Sunday, February 22, 2009

Microsoft Outlook 2003 Bible or Sams Teach Yourself Apache in 24 Hours

Microsoft Outlook 2003 Bible

Author: Rob Tidrow

Packed with step-by-step instructions for using e-mail, scheduling times and tasks, keeping track of people and managing items and folders.
* Readers discover out to use Outlook to its full potential and allow them to work more efficiently.
* Coverage goes beyond the basics of mastering e-mail to include using Outlook as a Personal Information Manager, integrating it with other Office applications, and discovering advanced message development.
* The companion CD-ROM includes sample code from the book and valuable third-party tools to help integrate Outlook.



Table of Contents:
Preface
Acknowledgments
Pt. IGetting Started with Microsoft Outlook 20031
Ch. 1Outlook 2003 in a Nutshell3
Ch. 2Installing Outlook 200323
Ch. 3A Guided Tour of Outlook 200357
Ch. 4Configuring Outlook 200385
Pt. IIMastering E-mail113
Ch. 5E-mail Basics115
Ch. 6Message Options and Attachments131
Ch. 7Advanced E-mail Concepts159
Ch. 8Processing Messages Automatically173
Pt. IIIInformation Manager191
Ch. 9Managing Your Contacts193
Ch. 10Managing Your Calendar223
Ch. 11Scheduling Your Time249
Ch. 12Tracking Tasks265
Ch. 13Keeping Your Journal285
Ch. 14Taking Notes301
Ch. 15Organizing Information with Categories317
Ch. 16Using Outlook Newsreader333
Pt. IVGetting the Most Out of Outlook 2003355
Ch. 17Customizing Outlook 2003357
Ch. 18Using Folders Effectively385
Ch. 19Integrating with Other Applications407
Ch. 20Delegating Tasks to an Assistant427
Ch. 21Using Windows SharePoint Services439
Pt. VManaging Outlook Users463
Ch. 22Supporting Roaming Users465
Ch. 23Managing Security and Performance487
Ch. 24Controlling Outlook (and Office) with Group and System Policies501
Ch. 25Backing Up and Recovering User Data515
Ch. 26Managing Exchange Server for Outlook Users533
Pt. VIBasics of Microsoft Outlook 2003559
Ch. 27Outlook 2003 Application Types561
Ch. 28Creating a Simple Outlook Form579
Ch. 29Controls in Outlook Forms591
Ch. 30Utilizing Custom Fields609
Ch. 31Adding Functionality to Outlook Forms621
Pt. VIIAdvanced Messaging Development635
Ch. 32Working with Application Folders637
Ch. 33Collaborative Messaging Basics655
Ch. 34Using the Outlook 2003 Object Model665
Pt. VIIIAdvanced Outlook Administration675
Ch. 35Using Business Contact Manager677
Ch. 36Using Outlook Web Access703
Ch. 37Optimizing Outlook Installations723
App.: What's on the CD-ROM737
Index745
End-User License Agreement785

Read also 101 tecnica di soluzione dei problemi creativa: Il manuale di nuove idee per il commercio

Sams Teach Yourself Apache in 24 Hours

Author: Daniel Lopez

Sams Teach Yourself Apache in 24 Hours covers the installation, configuration, and ongoing administration of the Apache Web server, the most popular Internet Web server. It covers both the 1.3 and the new 2.0 versions of Apache.

Using a hands-on, task-oriented format, it concentrates on the most popular features and common quirks of the server.

The first part of the book helps the reader build, configure, and get started with Apache. After completing these chapters the reader will be able to start, stop, and monitor the Web server. He also will be able to serve both static content and dynamic content, customize the logs, and restrict access to certain parts of the Web server.

The second part of the book explains in detail the architecture of Apache and how to extend the server via third-party modules like PHP and Tomcat. It covers server performance and scalability, content management, and how to set up a secure server with SSL.



Saturday, February 21, 2009

Mathematics for 3D Game Programming and Computer Graphics Second Edition or Magic Lantern Guides

Mathematics for 3D Game Programming and Computer Graphics, Second Edition

Author: Eric Lengyel

About the Author
Eric Lengyel (Sunnyvale, CA), best-selling author of Mathematics for 3D Game Programming and Computer Graphics, and the OpenGL Extensions Guide, is the Chief Technology Officer for Terathon Software, a game engine development studio. He holds an M.S. in Mathematics from Virginia Tech and has written several articles for gamasutra.com and the Game Programming Gems series (Charles River Media).



New interesting textbook: Overcoming Problematic Alcohol and Drug Use or Self Awareness Deficits in Psychiatric Patients

Magic Lantern Guides: Sigma DP1

Author: Jason Schneider

- The founding editor-in-chief of Popular Photography magazine brings his authority on camera design and technology to this complete guide on the world’s first digital compact camera with an “SLR-sized” sensor.

- Packed with shooting advice and insider tips on making the most of this unique camera, this is a must for all DP1 users. *(Please note that this does not include wallet card.)



Friday, February 20, 2009

Digital Nature and Landscape Photography or Hacking Exposed VoIP

Digital Nature and Landscape Photography

Author: Mark Lucock

Landscape photography is one of the last bastions of traditional film, but this is slowly changing, as more and more leading photographers adopt digital technology. This beautifully produced and illustrated reference outlines simple techniques for assuring that your nature images achieve both technical and creative excellence. Covering everything from using a digital camera in the field to image-editing methods in the digital darkroom, it elaborates on the best methods for working with tripods and flashes outside, the implications of using different exposure meters in certain lighting conditions, and a whole host of tips dedicated to gaining a proper understanding of the craft. With breathtaking images featured throughout, this resource is sure to inspire every amateur photographer eager to go digital outdoors.
 

Daniel Lombardo - Library Journal

These two volumes use completely different methods for inspiring photographers of the natural world. The unique format of Developing Vision and Style contains a dialog among three admired British landscape photographers (Charlie Waite, David Ward, and Joe Cornish) moderated by editor Eddie Ephraums. The answers to his thought-provoking questions are illustrated with each photographer's work. The same questions are then presented to several amateur and professional photographers for their insights, again accompanied by examples of their work. The result is a stunning landscape photography tutorial full of a broad range of insights. Highly recommended for all collections.

Lucock's splendid volume covers the new technical possibilities of digital nature and landscape photography. The coverage encompasses advice on the digital workflow from hardware to software, understanding the rich, creative potential of the medium, the use of digital cameras in the field, and basic and advanced image-editing techniques. As a biologist, professional photographer, and experienced author, Lucock is uniquely qualified to have produced this highly recommended book.



Table of Contents:
Introduction     6
Early Considerations     20
Digital Nuts and Bolts     40
The Digital Darkroom     74
The Photographic Basics     100
Understanding Field Craft     116
Professionalizing Your Photography     152
Glossary     168
Useful websites     173
About the author     174
Index     175

See also: Apples or Recipes for the Loaf Pan

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Author: David Endler

Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way

"This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network Security

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.

  • Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware
  • Fortify Cisco, Avaya, and Asterisk systems
  • Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation
  • Thwart number harvesting, call pattern tracking, and conversation eavesdropping
  • Measure and maintain VoIP network quality of service and VoIP conversation quality
  • Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones
  • Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks
  • Avoid insertion/mixing of malicious audio
  • Learn about voice SPAM/SPIT andhow to prevent it
  • Defend against voice phishing and identity theft scams

David Endler is the Director of Security Research for TippingPoint, a division of 3Com. Previously, he performed security research for Xerox Corporation, the NSA, and MIT.  Endler is also the chairman and founder of the Voice over IP Security Alliance.

Mark Collier is CTO for SecureLogix Corporation.  He is an expert author and frequent presenter on the topic of VoIP security. Collier is also a founding member of the Voice over IP Security Alliance.



Thursday, February 19, 2009

Sams Teach Yourself COBOL in 24 Hours with CD ROM or Network Security Assessment

Sams Teach Yourself COBOL in 24 Hours with CD-ROM

Author: Thane Hubbell

Sams Teach Yourself COBOL in 24 Hours teaches the basics of COBOL programming in 24 step-by-step lessons. Each lesson builds on the previous one providing a solid foundation in COBOL programming concepts and techniques. Coupled with the source code and the compiler available from Fujitsu, this hands-on guide is the easiest, fastest way to begin creating standard COBOL compliant code. Business professionals and programmers from other languages will find this hands-on, task-oriented tutorial extremely useful for learning the essential features and concepts of COBOL programming. Writing a program can be a complex task. Concentrating on one development tool guides you to good results every time. There will be no programs that will not compile!



Table of Contents:
Introduction
Pt. ICOBOL Program Basics
Hour 1Getting Started
Hour 2Writing Your First Program in COBOL
Hour 3Different Data Types
Hour 4Basic User Interface
Hour 5Procedure Division
Hour 6Manipulating Data
Hour 7Manipulating String Data
Hour 8Conditional Statements
Hour 9The Evaluate Statement
Hour 10Processing Loops
Hour 11Advanced Perform Statements
Hour 12Tables
Pt. IIFile Handling
Hour 13Sequential Files
Hour 14Indexed Files
Hour 15Reading Indexed File Records
Hour 16Updating Indexed File Records
Hour 17Sorting
Pt. IIIBusiness Processing
Hour 18Master File Updating
Hour 19Reporting
Hour 20Advanced Reporting
Pt. IVMiscellaneous Functions
Hour 21Date Manipulation
Hour 22Other Intrinsic Functions
Pt. IVAdvanced Topics
Hour 23The Call Interface
Hour 24The Graphical User Interface
Index

Interesting textbook: Superplonk 2006 or Soups

Network Security Assessment

Author: Chris McNab

How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack. Network Security Assessment demonstrates how a determined attacker scours Internet-based networks in search of vulnerable components, from the network to the application level. This new edition is up-to-date on the latest hacking techniques, but rather than focus on individual issues, it looks at the bigger picture by grouping and analyzing threats at a high-level. By grouping threats in this way, you learn to create defensive strategies against entire attack categories, providing protection now and into the future. Network Security Assessment helps you assess: Web services, including Microsoft IIS, Apache, Tomcat, and subsystems such as OpenSSL, Microsoft FrontPage, and Outlook Web Access (OWA) Web application technologies, including ASP, JSP, PHP, middleware, and backend databases such as MySQL, Oracle, and Microsoft SQL Server Microsoft Windows networking components, including RPC, NetBIOS, and CIFS services SMTP, POP3, and IMAP email services IP services that provide secure inbound network access, including IPsec, Microsoft PPTP, and SSL VPNs Unix RPC services on Linux, Solaris, IRIX, and other platforms Various types of application-level vulnerabilities that hacker tools and scripts exploit Assessment is the firststepany organization should take to start managing information risks correctly. With techniques to identify and assess risks in line with CESG CHECK and NSA IAM government standards, Network Security Assessment gives you a precise method to do just that.

Slashdot.org

A good framework for anyone who is serious about running network security scans to security his perimeter and interior networks. ...If you are looking for a to-the-point book that does not get bogged down with screen prints and meaningless hacker stories and myths, Network Security Assessment is a good place to start.



Wednesday, February 18, 2009

Red Hat Fedora and Enterprise Linux 4 Bible or Retouching Photos in Photoshop Elements 3

Red Hat Fedora and Enterprise Linux 4 Bible

Author: Christopher Negus

For desktop or business, here's all the Linux you need

Whether you want the latest Linux software in Fedora or a stable Red Hat Enterprise Linux for your business, this book covers it all. Install Fedora Core 4 from the DVD or two CDs included and learn to use Linux as a desktop system or an Internet server. Check out fun applications for surfing the Web and doing office tasks. Learn to manage basic system administration, and move up to running your own Web, mail, print, or file server.

Configure Fedora or Red Hat Enterprise Linux to:



• Browse the Web with Firefox

• Read and send e-mail with Evolution

• Create documents, spreadsheets, or presentations with OpenOffice.org

• Set up networked Web, mail, file, database, LDAP, print, or other servers



Transition your Fedora skills to Enterprise Linux with:



• Descriptions of RHEL products, features, and services

• Pointers to professional RHEL training and certification



Install complete Fedora Core 4 from DVD

Using the bonus DVD, you can:



• Boot the DVD to check and prepare your computer before installing Fedora (using KNOPPIX)

• Install the complete Fedora Core 4 Linux operating system (all source code packages included)



Install desktop Fedora Core 4 from CD

Using the bonus 2-CD set, you can:



• Select the software you need for a well-stocked desktop system

• Add key server features to use with your desktop Fedora system



Open formore!



• Find ten cool things you can do with Fedora

• Use KNOPPIX to test and prepare your computer

• Get your Windows stuff working in Linux



wiley.com/go/fedora4bible



Table of Contents:
Ch. 1An overview of Fedora and Red Hat Enterprise Linux3
Ch. 2Installing Fedora23
Ch. 3Getting started with the Desktop87
Ch. 4Using Linux commands139
Ch. 5Accessing and running applications181
Ch. 6Publishing with Fedora and RHEL233
Ch. 7Gaming in Fedora and RHEL269
Ch. 8Music, video, and images in Linux293
Ch. 9Using the Internet and the Web343
Ch. 10Understanding system administration399
Ch. 11Setting up and supporting users445
Ch. 12Automating system tasks
Ch. 13Backing up and restoring files513
Ch. 14Computer security issues547
Ch. 15Setting up a local area network605
Ch. 16Connecting to the Internet649
Ch. 17Setting up a print server691
Ch. 18Setting up a file server715
Ch. 19Setting up a mail server755
Ch. 20Setting up an FTP server785
Ch. 21Setting up a Web server795
Ch. 22Setting up an LDAP address book server847
Ch. 23Setting up boot servers : DHCP and NIS863
Ch. 24Setting up a MySQL database server885
Ch. 25Making servers public with DNS917
Ch. 26Using Linux servers from a Mac943
Ch. 27Adapting the Linux 2.6 kernel969
Ch. 28Implementing security enhanced Linux977

See also: Individual Differences and Behavior in Organizations or Entrepreneurship in Micro Enterprises

Retouching Photos in Photoshop Elements 3: Visual QuickProject Guide

Author: Peachpit Press Staff

While Photoshop offers a host of professional-level image editing and color features, sometimes all users want to do is correct an image's lighting, fix a little red eye, or even out the tones in a photograph--they don't want (or need) to know the rest of Photoshop's bells and whistles. This book is for anyone who simply wants to get from start to finish fast, and doesn't need to know every single Photoshop feature, but just the ones they'll use to accomplish their goals. This slim, four-color volume, one of Peachpit's brand-new Visual QuickProject guides, gives readers the quickest route to a polished, improved photo. To do this, it focuses on a single photo that readers correct as they go. Each short chapter uses large, four-color screen shots and step-by-step instructions to lead readers through each component of the process. By the end of this book, they'll have adjusted the photo's lighting, corrected skin tones, swapped in a new background, and saved the final product to the file format of their choice. Occasional sidebars and tips point out useful Photoshop retouching tricks.



Monday, February 16, 2009

Macromedia Flash or Closer

Macromedia Flash

Author: Mighty Assembly

The award-winning designers of Mighty Assembly present advanced Flash concepts and techniques in this richly-illustrated,full-color book. Inside,Mighty Assembly deconstructs their own site,from initial inception through implementation,offering in-depth insight along the way.

Execute your most creative concepts using Flash Get a developer's view of what it takes to conceive and produce an award-winning Flash Web site. This detailed case study deconstructs the site mightyassembly.com,offering readers a rare opportunity to observe and analyze how concepts are executed by pushing the limits of Flash. Learn how the developers and designers at Mighty Assembly merged original ideas and inspired designs with solid engineering principles using readily accessible Flash processes and techniques. This beautifully designed and informative book thoroughly and clearly examines the development and use of Flash graphics,sound,video,code-controlled motion,and linear animation. In the spirit of furthering the understanding and proliferation of Flash,Mighty Assembly's proprietary code is available free in downloadable form.

"This is a great resource for anyone interested in the in-depth processes and methods involved in creating an immersive online Flash experience. " —Matt Owens,volumeone.com

"Illuminates the value in the little paths a team explores during the process of refining every thought,pixel or line of code. " —Joshua Davis,praystation.com

"Provides an insider's look at how a Web site is made. Detailed accounts of how a concept is developed and individual parts are crafted demystify the work of a digital designer. " —Yoshi Sodeoka,C404

praystation.com - Joshua Davis

Illuminates the value in the little paths a team explores during the process of refining every thought, pixel or line of code.

volumeone.com - Matt Owens

This is a great resource for anyone interested in the in-depth processes and methods involved in creating an immersive online Flash experience.

Yoshi Sodeoka

Provides an insider's look at how a Web site is made. Detailed accounts of how a concept is developed and individual parts are crafted demystify the work of a digital designer.



New interesting textbook: Mindbody Cancer Wellness or HIV and Drug Free

Closer: Performance, Technologies, Phenomenology

Author: Susan Kozel

In Closer, Susan Kozel draws on live performance practice, digital technologies, and the philosophical approach of phenomenology. Trained in dance and philosophy, Kozel places the human body at the center of explorations of interactive interfaces, responsive systems, and affective computing, asking what can be discovered as we become closer to our computers--as they become extensions of our ways of thinking, moving, and touching.

Performance, Kozel argues, can act as a catalyst for understanding wider social and cultural uses of digital technology. Taking this one step further, performative acts of sharing the body through our digital devices foster a collaborative construction of new physical states, levels of conscious awareness, and even ethics. We reencounter ourselves and others through our interactive computer systems. What we need now are conceptual and methodological frameworks to reflect this.

Kozel offers a timely reworking of the phenomenology of French philosopher Maurice Merleau-Ponty. This method, based on a respect for lived experience, begins by listening to the senses and noting insights that arrive in the midst of dance, or quite simply in the midst of life. The combination of performance and phenomenology offered by Closer yields entwinements between experience and reflection that shed light on, problematize, or restructure scholarly approaches to human bodies using digital technologies.

After outlining her approach and methodology and clarifying the key concepts of performance, technologies, and virtuality, Kozel applies phenomenological method to the experience of designing and performing in a range of computationalsystems: telematics, motion capture, responsive architectures, and wearable computing.

The transformative potential of the alchemy between bodies and technologies is the foundation of Closer. With careful design, future generations of responsive systems and mobile devices can expand our social, physical, and emotional exchanges.



Sunday, February 15, 2009

Exploring Getting Started with Computing Concepts or Managing Information Security Risks

Exploring Getting Started with Computing Concepts

Author: Robert T Grauer

The Exploring series helps students master the How and Why of performing tasks in Office to gain a greater understanding of how to use the individual applications together to solve business problems. Exploring titles feature Perfect pages where every step of every hands-on exercise as well as every end-of-chapter problem begins on a new page and has its own screen shot to make it easier to follow. Each chapter contains Hands-on Exercises, Capstone Exercises, and Mini-Cases for practicing and reviewing skills acquired. 

Ideal for students and individuals seeking a comprehensive introduction to computer concepts for Microsoft Office 2007.



See also: The Leaders We Need or Presidential Humor

Managing Information Security Risks: The OCTAVE Approach

Author: Christopher J Alberts

Information security requires far more than the latest tool or technology. Organizations must understand exactly what they are trying to protect--and why--before selecting specific solutions. Security issues are complex and often are rooted in organizational and business concerns. A careful evaluation of security needs and risks in this broader context must precede any security implementation to insure that all the relevant, underlying problems are first uncovered.

The OCTAVE approach for self-directed security evaluations was developed at the influential CERT(R) Coordination Center. This approach is designed to help you:


  • Identify and rank key information assets
  • Weigh threats to those assets
  • Analyze vulnerabilities involving both technology and practices

OCTAVE(SM) enables any organization to develop security priorities based on the organization's particular business concerns. The approach provides a coherent framework for aligning security actions with overall objectives.

Managing Information Security Risks, written by the developers of OCTAVE, is the complete and authoritative guide to its principles and implementations. The book:

  • Provides a systematic way to evaluate and manage information security risks
  • Illustrates the implementation of self-directed evaluations
  • Shows how to tailor evaluation methods to different types of organizations

Special features of the book include:

  • A running example to illustrate important concepts and techniques
  • A convenient set of evaluation worksheets
  • A catalog of best practices to which organizations can comparetheir own



0321118863B05172002

Booknews

Written for people who manage information security risks for their organizations, this book details a security risk evaluation approach called "OCTAVE." The book provides a framework for systematically evaluating and managing security risks, illustrates the implementation of self-directed evaluations, and shows how to tailor evaluation methods to the needs of specific organizations. A running example illustrates key concepts and techniques. Evaluation worksheets and a catalog of best practices are included. The authors are on the technical staff of the Software Engineering Institute. Annotation c. Book News, Inc., Portland, OR



Table of Contents:
List of Figures
List of Tables
Preface
Acknowledgments
Pt. IIntroduction1
Ch. 1Managing Information Security Risks3
Ch. 2Principles and Attributes of Information Security Risk Evaluations17
Pt. IIThe OCTAVE Method41
Ch. 3Introduction to the OCTAVE Method43
Ch. 4Preparing for OCTAVE59
Ch. 5Identifying Organizational Knowledge (Processes 1 to 3)81
Ch. 6Creating Threat Profiles (Process 4)109
Ch. 7Identifying Key Components (Process 5)137
Ch. 8Evaluating Selected Components (Process 6)157
Ch. 9Conducting the Risk Analysis (Process 7)169
Ch. 10Developing a Protection Strategy - Workshop A (Process 8A)191
Ch. 11Developing a Protection Strategy - Workshop B (Process 8B)227
Pt. IIIVariations on the OCTAVE Approach239
Ch. 12An Introduction to Tailoring OCTAVE241
Ch. 13Practical Applications255
Ch. 14Information Security Risk Management275
Glossary293
Bibliography301
App. ACase Scenario for the OCTAVE Method311
App. B: Worksheets363
App. C: Catalog of Practices443
About the Authors457
Index461

Thursday, February 12, 2009

The Sims 2 or Information Security Governance

The Sims 2: Nightlife: Prima Official Game Guide

Author: Greg Kramer

Make it a night to remember
*Complete catalog of over 125 new Objects and Items
*Details on the new Pleasure and Aspiration
*Create the ultimate social butterfly with details on fun group outings night after night
*Send your Sims to the fanciest restaurant and the dingiest dives in the new downtown neighborhood
*Build the downtown of your dreams
*Become a true creature of the night--live the life of a vampire or a partier
*Be a winner at the dating game with tips for supercharging romantic pursuits



Book review: Introduction à l'Économétrie

Information Security Governance: Design, Implementation, Measurement & Compliance

Author: Timothy P Layton

Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs. Fortunately, Information Security: Design, Implementation, Measurement, and Compliance outlines a complete roadmap to successful adaptation and implementation of a security program based on the ISO/IEC 17799:2005 (27002) Code of Practice for Information Security Management. The book first describes a risk assessment model, a detailed risk assessment methodology, and an information security evaluation process. Upon this foundation, the author presents a proposed security baseline for all organizations, an executive summary of the ISO/IEC 17799 standard, and a gap analysis exposing the differences between the recently rescinded version and the newly released version of the standard. Finally, he devotes individual chapters to each of the 11 control areas defined in the standard, covering systematically the 133 controls within the 39 control objectives. Tim Layton's Information Security is a practical tool to help you understand the ISO/IEC 17799 standard and apply its principles within your organization's unique context.



Table of Contents:
Ch. 1Information security risk assessment model (ISRAM)3
Ch. 2Global information security assessment methodology (GISAM)17
Ch. 3Developing an information security evaluation (ISE) process49
Ch. 4A security baseline55
Ch. 5Background of the ISO/IEC 17799 standard71
Ch. 6ISO/IEC 17799:2005 gap analysis77
Ch. 7Security policy117
Ch. 8Organization of information security125
Ch. 9Asset management133
Ch. 10Human resources security139
Ch. 11Physical and environmental security147
Ch. 12Communications and operations management155
Ch. 13Access control173
Ch. 14Information systems acquisition, development, and maintenance185
Ch. 15Information security incident management195
Ch. 16Business continuity management199
Ch. 17Compliance203
App. AISO standards cited in ISO/IEC 17799:2005209

Wednesday, February 11, 2009

SPSS for Psychologists or Pattern Oriented Software Architecture

SPSS for Psychologists: A Guide to Data Analysis Using SPSS for Windows, Versions 12 And 13

Author: Nicola Brac

The new edition of this best-selling guide carefully leads the user through the process of using SPSS to analyze psychological data. The authors review the basic issues regarding design and proceed through all of the major statistical techniques used in psychology, from introductory to advanced level. Readers are introduced to the rationale and use of each test and shown how to choose, perform, and report the statistical analysis of their own data.

SPSS for Psychologists
, 3/E covers SPSS versions 12 and 13, but is also appropriate for those using versions 9 - 11. The new edition highlights the differences between the versions and now includes coverage of reliability measures, partial correlations, and using statistics for scale constructions.

Comprehensive in coverage, the book reviews advanced statistical material such as ANCOVA, factor analysis, logistic regression, and discriminant analysis as well as issues related to research design, data entry, data handling, data manipulation and modification in SPSS; how to calculate basic statistical procedures using SPSS; tests of difference for two sample designs, tests of correlation, and tests for nominal and categorical data; and tests for experiments involving complex designs or for data obtained using surveys.

Each statistical test features a brief description, an example of typical or actual research that might be analyzed using the test, and step-by-step instructions on how to perform the test using SPSS. Numerous screenshots and detailed descriptions of the steps required to perform the test, are included. Annotated examples of SPSS output help the reader understand and report the results of theiranalyses. Information on how to insert output into a text document is also included. The data used in the examples is found in an appendix and on a book specific Web site.

Intended for use as a supplementary text in statistics/research methods courses in psychology and related social sciences, a basic knowledge of Windows is assumed.



Books about: Le Droit des affaires Fondamental pour Paralegals, 5E

Pattern-Oriented Software Architecture: A Pattern Language for Distributed Computing, Vol. 4

Author: Douglas C Schmidt

The eagerly awaited Pattern-Oriented Software Architecture (POSA) Volume 4 is about a pattern language for distributed computing.

The authors will guide you through the best practices and introduce you to key areas of building distributed software systems. POSA 4 connects many stand-alone patterns, pattern collections and pattern languages from the existing body of literature found in the POSA series. Such patterns relate to and are useful for distributed computing to a single language.



• The panel of experts provides you with a consistent and coherent holistic view on the craft of building distributed systems.

• Includes a foreword by Martin Fowler

• A must read for practitioners who want practical advice to develop a comprehensive language integrating patterns from key literature.



Monday, February 9, 2009

Photoshop Elements 2 for Dummies or Wi Fi Toys

Photoshop Elements 2 for Dummies

Author: Deke McClelland

As far as sequels go, Adobe Photoshop Elements 2.0 belongs in the ranks of The Godfather: Part II – a sequel that improves on the original. What made the first release of Elements so impressive wasn't that it was especially easy to use; it was how much of Photoshop's power you could get for such a low price. Elements 2.0, however, takes big steps forward in both power and ease.

Photoshop Elements 2.0 For Dummies explains this program from the ground up, assuming that you know absolutely nothing about the program or even about image editing in general. But step by step, concept by concept, tool by tool, you'll gradually work through a thorough examination of Photoshop Elements 2.0 and the incredible things it can do for your images.

While this book is organized in logical order, with the lofty idea that you'll read it cover to cover, the best thing about Photoshop Elements 2.0 For Dummies is that you don't have to. Feel free to skip around if you get restless. There are even 16 color pages stuck in the book to show you things that can't be explained in black and white. You'll gain insight into



• Getting to know the Photoshop tools and palettes

• Editing your images

• Saving your files in proper format

• Making a bad image better

• Painting and distorting your images



Just as one CD contains both the Windows and Mac versions of Elements, so this one took tells both Windows and Mac users everything they need to know to use Elements on their system of choice. And because Elements 2.0 runs on both Windows XP and Mac OS X, we've also updatedthe figures in this book to show off the spiffy look of these two new operating systems.

As an Elements user, you've got a whole lot of Photoshop power coiled up inside your computer, waiting for you to discover how to harness it. Photoshop Elements 2.0 For Dummies is your guide for doing just that.



Book review: Elementos necesarios de Finanzas de Bienes inmuebles

Wi-Fi Toys: 15 Cool Wireless Projects for Home, Office, and Entertainment (ExtremeTech Series)

Author: Mike Outmesguin



• This ultra-cool volume invites readers to tap into your inner geek and build seventeen ultra-cool wireless devices including a solar powered access point, a wireless picture frame that dynamically changes its own photos, and even a wireless car-to-car audio and video system

• With a few simple tools, some off-the-shelf parts, and this book, readers will be creating wireless devices they never thought were possible-toys that certainly can't be found at the local computer store

• Written by the cofounder and members of the Southern California Wireless Users Group, this book provides readers with hands-on instruction and insider tips and tricks from those who are on the bleeding edge of wireless technology

• New addition to the ExtremeTech line of books-books for serious technophiles



Table of Contents:
Prefacexxvii
Introductionxxix
Part IBuilding Antennas1
Chapter 1Building Your Own Wi-Fi Antenna Cable3
About Wi-Fi4
Parts of a Wi-Fi Project9
Understanding Coaxial Cables12
Building a Coaxial Cable16
Choosing a Wi-Fi Pigtail31
Cheap Cable Testing33
Summary33
Chapter 2Building a Classic Paperclip Antenna35
Recognizing Different Antennas35
Before You Start45
What You Need46
Choosing a Wireless Card47
Choosing Platform Materials48
Building the Paperclip Antenna48
Mounting and Testing Your Paperclip Antenna56
Hitting the Road with Your Paperclip Antenna57
Summary57
Chapter 3Building a Directional Tin Can Antenna59
Types of Can Antennas60
Finding the Right Can63
Preparing the Can64
Where to Drill65
Fitting the Radiating Element68
Final Construction and Weatherizing73
Extra: Antenna Simulation and Patterns76
Summary79
Chapter 4Modifying Your Access Point with a High-Gain Antenna81
Choosing an Antenna83
Staying Legal84
The Site Survey88
Attaching a High-Gain Antenna91
What About Signal Amplification?99
Summary100
Part IIWar Driving--Wireless Network Discovery and Visualization101
Chapter 5Gearing Up for War Driving103
Overview of the War Drive103
It All Starts with the Wireless Adapter106
Choosing the Right Software109
Using GPS on Your Laptop112
Picking the Right Antenna115
Powering Your Rig117
Installing the System in Your Car118
Your First War Drive!123
Summary124
Chapter 6War Driving with NetStumbler127
Installing NetStumbler128
Configuring NetStumbler133
Setting Up a GPS135
Navigating the NetStumbler Screens137
Working with NS1 Log Files139
Using War Driving Data143
Summary143
Chapter 7Mapping Your War Driving Results145
Mapping Overview146
Mapping Software146
The Global Positioning System150
Creating a Map151
Visualizing Extras161
Summary166
Part IIIPlaying with Access Points169
Chapter 8Build Your Own Outdoor Access Point171
Location, Location, Location172
Choosing the Parts175
Configuring Your Access Point182
Assembling the Box191
Taking It To The Next Level201
Summary205
Chapter 9Building a Solar-Powered Wireless Repeater207
Learning Solar Basics209
Setting Up a Wireless Repeater211
Integrating Solar Power213
Configuring Your Solar System216
Time to Go Outside227
Applying Power and Testing234
Summary235
Chapter 10Creating a Free Wireless Hotspot237
What Is NoCatAuth?240
Risk Management242
Pre-Install Setup244
Installing NoCat249
Configuring NoCat250
Testing and Using NoCat251
Troubleshooting NoCat258
Summary266
Chapter 11Playing Access Point Games267
The Basica of AP Gaming269
Crazy Like a Foxhunt271
Finding Mass Quantities of Access Points274
An Access Point Treasure Hunt277
Other AP Games280
Finding an Edge in Competition282
Summary283
Part IVJust for Fun285
Chapter 12Wi-Fi Your TiVo287
TiVo Models288
PC to TiVo to PC298
TiVo Hacks301
Summary302
Chapter 13Create a Long-Distance Wi-Fi Link303
Selecting a Site304
Design Considerations305
Determining the Fresnel Zone311
Budgeting Your Wireless Link314
Putting It All Together317
Testing and Troubleshooting319
Summary322
Chapter 14Deploy a Car-to-Car Wireless Video Link323
Introduction to Videoconferencing324
Step 1Choosing a Camera326
Step 2Configuring NetMeeting332
Step 3Setting Up a Wi-Fi Link337
Step 4Preparing the Cars340
Extra Credit: Multipoint Car Conference342
Summary344
Chapter 15Making a Dynamic Wireless Digital Picture Frame345
What is a Digital Picture Frame?346
Choosing a Digiframe Computer347
Preparing the Computer349
Hacking the Laptop354
Mounting the Picture Frame360
Shutting Down the Frame362
Updating Pictures363
Extra Credit: Motion Video363
Summary363
Index365

Sunday, February 8, 2009

E Writing or Upgrading and Repairing Networks Fifth Edition

E-Writing: 21st-Century Tools for Effective Communication

Author: Dianna Booher

Are you guilty of email "trigger finger"? Do you constantly "cc" people you never even see? What are today's rules for conducting business over the Internet? Now, The Elements of Style meets "the Miss Manners of memos" in the ultimate writing guide for the digital age.

In an era when written communication in the workplace is more crucial than ever, at a time when many professionals all but completely eschew face-to-face dealings, E-Writing is poised to become the new bible of business writing. Accessible and inviting, this Web-savvy "How-to" book promises to transform anxious email hacks and mediocre memo writers into eloquent electronic scribes in no time at all.

Inside, you will learn how to:

  • combat counter-productive email habits
  • write authoritatively and persuasively, with a clear message that generates quick action
  • handle email and letter correspondence efficiently and effectively
  • select an appropriate style for the audience you're addressing
  • heighten your professional image, self-confidence, and career prospects

Practicing what she preaches, award-winning communicator and bestselling author Dianna Booher writes in a refreshingly straightforward style and has organized E-Writing to make on-the-spot referencing a snap. Keep it handy; refer to it often—and your online mailbox will never be the same again.

Working Woman

Dianna Booher incorporat[es] commonsense advice on office politics and tact.



Table of Contents:
Introduction: Writing Electronically.....1

Part 1: E-Mail Exchange.....9
1: Select the Right Medium to Communicate.....11
2: Follow the Rules of E-Mail Etiquette to Create the Proper Image.....15
3: Compose Clear, to-the-Point Messages.....23
4: Aim to Get Attention for Your Own E-Mail.....29
5: Manage High-Volume E-Mail Effectively.....33
6: Become Savvy About E-Mail Mechanics.....40
7: Make Sure You're Legal.....43

Part 2: The E-Writing Culture.....47
8: Counterproductive Communication Habits.....49

Part 3: Writing On Paper Or Online.....67
9: Step 1: Consider Your Audience for the Proper Approach.....71
10: Step 2: Anticipate Special Reader Reactions.....77
11: Step 3: Outline Your Message Functionally.....80
12: Step 4: Develop the First Draft Quickly.....126

Part 4: Step 5: Edit Content and Layout, Grammer, Clarity, Conciseness, and Style.....133
13: Edit for Content and Layout.....138
14: Edit for Grammar.....166
15: Edit for Clarity.....230
16: Edit for Conciseness.....259
17: Edit for Style.....273

Part 5: Let's Get Technical.....287
18: Guidelines for Document Variations on the
  • Transmittals.....291
  • Requests for Voluntary Action.....294
  • Negative Responses.....297
  • Complaints.....299
  • Apologies.....302
  • Accomplishment or Status Reports.....306

    19: Meeting Minutes.....312
    20: Service and Inspection Reports.....318
    21: Procedures.....320
    22: Formal Technical Reports.....325
    23: Proposals.....342
    24: Websites.....354
    A Final Note to the Reader.....359
    Bibliography.....361
    Appendix A: Grammar Glossary.....363
    Appendix B: Answers to Spelling Awareness Exercise.....369
    Acknowledgments.....371
    Other Resources By Dianna Booher Available from
    Booher Consultants.....373
    For More Information.....375
    Index.....377
  • Book review: Podcast Solutions or SQL Server 2005 T SQL Recipes

    Upgrading and Repairing Networks, Fifth Edition

    Author: Scott Mueller

    Upgrading and Repairing Networks, Fifth Edition  is the definitive guide for anyone with a network, from home networking enthusiasts to professional network administrators. The book explains network architectures and protocols using plain English and real-world examples, and gives valuable insight for fixing network problems. This updated edition includes the latest on network planning and design, and building a network using wired, wireless, or both technologies. It covers the latest updates in Windows XP Service Pack 2, as well as Gigabit Ethernet, virtual LANs, Bluetooth, WAP, security, firewalls, and VPN use.



    Saturday, February 7, 2009

    Beginning SQL Server 2005 Administration or SharePoint Users Guide

    Beginning SQL Server 2005 Administration

    Author: Chris Leiter

    For the first time, SQL Server 2005 provides features that can support large-scale enterprise databases. With this powerful new release, you may find yourself being called upon to perform duties that are no longer strictly "administrative," duties that have become much more complicated and difficult. With that in mind, a team of experienced Microsoft Certified Professionals provides you with the necessary information to be a more competent and successful database developer or administrator.

    Beginning with a foundation that features detailed coverage of typical administrative duties, the authors proceed to explain how to build complex data transformations for data import, build distributed data solutions, and maintain the security and integrity of the database. You will be able to apply what you learn to real-world scenarios, and smoothly navigate the vastly changed landscape of SQL Server 2005 administration.

    What you will learn from this book



    • How to install, maintain, and manage an SQL Server 2005 installation, including high availability and security considerations

    • Various features such as the Common Language Runtime, SQL Server Integration Services, Notification Service, and the Service Broker

    • How to use the tools that are necessary to manage configuration, backups, restores, security, availability, performance, and monitoring

    • A sampling of some of the more advanced areas and complex jobs of the broadening role of a database administrator in the enterprise



    Who this book is for

    This book is for both developers and administrators who are responsible forthe management and maintenance of an SQL Server 2005 database. Familiarity with relational database concepts and SQL is assumed.

    Wrox Beginning guides are crafted to make learning programming languages and technologies easier than you think, providing a structured, tutorial format that will guide you through all the techniques involved.

    Enhance Your Knowledge Advance Your Career



    Look this: International Business or Business Cycle Theory

    SharePoint User's Guide: Infusion Development Corporation

    Author: Infusion Development Corporation

    There's nothing like teamwork for making progress on aproject, but sharing information and building on eachother's successes can be challenging when your team isscattered across the miles. Microsoft's SharePoint helpsteams and organizations close the distance. With SharePoint,groups construct web sites specifically forcollaboration—sites where individuals can capture and shareideas, and work together on documents, tasks, contacts, andevents. It's the next best thing to being in the roomtogether.

    Unfortunately, much of the documentation for SharePoint iswritten to help system administrators get it up and running,which often leaves end users in the dark. The SharePointUser's Guide takes another approach: this quick and easyguide shows you what you need to know to start usingSharePoint effectively and how to get the most from it. You'll learn how to create sites that your organization canuse to work together or independently, from an end user'spoint of view. Now, even beginners can learn how to:access sites that are already set upcreate new sitespersonalize sitesuse the document and picture libraries for adding andediting contentadd discussion boards and surveys to a siteenhance securityYou'll learn how you can receive alerts to tell you whenexisting documents and information have been changed, orwhen new information or documents have been added. You caneven share select information with partners or customersoutside your organization. No one that uses SharePointcollaboration services can afford to be without this handybook.

    The SharePoint User's Guide is designed to help you findanswers quickly, explaining key concepts and major points instraightforward language. WithSharePoint, any team ororganization can overcome geographic or time-zonechallenges, and the SharePoint User's Guide will show themhow.



    Table of Contents:
    1Working with sites and workspaces1
    2Basic Web parts26
    3Extending site pages63
    4Securing SharePoint sites77
    5Integrating with Office 200388
    6Setting up Windows SharePoint Services107

    Friday, February 6, 2009

    Color Index or Sams Teach Yourself WPF in 24 Hours

    Color Index: Over 1,100 Color Combinations, CMYK and RGB Formulas, for Print and Web Media

    Author: Kraus

    Let Color Index turbo-charge your creativity! With over 1100 color combinations and formulas, it's guaranteed to help you solve design dilemmas and create more effective graphics for both print and the Web. From progressive colors to natural tones, Color Index makes choosing hues for any job easy! You'll start working with color in exciting new ways to create original, eye-catching designs that pop off the page. So go ahead. Explore and experiment with color. Now you've got everything you need, right in the palm of your hand.



    Read also Brand Management Stratégique

    Sams Teach Yourself WPF in 24 Hours (Sams Teach Yourself -- Hours Series)

    Author: Rob Eisenberg

    Printed entirely in color, with helpful figures and syntax coloring to make code samples appear as they do in Visual Studio.
     
    In just 24 sessions of one hour or less, you will be able to begin effectively using WPF to solve real-world problems, developing rich user interfaces in less time than you thought possible.
     
    Using a straightforward, step-by-step approach, each lesson builds on a real-world foundation forged in both technology and business matters, allowing you to learn the essentials of WPF from the ground up.
     
    Step-by-step instructions carefully walk you through the most common questions, issues, and tasks.
    The Q&A sections, quizzes, and exercises help you build and test your knowledge.
    By the Way notes present interesting pieces of information.
    Did You Know? tips offer advice or teach an easier way to do something.
    Watch Out! cautions advise you about potential problems and help you steer clear of disaster.
     
    Learn how to...

    • Use XAML to build user interfaces
    • Leverage data binding to minimize tedious code
    • Create visually engaging applications
    • Architect and design WPF applications using proven patterns such as MVP
    • Incorporate audio and video into your applications
    • Customize controls with styles, templates, and animation
    • Apply best practices for developing software with WPF
    • Deploy WPF applications to the desktop and Web
    • Take advantage of WPF’s advanced printing capabilities
    • Grow as a developer by improving your overall software designskills

     
    Introduction 1
    Part I                   Getting Started
    1      What WPF Is and Isn’t 5
    2      Understanding XAML 17
    3      Introducing the Font Viewer 27
    4      Handling Application Layout 41
    5      Using Basic Controls 59
    6      Introducing Data Binding 75
    Part II        Reaching the User
    7      Designing an Application 93
    8      Building a Text Document Editor 107
    9      Getting a Handle on Events 121
    10    Commands 145
    11    Output 157
    Part III      Visualizing Data
    12    Building a Contact Manager 177
    13    Presenters and Views 193
    14    Resources and Styles 211
    15    Digging Deeper into Data Binding 229
    16    Visualizing Lists 251
    Part IV       Creating Rich Experiences
    17    Building a Media Viewer 267
    18    Drawing with Shapes 291
    19    Colors and Brushes 315
    20    Transforms and Effects 331
    21    Using Control Templates 347
    22    Triggers 369
    23    Animation 383
    24    Best Practices 407
    Part V         Appendixes
    Appendix A: Tools and Resources 423
    Appendix B: 3D Tutorial Using ZAM 3D 427
    Appendix C: Project Source (downloadable) 437
    Index 439



    Table of Contents:

    Introduction 1

    Pt. I Getting Started

    Hour: 1 What WPF Is and Isn't 5

    Hour 2 Understanding XAML 17

    Hour 3 Introducing the Font Viewer 27

    Hour 4 Handling Application Layout 41

    Hour 5 Using Basic Controls 59

    Hour 6 Introducing Data Binding 75

    Pt. II Reaching the User

    Hour 7 Designing an Application 93

    Hour 8 Building a Text Document Editor 107

    Hour 9 Getting a Handle on Events 121

    Hour 10 Commands 145

    Hour 11 Output 157

    Pt. III Visualizing Data

    Hour 12 Building a Contact Manager 177

    Hour 13 Presenters and Views 193

    Hour 14 Resources and Styles 211

    Hour 15 Digging Deeper into Data Binding 229

    Hour 16 Visualizing Lists 251

    Pt. IV Creating Rich Experiences

    Hour 17 Building a Media Viewer 267

    Hour 18 Drawing with Shapes 291

    Hour 19 Colors and Brushes 315

    Hour 20 Transforms and Effects 331

    Hour 21 Using Control Templates 347

    Hour 22 Triggers 369

    Hour 23 Animation 383

    Hour 24 Best Practices 407

    Pt. V Appendixes

    A Tools and Resources 423

    B 3D Tutorial Using ZAM 3D 427

    C Project Source (downloadable) 437

    Index 439

    Thursday, February 5, 2009

    In Search of Stupidity or GCC Book

    In Search of Stupidity: Over 20 Years of High-Tech Marketing Disasters

    Author: Merrill R Chapman

    In Search of Stupidity: Over Twenty Years of High-Tech Marketing Disasters, Second Edition is National Lampoon meets Peter Drucker. It's a funny and well-written business book that takes a look at some of the most influential marketing and business philosophies of the last twenty years. Through the dark glass of hindsight, it provides an educational and entertaining look at why these philosophies didn't work for many of the country's largest and best-known high-tech companies.

    Marketing wizard Richard Chapman takes you on a hilarious ride in this book, which is richly illustrated with cartoons and reproductions of many of the actual campaigns used at the time. Filled with personal anecdotes spanning Chapman's remarkable career (he was present at many now-famous meetings and events), In Search of Stupidity, Second Edition examines the best of the worst marketing ideas and business decisions in the last twenty years of the technology industry.

    The second edition includes new chapters on Google and on how to avoid stupidity, plus the extensive analyses of all chapters from the first edition. You'll want to get a copy because it

    • Features an interesting preface and interview with Joel Spolsky of "Joel on Software"
    • Offers practical advice on avoiding PR disaster
    • Features actual pictures of some of the worst PR and marketing material ever created
    • Is highly readable and funny
    • Includes theme-based cartoons for every chapter

    Slashdot.org
    An excellent source of information, analysis and good laughs. It's one of the few industry titles that will give you a large supply of stories to re-tell to other developers over a beer. Chapman's book is also an excellent case study collection of anti-management rules that one should avoid when running a high tech company.



    Book about: Politica sporca: Inganno, distrazione e democrazia

    GCC Book

    Author: Kurt Wall

    The Definitive Guide to GCC is a comprehensive tutorial and guide to using the newest version of GCC, the GNU Compiler Collection. GCC is quite simply the most used and most powerful tool for programmers on the planet. GCC has long been available for most major hardware and operating system platforms and is often the preferred compiler for those platforms. As a general-purpose compiler, GCC produces higher quality, faster performing executable code with fewer bugs than equivalent offerings supplied by hardware and software vendors. GCC, along with GNU Emacs, the Linux operating system, the Apache web server, the Sendmail mail server, and the BIND DNS server, is one of the showpieces of the free software world and proof that sometimes you can get a free lunch.

    In The Definitive Guide to GCC, authors William von Hagen and Kurt Wall teach you how to build, install, customize, use, and troubleshoot GCC 3.2. This guide goes beyond just command-line invocations to show you how to use GCC to improve the quality of your code (with debugging, code profiling, and test code coverage), and how to integrate other GNU development tools, such as libtool, automake, and autoconf, into your GCC-based development projects.



    Table of Contents:
    About the Authors
    About the Technical Reviewer
    Acknowledgments
    Introducing GCC and the Definitive Guide to GCC
    Ch. 1Building GCC1
    Ch. 2Installing GCC on DOS and Windows Platforms39
    Ch. 3Basic GCC Usage59
    Ch. 4Advanced GCC Usage101
    Ch. 5Optimizing Code with GCC135
    Ch. 6Performing Code Analysis with GCC147
    Ch. 7Using Autoconf and Automake187
    Ch. 8Using Libtool221
    Ch. 9Troubleshooting GCC245
    Ch. 10Using GCC's Online Help265
    Ch. 11GCC Command-Line Options283
    Ch. 12Additional GCC Resources347
    App. ABuilding and Installing Glibc363
    App. BMachine and Processor-Specific Options for GCC403
    Index497

    Wednesday, February 4, 2009

    Introduction to Software Testing or Programming with QT

    Introduction to Software Testing

    Author: Paul Ammann

    Extensively class tested, this text takes an innovative approach to explaining the process of software testing: it defines testing as the process of applying a few well-defined, general-purpose test criteria to a structure or model of the software. The structure of the text directly reflects the pedagogical approach and incorporates the latest innovations in testing, including techniques to test modern types of software such as OO, web applications, and embedded software.



    Table of Contents:
    List of Figures     ix
    List of Tables     xiii
    Preface     xv
    Overview     1
    Introduction     3
    Activities of a Test Engineer     4
    Testing Levels Based on Software Activity     5
    Beizer's Testing Levels Based on Test Process Maturity     8
    Automation of Test Activities     10
    Software Testing Limitations and Terminology     11
    Coverage Criteria for Testing     16
    Infeasibility and Subsumption     20
    Characteristics of a Good Coverage Criterion     20
    Older Software Testing Terminology     21
    Bibliographic Notes     22
    Coverage Criteria     25
    Graph Coverage     27
    Overview     27
    Graph Coverage Criteria     32
    Structural Coverage Criteria     33
    Data Flow Criteria     44
    Subsumption Relationships among Graph Coverage Criteria     50
    Graph Coverage for Source Code     52
    Structural Graph Coverage for Source Code     52
    Data Flow Graph Coverage for Source Code     54
    Graph Coverage for Design Elements     65
    Structural Graph Coverage for Design Elements     65
    Data Flow Graph Coverage for Design Elements     67
    Graph Coverage for Specifications     75
    Testing Sequencing Constraints     75
    Testing State Behavior of Software     77
    Graph Coverage for Use Cases     87
    Use Case Scenarios     90
    Representing Graphs Algebraically     91
    Reducing Graphs to Path Expressions     94
    Applications of Path Expressions     96
    Deriving Test Inputs     96
    Counting Paths in a Flow Graph and Determining Max Path Length     97
    Minimum Number of Paths to Reach All Edges     98
    Complementary Operations Analysis     98
    Bibliographic Notes     100
    Logic Coverage     104
    Overview: Logic Predicates and Clauses     104
    Logic Expression Coverage Criteria     106
    Active Clause Coverage     107
    Inactive Clause Coverage     111
    Infeasibility and Subsumption     112
    Making a Clause Determine a Predicate     113
    Finding Satisfying Values     115
    Structural Logic Coverage of Programs     120
    Predicate Transformation Issues     127
    Specification-Based Logic Coverage     131
    Logic Coverage of Finite State Machines     134
    Disjunctive Normal Form Criteria     138
    Bibliographic Notes     147
    Input Space Partitioning     150
    Input Domain Modeling     152
    Interface-Based Input domain Modeling     153
    Functionality-Based Input Domain Modeling     154
    Identifying Characteristics     154
    Choosing Blocks and Values     156
    Using More than One Input Domain Model     158
    Checking the Input Domain Model     158
    Combination Strategies Criteria     160
    Constraints among Partitions     165
    Bibliographic Notes     166
    Syntax-Based Testing     170
    Syntax-Based Coverage Criteria     170
    BNF Coverage Criteria     170
    Mutation Testing     173
    Program-Based Grammars     176
    BNF Grammars for Languages     176
    Program-Based Mutation     176
    Integration and Object-Oriented Testing     191
    BNF Integration Testing     192
    Integration Mutation     192
    Specification-Based Grammars     197
    BNF Grammars     198
    Specification-Based Mutation     198
    Input Space Grammars     201
    BNF Grammars     201
    Mutation for Input Grammars     204
    Bibliographic Notes     210
    Applying Criteria in Practice     213
    Practical Considerations     215
    Regression Testing     215
    Integration and Testing     217
    Stubs and Drivers     218
    Class Integration Test Order     218
    Test Process     219
    Requirements Analysis and Specification     220
    System and Software Design     221
    Intermediate Design     222
    Detailed Design     223
    Implementation     223
    Integration     224
    System Deployment     224
    Operation and Maintenance     224
    Summary     225
    Test Plans     225
    Identifying Correct Outputs     230
    Direct Verification of Outputs     230
    Redundant Computations     231
    Consistency Checks     231
    Data Redundancy     232
    Bibliographic Notes     233
    Engineering Criteria for Technologies     235
    Testing Object-Oriented Software     236
    Unique Issues with Testing OO Software      237
    Types of Object-Oriented Faults     237
    Testing Web Applications and Web Services     256
    Testing Static Hyper Text Web Sites     257
    Testing Dynamic Web Applications     257
    Testing Web Services     260
    Testing Graphical User Interfaces     260
    Testing GUIs     261
    Real-Time Software and Embedded Software     262
    Bibliographic Notes     265
    Building Testing Tools     268
    Instrumentation for Graph and Logical Expression Criteria     268
    Node and Edge Coverage     268
    Data Flow Coverage     271
    Logic Coverage     272
    Building Mutation Testing Tools     272
    The Interpretation Approach     274
    The Separate Compilation Approach     274
    The Schema-Based Approach     275
    Using Java Reflection     276
    Implementing a Modern Mutation System     277
    Bibliographic Notes     277
    Challenges in Testing Software     280
    Testing for Emergent Properties: Safety and Security     280
    Classes of Test Cases for Emergent Properties     283
    Software Testability     284
    Testability for Common Technologies      285
    Test Criteria and the Future of Software Testing     286
    Going Forward with Testing Research     288
    Bibliographic Notes     290
    List of Criteria     293
    Bibliography     295
    Index     319

    Interesting book: Project Study Guide or IPsec Virtual Private Network Fundamentals

    Programming with QT: Writing Portable GUI Applications on Unix and Win32

    Author: Matthias Kalle Dalheimer

    Qt is a C++ class library for writing GUI applications that run on UNIX, Windows 95/98, and Windows NT platforms. Qt is much easier to use than the standard Motif toolkit for UNIX systems, but at the same time Qt emulates the look-and-feel of Motif. Best of all, after you have written an application with Qt, all you have to do is recompile it to have a version that works on Windows systems. Qt also emulates the look-and-feel of Windows, so you can provide all of your users with native-looking interfaces.

    Platform independence is not the only benefit of Qt. Qt uses an ingenious signal/slot mechanism for connecting user interaction with program functionality, providing an excellent framework for component-based programming. Graphical rendering in Qt is highly optimized due to its use of effective caching mechanisms -- rendering in Qt is often faster than with the similar native API. In addition to user interface classes, Qt features portable support for file system access, working with date and time values, and network programming. With Qt, you'll find that you need to write very little, if any, platform-dependent code because Qt already has what you need.

    Qt is popular with open-source and Linux developers because it can be used for free on UNIX systems for this type of development. For commercial development, you need a license for Qt, which is available from Troll Tech, the developers of Qt. In addition to open-source development, Qt is being used by several major companies and government and international agencies.

    While programming with Qt is straightforward and feels natural once you get the hang of it, the learning curve can be steep. Qt comes with excellent reference documentation, but beginners often find the included tutorial is not enough to really get started with Qt. That is where this book steps in. Programming with Qt guides you through the steps of writing a Qt application by showing you how to write a simple paint application. It also helps deepen your understanding of the topics with exercises and fully worked out answers. The book presents all of the GUI elements in Qt, along with advice about when and how to use them, so that you can make full use of the toolkit. There's also lots of information for seasoned Qt programmers, including material on advanced 2D transformations, drag-and-drop, and writing custom image file filters.

    Programming with Qt helps you get the most out of Qt. With it, you'll learn to take full advantage of this powerful, easy-to-use, cross-platform toolkit.

    Electronic Review of Books - Lou Grinzo

    Linux's meteoric rise in both popularity and usage is increasing the demand for solid information for programmers about all aspects of Linux development, as well as cross-platform issues. Programming with Qt, by Matthias Dalheimer, covers a tool that addresses some of the thornier topics in modern GUI programming, cross-platform application frameworks, and widget toolkits. Qt is a product of Troll Tech, and is available for both X Windows and Win32 environments. Dalheimer is a member of the board of directors of the KDE Foundation, and has considerable Qt experience, since the KDE desktop environment for Linux is based on Qt.

    In the book's 25 chapters, Dalheimer provides a good overview of the Qt programming model, and presents a solid conceptual framework for any experienced programmer new to Qt. He includes several usage tips and many pieces of thoughtful advice, any one of which could easily be worth the cost of the book in the right circumstances. He also talks about some more advanced topics, such as how to deal with resizable dialogs, especially at a time when large monitors are nearly ubiquitous; portability issues; and even the pros and cons of various approaches to writing a cross-platform widget toolkit like Qt. For readers new to Qt, especially those with a Windows background, this is all useful and enlightening material.

    Dalheimer takes you through the expected steps, from the obligatory "Hello, world!" program to dealing with menus, event handling, Qt's layout managers and container classes, graphics and text programming, file handling, focus issues, and interapplication communication. One of the longer chapters covers writing your own Qt widgets, and includes two extended examples that will be useful references for anyone taking on this task. Chapter 9 is one of the strongest parts of the book, in that it covers numerous graphics programming topics, such as palette management, saving and displaying graphics, double buffering, and transformations.

    One area the author focuses on throughout the book, and to good effect, is Qt's use of signals and slots. (These are not traditional UNIX IPC signals, but a variation unique to Qt.) This is the technology that notifies specific parts of a program when UI events happen, such as users clicking on a button or an item in a listbox. Every application framework has its own way of performing this "plumbing," and understanding it well enough to get notifications in the right places, forward them effectively, and so on, is critical to using the framework. Dalheimer clearly appreciates this fact, and doesn't just talk about Qt's signals and slots once and then move on, but returns to the topic several times in different contexts.

    Experienced programmers might raise an eyebrow over the thought of covering all this material -- an entire application framework and a widget toolkit -- in a mere 361 pages. (Petzold's Programming Windows, easily the standard in this area, is well over twice the page count in its second edition, for example, even if it does cover some topics not in Qt.) This highlights the only serious problem with this book: Its treatment of some topics is conspicuously thin. For example, the discussion of the file open/save dialogs is barely half a page of text (not counting illustrations), yet you will likely spend considerable time with these dialogs in various programs, using them in different ways. This book isn't meant to be a replacement for Troll Tech's reference manual, obviously, but several examples of how to use these dialogs with various options (multiple selection, file must exist, and the like), as well as a discussion of cross-platform issues would have been very welcome. Similarly, there are places where Dalheimer leaves pertinent questions unanswered, such as what the limit is on the number of items that a Qt listbox will handle. (He does advise against putting too many items into a listbox, for human factors reasons, which is clearly good advice, but it's critical for programmers to know what such limits are if they're to avoid exceeding them.)

    I was bothered by the number of extremely short chapters. Chapter 13, "Working with Date and Time Values" is less than one page of text, Chapter 18, "Debugging" is not quite two full pages, and "Sample Qt Projects" mentions only two -- KDE and Ortho Vista -- and doesn't provide nearly the insight into real-world usage of Qt for commercial work that I'd hoped for. More serious yet is the book's almost complete avoidance of font and text output issues, something nearly all programmers will have to wrestle with.

    These problems certainly don't make this a bad book, but they do make me wish for at least a few hundred more pages of the kind of work that Dalheimer is clearly capable of, to provide the fuller treatment programmers need of Qt at this time. Still, Programming with Qt, combined with the Qt reference material (freely available from the Troll Tech web site), should be enough to get experienced programmers started, while we hold out hope for a more comprehensive second edition.