IT Essentials: PC Hardware and Software Labs and Study Guide (3rd Edition) (Lab Companion) : 9781587131981

The IT Essentials: PC Hardware and Software version 4 course in the Cisco® Networking Academy® is designed to prepare you to take and pass the CompTIA A+ exams based on the 2006 objectives. You must pass both the A+ Essentials and one of the technician exams to earn the A+ certification. Chapters 1 through 10 cover the foundational knowledge that aligns with the CompTIA A+ Essentials exam (220-601). Chapters 11 through 16 explore more advanced concepts in greater depth to prepare you for the specialized CompTIA A+ technician exams (220-602 for IT Technician, 220-603 for Remote Support Technician, and 220-604 for Bench Technician).

 


IT Essentials: PC Hardware and Software Labs and Study Guide, Third Edition, is designed as a valuable teaching and learning tool, incorporating new features to improve your hands-on skills and reinforce the key topics of the course. Each chapter contains a Study Guide section and a Labs section.


 


The Study Guide section is designed to provide additional exercises and questions to reinforce your understanding of the course topics, preparing you for the course assessments and focusing on preparing for the associated certification exams.


 


The Labs section features the complete collection of the lab exercises and worksheets specifically designed by Cisco to give students hands-on experience in a particular concept or technology.


 


Chapters 1–10 cover the following skills and competencies:



  • Core competencies in the latest hardware and software technologies

  • Information security skills

  • Safety and environmental issues

  • Soft skills for career development


 


Chapters 11–16 cover the following skills and competencies:



  • Advanced troubleshooting skills

  • Preparation for all three CompTIA job environment certification exams

  • Advanced installation of computers, peripheral devices, networks, and security components


About the Author




Patrick Regan has been a PC technician, network administrator/engineer, design architect, and security analyst for the past 16 years after graduating with a bachelor’s degree in physics from the University of Akron. He has taught many computer and network classes at Sacramento local colleges (Heald College and MTI College) and has participated in and led many projects (Heald College, Intel Corporation, Miles Consulting Corporation, and Pacific Coast Companies). For his teaching accomplishments, he received the Teacher of the Year award from Heald College, and he has received several recognition awards from Intel. Previously, he worked as a product support engineer for the Intel Corporation Customer Service, a senior network engineer for Virtual Alert supporting the BioTerrorism Readiness suite, and as a senior design architect/engineer and training coordinator for Miles Consulting Corp (MCC), a premiere Microsoft Gold Certified Partner and consulting firm. He is currently a senior network engineer at Pacific Coast Companies, supporting a large enterprise network. He holds many certifications, including the Microsoft MCSE, MCSA, MCT; the CompTIA A+, Network+, Server+, Linux+, Security+, and CTT+; the Cisco CCNA; and the Novell CNE and CWNP Certified Wireless Network Administrator (CWNA).


 


Over the past several years, he has written several textbooks for Prentice Hall, including Troubleshooting the PC, Networking with Windows 2000 and 2003, Linux, Local Area Networks, Wide Area Networks, and the Acing series (Acing the A+, Acing the Network+, Acing the Security+, and Acing the Linux+). He also coauthored Exam Cram 70-290 MCSA/MCSE Managing and Maintaining a Microsoft Windows Server 2003 Environment, Second Edition.


 

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Introduction to Computer Graphics: Using Java 2D and 3D (Undergraduate Topics in Computer Science) : 9781846288470

Computer graphics comprises the creation and representation of simple graphical elements and images, as well as modern techniques for rendering a virtual reality. To apply these techniques correctly, one requires a basic understanding of the fundamental concepts in graphics.

 


This book introduces the most important basic concepts of computer graphics, coupling the technical background and theory with practical examples and applications throughout. Its user-friendly approach enables the reader to gain understanding through the theory at work, via the many example programs provided. With only elementary knowledge of the programming language Java, the reader will be able to create their own images and animations immediately, using Java 2D and/or Java 3D.


 


Features:


Presents computer graphics theory and practice in integrated combination


Focuses on the increasingly used Java 3D (and 2D in the first section of the book)


Uses many pedagogical tools, including numerous easy-to-understand example programs and end-of-chapter exercises


Offers Internet support for students and instructors (found at http://public.rz.fh-wolfenbuettel.de/~klawonn/computergraphics), such as additional exercises, solutions, program examples, slides for lecturers and links to useful websites


Provides an ideal, self-contained introduction to computer graphics


 


Written for second year undergraduates and above, this reader-friendly, clear and concise textbook will be an essential tool for those studying Computer Science and Computer Engineering.


 


Frank Klawonn has many years of experience teaching computer graphics and coordinating application projects with companies.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Internet Multimedia Communications Using SIP: A Modern Approach Including Java Practice : 9780123743008

Session Initiation Protocol (SIP) was conceived in 1996 as a signaling protocol for inviting users to multimedia conferences. With this development, the next big Internet revolution silently started. That was the revolution which would end up converting the Internet into a total communication system which would allow people to talk to each other, see each other, work collaboratively or send messages in real time. Internet telephony and, in general, Internet multimedia, is the new revolution today and SIP is the key protocol which allows this revolution to grow.
The book explains, in tutorial fashion, the underlying technologies that enable real-time IP multimedia communication services in the Internet (voice, video, presence, instant messaging, online picture sharing, white-boarding, etc). Focus is on session initiation protocol (SIP) but also covers session description protocol (SDP), Real-time transport protocol (RTP), and message session relay protocol (MSRP). In addition, it will also touch on other application-related protocols and refer to the latest research work in IETF and 3GPP about these topics. (3GPP stands for "third-generation partnership project" which is a collaboration agreement between ETSI (Europe), ARIB/TTC (Japan), CCSA (China), ATIS (North America) and TTA (South Korea).) The book includes discussion of leading edge theory (which is key to really understanding the technology) accompanied by Java examples that illustrate the theoretical concepts.

Throughout the book, in addition to the code snippets, the reader is guided to build a simple but functional IP soft-phone therefore demonstrating the theory with practical examples.

This book covers IP multimedia from both a theoretical and practical point of view focusing on letting the reader understand the concepts and put them into practice using Java. It includes lots of drawings, protocol diagrams, UML sequence diagrams and code snippets that allow the reader to rapidly understand the concepts.

KEY FEATURES

* Focus on HOW multimedia communications over the Internet works to allow readers to really understand and implement the technology
* Explains how SIP works, including many programming examples so the reader can understand abstract concepts like SIP dialogs, SIP transactions, etc.
* It is not focused on just VoIP. It looks At a wide array of enhanced communication services related to SIP enabling the reader put this technology into practice.
* Includes nearly 100 references to the latest standards and working group activities in the IETF, bringing the reader completely up to date.
* Provides a step-by-step tutorial on how to build a basic, though functional, IP soft-phone allowing the reader to put concepts into practice.
* For advanced readers, the book also explains how to build a SIP proxy and a SIP registrar to enhance one's expertise and marketability in this fast moving area.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Integrated Formal Methods: 4th International Conference, IFM 2004, Canterbury : 9783540213772

The fourth conference in the series of international meetings on Integrated Formal Methods, IFM, was held in Canterbury, UK, 4–7 April 2004. The conference was organized by the Computing Laboratory at the University of Kent, whose main campus is just outside the ancient town of Canterbury, part of the county of Kent.

Kent is situated in the southeast of England, and the university sits on a hill overlooking the city of Canterbury and its world-renowned cathedral. The University of Kent was granted its Royal Charter in 1965. Today there are almost 10,000 full-time and part-time students, with over 110 nationalities represented.

The IFM meetings have proven to be particularly successful. The first meeting was held in York in 1999, and subsequently we held events in Germany in 2000, and then Finland in 2002. The conferences are held every 18 months or so, and attract a wide range of participants from Europe, the Americas, Asia and Australia. The conference is now firmly part of the formal methods conference calendar. The conference has also evolved in terms of themes and subjects represented, and this year, in line with the subject as a whole, we saw more work on verification as some of the challenges in this subject are being met.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Processing in Medical Imaging: 16th International Conference, IPMI'99, Visegrad, Hungary : 9783540661672

This book constitutes the refereed proceedings of the 16th International Conference on Information Processing in Medical Imaging, IPMI'99, held in Visegrad, Hungary in June/July 1999.

The 24 revised full papers and the 28 posters presented have been carefully reviewed and selected from a total of 82 submissions. The volume addresses the full range of current topics in the area in particular new imaging techniques, 3D ultrasound and PET, segmentation, image analysis of the brain cortex, registration, feature, detection and modelling, cardiovascular image analysis, shape modelling and analysis, segmentation and detection, measurement and quantitative analysis, and analysis of image sequences and functional imaging.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information and Communications Security: 9th International Conference, ICICS 2007, Zhengzhou, China : 9783540770473

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007.

The 38 revised full papers presented were carefully reviewed and selected from 222 submissions. The papers are organized in topical sections on authentication and key exchange, digital signatures, applications, watermarking, fast implementations, applied cryptography, cryptanalysis, formal analysis, system security, and network security.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Implementing ITIL Configuration Management : 9780132425933

Practical, Real-World ITIL Configuration Management–From Start to Finish

 


The IT Infrastructure Library® (ITIL) places the “best practices” in IT operations at your command. ITIL helps you make better technology choices, manages IT more effectively, and drives greater business value from all your IT investments. The core of ITIL is configuration management: the discipline of identifying, tracking, and controlling your IT environment’s diverse components to gain accurate and timely information for better decision-making.


 


Now, there’s a practical, start-to-finish guide to ITIL configuration management for every IT leader, manager, and practitioner. ITIL-certified architect and solutions provider Larry Klosterboer helps you establish a clear roadmap for success, customize standard processes to your unique needs, and avoid the pitfalls that stand in your way.


 


You’ll learn how to plan your implementation, deploy tools and processes, administer ongoing configuration management tasks, refine ITIL information, and leverage it for competitive advantage. Throughout, Klosterboer demystifies ITIL’s jargon, illuminates each technique with real-world advice and examples, and helps you focus on the specific techniques that offer maximum business value in your environment.


 


Coverage includes



  • Assessing your current configuration management maturity and setting goals for improvement

  • Gathering and managing requirements to align ITIL with organizational needs

  • Describing the schema of your configuration management database (CMDB)

  • Identifying, capturing, and organizing configuration data

  • Choosing the best tools for your requirements

  • Integrating data and processes to create a unified logical CMDB and configuration management service

  • Implementing pilot projects to demonstrate the value of configuration management and to test your planning



  • Moving from a pilot to wide-scale enterprise deployment

  • Defining roles for deployment and ongoing staffing

  • Leveraging configuration management information: Reporting and beyond

  • Measuring and improving CMDB data accuracy


 


About the Author



Larry Klosterboer is a certified IT architect specializing in systems management. He works for IBM’s global service delivery team out of Austin, Texas. Larry has more than 18 years of experience in service delivery, spanning technologies from mainframe to networking to desktop computing. His areas of focus have included network design, UNIX® systems administration, asset management, and most recently, implementing IT service management.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Introduction to Constraint Databases : 9780387987293

Constraint databases provide extra expressive power over relational databases in a largely hidden way at the data-storage or physical level. Constraints, such as linear or polynomial equations, are used to represent large sets in a compact manner. They keep the view of the database for a user or application programmer almost as simple as in relational databases. "Introduction to Constraint Databases" comprehensively covers both constraint-database theory and several sample systems. The book reveals how constraint databases bring together techniques from a variety of fields, such as logic and model theory, algebraic and computational geometry, and symbolic computation, to the design and analysis of data models and query languages. Constraint databases are shown to be powerful and simple tools for data modeling and querying in application areas¿such as environmental modeling, bioinformatics, and computer vision--that are not suitable for relational databases. Specific applications are examined in geographic information systems, spatiotemporal data management, linear programming, genome databases, model checking of automata, and other areas. Topics and features: *Offers a database perspective and a focus on simplicity at the user level *Utilizes simple tools for determining whether queries are safe or not *Incorporates scientist-supplied descriptions of applications *Explains constraint databases from a developer's viewpoint *Provides extensive exercise sets, and sample software systems, that facilitate rapid learning of the topic within a real-world software context This volume presents a comprehensive introduction to the theory and applications of constraint database systems, which provide new methods for the design of data models and query languages. It is an essential resource for advanced students, practitioners, and professionals in computer science, database systems, and information systems.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Introduction to Assembly Language Programming: For Pentium and RISC Processors (Texts in Computer Science) : 9780387206363

Assembly language continues to hold a core position in the programming world because of its similar structure to machine language and its very close links to underlying computer-processor architecture and design. These features allow for high processing speed, low memory demands, and the capacity to act directly on the system's hardware. This completely revised second edition of the highly successful Introduction to Assembly Language Programming introduces the reader to assembly language programming and its role in computer programming and design. The focus is on providing readers with a firm grasp of the main features of assembly programming, and how it can be used to improve a computer's performance. The revised edition covers a broad scope of subjects and adds valuable material on protected-mode Pentium programming, MIPS assembly language programming, and use of the NASM and SPIM assemblers for a Linux orientation. All of the language's main features are covered in depth. The book requires only some basic experience with a structured, high-level language.

Topics and Features: Introduces assembly language so that readers can benefit from learning its utility with both CISC and RISC processors [ NEW ].- Employs the freely available NASM assembler, which works with both Microsoft Windows and Linux operating systems [ NEW ].- Contains a revised chapter on "Basic Computer Organization" [ NEW].- Uses numerous examples, hands-on exercises, programming code analyses and challenges, and chapter summaries.- Incorporates full new chapters on recursion, protected-mode interrupt processing, and floating-point instructions [ NEW ].


Assembly language programming is part of several undergraduate curricula in computer science, computer engineering, and electrical engineering. In addition, this newly revised text/reference can be used as an ideal companion resource in a computer organization course or as a resource for professional courses.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks : 9781420046595

An organizations employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods, safeguards, and techniques that help protect an organization from insider computer fraud.

Drawing from the authors vast experience assessing the adequacy of IT security for the banking and securities industries, the book presents a practical framework for identifying, measuring, monitoring, and controlling the risks associated with insider threats. It not only provides an analysis of application or system-related risks, it demonstrates the interrelationships that exist between an application and the IT infrastructure components it uses to transmit, process, and store sensitive data. The author also examines the symbiotic relationship between the risks, controls, threats, and action plans that should be deployed to enhance the overall information security governance processes.


Increasing the awareness and understanding necessary to effectively manage the risks and controls associated with an insider threat, this book is an invaluable resource for those interested in attaining sound and best practices over the risk management process.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007 : 9783540775348

This book constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, August 27-29, 2007.

The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical sections on Public Key Crypto Applications, Biometrics/Information Hiding, Secure Hardware, Secure Systems, Wireless and Mobile Security, Application Security/Secure Systems, Access Control/DB Security, Smart Cards/Secure Systems and Anonymity and P2P Security.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Access through Search Engines and Digital Libraries (The Information Retrieval Series) : 9783540751335

The Information Management Systems group at the University of Padua, led by Maristella Agosti, has been a major contributor to information retrieval (IR) and digital libraries for nearly twenty years. This group has gained an excellent reputation in the IR community and has produced some of the best-known IR researchers, whose work spans a broad range of topics.

The papers in this book deal with e.g. automated text categorizations, web link analysis algorithms, retrieval in multimedia digital libraries, and multilingual information retrieval. The presentation of original research results built on the past work of the group which at the same time summarizes past findings and opens up new directions and new areas of possible future research and cooperation will appeal to researchers and developers in institutions and companies working on search engines and information retrieval algorithms.


About the Author

Maristella Agosti is full professor in computer science, with a main focus on databases and information retrieval, at the Faculty of Humanities and at the Department of Information Engineering (DEI) of the University of Padova. She is the leader of the Information Management System (IMS) group of DEI and coordinates a number of national and international research projects. Her current interests are digital libraries, system architectures with a special focus on annotations, and multimedia digital archives.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Interactive Curve Modeling: with Applications to Computer Graphics, Vision and Image Processing : 9781846288708

Interactive curve modeling techniques and their applications are extremely useful in a number of academic and industrial settings, and specifically play a significant role in multidisciplinary problem solving, such as in font design, designing objects, CAD/CAM, medical operations, scientific data visualization, virtual reality, character recognition, and object recognition, etc. Various problems such as iris, fingerprint, and signature recognition, can also be intelligently solved and automated using curve techniques.

This broad-ranging textbook covers curve modeling with solutions to real life problems relating to computer graphics, vision, image processing, geometric modeling and CAD/CAM. Well-explained, easy-to-understand chapters deal with basic concepts, curve design techniques and their use to various applications, and a wide range of problems with their automated solutions via computers.


Features and topics:


Provides a class of practical solutions to real life and multidisciplinary problems


Offers students supporting pedagogical tools in the form of a thorough introductory chapter, individual chapter introductions and end summaries, as well as end-of-chapter exercises


Presents both classical and up-to-date theory, with practice to get problems solved in diverse disciplines


Focuses on interdisciplinary methods and up-to-date methodologies in the field


Imparts a description and analysis of a variety of classes of splines for use in CAGD (computer-aided geometric design), CAD (computer-aided design), CAE (computer-aided engineering), computer graphics, computer vision, image processing and other disciplines


Aims to stimulate views and provide a source where readers can find the latest state-of-the-art developments in the field, including a variety of techniques, applications, and systems necessary for solving problems


Interactive Curve Modeling also will serve as an important tool for readers; as an extremely useful textbook for senior undergraduates as well as graduate students in the areas of computer science, engineering, and other computational sciences. This comprehensive text can equally act as an invaluable resource for those practitioners and researchers looking for an introduction to the state-of-the-art on the topic.


Professor Sarfraz has many years of experience researching and teaching in the field, winning an award for Excellence in Research at the King Fahd University of Petroleum and Minerals, Saudi Arabia.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information Assurance: Dependability and Security in Networked Systems (The Morgan Kaufmann Series in Networking) : 9780123735669

In todays fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA).

KEY FEATURES

* The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting

* Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance

* Additional focus on security and survivability issues in wireless networks

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Implementation Patterns (Addison-Wesley Signature) : 9780321413093

Software Expert Kent Beck Presents a Catalog of Patterns Infinitely Useful for Everyday Programming

 


Great code doesn’t just function: it clearly and consistently communicates your intentions, allowing other programmers to understand your code, rely on it, and modify it with confidence. But great code doesn’t just happen. It is the outcome of hundreds of small but critical decisions programmers make every single day. Now, legendary software innovator Kent Beck–known worldwide for creating Extreme Programming and pioneering software patterns and test-driven development–focuses on these critical decisions, unearthing powerful “implementation patterns” for writing programs that are simpler, clearer, better organized, and more cost effective.


 


Beck collects 77 patterns for handling everyday programming tasks and writing more readable code. This new collection of patterns addresses many aspects of development, including class, state, behavior, method, collections, frameworks, and more. He uses diagrams, stories, examples, and essays to engage the reader as he illuminates the patterns. You’ll find proven solutions for handling everything from naming variables to checking exceptions.


 


This book covers



  • The value of communicating through code and the philosophy behind patterns

  • How and when to create classes, and how classes encode logic

  • Best practices for storing and retrieving state

  • Behavior: patterns for representing logic, including alternative paths

  • Writing, naming, and decomposing methods

  • Choosing and using collections

  • Implementation pattern variations for use in building frameworks


Implementation Patterns will help programmers at all experience levels, especially those who have benefited from software patterns or agile methods. It will also be an indispensable resource for development teams seeking to work together more efficiently and build more maintainable software. No other programming book will touch your day-to-day work more often.



About the Author


Kent Beck,
one of the software industry’s most creative and acclaimed leaders, consistently challenges software engineering dogma and promotes ideas like patterns, test-driven development, and Extreme Programming. Currently affiliated with Three Rivers Institute and Agitar Software, he is the author of many Addison-Wesley titles, including Test-Driven Development (2003) and, with Cynthia Andres, Extreme Programming Explained, Second Edition (2005).

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IP Networking over Next-Generation Satellite Systems: International Workshop, Budapest, July 2007 : 9780387754277

With the boom of Internet, IP-based applications, such as WWW and multimedia, bave been an essential part of our life, and there is an ever-increasing demand for accessing high-speed Internet services anywhere and anytime. This trend unavoidably has huge impacts on the design of the next-generation satellite systems. On the other hand, with its broadcasting nature and unique coverage, satellite systems also can play an important role in the next-generation Internet. For example, satellite systems can be a good driver for the deployment of IPv6 in the Internet, and can provide a fast way to reach end-users because they do not rely on construction of a high-speed terrestrial networks. The workshop proceedings will focus on the IP networking of next-generation satellite systems. Topics include IPv6 over satellites, new architectures of next-generation satellite systems, satellite and terrestrial network integration, network monitoring and measurement, and perfmance enhancement.

About the Author

Dr. Linghang Fan is a research fellow of the Centre for Communication Systems Research in the University of Surrey, UK. He received his B. Eng. in Automatic Control from Southeast University, China, and his M. S. and Ph. D. in Telecommunications from the University of Bradford, UK. From 1998 to 2000, he was a researcher at the University of Bradford and worked on EU projects SINUS and SUMO. In 2003, he joined the University of Surrey and worked on EU projects STRIKE, Ambient Networks, MAESTRO and SATNEX. Currently, he is working on the EU projects SATSIX and ECGIN. He has published more than forty papers in international journals and conferences. 


Dr. Haitham Cruickshank is a lecturer at the University of Surrey. He has worked there since January of 1996 on several European research projects in the ACTS, ESPRIT, TEN-TELECOM, and IST programs. His main research interests are network security, satellite network architectures, VoIP, and IP conferencing over satellites. He also teaches Data and Internet Networking and Satellite Communication courses at the University of Surrey.


Professor Zhili Sun is the Chair of Communication Networking in the Centre for Communication Systems Research, Department of Electronic Engineering, University of Surrey, UK. He received his B. S. in Mathematics from Nanjing University in China and Ph. D. in Computing Science from Lancaster University, UK. He was a Postdoctoral Researcher, from 1989 to 1993, in the Telecommunications Group, Queen Mary and Westfield College, University of London before coming to Surrey. He has been a principal investigator and technical coordinator in many European projects including the ESPRIT BISANTE, VIP-TEN, GEOCAST, ICEBERGS, SatLife, SATSIX, and Euro-NGI projects. 

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IT Project Management : On Track from Start to Finish, Second Edition : 9780072232028

Get expert advice on planning and steering a successful IT project using PMBOK-driven principles. Expert author and PMI certified Project Management Professional, Joseph Phillips, walks you through each step of the IT project management process, and shares critical strategies that engender smoothly-run, on-time, and within-budget projects. Find the best path to initiate a project, uncover techniques for project planning, focus your managing skills on picking the most qualified team members, and discover ways to deal with management. Then, establish communication channels and realistic timetables and learn how to track financial obligations. These concepts are also illustrated through interviews with leading IT project managers.



  • Define a project goal and create the project charter

  • Create a feasibility plan and establish a priority list

  • Determine strategy and obtain budget dollars

  • Work with management and define their role

  • Determine project expenses—including estimated required hours

  • Organize a project team—assess internal skills as well as utilize external resources

  • Delegate responsibilities and manage project schedules

  • Resolve disagreements—as well as address delays and budget increases

  • Track progress and implement quality testing

  • Maintain leadership and keep your team focused

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IT Project+ Study Guide, 2nd Edition (Exam PKO-002) : 9780782143188

Here’s the book you need to prepare for the latest version of CompTIA’s IT Project+ exam. This Study Guide was developed to meet the exacting requirements of today’s certification candidates. In addition to the consistent and accessible instructional approach that has earned Sybex the “Best Study Guide” designation in the 2003 CertCities Readers Choice Awards, this book provides:



  • Clear and concise information on IT project management

  • Practical examples and insights drawn from real-world experience

  • Leading-edge exam preparation software, including a test engine and electronic flashcards


You’ll also find authoritative coverage of key exam topics, including:



  • IT Project Initiation and Scope Definition

  • IT Project Planning

  • IT Project Execution, Control, and Coordination

  • IT Project Closure, Acceptance and Support


Look to Sybex for the knowledge and skills needed to succeed in today’s competitive IT marketplace.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks : 9780130461896

The Internet connects millions of people around the world and allows for immediate communication and access to a seemingly limitless amount of information. Data, video, and voice, almost every single type of communication, travels across the Internet. Some of this communication is private.


The language of the Internet is IP, the Internet Protocol. Everything can, and does, travel over IP. One thing IP does not provide, though, is security. IP packets can be forged, modified, and inspected en route. IPSec is a suite of protocols that seamlessly integrate security into IP and provide data source authentication, data integrity, confidentiality, and protection against replay attacks.


With IPSec, the power of the Internet can be exploited to its fullest potential.




  • Communication is the lifeblood of business. Without a guarantee that a customer's order is authentic, it is difficult to bill for a service. Without a guarantee that confidential information will remain confidential, it is impossible for businesses to grow and partnerships to be formed.




  • Unless there is a guarantee that records and information can remain confidential, the health care industry cannot utilize the Internet to expand its services and cut its costs.




  • Personal services, such as home banking, securities trading, and insurance can be greatly simplified and expanded if these transactions can be done securely.




The growth of the Internet is truly dependent on security, and the only technique for Internet security that works with all forms of Internet traffic is IPSec. IPSec runs over the current version of IP, IPv4, and also the next generation of IP, IPv6. In addition, IPSec can protect any protocol that runs on top of IP such as TCP, UDP, and ICMP. IPSec is truly the most extensible and complete network security solution.


IPSec enables end-to-end security so that every single piece of information sent to or from a computer can be secured. It can also be deployed inside a network to form Virtual Private Networks (VPNs) where two distinct and disparate networks become one by connecting them with a tunnel secured by IPSec.


This book discusses the architecture, design, implementation, and use of IPSec. Each of the protocols in the suite commonly referred to as "IPSec" (the Authentication Header, Encapsulating Security Payload, and Internet Key Exchange) is examined in detail. Common deployments of IPSec are discussed and future work on problem areas is identified.


This book is intended for an audience with an interest in network security as well as those who will be implementing secure solutions using IPSec, including building VPNs and e-commerce, and providing end-to-end security. Cryptography and networking basics are discussed in early chapters for those who are neither cryptography nor networking professionals.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

IP Addressing and Subnetting, Including IPv6 : 9781928994015

This book covers every aspect of the current version, as well as what will be a widespread migration starting in late 1999. These include: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy and an increased number of addressable nodes; supporting simpler auto-configuration of addresses; improving the scalability of multicast routing by adding a "scope" field to multicast addresses; and using a new "anycast address" to send a packet to any one of a group of nodes. As in other Syngress books, this one makes a complex subject accessible by including appendices, summaries, extensive art, and detailed indexes. (Coq)

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Introduction to Parallel Computing, Second Edition : 9780201648652

Increasingly, parallel processing is being seen as the only cost-effective method for the fast solution of computationally large and data-intensive problems. The emergence of inexpensive parallel computers such as commodity desktop multiprocessors and clusters of workstations or PCs has made such parallel methods generally applicable, as have software standards for portable parallel programming. This sets the stage for substantial growth in parallel software.


Data-intensive applications such as transaction processing and information retrieval, data mining and analysis and multimedia services have provided a new challenge for the modern generation of parallel platforms. Emerging areas such as computational biology and nanotechnology have implications for algorithms and systems development, while changes in architectures, programming models and applications have implications for how parallel platforms are made available to users in the form of grid-based services.


This book takes into account these new developments as well as covering the more traditional problems addressed by parallel computers.Where possible it employs an architecture-independent view of the underlying platforms and designs algorithms for an abstract model. Message Passing Interface (MPI), POSIX threads and OpenMP have been selected as programming models and the evolving application mix of parallel computing is reflected in various examples throughout the book.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Introduction to Automata Theory, Languages, and Computation (2nd Edition) : 9780201441246

It has been more than 20 years since this classic book on formal languages, automata theory, and computational complexity was first published. With this long-awaited revision, the authors continue to present the theory in a concise and straightforward manner, now with an eye out for the practical applications. They have revised this book to make it more accessible to today's students, including the addition of more material on writing proofs, more figures and pictures to convey ideas, side-boxes to highlight other interesting material, and a less formal writing style. Exercises at the end of each chapter, including some new, easier exercises, help readers confirm and enhance their understanding of the material.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Introduction to 3D Game Engine Design Using DirectX 9 and C# : 9781590590812

Introduction to 3D Game Engine Design Using DirectX 9 and C# illustrates the process of creating a simple 3D game engine. During this process, author Lynn Harrison demonstrates many facets of the DirectX 9 software through clear-cut explanations and examples.


Throughout the course of the book, you'll develop an off-road driving game that brings such features as management of large scenes, environmental effects, and physics into play. To write the game, you'll use cutting-edge technologies—C# and DirectX, and the .NET Framework—and you'll go beyond simple graphics to explore audio, user input, artificial intelligence, and multiplayer design.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Introducing Microsoft WinFX: The Application Programming Interface for the Next Generation of Microsoft Windows, Code Name Longhorn : 9780735620858

Get a headstart evaluating and programming with Microsoft’s next-generation client operating system. Get an expert, developer-focused introduction to the next generation Windows client operating system. Windows programming authority Brent Rector takes you inside the WinFX application model, explaining how its unified, managed-coded environment dramatically simplifies many programmatic “housekeeping” tasks and provides application security services from the very beginning of the development process. Then you’ll jump right into compiling, deploying, and running your first applications. From learning the new Extensible Application Markup Language (XAML) to taking advantage of the radical enhancements in security and privacy features, unified storage, file system APIs, rich media, and collaboration and communication services—you get the prerelease insights and preview code to dig into the “Longhorn” API right now.


Discover how to:



  • Design applications using the WinFX application model

  • work with the Microsoft .NET Build Engine

  • Exploit XAML to produce media-rich user interfaces and enhance online page navigation

  • Use the new WinFS storage system in Longhorn to access, manipulate, extend, and share data with less programmatic complexity

  • Move information between a .NET object and the UI and back again—without writing any procedural code—using data binding

  • Create security-enhanced communication applications—from Web services to RemoteObjects—with the new Windows communications technology, code name “indigo”

  • Write mobile applications with improved power management, grab-and-go docking, and wireless networking capabilities

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Introducing Microsoft .NET, Third Edition : 9780735619180

What problems can Microsoft .NET solve? What architectural approaches does it take to solve them? How do you start using .NET ,and how do you profit from it? Get the answers to these questions and more in the third edition of this popular, high-level .NET review—now updated for Microsoft Visual Studio .NET 2003 and .NET Framework version 1.1. Its organization makes it easy to decide how deep technically you want to go. The author expertly covers a single topic from the top down in each chapter, introducing simpler concepts first them progressing to greater technical detail. He makes his points with a minimum of jargon, a maximum of wit, a multitude of diagrams, and a wealth of meaningful analogies and clear explanations. By the end of this illuminating walk through, you’ll know enough about .NET to plan for the future of software as a Web service.


Topics covered include:



  • What the heck is .NET anyway?

  • .NET Framework objects

  • Microsoft ASP.NET and Web Forms

  • XML Web services

  • Microsoft ADO.NET

  • Handling XML

  • Events and delegates

  • Threads

  • Windows Forms

  • Data access

  • Bonus chapters on the Web about Windows Forms controls and Web Forms controls


New chapters in this edition:



  • .NET Remoting

  • The Reflection namespace

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Inside Windows Storage: Server Storage Technologies for Windows Server 2003, Windows 2000 and Beyond : 9780321126986

"Dilip Naik's Inside Windows Storage is an invaluable reference for developers and customers alike and is a must-read for anyone wishing to implement Windows-based storage networking."
—Tom Clark, Director, Technical Marketing, Nishan Systems


The Windows and enterprise storage markets are converging. Migrating upwards from low-end servers, Windows is becoming a genuine platform for running mission-critical applications. The enterprise storage market is moving from high-end servers to also include medium range servers. Thanks to a slew of enterprise storage related features, Microsoft Windows storage technologies are rapidly gaining widespread acceptance. System administrators, programmers, and technical managers need to learn to appreciate and to tap the full potential of Windows enterprise storage.


Inside Windows Storage is the first book to provide a comprehensive look at new and emerging Microsoft storage technologies. The text begins with an overview of the enterprise storage industry and Windows Server architecture, including the Windows NT I/O subsystem. With that foundation in place, readers explore the ins and outs of current Windows offerings, upcoming Windows server releases, and third-party products.


Key topic coverage includes:



  • Direct Attached Storage, including the new Windows Storport driver model

  • Fibre Channel Storage Area Networks (SANs)

  • Network Attached Storage (NAS), including the Windows NT network stack and an overview of CIFS

  • Backup and restore technologies, including Windows XP and Windows Server 2003 Volume Shadow Copy Service

  • File systems and disk virtualization, including a detailed overview of NTFS as well as a study of Windows cluster file systems

  • Storage management, including the new Windows Virtual Disk Service

  • IP Storage and Infiniband

  • High availability, including RAID mirroring as well as multi path I/O solutions


This extensive guide concludes by tracing Windows NT storage features as they appear in Windows NT 4.0, Windows 2000, and Windows Server 2003, and by offering a preview of what to expect from future Windows server releases. In short, Inside Windows Storage will help IT professionals gear up for the major role that Windows servers will surely play in the future of enterprise storage.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Inside Microsoft. NET IL assembler : 9780735615472

.NET IL Assemble is the intermediate language that the .NET common language runtime converts to machine language in .NET applications. Get the inside scoop on this critical low-level language with an architectural guide from the most reliable authority-the language's designer, Serge Lidin. You'll discover common structures, functions, and rules for designing .NET applications, explanations for how .NET executables compile, details on the .NET IL Assembler, IL Disassembler and Metadata Validation tools, and more.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Inside Microsoft Visual Studio .NET 2003 : 9780735618749

Learn how to put all the built-in power of Microsoft® Visual Studio® .NET 2003 to work with this comprehensive, in-depth programming guide. It drills down into the internal workings of Visual Studio .NET to help you get the most out of its features, editors, and project-management capabilities. You'll see how to extend this rich, integrated development environment to maximize your productivity for any project, no matter where you are in the development cycle—or which language you use. You'll also learn how to use macros and add-ins to simplify your work. Code examples in every chapter show you exactly what to do.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition) : 9780201787917

Inside Java(TM) 2 Platform Security, the definitive and comprehensive guide to the Java security platform, has been thoroughly updated to reflect key additions and revisions to Java security technologies currently in use by leading technology companies. This second edition, penned by the Java experts at Sun Microsystems, provides a detailed look into the central workings of the Java security architecture and describes tools and techniques for successful implementation on even the most demanding network computing environment.


While Java has always provided a stronger security model than other platforms, this book reviews all the methods and practices required to improve security without sacrificing functionality. With tips on how to customize, extend, and refine the Java security architecture, users will have everything they need to protect their information assets from both external and internal threats.


This book's in-depth coverage encompasses security architecture, deployment, customization, new developments, and much more.




  • Security fundamentals




  • Secure class loading




  • Specifying fine-grained security policy




  • Enforcing security policy with AccessController, SecurityManager, and more




  • Digital certificates, certification paths, signed code, JAAS, and other authentication measures




  • Java-based cryptography with code examples




  • JSSE, Java GSS-API, and RMI for network security




  • Previews of other platforms for security, including Java Card, J2ME and Jini




Designed for both the system administrator and software practitioner, this book delivers vital knowledge for building and maintaining a secure system using the Java 2 platform. With detailed code and usage examples throughout, Inside Java(TM) 2 Platform Security, Second Edition, is an indispensable resource for all platform security needs.


The Java(TM) Series is supported, endorsed, and authored by the creators of the Java technology at Sun Microsystems, Inc. It is the official place to go for complete, expert, and definitive information on Java technology. The books in this Series provide the inside information you need to build effective, robust, and portable applications and applets. The Series is an indispensable resource for anyone targeting the Java(TM) 2 platform.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Inside COM+ Base Services (Microsoft Programming Series) : 9780735607286

COM+ is not a radical departure from COM-it is the next stage of evolution of the COM programming model. COM was originally designed as a minimalist's component architecture. With the advent of the three-tier programming model, applications have become more complex. To help developers who work in this new world, COM+ offers a richer set of services than was available in COM. These services evolved from the technology previously known as Microsoft Transaction Server (MTS) and include features such as automatic transactions, role-based security, load balancing, object pooling, queued components, the in-memory database, and an external publish-and-subscribe event model.

COM+ offers many powerful and useful run-time services that save you the effort of building similar services yourself. While working on this book, we came to realize that it is impossible to explain these services without first explaining the fundamental component model at the heart of COM+. Whether or not you use these services in your components-for some developers, COM+ services offer little advantage1-you must understand the fundamental COM+ programming architecture before you can use COM+ effectively.

Inside COM+ Base Services describes the fundamental component model at the core of COM+. Once you understand the issues involved in building software components, you'll be able to decide where and how to use the COM+ component services effectively. Inside COM+ Component Services (forthcoming from Microsoft Press) covers these services in detail, along with issues involved in building multitier enterprise applications.

In this book, we make two assumptions-that you're interested in learning about COM+ and that you're familiar with a modern programming language such as C++, Microsoft Visual Basic, or Java. One of the central tenets of COM+ is the concept of language neutrality, so we've structured Inside COM+ Base Services around that idea. Although you can build COM+ components in a wide variety of development environments, we focus on the most popular trio: C++, Visual Basic, and Java. Visual Basic and Java developers will learn a lot from this book even though these languages hide a large part of the COM+ infrastructure. In many cases, we present examples in C++ and then show how components written in higher-level languages can tie into the same functionality. However, you must understand the fundamentals of C++ in order to use many of the sample programs.

Remember the Sojourner rover that roamed the surface of Mars during the summer of 1997? It ran on an 8-bit Intel 80C85 processor containing only 6500 transistors (compared with 5.5 million transistors in a Pentium). It had a radio modem capable of 9600 bps and was powered by solar energy and nonrechargeable lithium D-cell batteries. It was a feat of modern engineering achieved with the most basic components. In a less dramatic way, COM+ is like that-it consists of a fundamental set of ideas that can give rise to some amazingly powerful systems.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Inside ASP.NET : 9780735711358

Inside ASP.NET presents experienced software and web developers with accurate and concise information on the technologies and concepts introduced in Microsoft's new and revolutionary platform, .NET. Inside ASP.NET covers topics such as ADO.NET, XML Web Services, cache control, globalization, and mobile device development, providing the most comprehensive overview of ASP.NET available.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Inside the C++ Object Model : 9780201834543

Inside the C++ Object Model focuses on the underlying mechanisms that support object-oriented programming within C++: constructor semantics, temporary generation, support for encapsulation, inheritance, and "the virtuals"-virtual functions and virtual inheritance. This book shows how your understanding the underlying implementation models can help you code more efficiently and with greater confidence. Lippman dispells the misinformation and myths about the overhead and complexity associated with C++, while pointing out areas in which costs and trade offs, sometimes hidden, do exist. He then explains how the various implementation models arose, points out areas in which they are likely to evolve, and why they are what they are. He covers the semantic implications of the C++ object model and how that model affects your programs.

Highlights

Explores the program behavior implicit in the C++ Object Model's support of object-oriented programming.
Explains the basic implementation of the object-oriented features and the trade offs implicit in those features.
Examines the impact on performance in terms of program transformation.
Provides abundant program examples, diagrams, and performance measurements to relate object-oriented concepts to the underlying object model.

If you are a C++ programmer who desires a fuller understanding of what is going on "under the hood," then Inside the C++ Object Model is for you!


Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Inside Microsoft Windows 2000, Third Edition : 9780735610217

The third edition of Inside Microsoft Windows 2000 is intended for advanced computer professionals (both developers and system administrators) who want to understand how the core components of the Microsoft Windows 2000 operating system work internally. With this knowledge, developers can better comprehend the rationale behind design choices when building applications specific to the Windows 2000 platform. Such knowledge can also help developers debug complex problems. System administrators can benefit from this information as well because understanding how the operating system works under the covers facilitates understanding the performance behavior of the system and makes it easier to troubleshoot system problems when things go wrong. After reading this book, you should have a better understanding of how Windows 2000 works and why it behaves as it does.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Inside Flash : 9780735711051

This is a unique book. A unique approach. To a unique technology. Coders and creatives are both drawn to this thing called Flash, each riffing in different directions off the same tool.


Inside Flash is a world of information, ranging from foundation knowledge, to creative technique, to an exhaustive exploration of ActionScripting and Flash programming.


With the release of Flash 5, Macromedia has positioned Flash as a tool not just for creating interactive and engaging animated Web sites, but also for high-end Web applications. Add to that the integration of Flash and Generator and you can dramatically extend the power of your applications.


The high penetration of Flash into the browser market means that, as designers and developers, we finally have a viable alternative to the standard HTML/DHTML site.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Inside ColdFusion MX : 9780735713048

Welcome to Inside ColdFusion MX! This book is intended to be a comprehensive guide for ColdFusion developers. It provides the knowledge to leverage the power of the new, J2EE-based ColdFusion Server to create dynamic web applications.


The release of ColdFusion MX constitutes a major overhaul for the ColdFusion product. ColdFusion MX is the first version of ColdFusion built to leverage the J2EE initiative, and it enhances the ColdFusion developer's ability to create applications that are scalable and portable. With ColdFusion MX, you can easily extend ColdFusion by tying your application architecture to other existing J2EE-compliant applications throughout an organization. You can also deploy ColdFusion applications across a wide range of J2EE-compliant server products. This is an exciting and necessary advance for the ColdFusion product, and it will require you to gain a unique understanding of the new ColdFusion product and how you can leverage that power.


Inside ColdFusion MX takes you through the changes that that will affect you most when moving existing ColdFusion applications from ColdFusion 4.X and ColdFusion 5 to the ColdFusion MX architecture. In addition, Inside ColdFusion MX provides unique guidance for creating real-world applications from the ground-up that are built exclusively to leverage the power of ColdFusion MX and its uniquely new infrastructure. As the authors of this book, we have had daily involvement with the creation, management, deployment, and support of a multitude of enterprise-level ColdFusion applications. We are not removed "from the trenches," so to speak. We spend the majority of our time facing the real-world problems that you face, and in this book, we strive to give you a complete reference where you can find solutions and support for your problems.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Innovation and Imagination at Work, 2nd Edition : 9780074714539

In this revised and expanded second edition of Innovation and Imagination at Work, the Australian Institute of Management presents the thoughts of leading management thinkers and practitioners on how to create innovative organizations.


From a management and leadership perspective, this best-selling business book examines:



  • what business leaders and managers need to know about the future

  • why innovation will be imperative for corporate survival

  • how to transform an organization into an innovative enterprise

  • which innovation strategies are right for your organization

  • how to generate a constant stream of new ideas

  • how to manage and harness the creative energies of employees

  • why all organizations need to become entrepreneurial.


Each self-contained chapter combines theory, real-life application and practical guidance, with take-aways for the manager to explore and employ in the workplace.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Inside Windows Server 2003 : 9780735711587

Inside Windows .NET Server contains comprehensive information on deploying, managing, and troubleshooting systems using both Windows .NET and its predecessor. Readers get the in-depth, practical knowledge they need to master the hundreds of complex and often frustrating features found in Windows .NET Server. Inside Windows .NET Server is structured around a production deployment of Windows .NET in a global enterprise. Each chapter contains a lively feature description followed by extensively illustrated procedures for setting up and managing each service. All along the way, Boswell includes proven advice for improving stability, performance, and security. Readers of Boswell's Inside Windows 2000 Server declared it to be the best resource on the market. Inside Windows .NET Server improves coverage of existing features while expanding the scope to include the new features and improvements that make Windows .NET a must-have upgrade.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Imperfect C++ Practical Solutions for Real-Life Programming : 9780321228772

C++, although a marvelous language, isn't perfect. Matthew Wilson has been working with it for over a decade, and during that time he has found inherent limitations that require skillful workarounds. In this book, he doesn't just tell you what's wrong with C++, but offers practical techniques and tools for writing code that's more robust, flexible, efficient, and maintainable. He shows you how to tame C++'s complexity, cut through its vast array of paradigms, take back control over your code--and get far better results.


If you're a long-time C++ developer, this book will help you see your programming challenges in new ways--and illuminate powerful techniques you may never have tried. If you're newer to C++, you'll learn principles that will make you more effective in all of your projects. Along the way, you'll learn how to:




  • Overcome deficiencies in C++'s type system




  • Enforce software design through constraints, contracts, and assertions




  • Handle behavior ignored by the standard--including issues related to dynamic libraries, static objects, and threading




  • Achieve binary compatibility between dynamically loading components




  • Understand the costs and disadvantages of implicit conversions--and the alternatives




  • Increase compatibility with diverse compilers, libraries, and operating environments




  • Help your compiler detect more errors and work more effectively




  • Understand the aspects of style that impact reliability




  • Apply the Resource Acquisition Is Initialization mechanism to a wide variety of problem domains




  • Manage the sometimes arcane relationship between arrays and pointers




  • Use template programming to improve flexibility and robustness




  • Extend C++: including fast string concatenation, a true NULL-pointer, flexible memory buffers, Properties, multidimensional arrays, and Ranges




The CD-ROM contains a valuable variety of C++ compilers, libraries, test programs, tools, and utilities, as well as the author's related journal articles.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Information and Complexity in Statistical Modeling (Information Science and Statistics) : 9780387366104

No statistical model is "true" or "false," "right" or "wrong"; the models just have varying performance, which can be assessed. The main theme in this book is to teach modeling based on the principle that the objective is to extract the information from data that can be learned with suggested classes of probability models. The intuitive and fundamental concepts of complexity, learnable information, and noise are formalized, which provides a firm information theoretic foundation for statistical modeling. Inspired by Kolmogorov's structure function in the algorithmic theory of complexity, this is accomplished by finding the shortest code length, called the stochastic complexity, with which the data can be encoded when advantage is taken of the models in a suggested class, which amounts to the MDL (Minimum Description Length) principle. The complexity, in turn, breaks up into the shortest code length for the optimal model in a set of models that can be optimally distinguished from the given data and the rest, which defines "noise" as the incompressible part in the data without useful information.

Such a view of the modeling problem permits a unified treatment of any type of parameters, their number, and even their structure. Since only optimally distinguished models are worthy of testing, we get a logically sound and straightforward treatment of hypothesis testing, in which for the first time the confidence in the test result can be assessed. Although the prerequisites include only basic probability calculus and statistics, a moderate level of mathematical proficiency would be beneficial. The different and logically unassailable view of statistical modelling should provide excellent grounds for further research and suggest topics for graduate students in all fields of modern engineering, including and not restricted to signal and image processing, bioinformatics, pattern recognition, and machine learning to mention just a few.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google

Introduction to Digital Video, Second Edition : 9780240516370

Covers the essential fundamentals of digital video: from video principles, to conversion, compression, coding, interfaces and output.

Written for television professionals needing to apply digital video systems, equipment and techniques to multimedia and /or digital TV applications, as well as for computer system designers, engineers, programmers, or technicians needing to learn how to apply digital video to computer systems and applications. The text is based on the acclaimed industry `bible' The Art of Digital Video, but covers only the essential parts of this larger reference work.

It starts right from the basics from what a digital signal is to the how digital video can be applied.

John Watkinson is an international consultant in Audio, Video and Data Recording. He is a fellow of the AES, a member of the British Computer Society and Chartered Information Systems Practitioner. He presents lectures, seminars, conference papers and training courses worldwide. He is author of many other Focal press books including MPEG2, Art of Digital Video, Art of Digital Audio, Art of Sound Reporduction, Introduction to Digital Audio, Television Fundamentals and Audio for Television. He is also co-author of the Digital Interface Handbook and a contributor to The Loudspeaker and Headphone Handbook.

new edition has more on the computing aspects of videoincludes extra material on digital video broadcasting and video principlescovers more basic colorimetry and picture principles as well as progressive versus interface scanning

Written for television professionals needing to apply digital video systems, equipment and techniques to multimedia and /or digital TV applications, as well as for computer system designers, engineers, programmers, or technicians needing to learn how to apply digital video to computer systems and applications. The text is based on the acclaimed industry `bible' The Art of Digital Video, but covers only the essential parts of this larger reference work. It starts right from the basics from what a digital signal is to the how digital video can be applied.

About the Author

John Watkinson is an international consultant in audio video and data recording. He is a Fellow of the AES, a member of the British Computer Society and a chartered information systems practitioner. He presents lectures, seminars, conference papers and training courses worldwide and writes for many industry magazines. His other books for Focal Press are widely acknowledged as standard reference works and industry `bibles'. John is author of MPEG2, The Art of Digital Video and the Art of Digital Audio, An Introduction to Digital Video, An Introduction to Digital Audio, The Art of Sound Reproduction, Television Fundamentals, Co-author of The Digital Interface Handbook and Contributor to The Loudspeaker and Headphone Handbook.

Download Firefox For Free
Google Tool Bar. No Virus, Free From Virus
Google