlie all successful security efforts.
In Inside the Security Mind: Making the Tough Decisions, security expert Kevin Day teaches you how to approach information security the way the top gurus do—as an art, rather than a collection of technologies. By applying this discipline, your solutions will be more secure and less burdensome in time, expense, and effort. The first part of the book explains the practice of breaking security decisions down into a set of simple rules. These rules may then be applied to make solid security decisions in almost any environment. In the second part, Day uses a series of practical examples to illustrate exactly how the discipline works in practice. Additional material covers:
Designing an enterprise security plan, including perimeter/firewall and Internal defenses, application, system, and hardware security
Ongoing security measures—recurring audits, vulnerability maintenance, logging and monitoring, and incident response, plus risk assessment
Choosing between open source and proprietary solutions; and wired, wireless, and virtual private networks
This book is essential reading for anyone working to keep information secure. Technical and non-technical IT professionals alike can apply Day's concepts and strategies to become security gurus, while seasoned practitioners will benefit from the unique and effective presentation of the essential security practices.
Google Tool Bar. No Virus, Free From Virus
Inside the Minds: Winning Antitrust Strategies - Leading Lawyers : 9781587624384
This book provides a broad, yet comprehensive overview of legal discipline and elements outlining the current shape and future state of antitrust.
Inside the Minds: Winning Antitrust Strategies is an authoritative, insider’s perspective on the basic pillars that govern antitrust and competition, the essential capabilities of the successful practitioner and the future of the discipline, on a global scale. Featuring Department Heads, Leading Partners and Group Chairs of antitrust, all representing some of the nation’s top firms, this book provides a broad, yet comprehensive overview of this legal discipline and the elements there within, outlining the current shape and future state of antitrust. With a detailed explanation of the governing statutes of antitrust law and key strategies for success, including the essential components of negotiation and litigation, as well as the critical steps involved in joint ventures and licensing agreements, authors articulate the finer points around antitrust now, and what will hold true into the future. The different niches represented and the breadth of perspectives presented enable readers to get inside some of the great legal minds of today as experts offer up their expertise on this fascinating practice area—where law, economics and strategy intersect.
Google Tool Bar. No Virus, Free From Virus
Inside the Minds: the Art & Science of Health Care Law: Leading Lawyers : 9781587622908
This is an authoritative, insider's perspective on the laws which govern health care, the essential capabilities of the successful practitioner, and the future of this legal discipline, on a global scale.
Inside the Minds: The Art & Science of Health Care Law is an authoritative, insider's perspective on the laws which govern health care, the essential capabilities of the successful practitioner, and the future of this legal discipline, on a global scale. Featuring Department Heads, Group Chairs, and Leading Partners, all representing some of the nation's top firms, this book provides a broad, yet comprehensive overview of the practice area, discussing the current shape and future state of health care regulation, from the founding doctrines, to the pivotal cases of today. With a detailed explanation of the governing statutes of health care law and key strategies for success, from the steps involved in counseling clients and handling negotiations, to tactics around keeping up to date with the latest technological advances and ever changing laws, these authors articulate the finer points around health care now, and what will hold true into the future. The different niches represented and the breadth of perspectives presented enable readers to get inside some of the great legal minds of today as experts offer up their thoughts around the keys to success within this fascinating practice area - where law and medicine intersect.
Google Tool Bar. No Virus, Free From Virus
Inside the Minds: The Art of Advertising : 9781587622311
The different niches represented and the various perspectives presented in this text enable readers to really get inside the great minds of advertising and glean practical advice, as advertising CEOs go back to basics.
Inside the Minds: The Art of Advertising is the most authoritative book ever written on the essentials behind building successful brands and implementing creative communications solutions. This title features the founders, presidents and CEOs from some of the country’s leading advertising agencies, who have each contributed chapters akin to object, experience-related white papers or essays on the core issues surrounding success in such a competitive market. In an over-arching as well as in-depth presentation of the fundamentals, authors articulate the unspoken rules and the important issues facing any agency now, and what will hold true in the future. From effective branding strategies to industry trends and challenges, this title pulls readers through all facets of advertising, from beginning to end. The difference niches represented and the various perspectives presented enable readers to really get inside the great minds of advertising and glean practical advice, as the experts go back to basics in a must-read for anyone interested in this dynamic, unique industry.
Google Tool Bar. No Virus, Free From Virus
Inside the Minds: Managing for Profits - CEOs from Shuffle Master, BioReliance, AccuCode & More : 9781587622212
This book provides targeted, specific advice about how to identify a company’s main profit centers and strategically build upon these strongholds, as well as advice on the finer points of business, such as effective risk management, and more.
Inside the Minds: Managing for Profits is an indispensable guide for company leaders in any industry to expand their business and grow their profits. Featuring Presidents and CEOs representing some of the nation’s fastest growing private companies, this book provides targeted, specific advice from a wide range of leading executives. Authors raise critical points about how to identify a company’s main profit centers and strategically build upon these strongholds. Each chapter articulates key and fundamental strategies for growing profits in both strong, as well as unstable economies, and offers advice on the finer points of business—from leveraging key technologies to effective risk management, touching upon everything in between. This title is a must-read for executives across all industries in search of practical, strategic plans for increasing profits and sustaining long-term business growth.
Google Tool Bar. No Virus, Free From Virus
Inside the Java Virtual Machine (Java Masters Series) : 9780079132482
Want to write better Java programs? Look under the hood and see what makes the ingenious Java engine run! This easy-to-understand yet technically rich description of the Java Virtual Machine (JVM)--the engine of the Java language--is your key to writing more efficient and effective Java code. It provides a complete JVM tutorial and desktop programmer's reference that explains all aspects of the JVM architecture, facilities, and operation--everything you need to know about JVM to get the best possible performance from your Java applications. A combination of lively text and entertaining Java applets on CD-ROM demystify the elusive JVM for which all Java programs are compiled. Each chapter includes practical and invaluable Java programming tips and a major simulation applet--the source code of which is included on the CD-ROM--that interactively illustrates the concepts presented in the chapter. All key JVM concepts and issues are explored: the Java landscape and JVM structure, including the Java stack architecture and operation; class files, bytecodes, conversions, and verification during class loading; arithmetic, logical, and array operations and control flow; method invocation and return, exceptions, garbage collection and threads; the just-in-time compiler implementation of JVM. What's more, you get a complete reference to the JVM class file format, all JVM bytecodes, and their values. When you understand how the JVM behaves based on the bytecodes generated from the Java compiler--as this books helps you to do--you'll be able to write better, more efficient Java code. ABOUT THE AUTHOR: Bill Venners (Mountain View, CA) is an 11-year Silicon Valley veteran. He has developed software for the consumer electronics, semiconductor, and life insurance industries and is currently focused on Java--writing a column titled ``Under the Hood'' for JavaWorld. Bill is president of his own custom software development and consulting firm.
About the Author
Bill Venners (Mountain View, CA) is an 11-year Silicon Valley veteran. He has developed software for the consumer electronics, semiconductor, and life insurance industries and is currently focused on Java—writing a column titled "Under the Hood" for JavaWorld. Bill is president of his own custom software development and consulting firm.
Google Tool Bar. No Virus, Free From Virus
Inside the FDA: The Business and Politics Behind the Drugs We Take and the Food We Eat : 9780471610915
The Holiday Inn in Bethesda, Maryland, is an unassuming stucco building tucked sideways off a slow commercial street, across from a Pizza Hut, a gas station, and a mini-mart. You enter from the side driveway and climb up a wide, curving staircase to reach the Versailles II ballroom on the second floor.
On a sunny February morning in 2004, as week-old snow lingered in piles at the edge of the sidewalk, it was standing room only in that ballroom. Some three hundred people had come—parents, grandparents, siblings, and friends, bearing posters and white satin ribbons—to talk to the United States Food and Drug Administration about the medicine that had killed someone they loved.
The long room was decorated in shades of beige and blue, with textured beige wallpaper, beige-and-brown carpeting in a fleur-de-lis motif, and a turquoise ceiling studded with 16 crystal chandeliers. At one end, three tables had been arranged in a large “U” for the two panels of 36 outside experts who had been summoned to advise the FDA, along with a few agency staffers. Facing them were rows of burgundy-and-purple brocade chairs, a battery of TV cameras, and a microphone for the audience.
They came from Rhode Island and California, from Texas and Colorado, Arizona and Pennsylvania. Most of them were middle-aged, the men in business suits, the women in nice slacks. One mother quoted the Book of Revelations; another wore a button supporting Democratic Senator John Edwards for president. A 10-year-old girl read an Archie comic book, while a boy of about six played with his GameBoy. In the hall outside the ballroom, one blonde woman asked another, “Was your daughter suicidal?”
Google Tool Bar. No Virus, Free From Virus
Inside the C++ Object Model : 9780201834543
Inside the C++ Object Model focuses on the underlying mechanisms that support object-oriented programming within C++: constructor semantics, temporary generation, support for encapsulation, inheritance, and "the virtuals"-virtual functions and virtual inheritance. This book shows how your understanding the underlying implementation models can help you code more efficiently and with greater confidence. Lippman dispells the misinformation and myths about the overhead and complexity associated with C++, while pointing out areas in which costs and trade offs, sometimes hidden, do exist. He then explains how the various implementation models arose, points out areas in which they are likely to evolve, and why they are what they are. He covers the semantic implications of the C++ object model and how that model affects your programs.
Highlights
Explores the program behavior implicit in the C++ Object Model's support of object-oriented programming.
Explains the basic implementation of the object-oriented features and the trade offs implicit in those features.
Examines the impact on performance in terms of program transformation.
Provides abundant program examples, diagrams, and performance measurements to relate object-oriented concepts to the underlying object model.
If you are a C++ programmer who desires a fuller understanding of what is going on "under the hood," then Inside the C++ Object Model is for you!
Google Tool Bar. No Virus, Free From Virus
Inside SQL Server 2005 Tools (Microsoft Windows Server System Series) : 9780321397966
Direct from Microsoft Insiders: the Complete Hands-On Guide to
SQL Server 2005’s Powerful Tools!
Microsoft SQL Server 2005’s high-powered management tools can dramatically
improve DBA productivity and effectiveness. Now there’s a comprehensive guide
to SQL Server 2005’s toolset, straight from the Microsoft team that created it.
This book covers the entire toolset in unprecedented depth, guides database
professionals in choosing the right tools, and shows them how to use various
tools collectively to solve real-world problems. The authors present âÂÂhow-toâÂÂ
solutions and never-before-published tips for SQL Server 2005 installation,
upgrades, configuration, authoring, schema design, development, deployment,
optimization, troubleshooting, and more.
MICHAEL RAHEEM is the senior product manager of the Microsoft SQL Server
team and led the design and implementation of several SQL Server tools, such
as SQL Server Management Studio, Database Mail, Upgrade Advisors, and
Surface Area Configuration. He currently leads the SQL Server enterprise
marketing efforts including high availability, scalability, and performance.
DIMA SONKIN is development lead in the SQL Server Tools group responsible
for SQL Server Agent, SMO, DMO, SQL Profiler, Database Engine Tuning Advisor,
Database Mail, SQLMail, SqlCmd, and OSQL.
THIERRY D’HERS is the lead program manager on Microsoft’s SQL BI Analysis
Services team and has spent five years designing and specifying Analysis
Services tools.
KAMI LEMONDS is the documentation manager for Microsoft’s SQL Server User
Education team and contributed to the SQL Server 2000 Resource Kit.
CD-ROM contains all sample code from the book and corresponding
Visual Studio project files.
Google Tool Bar. No Virus, Free From Virus
Inside Solaris 9 : 9780735711013
Inside Solaris 9 gives administrators the information they'll need to upgrade to Solaris 9 and maximize the new features. Author Bill Calkins begins by laying the foundations of Solaris, then explains how to get set up with Solaris 9 (including any potential pitfalls). Next, system maintenance issues are covered such as setting up user accounts, managing file systems and processes, system security, monitoring and tuning, and backup and recovery. Solaris networking and service management issues round out the book, along with some excellent resources and a glossary.
Google Tool Bar. No Virus, Free From Virus
Inside Server-Based Applications : 9781572318175
Inside Server-Based Applications is designed to guide you from being a server-based applications novice to becoming a server-based applications expert. I start with some general background material about server-based applications and then move into the specifics of the APIs and technologies that allow you to create useful server-based applications for Microsoft Windows 2000.
I wrote this book for the developer who wants to understand the underlying Win32 programming elements that make server-based development possible. In order to get the most from this book, you should be familiar with C++, especially the Microsoft Visual C++ programming environment. It is not essential that you have extensive experience with the Win32 API, but it won't hurt.
The Active Server Pages (ASP) and Internet Server API (ISAPI) examples in this book assume that you have some familiarity with Internet Information Server (IIS). The ASP examples also assume some familiarity with VBScript or Microsoft Visual Basic. Familiarity is not essential, however, because most of the VBScript used in the examples simply accesses methods of objects, something any C++ programmer will likely be comfortable doing. One of the examples uses JScript created on the server to be passed to the client. You'll also need to know JScript to understand the details of the example, but understanding the broader implications of creating client-side scripting and sending it to the client does not require knowledge of JScript.
Some examples use Microsoft SQL Server, both as a simple data source and as a sever-side development environment. Using SQL Server as a server-side development environment does require some understanding of SQL.
Google Tool Bar. No Virus, Free From Virus
Inside Relational Databases with Examples in Access : 9781846283949
Database books currently tend to fall into two categories: highly theoretical and detailed textbooks and manuals which teach how to use the software but not the underlying theory. Neither type of book explains why the reader would want to do many of the things they describe. Marklyn and Whitehorn cover essential relational database theory and explain how to build databases securely - without bogging them down into too much detail and endless formulae. They start by explaining interface components and letting you build working databases. Along the way the authors guide you through potential disasters and provide the techniques to avoid them. Inside Relational Databases is aimed at equipping students with the necessary skills to build practical databases in the 'real world' as well as ensuring that they have a sufficient theoretical grounding in the subject.
Aimed at equipping students with the necessary skills to build practical databases in the real world as well as ensuring that they have a sufficient theoretical grounding in the subject. Softcover. CD-ROM included.
.
Google Tool Bar. No Virus, Free From Virus
Inside Network Security Assessment: Guarding Your IT Infrastructure : 9780672328091
As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessment: Guarding Your IT Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two highly qualified authors with close ties to the International Information Systems Security Certification Consortium, this book was developed with the goal of being a text for the CISSP continuing education class on Network Security Assessment. You will be provided with step-by-step training on assessing security, from paperwork to penetration testing to ethical hacking. The supporting website will also provide you with access to a variety of tools, checklists, and templates to make your job even easier. You'll save everyone time and money by learning to perform security assessments yourself with the help of Inside Network Security Assessment.
About author
Michael Gregg is the president of Superior Solutions, Inc., a Houston-based security assessment and training firm. He has more than 20 years of experience in the IT field. He holds two associate's degrees, a bachelor's degree, and a master's degree. Some of the certifications he maintains are the following: CISSP, MCSE, CCNA, CTT+, A+, N+, Security+, CIW Security Analyst, CEH, NSA IAM, SCNP, DCNP, CCE, and TICSA.
David Kim, B.S.E.E., is the Senior Vice President and Chief Operating Officer of Security Evolutions, Inc. (SEI) and former Chief Operating Officer of (ISC)2 Institute. SEI specializes in IT security training, IT security consulting services, and IT security development. David is responsible for leading the vision of SEI's information security products and services portfolio and managing the day-to-day operations for SEI's P&L Business Units.
Google Tool Bar. No Virus, Free From Virus
Inside Network Perimeter Security (2nd Edition) : 9780672327377
Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security. You will work your way through fortifying the perimeter, designing a secure network, and maintaining and monitoring the security of the network. Additionally, discussion of tools such as firewalls, virtual private networks, routers and intrusion detection systems make Inside Network Perimeter Security, Second Edition a valuable resource for both security professionals and GIAC Certified Firewall Analyst certification exam candidates.
Google Tool Bar. No Virus, Free From Virus
Inside Microsoft Windows SharePoint Services 3.0 (Pro Developer) : 9780735623200
Get in-depth architectural insights for building enterprise solutions-straight from the experts.
Focus is on the internals of the Windows SharePoint Services 3.0 platform with this in-depth, straightforward reference. You get expert insights, task-oriented guidance, and extensive code samples to help you master the intricacies of building robust, enterprise content management applications.
Discover how to:
- Build application pages and site pages
- Develop and deploy reusable Web parts to enable customization and personalization
- Exploit Windows SharePoint APIs to deploy Microsoft ASP.NET AJAX components
- Use XML and Collaborative Application Markup Language (CAML) to create provisioning components
- Design and implement custom document libraries
- Use Windows Workflow Foundation to create applications that automate business process
- Create Site Definitions to aggregate and package component for deployment
- Implement Code Access Security, Trust Levels, authentication, and authorization
About the Authors
Ted Pattison is the founder of the Ted Pattison Group, a developer training company specializing in Microsoft Office and SharePoint Products and Technologies. He has taught classes on Office SharePoint Server 2007 to audiences worldwide-including Microsoft employees. He is a contributing editor for MSDN Magazine and author of the popular column “Office Space.”
Daniel Larson is a Microsoft MVP for SharePoint Server 2007. He works at NewsGator Technologies as a software engineer, where he develops blogging, social networking, and portal software. Dan is also an avid blogger about ASP.NET AJAX and SharePoint Products and Technologies.
Google Tool Bar. No Virus, Free From Virus