Sunday, December 6, 2009

Performing with Computer Applications or Active Directory Best Practices 24sevensmall Small

Performing with Computer Applications: Personal Information Manager, Word P

Author: Iris Blanc

Using the developmental approach to learning, Performing with Computer Applications, 3rd Edition offers a means of learning about computers, thinking critically, solving problems, communicating effectively, applying technology to task and working in teams. The book introduces word processing, Internet, desktop publishing, spreadsheet, database, and presentation concepts through sequential practice material. It is non-software specific so its exercises can be used with any software or operating system.



Table of Contents:
Introduction to Computers Unit I: Orientation 1. Get Started 2. Use Settings, Displays, Help, and File Management Unit II: Work with a Personal Information Manager 1. Exploring Outlook 2. Work with Contacts 3. Work with the Calendar, Tasks, and Notes Unit III: Word Processing 1. Create and Save Documents 2. Open and Edit Documents 3. Work with Text Alignments, Fonts, and Font Formatting 4. Basic Document Formatting and Editing 5. Additional Document Formatting and Editing 6. Work with the Internet 7. Work with Multiple-Page Documents and Multiple Documents 8. Work with Columns, Tables, and Forms 9. Work with AutoText and Macros; Merge Unit IV: Desktop Publishing 1. Work with Objects, Lines, and Text Boxes 2. Work with Drawing Tools 3. Add Special Effects Unit V: Spreadsheets 1. Create, Save, and Print a Worksheet 2. Use Formulas; Copy a Formula; Format and Enhance Worksheet Data 3. Use Functions, Additional Formatting, and Editing 4. Create and Edit Charts 5. Integrate Worksheets with Other Applications Unit VI: Database 1. Plan, Create, and Save a Database 2. Open, Edit, and Print a Database 3. Modify and Format a Database; Search and Sort a Database 4. Use Queries and Create Reports; Integrate Databases with Other Applications Unit VII: Presentations 1. Create, Save, and Print a Presentation 2. Enhance Slides; Work with Text and Objects 3. Work with Slide Shows; Integrate Presentations with Other Applications Unit VIII: Web Sites 1. Work with Web Pages 2. Create and Enhance Web Sites Capstone Projects 1. Planning a Conference 2. Organizing a Community Activity 3. Planning a Group Travel Expedition AppendicesGlossary

Look this: Winning Is Not Enough or The Fortune at the Bottom of the Pyramid

Active Directory Best Practices 24sevensmall /Small: Migrating, Designing, and Troubleshooting

Author: Brad Pric

Advanced Coverage for Experienced Network Administrators

Active Directory Best Practices 24seven is written specifically to build on the practical and conceptual knowledge you've already earned. Taking a "just the facts, ma'am" approach this book provides targeted instruction and insider tips to help you quickly implement the best practices established by successful network administrators across a wide range of industries. This is also an excellent way to make a pain-free transition to the latest release of Active Directory. Coverage includes:



• Building a complete Active Directory-based infrastructure

• Understanding migration options, including the role of Organizational Units

• Configuring domain controllers to support Flexible Single Master Operations

• Understanding how Exchange affects Active Directory design

• Using the new backup and restore options

• Troubleshooting and optimizing the Active Directory database, File Replication Service, and Group Policy

• Setting up and maintaining interoperation between Active Directory and DNS

• Migrating and consolidating Windows NT 4 and Windows 2000-based domains

• Managing patches

• Securing the base operating system before promoting a domain controller

• Securing DNS to protect associated domain controllers

• Working with Active Directory security options




Saturday, December 5, 2009

ALEKS with Users Guide and One Semester Access Code Stand Alone Version or Computers as Theatre

ALEKS with User's Guide and One Semester Access Code Stand Alone Version

Author: ALEKS Corporation

ALEKS is an artificial intelligence-based system for individualized math learning, available for Higher Education from McGraw-Hill over the World Wide Web.

ALEKS delivers precise assessments of your math knowledge, guides you in the selection of appropriate new study material, and records your progress toward mastery of goals.

ALEKS interacts with you much as a skilled human tutor would, moving between explanation and practice as needed, correcting and analyzing errors, defining terms and changing topics on request. By accurately assessing your knowledge, ALEKS focus clearly on what you are ready to learn next, helping you master the course content more quickly and easily.

Note:

Included Internet access code is one time use only.



Go to: Beyond al Qaeda or Beyond al Qaeda

Computers as Theatre

Author: Brenda Laurel

features a new chapter that takes the reader through virtual reality and beyond to a new level of human computer interaction that is genuinely transforming. Like its predecessor, this book presents a new theory of human-computer activity.



0201550601B04062001

Booknews

Building on Aristotle's analysis of the form and structure of drama, presents a new theory of human-computer activity. Suggests that the next generation of interactive computers will employ dramatic as well as psychological and graphic techniques. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Table of Contents:
1. The Nature of the Best.
2. Dramatic Foundations, Part I: Elements of Qualitative Structure.
3. Dramatic Foundations, Part II: Orchestrating Action.
4. Dramatic Techniques for Orchestrating Human Response.
5. Design Principles for Human-Computer Activity.
6. New Directions in Human-Computer Activity.
7. Post-Virtual Reality: After the Hype is Over. 0201550601T04062001

Thursday, December 3, 2009

Windows 2000 Scripting Bible or Problem Solving Cases in Microsoft Access and Excel

Windows 2000 Scripting Bible

Author: William R Stanek

This authoritative, comprehensive guide is your bible to Windows® 2000 scripting. Written for people at all levels of technological know-how, it may be used as a reference book or a tutorial. You'll appreciate the step-by-step instructions and clear explanations enhanced by icons, charts, and hundreds of screenshots. The tips, insights, and shortcuts that appear in each chapter will help you to

  • Automate most network routines.
  • Master VBScript and JScript essentials.
  • Learn the ins and outs of scripting engines and the Windows Scripting Host architecture.
  • Read or write to files, manage drives and printers, configure menus, and work with the Registry.
  • Save time with scripts for network tasks, logon/logoff operations, and other routines.
  • Use Active Directory Services scripting to manage accounts, systems, and services.
  • Build spreadsheets, animate charts, and access databases with COM scripting.
  • Work with library utilities to automate scripts for file management, network administration, and more.
If you're an administrator or developer using Windows or scripting technologies, you'll find techniques not published anywhere else. You'll see why the entire Bible series has such an outstanding reputation when the Windows 2000 Scripting Bible goes the distance for you.



Table of Contents:
Preface.

Acknowledgments.

PART I: Getting Started with Windows Scripting.

Chapter 1: Introducing Windows Scripting.

Chapter 2: VBScript Essentials.

Chapter 3: JScript Essentials.

PART II: Windows Scripting Essentials.

Chapter 4: Creating Scripts and Scripting Files.

Chapter 5: Scripting Basics.

Chapter 6: Input, Output, and Error Handling.

Chapter 7: Working with Files and Folders.

Chapter 8: Reading and Writing Files.

Chapter 9: Managing Drives and Printers.

Chapter 10: Configuring Menus, Shortcuts, and Startup Applications.

Chapter 11: Working with the Windows Registry and Event Logs.

PART III: Network and Directory Service Scripting.

Chapter 12: Scheduling One-time and Recurring Tasks.

Chapter 13: Managing Computer and User Scripts.

Chapter 14: Introducing Active Directory Service Interfaces.

Chapter 15: Using Schema to Master ADSI.

Chapter 16: Managing Local and Domain Resources with ADSI.

Chapter 17: Service and Resource Administration with ADSI.

Chapter 18: Maintaining Shared Directories, Printer Queues, and Print Jobs.

Chapter 19: Managing Active Directory Domain Extensions.

Chapter 20: Where to Go from Here?

PART IV: Windows Scripting Libraries.

Chapter 21: Library: File-System Utilities.

Chapter 22: Library: I/O Utilities.

Chapter 23: Library: Network Resource Utilities.

Chapter 24: Library: Account Management Utilities.

Appendix A: Windows Script Host Quick Reference.

Appendix B: Core ADSI Reference.

Appendix C: Essential Command-Line Utilities for Use with WindowsScripts.

Index.

Book review: Kings of Peace Pawns of War or Footwear Impression Evidence Detection Recovery and Examination Second Edition

Problem-Solving Cases in Microsoft Access and Excel

Author: Joseph Brady

Now in its Second Annual Edition, Problem-Solving Cases in Microsoft Access and Excel helps build spreadsheet and database skills using realistic business cases and is the perfect complement to a computer literacy or MIS course. Each case introduces a compelling business problem and, with the help of tutorials on Microsoft Access and Excel, trains users in critical thinking and problem solving. Readers will use Microsoft Access and Excel throughout the book to work through the case material. The scenarios found in the text reflect real business situations, ranging from small, privately-owned companies to large corporations.



Wednesday, December 2, 2009

IP Telephony Using CallManager Express Lab Portfolio or Pro Perl Parsing

IP Telephony Using CallManager Express-Lab Portfolio

Author: Cheryl Schmidt

IP Telephony Using CallManager Express

Lab Portfolio

 

Cheryl A. Schmidt

Ernie Friend

 

IP Telephony Using CallManager Express Lab Portfolio provides a hands-on approach to learning the basic principles of voice over IP (VoIP) to build a voice-enabled network for the small to medium-sized business.

 

As you work through the 51 labs in the book, you learn how to deploy a basic phone system using a CallManager Express-capable router. You install, configure, and customize Cisco® IP Phones to work in an IP Telephony environment as well as with traditional analog telephony devices.

 

Each chapter begins with an explanation of the converging technology used within that chapter’s labs and, where necessary, includes a refresher on routing and switching topics so that you can properly set up the labs. The collection of labs features clear objectives, equipment needs, alternative methods, and probing questions. Additionally, the book includes a command reference as one of the six supplemental appendixes.

 

All the material has been written and tested with students in a live classroom environment:

  • Labs enable you to deploy a progressively more layered VoIP environment as you complete the labs in each chapter.
  • Paper exercises help you work through and reinforce your understanding of fundamental topics such as dial plans, IP addressing, and dial peers.
  • Case Study labs present the material in scenarios that combine the methods learned in the previous chapters so that you apply your knowledge to a specific scenario or task. Pulling together various concepts simulates the real-world environment where things are rarely assigned one step at a time.

 

The Lab Portfolio can be used as a supplement to any textbook used to teach CVoice or CallManager Express. It can also be used as a standalone resource for anyone wanting to learn the basics of IP Telephony.

After completing all the exercises and hands-on labs in this book, you will know how VoIP works and be well prepared to configure the technology in a small to medium-sized business.

 

Cheryl A. Schmidt is a full-time faculty member in the Network Engineering Technology department at Florida Community College at Jacksonville (FCCJ).

She has a master's degree in computer and information resource management. For the past 10 years, Cheryl has been teaching courses such as computer repair, CCNA®, CCNP,® VoIP, QoS, and wireless.

 

Ernie Friend is the Director of Academic Systems at Florida Community College at Jacksonville (FCCJ) Florida. He manages the Network Engineering Technology department at FCCJ and had previously managed the college’s network and computer infrastructure. He has been managing computer and networking departments for more than 14 years at the college and continues to explore and teach the latest networking technologies.

 

Use this Lab Portfolio with:

 

Cisco IP Communications Express: CallManager Express with Cisco Unity Express

ISBN: 1-58705-180-X

 

Voice over IP Fundamentals, Second Edition

ISBN: 1-58705-257-1

 

This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco Systems®.

 

Category: IP Telephony

Covers: CallManager Express

 

111606



Book about: Wolf of Wall Street or The Art of War

Pro Perl Parsing

Author: Christopher M Frenz

I thoroughly enjoyed this...I write and maintain a fair amount of Perl, and matching and parsing patterns is often the largest part of the work.


— A.P. Lawrence, Information and Resources for Unix and Linux Systems

Perl, one of the world's most diffuse programming languages, was born out of the need to resolve the creator's dissatisfaction with what were at the time standard data-parsing solutions. Indeed, since the 1.0 release in 1987, Perl has been heralded for its powerful parsing capabilities--features that are further enhanced through the thousands of Perl extensions made available through CPAN (the Comprehensive Perl Archive Network).

Pro Perl Parsing begins with several chapters devoted to key parsing principles, discussing topics pertinent to regular expressions, parsing grammars, and parsing techniques. This material sets the stage for later chapters, which introduce numerous and powerful CPAN parsing modules, and provide an ample supply of example applications.



Tuesday, December 1, 2009

Multi Platinum Pro Tools or How to Do Everything with Windows Vista

Multi-Platinum Pro Tools: Advanced Editing, Pocketing and Autotuning Techniques

Author: Nathan Adam

Learn how a real professional uses Pro Tools to make multi-platinum records with this jam-packed, fast-paced guide. Including over 300 color illustrations, Multi-Platinum Pro Tools takes you inside the minds of one of the top Pro Tools engineers in the business, giving you the skills you need to succeed. Using the interactive DVD (featuring a real Nashville recording session) you watch, listen, learn and edit alongside Multi-Platinum and Gold record engineer Brady Barnett in a real Pro Tools editing session!

Essential reading for current and aspiring recording engineers, students, musicians and all those who have some prior knowledge of Pro Tools but wish to become expert users, Multi-Platinum Pro Tools enables you to really enhance your Pro Tools skills without having to spend thousands on special 'digidesign training.'

* Provides step-by-step techniques for using Pro Tools in a session, enabling you to edit, tune, and pocket everything from rhythmic and melodic instruments to lead and background vocals
* High-quality DVD includes an interactive editing session and close-up movie screenshots giving you an in-depth look at the editing techniques used on major record label releases
* Pre-edited and final mix versions of the session demonstrate just how these techniques will take your mixes from Demo to Promo



Table of Contents:
Ch. 1Pocketing, editing, and tuning : the what, whys, and hows of major-label Pro Tools editing1
Ch. 2Adjusting your seat-belt : setting up Pro Tools preferences for a streamlined edit session13
Ch. 3Beginning the pocket : building a song from the drums up69
Ch. 4Using beat detective to save time, money, and headaches131
Ch. 5Getting the bass player on time - and not just to rehearsal173
Ch. 6Locking up the acoustic tracks207
Ch. 7Electricity in the air233
Ch. 8Autotuning : the not-so-dirty little secret behind a great local track261

Look this: How to Cure a Hangover or Does A Chimp Wear Clothes LE

How to Do Everything with Windows Vista

Author: Curt Simmons

Bring clarity to your PC experience with Windows Vista and this easy-to-use guide. How to Do Everything with Windows Vista shows you how to take full advantage of all the powerful and fun features of this revolutionary new operating system. Learn to customize your settings, connect to the Internet, set up a home network, secure your system, and connect peripheral devices. You'll also discover how to maximize all of the entertainment capabilities--games, music, photos, video, and more.

  • Manage components, programs, folders, and files
  • Install hardware and software
  • Use printers, scanners, and digital cameras
  • Connect to the Internet
  • Set up and manage a home network
  • Manage security with Windows Firewall and Windows Defender
  • Play games on your PC or online
  • Play and record music with Windows Media Player
  • Create your own movies with Windows Movie Maker
  • Organize and print your digital photos
  • Optimize, manage, and troubleshoot Windows Vista

 

Curt Simmons is a technology author and trainer. He has written more than 50 computer and technology books, including three editions of How to Do Everything with Windows XP and two editions of How to Do Everything with Your Blackberry.



Monday, November 30, 2009

The Elements of Java Style or Photoshop Elements 4

The Elements of Java Style

Author:

The Elements of Java Style, written by renowned author Scott Ambler, Alan Vermeulen, and a team of programmers from Rogue Wave Software, is directed at anyone who writes Java code. Many books explain the syntax and basic use of Java; however, this essential guide explains not only what you can do with the syntax, but what you ought to do. Just as Strunk and White's The Elements of Style provides rules of usage for the English language, this text furnishes a set of rules for Java practitioners. While illustrating these rules with parallel examples of correct and incorrect usage, the authors offer a collection of standards, conventions, and guidelines for writing solid Java code that will be easy to understand, maintain, and enhance. Java developers and programmers who read this book will write better Java code, and become more productive as well. Indeed, anyone who writes Java code or plans to learn how to write Java code should have this book next to his/her computer.



Table of Contents:
Preface
Acknowledgments
Introduction
1General Principles1
2Formatting Conventions5
3Naming Conventions15
Package Names18
Type Names20
Method Names23
Variable Names25
Constant Names29
4Documentation Conventions31
Comment Types32
Documentation Comments36
Internal Comments52
5Programming Conventions57
Type Safety64
Statements and Expressions66
Construction70
Exception Handling72
Assertions75
Concurrency79
Synchronization80
Efficiency85
6Packaging Conventions89
Summary95
Glossary105
Bibliography119
Index123

Go to: Democracy and Tradition or MoveOns 50 Ways to Love Your Country

Photoshop Elements 4: The Missing Manual

Author: Barbara Brundag

Photoshop Elements 4 has everything you need to edit and organize your photos. In fact, the program gives you most of what big-daddy Photoshop offers. What it doesn't give you is a manual. Enter Photoshop Elements 4: The Missing Manual. It explains not only how the tools and commands work, but when you'd want to use them, too.



Sunday, November 29, 2009

Mastering InDesign CS3 for Print Design and Production or Ultimate Blogs

Mastering InDesign CS3 for Print Design and Production

Author: Pariah Burk

Mastering InDesign for Print Design and Production shows how experienced professionals with deadlines and billable hours use InDesign efficiently and effectively. Through the case studies and interviews, readers will find inspired to look beyond the over-emphasized basic features and into the depths of InDesign's utility for real-world print design.

Most InDesign books are written for beginners, and experienced users are frustrated by them. When you already know how to make, fill, and thread a text box, the entire first half of most InDesign books is useless. But this one doesn't dwell on the basics. Mastering InDesign for Print Design and Production fulfills the promise of the Mastering series, to provide real-world skills to professionals and students. Like all Mastering books, this one includes:



• A "by pros for pros" approach: The author is an active professional working in the field of graphic arts, layout, and design, writing for professionals who want to improve their skills or learn new skills.

• Real-world examples: Running throughout the text are examples of how the various skills are applied in real scenarios, described throughout the book in the form of examples and case studies from the author's own design and consulting work, as well as interviews with other designers using InDesign on the job.

• Skill-based teaching and hands-on exercises



Although the book has a comprehensive glossary, page one begins right away speaking to the core market—print professionals—in industry terms about industry challenges. This immediately lets experienced InDesign usersknow the book is about them. The approach is humorous, making the digestion and retention of complicated information easier for the reader through quips, anecdotes, and design- and print-geek humor. But at all times the book is true to its mission: Helping a professional do their job in InDesign without frustration, confusion, or aesthetic compromise.



Table of Contents:
Introduction.

Chapter 1: Customizing.

Chapter 2: Text.

Chapter 3: Characters.

Chapter 4: Drawing.

Chapter 5: Images.

Chapter 6: Objects.

Chapter 7: Pages.

Chapter 8: Stories.

Chapter 9: Documents.

Chapter 10: Output.

Chapter 11: Efficiency.

Chapter 12: Collaboration.

Appendix: The Bottom Line.

Glossary.

Index.

See also: Bacardi and the Long Fight for Cuba or The First 90 Days

Ultimate Blogs: Masterworks from the Wild Web

Author: Sarah Boxer

“What are you working on?”
“An anthology of blogs.”
“I didn’t know you had a blog.”
“I don’t. It’s an anthology of other people’s blogs.”
“How do you find good blogs?”
“I read. I surf. I look at blog contests. I follow links. I ask people about the blogs they like.”
“Is a good blog hard to find?”
“Yes. Very.”

A Book of Blogs? WTF!!

Sarah Boxer, a former New York Times reporter and critic, travels through the blogosphere (more than 80 million blogs — and counting) and finds some masterpieces along the way. Among the bloggers in the anthology are:

two fashion critics mocking the inexplicable “fugliness” of celebrities
a Marine Corps lieutenant stationed in Fallujah in 2006
a 19-year old student in Singapore cheerfully pining for her ex
an illustrator’s tiny saga of a rodent and his ball of crap
Odysseus’s sidekick telling his side of the Iliad and Odyssey

Revealing and deceptive, grand and niggling, worldly and parochial, these blogs comprise a snapshot of life on the wild, wild Web.

Publishers Weekly

With this collection of 27 blogs culled from disparate corners of the Internet, Boxer, who writes for the New York Times, attempts to impose some kind of fixed order on a form that generally relies on the satisfaction of timely updates. For many blog-savvy readers, this collection would appear to have all the appeal of a new MP3 converted into 8-track format, but much of the writing contained in the book is well worth browsing for even the most hardened Web aficionado. The highlights in book format, predictably, are the blogs that maintain relatively tight spelling and grammar standards and focus on subjects beyond the writer's petty complaints. Benjamin Zimmer's "Language Log" reads like a wonderfully expansive and more self-aware William Safire column, while Sean Carroll's "Cosmic Variance" manages to be wryly humorous even while discussing theoretical physics at the Ph.D. level. Ringers like Alex Ross of the New Yorkerand Matthew Yglesias of the Atlantic Monthlyhardly seem like fair choices to demonstrate the democratization of the Web, but their blogs, on music and classical politics, respectively, are must-reads. Other, less conventional highlights include the neocon-spoofing comic "Get Your War On," the ruminative expat diary "How to Learn Swedish in 1000 Difficult Lessons" and the cheerfully hyperactive idea stockpile "Ironic Sans." (Feb.)

Copyright 2007 Reed Business Information

Forbes

The irony that an anthology of compelling blogs would appear in paperback is not lost on Sarah Boxer, the former New York Times Web critic and editor of Ultimate Blogs. But here it is, 27 blogs from the more than 80 million out there. Boxer has done the surfing for us, turning up a Nobel Prize laureate and U.S. Court of Appeals judge discussing immigration and global warming; a 19-year-old student in Singapore pining for her ex; an African-American arguing that King Kong is an inherently racist film. Many bare their souls, like gear-head-turned-Marine-Corps-lieutenant Jeffrey Barnett, who is thrilled to connect with the children of Abu Ghraib prisoner and yet plainly con-fesses, "That's right, we profile based on age and gender . . . and it works." Apparently there is more to the blogosphere than mere navel-gazing.—Stephanie Cooperman



Saturday, November 28, 2009

AutoCAD AutoCAD LT All in One Desk Reference For Dummies or The Java EE 5 Tutorial

AutoCAD & AutoCAD LT All-in-One Desk Reference For Dummies 

Author: David Byrnes

AutoCAD is the leading software tool for creating technical and architectural drawings, but it definitely doesn't lead in the "easy to master" category. That's why there's AutoCAD and AutoCAD LT All-in-One Desk Reference For Dummies—the perfect way to break a complex topic into bite-size, easy-to-understand pieces.

Once you get the hang of using AutoCAD and its slightly less feature-rich cousin, AutoCAD LT, you discover that it offers wonderful advantages. AutoCAD allows you to



• Create precision to 14 significant digits

• Re-use portions of your drawings by copying and pasting

• Draw things full size and print your drawings in any scale

• Produce drawings that are easier to read when reduced

• Electronically share and distribute drawings

• Design in 2D or 3D



So obviously, the trick is to speed up that "getting the hang of it" process. That's where AutoCAD and AutoCAD LT All-in-One Desk Reference For Dummies comes in especially handy. Ten easy-to-follow minibooks cover every aspect of AutoCAD, including the latest features of AutoCAD 2007, so you can find just what you need to know quickly and easily. You'll get the scoop on



• AutoCAD basics, such as setting up drawings, finding your way around the interface, and using all the tools

• Drawing and modifying objects in 2D and annotating your drawings

• 3D modeling and viewing, working with solids and surfaces, and rendering

• Understanding how AutoCAD LT differs from AutoCAD and deciding which program you need

• Advanced drafting skills,including organizing drawings, working with blocks, and using AutoCAD utilities

• Setting up your drawings for plotting to paper and publishing

• Sharing your drawings online for collaboration

• Customizing and programming AutoCAD to make it work the way you want it to



In the familiar, friendly For Dummies fashion, AutoCAD and AutoCAD LT All-in-One Desk Reference For Dummies gives you plain-English explanations and step-by-step directions. Written by a pair of AutoDesk Authorized Authors, this handy guide will help make your relationship with AutoCAD a happy and productive one.



Table of Contents:
Bk. 1AutoCAD basics7
Ch. 1Drawing on (and in) AutoCAD9
Ch. 2Navigating the AutoCAD interface15
Ch. 3All about files35
Ch. 4Basic tools55
Ch. 5Setting up drawings67
Ch. 6Precision tools93
Bk. II2D drafting115
Ch. 1Drawing objects117
Ch. 2Modifying objects143
Ch. 3Managing views171
Bk. IIIAnnotating drawings185
Ch. 1Text : when pictures just won't do187
Ch. 2Dimensioning213
Ch. 3Hatching your drawings241
Bk. IVLT differences251
Ch. 1The LT difference253
Ch. 2Extending AutoCAD LT261
Ch. 3Mixed environments269
BK. V3D modeling275
Ch. 1Introducing the third dimension277
Ch. 2Using the 3D environment285
Ch. 3Viewing in 3D297
Ch. 4Moving from 2D to 3D307
Ch. 5Working with solids321
Ch. 6Working with surfaces329
Ch. 7Rendering : lights, cameras, AutoCAD!337
Bk. VIAdvanced drafting347
Ch. 1Playing with blocks349
Ch. 2Dynamic blocks365
Ch. 3External references381
Ch. 4Organizing your drawings405
Ch. 5AutoCAD utilities415
Bk. VIIPublishing drawings427
Ch. 1Page setup429
Ch. 2Sheet sets without regret449
Ch. 3Print, plot, publish477
Bk. VIIICollaboration497
Ch. 1CAD management : the necessary evil499
Ch. 2CAD standards509
Ch. 3Working with drawing files527
Ch. 4Sharing electronic files547
Bk. IXCustomizing AutoCAD567
Ch. 1The basics of customizing AutoCAD569
Ch. 2Customizing the interface587
Ch. 3Customizing the tools607
Ch. 4Delving deeper into customization629
Bk. XProgramming AutoCAD651
Ch. 1The AutoCAD programming interfaces653
Ch. 2Using custom programs663
Ch. 3Introducing AutoLISP681
Ch. 4Visual Basic for AutoCAD719

Read also Sendo Preto, Vivendo na Vermelhidão - Corrida, Prosperidade, e Política Social na América

The Java EE 5 Tutorial

Author: Eric Jendrock

The Java™ EE 5 Tutorial, Third Edition, is the definitive, task-oriented, example-driven guide to programming server-side applications with Sun Microsystems' new Java(TM) EE 5 platform. Written by members of Sun's Java EE 5 platform team, this book enables new and intermediate Java programmers to build production-quality Java applications right away, as they gain a deep, rich understanding of the entire platform.

This tutorial offers expert guidance on developing presentation layers with the Java EE 5 platform's web tier technologies, using the platform's rich web services support, developing business logic with Enterprise JavaBeans 3.0 technology, accessing databases via the Java Persistence API, and leveraging the Java EE 5 platform's powerful services. It contains extensive new material throughout, including detailed introductions to the latest APIs, and instructions for using the NetBeans 5.5 IDE and Sun Java System Application Server 9.

The technologies and services covered in depth include:

  • Enterprise JavaBeans 3.0
  • Java Persistence
  • JavaServer Faces Technology
  • Java API for XML-Based Web Services (JAX-WS)
  • Java Architecture for XML Binding (JAXB)
  • Streaming API for XML (StAX)
  • Java Servlet 2.5
  • JavaServer Pages 2.1
  • JavaServer Pages Standard Tag Library (JSTL)
  • SOAP with Attachments API for Java (SAAJ)

The Java™ Series is supported, endorsed, and authored by the creators of the Java technology at Sun Microsystems, Inc. It is the official place to go for complete, expert, and definitive information on Java technology. The booksin this Series provide the inside information you need to build effective, robust, and portable applications and applets. The Series is an indispensable resource for anyone targeting the Java 2 platform.



Thursday, November 26, 2009

Simulation Using Promodel or Tomorrows Technology and You Complete

Simulation Using Promodel

Author: Charles R Harrell

The second edition of Simulation Using ProModel covers the art and science of simulation in general and the use of ProModel simulation software in particular. The lead author is the Chief Technology Advisor for ProModel Corporation. The text is appropriate for use in both a graduate or undergraduate course in simulation in a Business, Engineering or Computer Science program, and as a self-study guide to simulation for practitioners in business and industry.

The second edition of Simulation Using Promodel reflects the most recent version of the ProModel software available (version 6.0) and includes a new chapter and lab that provide deeper coverage of how random behavior is simulated and how output results are generated and evaluated. Additional examples, review questions, lab exercises and case study assignments have also been added to further enhance students’ learning experience.

This text blends theory with practice presenting actual applications in business, services and manufacturing. General topics include simulation basics, planning, data collection and analysis, model building, model verification and validation, output analysis and experimental design. Additionally, this is the first simulation text that covers simulation optimization using modern techniques. For a practical emphasis, complete chapters are devoted to typical modeling issues encountered in manufacturing, material handling and service systems.



Table of Contents:

I Study Chapters

1 Introduction to Simulation

2 System Dynamics

3 Simulation Basics

4 Discrete-Event Simulation

5 Getting Started

6 Data Collection and Analysis

7 Model Building

8 Model Verification and Validation

9 Simulation Output Analysis

10 Comparing Systems

11 Simulation Optimization

12 Modeling Manufacturing Systems

13 Modeling Material Handling Systems

14 Modeling Service Systems

II Labs

1 Introduction to ProModel 6.0

2 ProModel World View, Menu and Tutorial

3 Running a ProModel Simulation

4 Building Your First Model

5 ProModel's Output Module

6 Fitting Statistical Distribution to Input Data

7 Basic Modeling Concepts

8 Model Verification and Validation

9 Simulation Output Analysis

10 Comparing Alternative Systems

11 Simulation Optimization with SimRunner

12 Intermediate Modeling Concepts

13 Material Handling Concepts

14 Additional Modeling Concepts

III Case Study Assignments

Case 1 Toy Airplane Manufacturing

Case 2 Mi Cazuela - Mexican Restaurant

Case 3 Jai Hind Cycles Inc. Plans New Production Facility

Case 4 The FSB Coin System

Case 5 Automated Warehousing at Athletic Shoe Company

Case 6 Concentrate Line at Florida Citrus Company

Case 7 Balancing the Production Line at Southern California Door Company

Case 8 Material Handling at California Steel Industries, Inc.

Appendixes

A Common Continuous and Discrete Distributions

B Critical Values for Students t Distribution

C F Distribution for a=0.05

D Critical Values for Chi-Square Distribution

Look this: Untamed Hospitality or World Grilling

Tomorrow's Technology and You, Complete

Author: George Beekman

Completely updated, Tomorrow’s Technology and You, Ninth Edition provides you with an understanding of information technology so you can successfully navigate change and advance into the future.


 


Today we’re standing at the junction of three powerful and rapidly evolving technological forces: computers, communications, and digital entertainment. Computer technology is showing up in everything from automobiles to home appliances to telephones to televisions, and the lines that separate these machines are fading. This digital convergence is rapidly—and radically—altering the world in which we live.



Wednesday, November 25, 2009

FastCARD or A Step by Step Approach to Using the SAS System for Factor Analysis and Structural Equation Modeling

FastCARD: Lotus Notes 7

Author: Course Technology

Get up to speed quickly with Course Technology's new four-color, tri-fold, six-sided FastCARDs! Our easy-to-follow design makes each FastCARD the perfect self-study tool to get you started with a new application, technology, or business skill. Use FastCARDs to roll out a new application, Office suite, or business topic, get answers to frequently asked questions, or teach a 1-2 hour or half-day course.



New interesting textbook: Encyclopedia of Food and Color Additives or Move over Martha

A Step-by-Step Approach to Using the SAS System for Factor Analysis and Structural Equation Modeling

Author: Larry Hatcher

Packed with concrete examples, Hatcher's book provides an introduction to more advanced statistical procedures and includes handy appendices that give basic instruction in using SAS. Novice SAS users will find all they need to master SAS basics and to move into advanced statistical analyses in this one book. Featured is a simple, step-by-step approach to testing structural equation models with latent variables using the CALIS procedure. The following topics are explained in easy-to-understand terms: exploratory factor analysis, principal component analysis, and developing measurement models with confirmatory factor analysis. Other covered topics of note include "LISREL-type" analyses with the user-friendly PROC CALIS and solving problems encountered in real-world social science research.

Supports releases 6.09E and higher of SAS software.



Sunday, February 22, 2009

Microsoft Outlook 2003 Bible or Sams Teach Yourself Apache in 24 Hours

Microsoft Outlook 2003 Bible

Author: Rob Tidrow

Packed with step-by-step instructions for using e-mail, scheduling times and tasks, keeping track of people and managing items and folders.
* Readers discover out to use Outlook to its full potential and allow them to work more efficiently.
* Coverage goes beyond the basics of mastering e-mail to include using Outlook as a Personal Information Manager, integrating it with other Office applications, and discovering advanced message development.
* The companion CD-ROM includes sample code from the book and valuable third-party tools to help integrate Outlook.



Table of Contents:
Preface
Acknowledgments
Pt. IGetting Started with Microsoft Outlook 20031
Ch. 1Outlook 2003 in a Nutshell3
Ch. 2Installing Outlook 200323
Ch. 3A Guided Tour of Outlook 200357
Ch. 4Configuring Outlook 200385
Pt. IIMastering E-mail113
Ch. 5E-mail Basics115
Ch. 6Message Options and Attachments131
Ch. 7Advanced E-mail Concepts159
Ch. 8Processing Messages Automatically173
Pt. IIIInformation Manager191
Ch. 9Managing Your Contacts193
Ch. 10Managing Your Calendar223
Ch. 11Scheduling Your Time249
Ch. 12Tracking Tasks265
Ch. 13Keeping Your Journal285
Ch. 14Taking Notes301
Ch. 15Organizing Information with Categories317
Ch. 16Using Outlook Newsreader333
Pt. IVGetting the Most Out of Outlook 2003355
Ch. 17Customizing Outlook 2003357
Ch. 18Using Folders Effectively385
Ch. 19Integrating with Other Applications407
Ch. 20Delegating Tasks to an Assistant427
Ch. 21Using Windows SharePoint Services439
Pt. VManaging Outlook Users463
Ch. 22Supporting Roaming Users465
Ch. 23Managing Security and Performance487
Ch. 24Controlling Outlook (and Office) with Group and System Policies501
Ch. 25Backing Up and Recovering User Data515
Ch. 26Managing Exchange Server for Outlook Users533
Pt. VIBasics of Microsoft Outlook 2003559
Ch. 27Outlook 2003 Application Types561
Ch. 28Creating a Simple Outlook Form579
Ch. 29Controls in Outlook Forms591
Ch. 30Utilizing Custom Fields609
Ch. 31Adding Functionality to Outlook Forms621
Pt. VIIAdvanced Messaging Development635
Ch. 32Working with Application Folders637
Ch. 33Collaborative Messaging Basics655
Ch. 34Using the Outlook 2003 Object Model665
Pt. VIIIAdvanced Outlook Administration675
Ch. 35Using Business Contact Manager677
Ch. 36Using Outlook Web Access703
Ch. 37Optimizing Outlook Installations723
App.: What's on the CD-ROM737
Index745
End-User License Agreement785

Read also 101 tecnica di soluzione dei problemi creativa: Il manuale di nuove idee per il commercio

Sams Teach Yourself Apache in 24 Hours

Author: Daniel Lopez

Sams Teach Yourself Apache in 24 Hours covers the installation, configuration, and ongoing administration of the Apache Web server, the most popular Internet Web server. It covers both the 1.3 and the new 2.0 versions of Apache.

Using a hands-on, task-oriented format, it concentrates on the most popular features and common quirks of the server.

The first part of the book helps the reader build, configure, and get started with Apache. After completing these chapters the reader will be able to start, stop, and monitor the Web server. He also will be able to serve both static content and dynamic content, customize the logs, and restrict access to certain parts of the Web server.

The second part of the book explains in detail the architecture of Apache and how to extend the server via third-party modules like PHP and Tomcat. It covers server performance and scalability, content management, and how to set up a secure server with SSL.



Saturday, February 21, 2009

Mathematics for 3D Game Programming and Computer Graphics Second Edition or Magic Lantern Guides

Mathematics for 3D Game Programming and Computer Graphics, Second Edition

Author: Eric Lengyel

About the Author
Eric Lengyel (Sunnyvale, CA), best-selling author of Mathematics for 3D Game Programming and Computer Graphics, and the OpenGL Extensions Guide, is the Chief Technology Officer for Terathon Software, a game engine development studio. He holds an M.S. in Mathematics from Virginia Tech and has written several articles for gamasutra.com and the Game Programming Gems series (Charles River Media).



New interesting textbook: Overcoming Problematic Alcohol and Drug Use or Self Awareness Deficits in Psychiatric Patients

Magic Lantern Guides: Sigma DP1

Author: Jason Schneider

- The founding editor-in-chief of Popular Photography magazine brings his authority on camera design and technology to this complete guide on the world’s first digital compact camera with an “SLR-sized” sensor.

- Packed with shooting advice and insider tips on making the most of this unique camera, this is a must for all DP1 users. *(Please note that this does not include wallet card.)



Friday, February 20, 2009

Digital Nature and Landscape Photography or Hacking Exposed VoIP

Digital Nature and Landscape Photography

Author: Mark Lucock

Landscape photography is one of the last bastions of traditional film, but this is slowly changing, as more and more leading photographers adopt digital technology. This beautifully produced and illustrated reference outlines simple techniques for assuring that your nature images achieve both technical and creative excellence. Covering everything from using a digital camera in the field to image-editing methods in the digital darkroom, it elaborates on the best methods for working with tripods and flashes outside, the implications of using different exposure meters in certain lighting conditions, and a whole host of tips dedicated to gaining a proper understanding of the craft. With breathtaking images featured throughout, this resource is sure to inspire every amateur photographer eager to go digital outdoors.
 

Daniel Lombardo - Library Journal

These two volumes use completely different methods for inspiring photographers of the natural world. The unique format of Developing Vision and Style contains a dialog among three admired British landscape photographers (Charlie Waite, David Ward, and Joe Cornish) moderated by editor Eddie Ephraums. The answers to his thought-provoking questions are illustrated with each photographer's work. The same questions are then presented to several amateur and professional photographers for their insights, again accompanied by examples of their work. The result is a stunning landscape photography tutorial full of a broad range of insights. Highly recommended for all collections.

Lucock's splendid volume covers the new technical possibilities of digital nature and landscape photography. The coverage encompasses advice on the digital workflow from hardware to software, understanding the rich, creative potential of the medium, the use of digital cameras in the field, and basic and advanced image-editing techniques. As a biologist, professional photographer, and experienced author, Lucock is uniquely qualified to have produced this highly recommended book.



Table of Contents:
Introduction     6
Early Considerations     20
Digital Nuts and Bolts     40
The Digital Darkroom     74
The Photographic Basics     100
Understanding Field Craft     116
Professionalizing Your Photography     152
Glossary     168
Useful websites     173
About the author     174
Index     175

See also: Apples or Recipes for the Loaf Pan

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Author: David Endler

Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way

"This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network Security

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.

  • Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware
  • Fortify Cisco, Avaya, and Asterisk systems
  • Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation
  • Thwart number harvesting, call pattern tracking, and conversation eavesdropping
  • Measure and maintain VoIP network quality of service and VoIP conversation quality
  • Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones
  • Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks
  • Avoid insertion/mixing of malicious audio
  • Learn about voice SPAM/SPIT andhow to prevent it
  • Defend against voice phishing and identity theft scams

David Endler is the Director of Security Research for TippingPoint, a division of 3Com. Previously, he performed security research for Xerox Corporation, the NSA, and MIT.  Endler is also the chairman and founder of the Voice over IP Security Alliance.

Mark Collier is CTO for SecureLogix Corporation.  He is an expert author and frequent presenter on the topic of VoIP security. Collier is also a founding member of the Voice over IP Security Alliance.



Thursday, February 19, 2009

Sams Teach Yourself COBOL in 24 Hours with CD ROM or Network Security Assessment

Sams Teach Yourself COBOL in 24 Hours with CD-ROM

Author: Thane Hubbell

Sams Teach Yourself COBOL in 24 Hours teaches the basics of COBOL programming in 24 step-by-step lessons. Each lesson builds on the previous one providing a solid foundation in COBOL programming concepts and techniques. Coupled with the source code and the compiler available from Fujitsu, this hands-on guide is the easiest, fastest way to begin creating standard COBOL compliant code. Business professionals and programmers from other languages will find this hands-on, task-oriented tutorial extremely useful for learning the essential features and concepts of COBOL programming. Writing a program can be a complex task. Concentrating on one development tool guides you to good results every time. There will be no programs that will not compile!



Table of Contents:
Introduction
Pt. ICOBOL Program Basics
Hour 1Getting Started
Hour 2Writing Your First Program in COBOL
Hour 3Different Data Types
Hour 4Basic User Interface
Hour 5Procedure Division
Hour 6Manipulating Data
Hour 7Manipulating String Data
Hour 8Conditional Statements
Hour 9The Evaluate Statement
Hour 10Processing Loops
Hour 11Advanced Perform Statements
Hour 12Tables
Pt. IIFile Handling
Hour 13Sequential Files
Hour 14Indexed Files
Hour 15Reading Indexed File Records
Hour 16Updating Indexed File Records
Hour 17Sorting
Pt. IIIBusiness Processing
Hour 18Master File Updating
Hour 19Reporting
Hour 20Advanced Reporting
Pt. IVMiscellaneous Functions
Hour 21Date Manipulation
Hour 22Other Intrinsic Functions
Pt. IVAdvanced Topics
Hour 23The Call Interface
Hour 24The Graphical User Interface
Index

Interesting textbook: Superplonk 2006 or Soups

Network Security Assessment

Author: Chris McNab

How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack. Network Security Assessment demonstrates how a determined attacker scours Internet-based networks in search of vulnerable components, from the network to the application level. This new edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks at the bigger picture by grouping and analyzing threats at a high-level. By grouping threats in this way, you learn to create defensive strategies against entire attack categories, providing protection now and into the future. Network Security Assessment helps you assess: Web services, including Microsoft IIS, Apache, Tomcat, and subsystems such as OpenSSL, Microsoft FrontPage, and Outlook Web Access (OWA) Web application technologies, including ASP, JSP, PHP, middleware, and backend databases such as MySQL, Oracle, and Microsoft SQL Server Microsoft Windows networking components, including RPC, NetBIOS, and CIFS services SMTP, POP3, and IMAP email services IP services that provide secure inbound network access, including IPsec, Microsoft PPTP, and SSL VPNs Unix RPC services on Linux, Solaris, IRIX, and other platforms Various types of application-level vulnerabilities that hacker tools and scripts exploit Assessment is the firststepany organization should take to start managing information risks correctly. With techniques to identify and assess risks in line with CESG CHECK and NSA IAM government standards, Network Security Assessment gives you a precise method to do just that.

Slashdot.org

A good framework for anyone who is serious about running network security scans to security his perimeter and interior networks. ...If you are looking for a to-the-point book that does not get bogged down with screen prints and meaningless hacker stories and myths, Network Security Assessment is a good place to start.



Wednesday, February 18, 2009

Red Hat Fedora and Enterprise Linux 4 Bible or Retouching Photos in Photoshop Elements 3

Red Hat Fedora and Enterprise Linux 4 Bible

Author: Christopher Negus

For desktop or business, here's all the Linux you need

Whether you want the latest Linux software in Fedora or a stable Red Hat Enterprise Linux for your business, this book covers it all. Install Fedora Core 4 from the DVD or two CDs included and learn to use Linux as a desktop system or an Internet server. Check out fun applications for surfing the Web and doing office tasks. Learn to manage basic system administration, and move up to running your own Web, mail, print, or file server.

Configure Fedora or Red Hat Enterprise Linux to:



• Browse the Web with Firefox

• Read and send e-mail with Evolution

• Create documents, spreadsheets, or presentations with OpenOffice.org

• Set up networked Web, mail, file, database, LDAP, print, or other servers



Transition your Fedora skills to Enterprise Linux with:



• Descriptions of RHEL products, features, and services

• Pointers to professional RHEL training and certification



Install complete Fedora Core 4 from DVD

Using the bonus DVD, you can:



• Boot the DVD to check and prepare your computer before installing Fedora (using KNOPPIX)

• Install the complete Fedora Core 4 Linux operating system (all source code packages included)



Install desktop Fedora Core 4 from CD

Using the bonus 2-CD set, you can:



• Select the software you need for a well-stocked desktop system

• Add key server features to use with your desktop Fedora system



Open formore!



• Find ten cool things you can do with Fedora

• Use KNOPPIX to test and prepare your computer

• Get your Windows stuff working in Linux



wiley.com/go/fedora4bible



Table of Contents:
Ch. 1An overview of Fedora and Red Hat Enterprise Linux3
Ch. 2Installing Fedora23
Ch. 3Getting started with the Desktop87
Ch. 4Using Linux commands139
Ch. 5Accessing and running applications181
Ch. 6Publishing with Fedora and RHEL233
Ch. 7Gaming in Fedora and RHEL269
Ch. 8Music, video, and images in Linux293
Ch. 9Using the Internet and the Web343
Ch. 10Understanding system administration399
Ch. 11Setting up and supporting users445
Ch. 12Automating system tasks
Ch. 13Backing up and restoring files513
Ch. 14Computer security issues547
Ch. 15Setting up a local area network605
Ch. 16Connecting to the Internet649
Ch. 17Setting up a print server691
Ch. 18Setting up a file server715
Ch. 19Setting up a mail server755
Ch. 20Setting up an FTP server785
Ch. 21Setting up a Web server795
Ch. 22Setting up an LDAP address book server847
Ch. 23Setting up boot servers : DHCP and NIS863
Ch. 24Setting up a MySQL database server885
Ch. 25Making servers public with DNS917
Ch. 26Using Linux servers from a Mac943
Ch. 27Adapting the Linux 2.6 kernel969
Ch. 28Implementing security enhanced Linux977

See also: Individual Differences and Behavior in Organizations or Entrepreneurship in Micro Enterprises

Retouching Photos in Photoshop Elements 3: Visual QuickProject Guide

Author: Peachpit Press Staff

While Photoshop offers a host of professional-level image editing and color features, sometimes all users want to do is correct an image's lighting, fix a little red eye, or even out the tones in a photograph--they don't want (or need) to know the rest of Photoshop's bells and whistles. This book is for anyone who simply wants to get from start to finish fast, and doesn't need to know every single Photoshop feature, but just the ones they'll use to accomplish their goals. This slim, four-color volume, one of Peachpit's brand-new Visual QuickProject guides, gives readers the quickest route to a polished, improved photo. To do this, it focuses on a single photo that readers correct as they go. Each short chapter uses large, four-color screen shots and step-by-step instructions to lead readers through each component of the process. By the end of this book, they'll have adjusted the photo's lighting, corrected skin tones, swapped in a new background, and saved the final product to the file format of their choice. Occasional sidebars and tips point out useful Photoshop retouching tricks.



Monday, February 16, 2009

Macromedia Flash or Closer

Macromedia Flash

Author: Mighty Assembly

The award-winning designers of Mighty Assembly present advanced Flash concepts and techniques in this richly-illustrated,full-color book. Inside,Mighty Assembly deconstructs their own site,from initial inception through implementation,offering in-depth insight along the way.

Execute your most creative concepts using Flash Get a developer's view of what it takes to conceive and produce an award-winning Flash Web site. This detailed case study deconstructs the site mightyassembly.com,offering readers a rare opportunity to observe and analyze how concepts are executed by pushing the limits of Flash. Learn how the developers and designers at Mighty Assembly merged original ideas and inspired designs with solid engineering principles using readily accessible Flash processes and techniques. This beautifully designed and informative book thoroughly and clearly examines the development and use of Flash graphics,sound,video,code-controlled motion,and linear animation. In the spirit of furthering the understanding and proliferation of Flash,Mighty Assembly's proprietary code is available free in downloadable form.

"This is a great resource for anyone interested in the in-depth processes and methods involved in creating an immersive online Flash experience. " —Matt Owens,volumeone.com

"Illuminates the value in the little paths a team explores during the process of refining every thought,pixel or line of code. " —Joshua Davis,praystation.com

"Provides an insider's look at how a Web site is made. Detailed accounts of how a concept is developed and individual parts are crafted demystify the work of a digital designer. " —Yoshi Sodeoka,C404

praystation.com - Joshua Davis

Illuminates the value in the little paths a team explores during the process of refining every thought, pixel or line of code.

volumeone.com - Matt Owens

This is a great resource for anyone interested in the in-depth processes and methods involved in creating an immersive online Flash experience.

Yoshi Sodeoka

Provides an insider's look at how a Web site is made. Detailed accounts of how a concept is developed and individual parts are crafted demystify the work of a digital designer.



New interesting textbook: Mindbody Cancer Wellness or HIV and Drug Free

Closer: Performance, Technologies, Phenomenology

Author: Susan Kozel

In Closer, Susan Kozel draws on live performance practice, digital technologies, and the philosophical approach of phenomenology. Trained in dance and philosophy, Kozel places the human body at the center of explorations of interactive interfaces, responsive systems, and affective computing, asking what can be discovered as we become closer to our computers--as they become extensions of our ways of thinking, moving, and touching.

Performance, Kozel argues, can act as a catalyst for understanding wider social and cultural uses of digital technology. Taking this one step further, performative acts of sharing the body through our digital devices foster a collaborative construction of new physical states, levels of conscious awareness, and even ethics. We reencounter ourselves and others through our interactive computer systems. What we need now are conceptual and methodological frameworks to reflect this.

Kozel offers a timely reworking of the phenomenology of French philosopher Maurice Merleau-Ponty. This method, based on a respect for lived experience, begins by listening to the senses and noting insights that arrive in the midst of dance, or quite simply in the midst of life. The combination of performance and phenomenology offered by Closer yields entwinements between experience and reflection that shed light on, problematize, or restructure scholarly approaches to human bodies using digital technologies.

After outlining her approach and methodology and clarifying the key concepts of performance, technologies, and virtuality, Kozel applies phenomenological method to the experience of designing and performing in a range of computationalsystems: telematics, motion capture, responsive architectures, and wearable computing.

The transformative potential of the alchemy between bodies and technologies is the foundation of Closer. With careful design, future generations of responsive systems and mobile devices can expand our social, physical, and emotional exchanges.



Sunday, February 15, 2009

Exploring Getting Started with Computing Concepts or Managing Information Security Risks

Exploring Getting Started with Computing Concepts

Author: Robert T Grauer

The Exploring series helps students master the How and Why of performing tasks in Office to gain a greater understanding of how to use the individual applications together to solve business problems. Exploring titles feature Perfect pages where every step of every hands-on exercise as well as every end-of-chapter problem begins on a new page and has its own screen shot to make it easier to follow. Each chapter contains Hands-on Exercises, Capstone Exercises, and Mini-Cases for practicing and reviewing skills acquired. 

Ideal for students and individuals seeking a comprehensive introduction to computer concepts for Microsoft Office 2007.



See also: The Leaders We Need or Presidential Humor

Managing Information Security Risks: The OCTAVE Approach

Author: Christopher J Alberts

Information security requires far more than the latest tool or technology. Organizations must understand exactly what they are trying to protect--and why--before selecting specific solutions. Security issues are complex and often are rooted in organizational and business concerns. A careful evaluation of security needs and risks in this broader context must precede any security implementation to insure that all the relevant, underlying problems are first uncovered.

The OCTAVE approach for self-directed security evaluations was developed at the influential CERT(R) Coordination Center. This approach is designed to help you:


  • Identify and rank key information assets
  • Weigh threats to those assets
  • Analyze vulnerabilities involving both technology and practices

OCTAVE(SM) enables any organization to develop security priorities based on the organization's particular business concerns. The approach provides a coherent framework for aligning security actions with overall objectives.

Managing Information Security Risks, written by the developers of OCTAVE, is the complete and authoritative guide to its principles and implementations. The book:

  • Provides a systematic way to evaluate and manage information security risks
  • Illustrates the implementation of self-directed evaluations
  • Shows how to tailor evaluation methods to different types of organizations

Special features of the book include:

  • A running example to illustrate important concepts and techniques
  • A convenient set of evaluation worksheets
  • A catalog of best practices to which organizations can comparetheir own



0321118863B05172002

Booknews

Written for people who manage information security risks for their organizations, this book details a security risk evaluation approach called "OCTAVE." The book provides a framework for systematically evaluating and managing security risks, illustrates the implementation of self-directed evaluations, and shows how to tailor evaluation methods to the needs of specific organizations. A running example illustrates key concepts and techniques. Evaluation worksheets and a catalog of best practices are included. The authors are on the technical staff of the Software Engineering Institute. Annotation c. Book News, Inc., Portland, OR



Table of Contents:
List of Figures
List of Tables
Preface
Acknowledgments
Pt. IIntroduction1
Ch. 1Managing Information Security Risks3
Ch. 2Principles and Attributes of Information Security Risk Evaluations17
Pt. IIThe OCTAVE Method41
Ch. 3Introduction to the OCTAVE Method43
Ch. 4Preparing for OCTAVE59
Ch. 5Identifying Organizational Knowledge (Processes 1 to 3)81
Ch. 6Creating Threat Profiles (Process 4)109
Ch. 7Identifying Key Components (Process 5)137
Ch. 8Evaluating Selected Components (Process 6)157
Ch. 9Conducting the Risk Analysis (Process 7)169
Ch. 10Developing a Protection Strategy - Workshop A (Process 8A)191
Ch. 11Developing a Protection Strategy - Workshop B (Process 8B)227
Pt. IIIVariations on the OCTAVE Approach239
Ch. 12An Introduction to Tailoring OCTAVE241
Ch. 13Practical Applications255
Ch. 14Information Security Risk Management275
Glossary293
Bibliography301
App. ACase Scenario for the OCTAVE Method311
App. B: Worksheets363
App. C: Catalog of Practices443
About the Authors457
Index461

Thursday, February 12, 2009

The Sims 2 or Information Security Governance

The Sims 2: Nightlife: Prima Official Game Guide

Author: Greg Kramer

Make it a night to remember
*Complete catalog of over 125 new Objects and Items
*Details on the new Pleasure and Aspiration
*Create the ultimate social butterfly with details on fun group outings night after night
*Send your Sims to the fanciest restaurant and the dingiest dives in the new downtown neighborhood
*Build the downtown of your dreams
*Become a true creature of the night--live the life of a vampire or a partier
*Be a winner at the dating game with tips for supercharging romantic pursuits



Book review: Introduction à l'Économétrie

Information Security Governance: Design, Implementation, Measurement & Compliance

Author: Timothy P Layton

Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs. Fortunately, Information Security: Design, Implementation, Measurement, and Compliance outlines a complete roadmap to successful adaptation and implementation of a security program based on the ISO/IEC 17799:2005 (27002) Code of Practice for Information Security Management. The book first describes a risk assessment model, a detailed risk assessment methodology, and an information security evaluation process. Upon this foundation, the author presents a proposed security baseline for all organizations, an executive summary of the ISO/IEC 17799 standard, and a gap analysis exposing the differences between the recently rescinded version and the newly released version of the standard. Finally, he devotes individual chapters to each of the 11 control areas defined in the standard, covering systematically the 133 controls within the 39 control objectives. Tim Layton's Information Security is a practical tool to help you understand the ISO/IEC 17799 standard and apply its principles within your organization's unique context.



Table of Contents:
Ch. 1Information security risk assessment model (ISRAM)3
Ch. 2Global information security assessment methodology (GISAM)17
Ch. 3Developing an information security evaluation (ISE) process49
Ch. 4A security baseline55
Ch. 5Background of the ISO/IEC 17799 standard71
Ch. 6ISO/IEC 17799:2005 gap analysis77
Ch. 7Security policy117
Ch. 8Organization of information security125
Ch. 9Asset management133
Ch. 10Human resources security139
Ch. 11Physical and environmental security147
Ch. 12Communications and operations management155
Ch. 13Access control173
Ch. 14Information systems acquisition, development, and maintenance185
Ch. 15Information security incident management195
Ch. 16Business continuity management199
Ch. 17Compliance203
App. AISO standards cited in ISO/IEC 17799:2005209

Wednesday, February 11, 2009

SPSS for Psychologists or Pattern Oriented Software Architecture

SPSS for Psychologists: A Guide to Data Analysis Using SPSS for Windows, Versions 12 And 13

Author: Nicola Brac

The new edition of this best-selling guide carefully leads the user through the process of using SPSS to analyze psychological data. The authors review the basic issues regarding design and proceed through all of the major statistical techniques used in psychology, from introductory to advanced level. Readers are introduced to the rationale and use of each test and shown how to choose, perform, and report the statistical analysis of their own data.

SPSS for Psychologists
, 3/E covers SPSS versions 12 and 13, but is also appropriate for those using versions 9 - 11. The new edition highlights the differences between the versions and now includes coverage of reliability measures, partial correlations, and using statistics for scale constructions.

Comprehensive in coverage, the book reviews advanced statistical material such as ANCOVA, factor analysis, logistic regression, and discriminant analysis as well as issues related to research design, data entry, data handling, data manipulation and modification in SPSS; how to calculate basic statistical procedures using SPSS; tests of difference for two sample designs, tests of correlation, and tests for nominal and categorical data; and tests for experiments involving complex designs or for data obtained using surveys.

Each statistical test features a brief description, an example of typical or actual research that might be analyzed using the test, and step-by-step instructions on how to perform the test using SPSS. Numerous screenshots and detailed descriptions of the steps required to perform the test, are included. Annotated examples of SPSS output help the reader understand and report the results of theiranalyses. Information on how to insert output into a text document is also included. The data used in the examples is found in an appendix and on a book specific Web site.

Intended for use as a supplementary text in statistics/research methods courses in psychology and related social sciences, a basic knowledge of Windows is assumed.



Books about: Le Droit des affaires Fondamental pour Paralegals, 5E

Pattern-Oriented Software Architecture: A Pattern Language for Distributed Computing, Vol. 4

Author: Douglas C Schmidt

The eagerly awaited Pattern-Oriented Software Architecture (POSA) Volume 4 is about a pattern language for distributed computing.

The authors will guide you through the best practices and introduce you to key areas of building distributed software systems. POSA 4 connects many stand-alone patterns, pattern collections and pattern languages from the existing body of literature found in the POSA series. Such patterns relate to and are useful for distributed computing to a single language.



• The panel of experts provides you with a consistent and coherent holistic view on the craft of building distributed systems.

• Includes a foreword by Martin Fowler

• A must read for practitioners who want practical advice to develop a comprehensive language integrating patterns from key literature.



Monday, February 9, 2009

Photoshop Elements 2 for Dummies or Wi Fi Toys

Photoshop Elements 2 for Dummies

Author: Deke McClelland

As far as sequels go, Adobe Photoshop Elements 2.0 belongs in the ranks of The Godfather: Part II – a sequel that improves on the original. What made the first release of Elements so impressive wasn't that it was especially easy to use; it was how much of Photoshop's power you could get for such a low price. Elements 2.0, however, takes big steps forward in both power and ease.

Photoshop Elements 2.0 For Dummies explains this program from the ground up, assuming that you know absolutely nothing about the program or even about image editing in general. But step by step, concept by concept, tool by tool, you'll gradually work through a thorough examination of Photoshop Elements 2.0 and the incredible things it can do for your images.

While this book is organized in logical order, with the lofty idea that you'll read it cover to cover, the best thing about Photoshop Elements 2.0 For Dummies is that you don't have to. Feel free to skip around if you get restless. There are even 16 color pages stuck in the book to show you things that can't be explained in black and white. You'll gain insight into



• Getting to know the Photoshop tools and palettes

• Editing your images

• Saving your files in proper format

• Making a bad image better

• Painting and distorting your images



Just as one CD contains both the Windows and Mac versions of Elements, so this one took tells both Windows and Mac users everything they need to know to use Elements on their system of choice. And because Elements 2.0 runs on both Windows XP and Mac OS X, we've also updatedthe figures in this book to show off the spiffy look of these two new operating systems.

As an Elements user, you've got a whole lot of Photoshop power coiled up inside your computer, waiting for you to discover how to harness it. Photoshop Elements 2.0 For Dummies is your guide for doing just that.



Book review: Elementos necesarios de Finanzas de Bienes inmuebles

Wi-Fi Toys: 15 Cool Wireless Projects for Home, Office, and Entertainment (ExtremeTech Series)

Author: Mike Outmesguin



• This ultra-cool volume invites readers to tap into your inner geek and build seventeen ultra-cool wireless devices including a solar powered access point, a wireless picture frame that dynamically changes its own photos, and even a wireless car-to-car audio and video system

• With a few simple tools, some off-the-shelf parts, and this book, readers will be creating wireless devices they never thought were possible-toys that certainly can't be found at the local computer store

• Written by the cofounder and members of the Southern California Wireless Users Group, this book provides readers with hands-on instruction and insider tips and tricks from those who are on the bleeding edge of wireless technology

• New addition to the ExtremeTech line of books-books for serious technophiles



Table of Contents:
Prefacexxvii
Introductionxxix
Part IBuilding Antennas1
Chapter 1Building Your Own Wi-Fi Antenna Cable3
About Wi-Fi4
Parts of a Wi-Fi Project9
Understanding Coaxial Cables12
Building a Coaxial Cable16
Choosing a Wi-Fi Pigtail31
Cheap Cable Testing33
Summary33
Chapter 2Building a Classic Paperclip Antenna35
Recognizing Different Antennas35
Before You Start45
What You Need46
Choosing a Wireless Card47
Choosing Platform Materials48
Building the Paperclip Antenna48
Mounting and Testing Your Paperclip Antenna56
Hitting the Road with Your Paperclip Antenna57
Summary57
Chapter 3Building a Directional Tin Can Antenna59
Types of Can Antennas60
Finding the Right Can63
Preparing the Can64
Where to Drill65
Fitting the Radiating Element68
Final Construction and Weatherizing73
Extra: Antenna Simulation and Patterns76
Summary79
Chapter 4Modifying Your Access Point with a High-Gain Antenna81
Choosing an Antenna83
Staying Legal84
The Site Survey88
Attaching a High-Gain Antenna91
What About Signal Amplification?99
Summary100
Part IIWar Driving--Wireless Network Discovery and Visualization101
Chapter 5Gearing Up for War Driving103
Overview of the War Drive103
It All Starts with the Wireless Adapter106
Choosing the Right Software109
Using GPS on Your Laptop112
Picking the Right Antenna115
Powering Your Rig117
Installing the System in Your Car118
Your First War Drive!123
Summary124
Chapter 6War Driving with NetStumbler127
Installing NetStumbler128
Configuring NetStumbler133
Setting Up a GPS135
Navigating the NetStumbler Screens137
Working with NS1 Log Files139
Using War Driving Data143
Summary143
Chapter 7Mapping Your War Driving Results145
Mapping Overview146
Mapping Software146
The Global Positioning System150
Creating a Map151
Visualizing Extras161
Summary166
Part IIIPlaying with Access Points169
Chapter 8Build Your Own Outdoor Access Point171
Location, Location, Location172
Choosing the Parts175
Configuring Your Access Point182
Assembling the Box191
Taking It To The Next Level201
Summary205
Chapter 9Building a Solar-Powered Wireless Repeater207
Learning Solar Basics209
Setting Up a Wireless Repeater211
Integrating Solar Power213
Configuring Your Solar System216
Time to Go Outside227
Applying Power and Testing234
Summary235
Chapter 10Creating a Free Wireless Hotspot237
What Is NoCatAuth?240
Risk Management242
Pre-Install Setup244
Installing NoCat249
Configuring NoCat250
Testing and Using NoCat251
Troubleshooting NoCat258
Summary266
Chapter 11Playing Access Point Games267
The Basica of AP Gaming269
Crazy Like a Foxhunt271
Finding Mass Quantities of Access Points274
An Access Point Treasure Hunt277
Other AP Games280
Finding an Edge in Competition282
Summary283
Part IVJust for Fun285
Chapter 12Wi-Fi Your TiVo287
TiVo Models288
PC to TiVo to PC298
TiVo Hacks301
Summary302
Chapter 13Create a Long-Distance Wi-Fi Link303
Selecting a Site304
Design Considerations305
Determining the Fresnel Zone311
Budgeting Your Wireless Link314
Putting It All Together317
Testing and Troubleshooting319
Summary322
Chapter 14Deploy a Car-to-Car Wireless Video Link323
Introduction to Videoconferencing324
Step 1Choosing a Camera326
Step 2Configuring NetMeeting332
Step 3Setting Up a Wi-Fi Link337
Step 4Preparing the Cars340
Extra Credit: Multipoint Car Conference342
Summary344
Chapter 15Making a Dynamic Wireless Digital Picture Frame345
What is a Digital Picture Frame?346
Choosing a Digiframe Computer347
Preparing the Computer349
Hacking the Laptop354
Mounting the Picture Frame360
Shutting Down the Frame362
Updating Pictures363
Extra Credit: Motion Video363
Summary363
Index365