Sunday, December 6, 2009

Usability Engineering or Numerical Methods Using MathCAD

Usability Engineering

Author: Jakob Nielsen

Written by the author of the best-selling HyperText & HyperMedia, this book is an excellent guide to the methods of usability engineering. The book provides the tools needed to avoid usability surprises and improve product quality. Step-by-step information on which method to use at various stages during the development lifecycle are included, along with detailed information on how to run a usability test and the unique issues relating to international usability.

* Emphasizes cost-effective methods that developers can implement immediately
* Instructs readers about which methods to use when, throughout the development lifecycle, which ultimately helps in cost-benefit analysis.
* Shows readers how to avoid the four most frequently listed reasons for delay in software projects.
* Includes detailed information on how to run a usability test.
* Covers unique issues of international usability.
* Features an extensive bibliography allowing readers to find additional information.
* Written by an internationally renowned expert in the field and the author of the best-selling HyperText & HyperMedia.


Nielsen, author of the popular HyperText & HyperMedia, provides concrete advice and methods that can be systematically employed to ensure a high degree of usability in the final user interface. Appendix A lists several practical exercises touching upon important aspects of usability engineering. Appendix B is an extensive (53-page) bibliography. Annotation c. Book News, Inc., Portland, OR (

Table of Contents:
Teaching Usability Engineering
Ch. 1Executive Summary1
Ch. 2What Is Usability?23
Ch. 3Generations of User Interfaces49
Ch. 4The Usability Engineering Lifecycle71
Ch. 5Usability Heuristics115
Ch. 6Usability Testing165
Ch. 7Usability Assessment Methods beyond Testing207
Ch. 8Interface Standards227
Ch. 9International User Interfaces237
Ch. 10Future Developments255
Appendix A: Exercises269
Appendix B: Bibliography283
Author Index341
Subject Index351

Books about: Cook Book or Foodservice Organizations

Numerical Methods Using MathCAD

Author: Laurene Fausett

This book presents the fundamental numerical techniques used in engineering, applied mathematics, computer science, and the physical and life sciences in a way that is both interesting and understandable. Using a wide range of examples and problems, this book focuses on the use of MathCAD functions and worksheets to illustrate the methods used when discussing the following concepts: solving linear and nonlinear equations, numerical linear algebra, numerical methods for data interpolation and approximation, numerical differentiation and integration, and numerical techniques for solving differential equations. For professionals in the fields of engineering, mathematics, computer science, and physical or life sciences who want to learn MathCAD functions for all major numerical methods.

Saturday, December 5, 2009

Wireless Communications Security or Lightwave 3D 8 Cartoon Character Creation Volume 2

Wireless Communications Security

Author: Hideki Imai

Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers a broad overview of wireless security, so engineers can choose the methods and techniques that are most appropriate for their projects. Professionals gain a solid understanding of critical cryptography techniques, such as private/public key encryption, digital signatures, and block and stream ciphers. The book provides expert guidance on how to evaluate cryptography deployment impact on current wireless network architectures and implement an effective cryptography architecture for any organization. This forward-looking resource offers the technical know-how practitioners need to understand and work with the security concepts and techniques used for 2nd, 3rd, and 4th generation mobile networks.

Go to: In Therapy We Trust or The Official Patients Sourcebook on Polymyositis

Lightwave 3D 8 Cartoon Character Creation, Volume 2: Rigging & Animation

Author: Jonny Gorden

The second of two volumes explaining proven methods of creating 3D cartoon characters for animation.

Thursday, December 3, 2009

In Search of Stupidity or Object Oriented Perl

In Search of Stupidity: Over 20 Years of High-Tech Marketing Disasters

Author: Merrill R Chapman

In Search of Stupidity: Over Twenty Years of High-Tech Marketing Disasters, Second Edition is National Lampoon meets Peter Drucker. It's a funny and well-written business book that takes a look at some of the most influential marketing and business philosophies of the last twenty years. Through the dark glass of hindsight, it provides an educational and entertaining look at why these philosophies didn't work for many of the country's largest and best-known high-tech companies.

Marketing wizard Richard Chapman takes you on a hilarious ride in this book, which is richly illustrated with cartoons and reproductions of many of the actual campaigns used at the time. Filled with personal anecdotes spanning Chapman's remarkable career (he was present at many now-famous meetings and events), In Search of Stupidity, Second Edition examines the best of the worst marketing ideas and business decisions in the last twenty years of the technology industry.

The second edition includes new chapters on Google and on how to avoid stupidity, plus the extensive analyses of all chapters from the first edition. You'll want to get a copy because it

  • Features an interesting preface and interview with Joel Spolsky of "Joel on Software"
  • Offers practical advice on avoiding PR disaster
  • Features actual pictures of some of the worst PR and marketing material ever created
  • Is highly readable and funny
  • Includes theme-based cartoons for every chapter
An excellent source of information, analysis and good laughs. It's one of the few industry titles that will give you a large supply of stories to re-tell to other developers over a beer. Chapman's book is also an excellent case study collection of anti-management rules that one should avoid when running a high tech company.

Object Oriented Perl

Author: Damian Conway

Techniques and tricks to master basic and advanced OO Perl for programmers who already have basic to intermediate skills in procedural Perl.


Conway (computer science, Monash U., Melbourne) provides novices and experienced Perl hackers alike with a guide to writing clean, readable, and maintainable Perl programs. The book begins with object orientation and Perl basics, and moves on to topics such as encapsulation, polymorphism, operator overloading, multiple dispatch and persistence. Conway incorporates examples of databases, pattern matching, multiprocessing, encryption, and debugging among others, and he includes transition guides from C++, Java, Eiffel, and Smalltalk. Annotation c. Book News, Inc., Portland, OR (

Development Exchange

Object Oriented Perl is well written and communicates a lot of technical know-how to its readers, both in terms of specific language features and general design concepts. You'll put this book down with more knowledge of modular Perl than you had when you picked it up. Whether object-oriented Perl programming is right for your projects is another question-but there's no better decision helper than Conway's guide.

...a gem of a book...Superbly organized and excellently explained, this is the definitive book on Object Oriented programming with Perl. Judging from the comments of more qualified experts, we agree that this book belongs on the shelf of any serious Perl hacker.

Table of Contents:
    1. What is this book about?
    2. What is object-oriented Perl?
    3. Whom this book is for?
    4. Where to find what you're looking for?

  1. What You Need To Know First (An OO Primer)
    1. The essential elements of OO
      • Abstraction
      • Encapsulation
      • Inheritance
      • Polymorphism
    2. Other OO concepts
      • Genericity
      • Interface vs implementation
      • Class vs type
      • Persistence
    3. A few words about terminology
    4. Where to find out more

  2. What You Need To Know Second (A Perl Refresher)
    1. Essential Perl
      • Scalars
      • Arrays
      • Hashes
      • Subroutines
      • References
      • Packages
    2. Non-essential (but very useful) Perl
      • Modules
      • Autoloading
      • Closures
      • Typeglobs
    3. Where to find out more
      • Books
      • The Perl documentation
      • The Perl Journal
      • Perl on the WWW
      • Newsgroups

  3. Simple Object-Oriented Perl
    1. Three little rules
      • Rule 1: To create a class, build a package
      • Rule 2: To create a method, write a subroutine
      • Rule 3: To create an object, bless a referent
    2. A simple Perl class
      • The code
      • Using the CD::Music class
    3. Making life easier
      • Class modules
      • use strict and the -w flag
      • Automating data member access
      • Documenting a class
    4. Creation and destruction of objects
      • Constructors
      • Destructors
    5. The CD::Music class, compleat

  4. Blessing Variables
    1. What's wrong with a hash?
    2. Blessing an array
      • Reimplementing CD::Music
      • An array-specific example - iterators
      • Where to find out more
    3. Blessing a pseudo-hash
      • A pseudo-what???
      • Limitations of a pseudo-hash
      • Advantages of a pseudo-hash
      • The worst of both worlds?
      • Compile-time support for run-time performance
      • Just how Perl knows at compile-time that a particular
      • Yet another version of CD::Music
      • Where to find out more
    4. Blessing a scalar
      • Why not bless a scalar?
      • An object-oriented password
      • A bit-string class
      • Where to find out more

  5. Blessing Other Things
    1. Blessing a regular expression
      • The qr operator
      • Why an OO regular expression class?
      • Designing a different regular expressions mechanism
      • A closer look at the two classes
      • On the separation of Search and State
      • Where to find out more
    2. Blessing a subroutine
      • So how can a subroutine be an object?
      • Why objectify a subroutine?
      • A lexer object
      • Example: A simple pretty-printer
      • Where to find out more
    3. Blessing a typeglob
      • Paging STDOUT
      • A multiprocess pager class
      • A threaded pager class
      • Where to find out more

  6. Inheritance
    1. How Perl handles inheritance
      • The @ISA array
      • What inheritance means in Perl
      • Where the call goes
      • Constructors and inheritance
      • Destructors and inheritance
    2. Tricks and Traps
      • Naming attributes of derived classes
      • The isa() subroutine
      • The can() subroutine
      • The UNIVERSAL package
      • The SUPER pseudo-package
      • Inheritance and pseudo-hashes
      • Issues related to accessing class data
    3. Example: Inheriting the CD class
      • Applied laziness
      • Class attributes revisited
      • An alternative solution

  7. Polymorphism
    1. Polymorphism in Perl
    2. Example: Polymorphic methods for the Lexer class
    3. The simple pretty-printer objectified
    4. Using interface polymorphism instead

  8. Automating class creation
    1. The Class::Struct module
    2. The Class::MethodMaker module

  9. Operator Overloading
    1. The prob

Wednesday, December 2, 2009

The Berkeley DB Book or Window Seat

The Berkeley DB Book

Author: Himanshu Yadava

The Berkeley DB Book is a practical guide to the intricacies of the Berkeley DB. This book covers in-depth the complex design issues that are mostly only touched on in terse footnotes within the dense Berkeley DB reference manual. It explains the technology at a higher level and also covers the internals, providing generous code and design examples.

In this book, you will get to see a developer's perspective on intriguing design issues in Berkeley DB--based applications, and you will be able to choose design options for specific conditions. Also included is a special look at fault tolerance and high-availability frameworks. Berkeley DB is becoming the database of choice for large-scale applications like search engines and high-traffic web sites.

Interesting book: Astrological Gastronomy or Opaa Greek Cooking Detroit Style

Window Seat: The Art of Digital Photography and Creative Thinking

Author: Julieanne Kost

Window Seat: The Art of Digital Photography and Creative Thinking is a complete view of a creative project from the artist's perspective. Julieanne Kost, a Photoshop and creative thinking expert, has taken her own experience shooting images out of commercial airplane windows to create a unique creative seminar:

The first section of the book, The Art of Creative Thinking: The Principles, outlines Julieanne's method for staying creative in an increasingly complicated world. In her personal stories, advice, and philosophies, you'll find inspiration if you're stuck or just can't get started. You may recognize some of your own less-than-productive thought processes as she describes her own struggle to let go of the everyday flotsam of life to find a quiet mental space in which she can think, dream, and create.

The second part of the book, Window Seat: The Portfolio, is a collection of images culled from over 3000 photographs Julieanne shot from commercial airplane windows over a period of five years. The photographs are accompanied by brief commentaries addressing various aspects of the process, from the original inspiration to issues of control, subject matter, image selection, and manipulation.

The Appendix contains technical information: a discussion of the equipment and media Julieanne used to shoot the photos; how she processed the photographs using Adobe Camera Raw; the Photoshop techniques she employed to correct, retouch, and manipulate the images; her personal file management system; and how she prepares her files for printing.

This book is essential reading for photographers and artists looking for ways to stay creatively awake, aware, and alive.

Tuesday, December 1, 2009

Scripting VMware Power Tools or The Art of Digital Music

Scripting VMware Power Tools: Automating Virtual Infrastructure Administration

Author: Al Muller

This book contains simple and advanced scripting using both ESX and Linux commands to provide awesome virtual tools to automate administrative tasks of ESX Server.

This book will cover the native tools that VMware provides with ESX Server. It will then discuss in detail the different scripting API's and how they can be leveraged to provide some very useful, practical and time saving tools to manage a virtual infrastructure. From virtual server provisioning to backups and everything in between, this book is a one stop shop for virtual tools.

* An essential guide to virtualisation using both Linux and ESX commands

* The companion Web site for book provides dozens for working scripts and tools presented in the book

* Maximise VMware's powerful scripting language to automate time consuming administrative tasks

Interesting book: Condemned or Office 2003 Bible

The Art of Digital Music: 53 Visionary Artists & Insiders Reveal their Creative Secrets

Author: David Battino

The Art of Digital Music shows firsthand how top artists - pioneers such as Alan Parsons, Herbie Hancock, BT, Todd Rundgren, Steve Reich, and Phil Ramone - use digital technology in their work. Through a dynamic blend of practical, hands-on production tips, inspiring case studies, extensive graphics, and in-depth interviews, the authors explore the creative freedom these new tools afford.

In addition to artist interviews, this entertaining volume features lively discussions with technological pioneers - the producers, engineers, software wizards, and Internet visionaries who are shaping the sound of the future. In addition to audio examples, the accompanying DVD features tours of artists' studios. The Art of Digital Music will appeal to musicians who use technology to make music and fans who want to understand how technology is changing the way music is created, experienced, and shared.

Monday, November 30, 2009

Designing and Engineering Time or Find Gold in Windows Vista

Designing and Engineering Time: The Psychology of Time Perception in Software

Author: Steven C Seow

Build Applications, Websites, and Software Solutions that Feel Faster, More Efficient, and More Considerate of Users’ Time!

One hidden factor powerfully influences the way users react to your software, hardware, User Interfaces (UI), or web applications: how those systems utilize users’ time. Now, drawing on the nearly 40 years of human computer interaction research –including his own pioneering work –Dr. Steven Seow presents state-of-the-art best practices for reflecting users’ subjective perceptions of time in your applications and hardware.

Seow begins by introducing a simple model that explains how users perceive and expend time as they interact with technology. He offers specific guidance and recommendations related to several key aspects of time and timing–including user tolerance, system responsiveness, progress indicators, completion time estimates, and more. Finally, he brings together proven techniques for impacting users' perception of time drawn from multiple disciplines and industries, ranging from psychology to retail, animal research to entertainment.

·   Discover how time and timing powerfully impact user perception, emotions, and behavior

·   Systematically make your applications more considerate of users’ time

·   Avoid common mistakes that consistently frustrate or infuriate users

·   Manage user perceptions and tolerance, and build systems that are perceived as faster

·   Optimize “flow” to make users feel more productive, empowered, and creative

·   Make reasonable and informed tradeoffs thatmaximize limited development resources

·   Learn how to test usability issues related to time -- including actual vs. perceived task duration

Designing and Engineering Time is for every technology developer, designer, engineer, architect, usability specialist, manager, and marketer. Using its insights and techniques, technical and non-technical professionals can work together to build systems and applications that provide far more value –and create much happier users.

Table of Contents:

1 Designing and Engineering Time

2 Perception and Tolerance

3 User and System Response Times

4 Responsiveness

5 Detecting Timing Differences

6 Progress Indication

7 Expressing Time

8 User Flow

9 Testing Time

10 Techniques

11 Violations

Go to: Cocina Vegetariana Saludable or Everyone Can Cook Appetizers

Find Gold in Windows Vista

Author: Dan Gookin

Windows Vista represents a major improvement to Windows--one that's been long in coming. Because of that, many readers will be experienced Windows users who have grown accustomed to doing things a certain way. The new version of Windows will present a challenge to them. This book is for that reader.

Getting up to speed on a new version of Windows is a frustrating game called "Where have they buried the bodies?" People know what they want to do; they just don't know the new places to find what they need and the new steps involved to accomplish the task. Find Gold in Windows Vista shows readers the new places and the new steps in the new Windows. This book is different because computer users who already know Windows but are merely concerned with finding where the bodies are buried can use it to find quickly the exact information they need.

While experienced readers can enjoy this book's topical and to-the-point approach, beginners and those intimidated by computers will enjoy the tutorial aspect. This is the "Ask Dan" flavor of the book, where Dan explains in his usual, avuncular style how to do things for folks who are intimidated or perhaps just don't know a better way to get things done.

Sunday, November 29, 2009

SSH The Secure Shell or Wileys Teach Yourself C 7th Edition

SSH, The Secure Shell: The Definitive Guide

Author: Daniel J Barrett

Secure your computer network with SSH! With end-to-end strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.

SSH, The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:

  • Basic to advanced use of SSH client tools for Unix, Windows, and Macintosh.
  • Installing, configuring, and maintaining SSH (with special tips for large data centers).
  • The three levels of SSH server control: compile-time and server-wide configuration for administators, and per-account configuration for end users.
  • Application tunneling, port and agent forwarding, and forced commands.
  • Undocumented features of popular SSH implementations.
  • Detailed case studies of creating complex applications with SSH.
  • Troubleshooting a wide variety of common and not-so-common problems.
Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.

About the Author:
Daniel J. Barrett, Ph.D., has been immersed in Internet technology since 1985. Currently a software engineer and vice president at a well-known financial services company, Dan has also been a heavy metal singer, Unix system administrator, university lecturer, web designer, and humorist.

Dan has written several other O'Reilly books, including NetResearch: Finding Information Online and Bandits on the Information Superhighway, as well as monthly columns for Compute! and Keyboard Magazine. He and his family reside in Boston.

Look this: Factory Girls or Moneyball

Wiley's Teach Yourself C++, 7th Edition

Author: Al Stevens

* The number one C++ self-study course from the nation's number one C++ authority, the author of the Dr. Dobb's Journal "C Programming" column since 1988
* Completely updated with the latest revisions to the C++ compilers, this book uses a tutorial approach to teach one of the most widely used, yet hard to learn, programming languages-more than 100,000 copies sold over all editions
* Provides a complete working program to teach each lesson and carefully builds on previous lessons for greater understanding
* CD-ROM includes a complete Windows-hosted IDE and C++ compiler suite, allowing the reader to compile, run, and experiment with the example programs for a complete tutorial experience

Table of Contents:
Pt. IThe C++ Language1
Ch. 1An Introduction to Programming in C++3
Ch. 2Writing Simple C++ Programs15
Ch. 3Functions53
Ch. 4Program Flow Control69
Ch. 5C++ Data Type Organization89
Ch. 6Structures and Unions105
Ch. 7More About C++ Data123
Ch. 8Pointers, Addresses, and Dynamic Memory Allocation135
Ch. 9Reference Variables159
Ch. 10Recursion169
Ch. 11The Preprocessor177
Ch. 12Function Templates193
Ch. 13Program Organization201
Pt. IIWorking with Classes219
Ch. 14C++ Classes221
Ch. 15Constructors and Destructors229
Ch. 16Conversion241
Ch. 17Arrays of Class Objects253
Ch. 18Class Members259
Ch. 19Friends275
Ch. 20Classes and the Heap283
Ch. 21Overloading Operators291
Ch. 22Class Libraries317
Ch. 23Class Inheritance327
Ch. 24Multiple Inheritance361
Ch. 25Class Templates375
Pt. IIIThe Standard C++ Library393
Ch. 26Standard C Library Functions395
Ch. 27Introduction to the Standard C++ Library415
Ch. 28Formatting IOStreams and the stringstream Classes427
Ch. 29File I/O Streams441
Pt. IVThe Standard Template Library461
Ch. 30Introduction to STL463
Ch. 31STL Sequence Containers469
Ch. 32Associative Containers497
Ch. 33Genetic Algorithms533
Ch. 34Iterators557
Pt. VAdvanced Topics573
Ch. 35Exception Handling575
Ch. 36Namespaces597
Ch. 37C++ Typecasts607
Ch. 38Runtime Type Information (RTTI)615
Ch. 39Locales621
Ch. 40Object-Oriented Programming631
App. ALibrary Listings643
App. BWhat's on the CD-ROM?657
App. CQuincy 2002 User's Guide659
App. DC++ Reference Tables665
App. E: Bibliography671
End-User License Agreement705

Friday, November 27, 2009

BlackBerry Pearl for Dummies or Mike Meyers Security Certification Passport

BlackBerry Pearl for Dummies

Author: Dante Sarigumba

The excitement of purchasing a Blackberry Pearl can only be outdone by the confusion of how to use it. How do you check your e-mail? How do you play music and video? What are PIN-to-PIN messages? Where do you find cool stuff to customize your Pearl?

With Blackberry Pearl for Dummies, you’ll discover all the answers to these questions and see how to use your new PDA to its maximum potential. This down-to-earth guide explores all of Pearl’s features and shows you cool ways to make your Pearl your Pearl. Clear, step-by-step instructions explain all the parts of the Pearl and give you the know-how to:

• Get organized with the Address Book, Calendar, and MemoPad

• Manage e-mail and send instant messages

• Surf the Internet

• Dial and receive calls

• Set up your voicemail service

• Take photos and create slideshows

• Access the multimedia player

• Use Desktop Manager

• Protect and secure your Pearl

But don’t think that this book is a plain, boring, just-the-facts type of guide. It will cue you in on how to personalize your Pearl with fun games, wallpaper, ringtones, and more. If you like news and entertainment, it also suggests some nifty programs that are a must-have. This is not just any ordinary PDA, and Blackberry Pearl for Dummies shows you why!

Table of Contents:
Introduction     1
About This Book     1
Who Are You?     2
What's in This Book     2
Meet and Greet Your BlackBerry Pearl     3
Getting Organized with Your Pearl     3
Getting Multimedia and Online with Your Pearl     3
Working with Desktop Manager     3
The Part of Tens     4
Icons in This Book     4
Where to Go from Here     4
Meet and Greet Your BlackBerry Pearl     5
Your BlackBerry Is Not an Edible Fruit     7
Knowing Your BlackBerry History     8
How It Works: The Schematic Approach     9
The role of the network service provider     9
Connecting to your personal computer     10
Doing the BlackBerry world-traveler thing     10
Oh, the Things You Can Do!     12
All-in-one multimedia center     12
Internet at your fingertips     12
Me and my great personal assistant     13
Me and my chatty self     13
Look, Dad, no hands!     14
Final BlackBerry Tidbits     14
Power efficiency     14
Memory management     15
A sentry is always on duty     15
Navigating the Pearl     17
Anatomy 101     17
Display screen     19
SureType keyboard     20
Escape key     23
Trackball - a.k.a. the Pearl     23
Menu key     23
MicroSD slot     24
Navigation Guidelines     25
Switching applications     26
Changing options     26
Turning On Your BlackBerry Pearl (and Keeping It Happy)     27
Making Your BlackBerry Pearl Yours     27
Branding your BlackBerry Pearl     28
Choose a language, any language     29
Typing with ease using AutoText     29
Inserting macros     31
Getting your dates and times lined up     31
Customizing your screen's look and feel     32
Tuning Pearl navigation     33
Choosing themes for your BlackBerry     35
Wallpaper for your BlackBerry     37
Let freedom ring     38
Power Usage and Consumption     43
Keeping Your BlackBerry Safe     44
Who Ya Gonna Call (When Your BlackBerry Pearl Breaks)?     46
Getting Organized with Your Pearl     47
Remembering and Locating Your Acquaintances     49
Accessing Your Address Book     49
Working with Address Book Names     50
Creating a new contact     50
Adding contacts from other BlackBerry applications     52
Viewing a contact     53
Editing a contact     53
Deleting a contact     54
Looking for Someone?     54
Organizing Your Contacts     56
Creating a group     57
Using the Filter feature on your contacts     59
Setting preferences     61
Locating a Contact Using Maps     62
Never Miss Another Appointment     63
Accessing the BlackBerry Pearl Calendar     64
Choosing Your Calendar View     64
Moving between Time Frames     66
Customizing Your Calendar     67
All Things Appointments: Adding, Opening, and Deleting     69
Creating an appointment     69
Opening an appointment     72
Deleting an appointment     73
Making Notes and Keeping Your Words     75
MemoPad     75
Accessing MemoPad     76
Jotting down notes     76
Viewing your notes      77
Updating your notes     77
Deleting your notes     77
Quickly finding a note     78
The Password Keeper     79
Accessing Password Keeper     79
Setting a password for Password Keeper     80
Creating new credentials     81
Random password generation     82
Using your password     82
Password Keeper options     83
Getting Multimedia and Going Online With your Pearl     85
You've Got (Lots of) E-Mail     87
Getting Up and Running with E-Mail     87
Using the BlackBerry Internet Service client     88
Combining your e-mail accounts into one     88
Adding an e-mail account     89
Configuring your e-mail signature     90
Enabling wireless reconciliation     91
Accessing Messages     92
Receiving e-mails     93
Sending e-mail     96
Adding a sender to your Address Book     97
Filtering your e-mail     98
Searching through Your Messages Like a Pro     100
Running a general search     100
Saving search results     102
Reusing saved search results     103
Long Live E-Mail     103
Too Cool for E-Mail     105
Sending and Receiving PIN-to-PIN Messages     106
Getting a BlackBerry PIN     106
Assigning PINs to names     107
Sending a PIN-to-PIN message     107
Receiving a PIN-to-PIN message     108
Keeping in Touch, the SMS/MMS Way     108
Sending a text or multimedia message     109
Viewing or listening to a message you receive     109
Always Online Using Instant Messaging     110
Chatting using IM rules     110
IM basics: What you need     111
Using BlackBerry Messenger     114
Surfing the Internet Wave     117
Getting Started with the BlackBerry Browser     117
Accessing Browser     117
Hitting the (air)waves     119
Navigating Web pages     119
Saving a Web page address     122
Sending an address by e-mail     123
Saving Web images     123
Bookmarking Your Favorite Sites     123
Adding a bookmark     123
Available offline     124
Modifying a bookmark     124
Organizing your bookmarks     125
Browser Options and Optimization Techniques     126
Browser Configuration screen     127
General Properties screen     128
Cache operations screen     129
Calling Your Favorite Person     131
Using the BlackBerry Phone Application     131
Making and Receiving Calls     132
Making a call     132
Receiving a call     133
Phone Options While on a Call     134
Muting your call     134
Adjusting the call volume     135
Customizing the BlackBerry Phone     135
Setting up your voice mail number     135
Using call forwarding     135
Configuring speed dial     137
Arranging Conference Calls     138
Talking privately to a conference participant     140
Alternate between phone conversations     140
Dropping that meeting hugger     141
Communicating Hands-Free     141
Using the speaker phone     141
Pairing your BlackBerry with a Bluetooth headset     142
Using voice dialing     143
Multitasking While on the Phone     144
Taking Great Pictures with Your Pearl     145
Say Cheese      145
The Screen Indicators     146
Choosing picture quality     146
Zooming and focusing     147
Setting the flash     147
Working with Pictures     148
Viewing     148
Slide show     148
Trashing     148
Listing     149
Picture properties     149
Organizing your pictures     150
Sharing your pictures     152
Setting a picture as the caller ID     152
Setting a Home screen image     152
Other Important Camera Options     153
Satisfy All Your Senses with the Media Player     155
Accessing Media     155
Folder navigation     156
Let the music play     157
Now showing     159
Lord of the ringtones     159
Picture this     159
Turn it down or blast it off     160
Commonly used navigation     160
Working with Media Files     161
Importing your media collection     162
Synchronizing with iTunes     162
Sharing media files using Bluetooth     162
Downloading tunes     163
Working with Desktop Manager      165
Synching the Synchronize Way     167
Introduction to BlackBerry Desktop Manager     168
Launching BDM     168
Connecting BDM to your Pearl     169
Setting Up Synchronize     169
Configuring PIM synchronization     170
Confirming record changes     171
Resolving update conflicts     172
Ready, Set, Synchronize!     174
Synchronize Now     174
Automatic synchronization     175
Managing Your Media on Your Pearl     175
Protecting Your Information     177
Accessing Backup and Restore     178
Backing Up BlackBerry Style     178
Backing up your BlackBerry manually     178
Setting up automatic backups     180
Full Restore from Backup Information     181
Protecting Your Data, Your Way     182
Backing up, your way     183
Restoring, your way     184
Clearing BlackBerry information, your way     185
Using Your Pearl as a Portable Flash Drive     187
The Media Card     188
Acquiring one     188
Inserting the card     189
Formatting the card      189
Setting to mass storage mode     190
Copying Files between the PC and Pearl     190
Securing Your Files     191
Setting a device password     192
Encrypting media files     192
The Part of Tens     195
Ten Great BlackBerry Accessories     197
Cases for Protection and Style     197
BlackBerry Screen Protector     198
MicroSD Memory Card     198
Long Live Your BlackBerry     198
Replenishing Your BlackBerry     199
Bluetooth Hands-Free Headset     199
Full Keyboard     199
External Speaker Phone     200
BlackBerry Car Mount     200
BlackBerry Pearl Cleaner     200
Ten Must-Have BlackBerry Pearl Programs     201
AskMeNow     201
BBToday     202
English Language Acronyms Dictionary for BlackBerry 4.0     202
Berry411     203
Handmark Pocket Express     203
Stock Ticker     203
Wisespent Professional     204
TrackIT: Vehicle Edition     204
Ascendo Fitness for BlackBerry     204
4INF0 Mobile     204
Index      205

Go to: Direction de Personnel Publique :Contextes et Stratégies

Mike Meyers' Security+ Certification Passport

Author: Trevor Kay

Mike Meyers, the industry expert on professional certification, brings you this concise, affordable, and portable study tool for the CompTIA Security+ certification exam. With an intensive focus on only what you need to know to pass this challenging exam plus a free practice test available at, this book is your ticket to success on exam day.

Trevor Kay has been the key security contact at STIHL Limited, and is currently an independent consultant and author. He has served as a Subject Matter Expert for CompTIA on their Server+ and Linux+ certification development and has continuing close ties there – including with the Security+ exam development team. He authored Server+ Certification Bible, Linux+ Certification Bible and co-authored Network+ Certification Bible. His website is

Thursday, November 26, 2009

Programming ASPNET or Natural Language Processing for Online Applications

Programming ASP.NET

Author: Jesse Liberty

ASP.NET is the successor technology to Active Server Pages (ASP), the world's most successful development environment for building server-side web applications. ASP.NET leverages the power of Microsoft's new .NET platform to allow you to write dynamic, data-driven applications that run over the World Wide Web. In Programming ASP.NET, Jesse Liberty and Dan Hurwitz teach you everything you need to know to write web applications and web service. The book focuses on ASP.NET development using both C# and Visual Basic .NET, and coding examples are presented in both languages.

Programming ASP.NET includes a detailed tutorial on Web Forms, which, in conjunction with Visual Studio .NET, allow you to apply Rapid Application Development techniques (including drag-and-drop control placement) to web development. Programming ASP.NET includes extensive coverage of each type of server control, including web server controls, HTML server controls, and custom controls. Since most web applications and web services involve retrieving data and returning it to a client browser, Programming ASP.NET also offers extensive coverage of data access issues. These include topics such as using ASP.NET's list-bound controls, accessing data using the ADO.NET object model, and updating data with or without transaction support.

Go to: Live Free from Asthma and Allergies or Cesarean Recovery

Natural Language Processing for Online Applications: Text Retrieval, Extraction and Categorization

Author: Peter Jackson

This text covers the emerging technologies of document retrieval, information extraction, and text categorization in a way which highlights commonalities in terms of both general principles and practical issues. It seeks to satisfy a need on the part of technology practitioners in the internet space, faced with having to make difficult decisions as to what research has been done and what the best practices are. It is not intended as a vendor guide (such things are quickly out of date), or as a recipe for building applications (such recipes are very context-dependent). But it does identify the key technologies, the issues involved, and the strengths and weaknesses of the various approaches. There is also a strong emphasis on evaluation in every chapter, both in terms of methodology (how to evaluate) and what controlled experimentation and industrial experience have to tell us.

Table of Contents:
Ch. 1Natural language processing1
Ch. 2Document retrieval23
Ch. 3Information extraction75
Ch. 4Text categorization119
Ch. 5Towards text mining173

Wednesday, November 25, 2009

Programming the Finite Element Method or Enterprise Architecture A to Z

Programming the Finite Element Method

Author: D V Griffiths

This title demonstrates how to develop computer programmes which solve specific engineering problems using the finite element method. It enables students, scientists and engineers to assemble their own computer programmes to produce numerical results to solve these problems. The first three editions of Programming the Finite Element Method established themselves as an authority in this area.  This fully revised 4th edition includes completely rewritten programmes with a unique description and list of parallel versions of programmes in Fortran 90.  The Fortran programmes and subroutines described in the text will be made available on the Internet via anonymous ftp, further adding to the value of this title. 


Intended to help readers assemble computer programs to solve particular engineering problems by using building blocks specifically designed for computations via the finite element technique. Topics: spatial discretization by finite elements, programming finite element computations, static equilibrium of structures and of elastic solids, material nonlinearity, steady state flow, uncoupled and coupled transient problems, eigenvalue problems, and forced vibrations. Several appendices supply the building block subroutines necessary to build the programs described in the book, as well as information on nodal loads, geometry subroutines, and plastic stress-strain matrices and plastic potential. Annotation c. by Book News, Inc., Portland, Or.

Table of Contents:
1Preliminaries : computer strategies1
2Spatial discretisation by finite elements21
3Programming finite element computations55
4Static equilibrium of structures109
5Static equilibrium of linear elastic solids165
6Material non-linearity223
7Steady state flow319
8Transient problems : first order (uncoupled)357
9Coupled problems403
10Eigenvalue problems441
11Forced vibrations465
12Parallel processing of finite element analyses509
AEquivalent nodal loads577
BShape functions and element node numbering583
CPlastic stress-strain matrices and plastic potential derivatives591
DMain library subroutines595
EGeom library subroutines605
FParallel library subroutines609

Books about: Economia finanziaria

Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology

Author: Daniel Minoli

Driven by the need and desire to reduce costs, organizations are faced with a set of decisions that require analytical scrutiny. Designing State-of-the-Art Data Centers examines cost-saving trends in planning, administration, and management. To establish a framework for discussion, this book begins by evaluating the role of Enterprise Architecture planning and Service Oriented modeling. The text presents an assessment of storage technologies and networking as well as addresses regulatory and security issues. Additional coverage includes high-speed communication mechanisms such as Ethernet, WAN and Internet communication technologies, broadband communications, and chargeback models.

Sunday, February 22, 2009

C Programming or Programming HD DVD and Blu Ray Disc

C# Programming: From Problem Analysis to Program Design, Second Edition

Author: Barbara Doyl

Master the problem-solving skills and techniques associated with object-oriented program development using this hands-on, reader-friendly text. C# Programming: From Problem Analysis to Program Design, Second Edition, introduces a variety of basic programming concepts, from data types and expressions to arrays and collections, all using C# as the programming language. Ideal for both novices and programmers with experience in other languages, this book goes beyond traditional programming books by including new, advanced software development features that are often only found in specialized books. Full chapters are devoted to ADO.NET and ASP.NET. The second edition has been revised to include new features of Visual C# 2005, including generics and partial classes, so readers receive an up-to-date education on programming.

See also: Antidumping Laws and the U S Economy or Financial Markets and Institutions

Programming HD-DVD and Blu-Ray Disc

Author: Zink

The ultimate book/DVD package for HD and Blu-Ray DVD applications
This complete book/DVD package covers everything you need to know in order to write optical working code for HD and Blu-Ray DVD applications.This comprehensive tutorial not only teaches the new programming skills but also includes large chunks of reusable code and demonstrates actual code outcomes.
Michael Zink is the Director of Advanced Technology at Technicolor and responsible for establishing the HD-DVD and Blu-ray production lines in the company’s Burbank facility. Phil Carl Starner is a Software Engineer with Javelin Ventures LLC, and the author of more than 400 DVDs. His game “Who Wants to Be King of the Jungle” won a DVDX Award for Best Games and Interactivities. Bill Foote is a Senior Staff Engineer with Sun Microsystems, who authored many portions of Sun’s Java TV and DVB-MHP specifications.

Saturday, February 21, 2009

Absolute Beginners Guide to Quattro Pro X or Deploying NET Applications with MSBuild and ClickOnce

Absolute Beginner's Guide to Quattro Pro X

Author: Elaine J Marmel

More and more people are learning the advantages of using Corel's Quattro Pro over other spreadsheet applications. If you have joined their ranks, this book is for you! Absolute Beginner's Guide to Quattro Pro is endorsed by Corel, and offers a straight-forward, no-nonsense approach to the basics. With the help of this book, you will learn how to efficiently manage, analyze, report, and share data, and then move on to more advanced features.

See also: Shiatsu Theory and Practice or Start Fresh

Deploying .NET Applications with MSBuild and ClickOnce

Author: Sayed Y Hashiimi

Whether building a console application, a web service, or a smart client, you eventually need to distribute your finished work. Deploying .NET Applications is a complete guide to delivering applications built with .NET. Packed with hands-on guidance, practical examples, and war stories from the authors' many experiences with deployment scenarios, this book provides everything you need to know.

The book begins by introducing the deployment problem, then examines why deployment is an engineering problem for organizations. Subsequent chapters provide detail about deploying each type of application, then discuss automated deployments. You'll want to get ahold of this book because it

  • Includes hands-on detail about the newest deployment tools, MSBuild and ClickOnce
  • Discusses many best practices of .NET 2.0 software deployment
  • Covers details about automating new software deployments

Friday, February 20, 2009

Hacking the PSP or Database Development For Dummies

Hacking the PSP: Cool Hacks, Mods, and Customizations for the Sony Playstation Portable, Second Edition (Extremetech)

Author: Auri Rahimzadeh

We're not just playing games. You love your PSP. You loved the first edition of this book. If you're ready for more fun, here it is. Check out: Networking hacks that let you IM and speed up multiplayer game action. Awesome audio, video, and image hacks. Game hacks that let you use a single UMD cartridge for multiplayer games. The ever-popular homebrew applications, with secrets for sneaking them past the firmware. We're taking playtime to a whole new level.

Let the fun begin with complete instructions on how to do all this and more with your PSP, including:

• Speeding up Web surfing.

• Getting maximum quality when moving video or audio to your PSP.

• Using your PSP like an iPod.

• Transfering DVDs to your PSP.

• Getting more power.

• Playing multiplayer games with a single UMD.

• Writing homebrew apps, even if you've never programmed before.

• Learning to fool, and even downgrade, your firmware.

• Running Linux® and Windows®.

Visit to post your questions on the author's forum, download any files you need, get updates to the book, and check out new hacks the moment they're available.

Table of Contents:

Chapter 1: Introduction.

Chapter 2: Overview of the PSP.

Chapter 3: Quickies.

Chapter 4: Taking Apart Your PSP.

Chapter 5: Getting Online: Configuring Your PSP for Networking.

Chapter 6: The Web on Your PSP.

Chapter 7: Online Hacks.

Chapter 8: Offline Hacks.

Chapter 9: Game Hacks.

Chapter 10: Video Hacks.

Chapter 11: Audio Hacks.

Chapter 12: Image and Photo Hacks.

Chapter 13: Getting More Power.

Chapter 14: Taking Your PSP on the Road.

Chapter 15: Running Linux and Windows on the PSP.

Chapter 16: Downgrading Your PSP’s Firmware and Other Firmware Hacks.

Chapter 17: Programming the PSP: Setting Up the Development Environment.

Chapter 18: Programming the PSP: Hello World.

Chapter 19: Running Homebrew Applications.

Chapter 20: Installing and Running Homebrew on PSPs with Firmware Version 2.00.

Chapter 21: Installing and Running Homebrew on PSPs with Firmware Version 2.01 Through 2.60.

Chapter 22: Navigating the Unofficial PSP SDK.

Chapter 23: Alternative Development Languages.

Chapter 24: Distributing Your Applications.

Chapter 25: Synchronization and Utility Software.

Appendix A: Additional Resources.

Appendix B: PSP Maintenance and Frequently Asked Questions.


See also: Im Like So Fat or Cults

Database Development For Dummies

Author: Allen G Taylor

From ATMs to the personal finance, online shopping to networked information management, databases permeate every nook and cranny of our highly-connected, information-intensive world. Databases have become so integral to the business environment that, nowadays, it’s next to impossible to stay competitive without the assistance of some sort of database technology—no matter what type or size of business you run. But developing your own database can be very tricky. In fact, whether you want to keep records for a small business or run a large e-commerce website, developing the right database system can be a major challenge. Which is where this friendly guide comes in.

From data modeling methods and development tools to Internet accessibility and security, Database Development For Dummies shows you, step-by-step, everything you need to know about building a custom system from the ground up. You’ll discover how to:

  • Model data accurately
  • Design a reliable functional database
  • Deliver robust relational databases on time and on budget
  • Build a user-friendly database application
  • Put your database on the Web

In plain English, author Allen Taylor acquaints you with the most popular data modeling methods, and he shows you how to systematically design and develop a system incorporating a database and one or more applications that operate on it. Important topics he explores include:

  • Understanding database architecture and how it has evolved
  • Recognizing how database technology affects everyday life
  • Using a structured approach to database development
  • Creating an appropriate data model
  • Developing a reliable relational design
  • Understanding the complexities you’re likely to encounter in designing a database and how to simplify them
  • Implementing your design using Microsoft Access 2000, SQL Server and other powerful database development tools
  • Keeping your database secure
  • Putting your database on the Internet

Today’s powerful, low-cost database development tools make it possible for virtually anybody to create their own database. Get Database Development For Dummies and discover what it takes to design, develop and implement a sophisticated database system tailored to you and your company’s current and future data storage and management needs.

Thursday, February 19, 2009

Learning PHP 5 or Generation Myspace

Learning PHP 5

Author: David Sklar

PHP has gained a following among non-technical web designerswho need to add interactive aspects to their sites. Offering a gentle learning curve, PHP is an accessible yet powerful language for creating dynamic web pages. As its popularity has grown, PHP's basic feature set has become increasingly more sophisticated. Now PHP 5 boasts advanced features—such as new object-oriented capabilities and support for XML and Web Services—that will please even the most experienced web professionals while still remaining user-friendly enough for those with a lower tolerance for technical jargon.

If you've wanted to try your hand at PHP but haven't known where to start, then Learning PHP 5 is the book you need. If you've wanted to try your hand at PHP but haven't known where to start, then Learning PHP 5 is the book you need. With attention to both PHP 4 and the new PHP version 5, it provides everything from a explanation of how PHP works with your web server and web browser to the ins and outs of working with databases and HTML forms. Written by the co-author of the popular PHP Cookbook, this book is for intelligent (but not necessarily highly-technical) readers. Learning PHP 5 guides you through every aspect of the language you'll need to master for professional web programming results. This book provides a hands-on learning experience complete with exercises to make sure the lessons stick.

Learning PHP 5 covers the following topics, and more:

  • How PHP works with your web browser and web server
  • PHP language basics, including data, variables, logic and looping
  • Working with arrays and functions
  • Making web forms
  • Working with databases like MySQL
  • Remembering users with sessions
  • Parsing and generating XML
  • Debugging

Written by David Sklar, coauthor of the PHP Cookbook and an instructor in PHP, this book offers the ideal classroom learning experience whether you're in a classroom or on your own. From learning how to install PHP to designing database-backed web applications, Learning PHP 5 will guide you through every aspect of the language you'll need to master to achieve professional web programming results.

Table of Contents:
1Orientation and first steps1
2Working with text and numbers16
3Making decisions and repeating yourself33
4Working with arrays48
6Making web forms84
7Storing information with databases114
8Remembering users with cookies and sessions151
9Handling dates and times170
10Working with files192
11Parsing and generating XML210
13What else can you do with PHP?232
AInstalling and configuring the PHP interpreter255

Read also Criação de Trabalho de Reuniões:Como Começar, Venha Indo, e Fazem-no

Generation Myspace: Helping Your Teen Survive Online Adolescence: How Social Networking is Changing Friendship, Gossip, Sex, Drugs and Our Kids' Self-Esteem

Author: Candice M Kelsey

Does it seem like your teen can't tear herself away from friends on the computer screen (except to text them on her cell phone)? That's because MySpace, Facebook and YouTube are your son or daughter's life, not just another passing diversion. All that energy and time spent online is affecting your teen's life in countless ways, from sexual pressure and privacy to social standing and self-esteem.

Some schools are banning online networking sites, yet your child insists they're "no big deal." Who's right? Drawing on personal interviews with hundreds of teens, educator Candice M. Kelsey helps parents assess what they should—and shouldn't—be worried about when it comes to technology. A landmark book, Generation MySpace is the first guide to the new world of online adolescence, where you'll discover:

  • The Appeal of MySpace: How interaction becomes addictive, and how to stop it from taking control
  • Profiles, Adds, and Top 8 Popularity: How "friending" is redefining friendship
  • Baring It All: How kids as young as eleven are learning to market themselves—and why they're looking to celebrities and porn stars first
  • The Drug Connection: How social networking has made illicit substances easier for teens to get, and even easier to hide
  • From Predators to Cyber-Bullies: How to help your kids protect themselves

Tuesday, February 17, 2009

Applied Microsoft NET Framework Programming or Network Security Foundations

Applied Microsoft .NET Framework Programming

Author: Jeffrey Richter

The Microsoft® .NET Framework allows developers to quickly build robust, secure ASP.NET Web Forms and XML Web service applications, Windows® Forms applications, tools, and types. Find out all about its common language runtime and learn how to leverage its power to build, package, and deploy any kind of application or component. APPLIED MICROSOFT .NET FRAMEWORK PROGRAMMING is ideal for anyone who understands object-oriented programming concepts such as data abstraction, inheritance, and polymorphism. The book carefully explains the extensible type system of the .NET Framework, examines how the runtime manages the behavior of types, and explores how an application manipulates types. While focusing on C#, it presents concepts applicable to all programming languages that target the .NET Framework. Topics covered include:

. The .NET Framework architecture

. Building, packaging, deploying, and administering applications and their types

. Building and deploying shared assemblies

. Type fundamentals

. Primitive, reference, and value types

. Operations common to all objects

. Type members and accessibility

. Constants, fields, methods, properties, and events

. Working with text

. Enumerated types and bit flags

. Array types

. Interfaces

. Custom attributes

. Delegates

. Error handling with exceptions

. Automatic memory management

. AppDomains and reflectionIncludes coverage of C#

Table of Contents:

1. The Architecture of the .NET Framework Development Platform
Compiling Source Code into Managed Modules
Combining Managed Modules into Assemblies
Loading the Common Language Runtime
Executing Your Assembly's Code
   IL and Verification
The .NET Framework Class Library
The Common Type System
The Common Language Specification
Interoperability with Unmanaged Code
2. Building, Packaging, Deploying, and Administering Applications and Types
.NET Framework Deployment Goals
Building Types into a Module
Combining Modules to Form an Assembly
   Adding Assemblies to a Project Using the Visual Studio .NET IDE
   Using the Assembly Linker
   Including Resource Files in the Assembly
Assembly Version Resource Information
   Version Numbers
Simple Application Deployment (Privately Deployed Assemblies)
Simple Administrative Control (Configuration)
3. Shared Assemblies
Two Kinds of Assemblies, Two Kinds of Deployment
Giving an Assembly a Strong Name
The Global Assembly Cache
   The Internal Structure of the GAC
Building an Assembly That References a Strongly Named Assembly
Strongly Named Assemblies Are Tamper-Resistant
Delayed Signing
Privately Deploying Strongly Named Assemblies
Side-by-Side Execution
How the Runtime Resolves Type References
Advanced Administrative Control (Configuration)
   Publisher Policy Control
Repairing a Faulty Application

4. Type Fundamentals
All Types Are Derived from System.Object
Casting Between Types
   Casting with the C# is and as Operators
Namespaces and Assemblies
5. Primitive, Reference, and Value Types
Programming Language Primitive Types
   Checked and Unchecked Primitive Type Operations
Reference Types and Values Types
Boxing and Unboxing Value Types
6. Common Object Operations
Object Equality and Identity
   Implementing Equals for a Reference Type Whose Base Classes Don't Override Object's Equals
   Implementing Equals for a Reference Type When One or More of Its Base Classes Overrides Object's Equals
   Implementing Equals for a Value Type
   Summary of Implementing Equals and the ==/!= Operators
Object Hash Codes
Object Cloning

7. Type Members and Their Accessibility
Type Members
Accessibility Modifiers and Predefined Attributes
   Type Predefined Attributes
   Field Predefined Attributes
   Method Predefined Attributes
8. Constants and Fields
9. Methods
Instance Constructors
Type Constructors
Operator Overload Methods
   Operators and Programming Language Interoperability
Conversion Operator Methods
Passing Parameters by Reference to a Method
Passing a Variable Number of Parameters to a Method
How Virtual Methods Are Called
Virtual Method Versioning
10. Properties
Parameterless Properties
Parameterful Properties
11. Events
Designing a Type That Exposes an Event
Designing a Type That Listens for an Event
Explicitly Controlling Event Registration
Designing a Type That Defines Lots of Events
Designing the EventHandlerSet Type
12. Working with Text
The System.String Type
   Constructing Strings
   Strings Are Immutable
   Comparing Strings
   String Interning
   String Pooling
   Examining a String's Characters
   Other String Operations
Dynamically Constructing a String Efficiently
   Constructing a StringBuilder Object
   StringBuilder's Members
Obtaining a String Representation for an Object
   Specific Formats and Cultures
   Formatting Multiple Objects into a Single String
   Providing Your Own Custom Formatter
Parsing a String to Obtain an Object
Encodings: Converting Between Characters and Bytes
    Encoding/Decoding Streams of Characters and Bytes
   Base-64 String Encoding and Decoding
13. Enumerated Types and Bit Flags
Enumerated Types
Bit Flags
14. Arrays
All Arrays Are Implicitly Derived from System.Array
Casting Arrays
Passing and Returning Arrays
Creating Arrays That Have a Nonzero Lower Bound
Fast Array Access
Redimensioning an Array
15. Interfaces
Interfaces and Inheritance
Designing an Application That Supports Plug-In Components
Changing Fields in a Boxed Value Type Using Interfaces
Implementing Multiple Interfaces That Have the Same Method
Explicit Interface Member Implementations
16. Custom Attributes
Using Custom Attributes
Defining Your Own Attribute
Attribute Constructor and Field/Property Data Types
Detecting the Use of a Custom Attribute
Matching Two Attribute Instances Against Each Other
Pseudo-Custom Attributes
17. Delegates
A First Look at Delegates
Using Delegates to Call Back Static Methods
Using Delegates to Call Back Instance Methods
Demystifying Delegates
Some Delegate History: System.Delegate and System.MulticastDelegate
Comparing Delegates for Equality
Delegate Chains
C#'s Support for Delegate Chains
Having More Control over Invoking a Delegate Chain
Delegates and Reflection

18. Exceptions
The Evolution of Exception Handling
The Mechanics of Exception Handling
   The try Block
   The catch Block
   The finally Block
What Exactly Is an Exception?
The System.Exception Class
FCL-Defined Exception Classes
Defining Your Own Exception Class
How to Use Exceptions Properly
   You Can't Have Too Many finally Blocks
   Don't Catch Everything
   Gracefully Recovering from an Exception
   Backing Out of a Partially Completed Operation When an Unrecoverable Exception Occurs
   Hiding an Implementation Detail
What's Wrong with the FCL
Performance Considerations
Catch Filters
Unhandled Exceptions
   Controlling What the CLR Does When an Unhandled Exception Occurs
   Unhandled Exceptions and Windows Forms
   Unhandled Exceptions and ASP.NET Web Forms
   Unhandled Exceptions and ASP.NET XML Web Services
Exception Stack Traces
   Remoting Stack Traces
Debugging Exceptions
   Telling Visual Studio What Kind of Code to Debug
19. Automatic Memory Management (Garbage Collection)
Understanding the Basics of Working in a Garbage-Collected Platform
The Garbage Collection Algorithm
   What Causes Finalize Methods to Get Called
   Finalization Internals
The Dispose Pattern: Forcing an Object to Clean Up
   Using a Type That Implements the Dispose Pattern
   C#'s using Statement
   An Interesting Dependency Issue
Weak References
   Weak Reference Internals
   Designing an Object Pool Using Resurrection
Programmatic Control of the Garbage Collector
Other Garbage Collector Performance Issues
   Synchronization-Free Allocations
   Scalable Parallel Collections
   Concurrent Collections
   Large Objects
Monitoring Garbage Collections
20. CLR Hosting, AppDomains, and Reflection
Metadata: The Cornerstone of the .NET Framework
CLR Hosting
   Accessing Objects Across AppDomain Boundaries
   AppDomain Events
   Applications and How They Host the CLR and Manage AppDomains
The Gist of Reflection
Reflecting Over an Assembly's Types
Reflecting Over an AppDomain's Assemblies
Reflecting Over a Type's Members: Binding
Explicitly Loading Assemblies
   Loading Assemblies as "Data Files"
   Building a Hierarchy of Exception-Derived Types
Explicitly Unloading Assemblies: Unloading an AppDomain
Obtaining a Reference to a System.Type Object
Reflecting Over a Type's Members
   Creating an Instance of a Type
   Calling a Type's Method
   Bind Once, Invoke Multiple Times
Reflecting Over a Type's Interfaces
Reflection Performance


Books about: Human Services in Contemporary America or Nationalism Reader

Network Security Foundations

Author: Matthew Streb

The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the strongest possible starting point, no matter what your endeavor.

Network Security Foundations provides essential knowledge about the principles and techniques used to protect computers and networks from hackers, viruses, and other threats. What you learn here will benefit you in the short term, as you acquire and practice your skills, and in the long term, as you use them. Topics covered include:

• Why and how hackers do what they do

• How encryption and authentication work

• How firewalls work

• Understanding Virtual Private Networks (VPNs)

• Risks posed by remote access

• Setting up protection against viruses, worms, and spyware

• Securing Windows computers

• Securing UNIX and Linux computers

• Securing Web and email servers

• Detecting attempts by hackers

Monday, February 16, 2009

Object Oriented Design Heuristics or Security Patterns

Object-Oriented Design Heuristics

Author: Arthur Riel

Object-Oriented Design Heuristics offers insight into object-oriented design improvement. The more than sixty guidelines presented in this book are language-independent and allow you to rate the integrity of a software design. The heuristics are not written as hard and fast rules; they are meant to serve as warning mechanisms which allow the flexibility of ignoring the heuristic as necessary. This tutorial-based approach, born out of the author's extensive experience developing software, teaching thousands of students, and critiquing designs in a variety of domains, allows you to apply the guidelines in a personalized manner. The heuristics cover important topics ranging from classes and objects (with emphasis on their relationships including association, uses, containment, and both single and multiple inheritance) to physical object-oriented design. You will gain an understanding of the synergy that exists between design heuristics and the popular concept of design patterns; heuristics can highlight a problem in one facet of a design while patterns can provide the solution. Programmers of all levels will find value in this book. The newcomer will discover a fast track to understanding the concepts of object-oriented programming. At the same time, experienced programmers seeking to strengthen their object-oriented development efforts will appreciate the insightful analysis. In short, with Object-Oriented Design Heuristics as your guide, you have the tools to become a better software developer.

Table of Contents:
1The Motivation for Object-Oriented Programming1
2Classes and Objects: The Building Blocks of the Object-Oriented Paradigm11
3Topologies of Action-Oriented Versus Object-Oriented Applications29
4The Relationships Between Classes and Objects53
5The Inheritance Relationship75
6Multiple Inheritance131
7The Association Relationship143
8Class-Specific Data and Behavior151
9Physical Object-Oriented Design159
10The Relationship Between Heuristics and Patterns183
11The Use of Heuristics in Object-Oriented Design199
A Heuristics Summary219
B Memory Leakage in C++225
C Selected C++ Examples245

Book review: Urteil im Bilden der Unternehmerischen Entscheidung

Security Patterns: Integrating Security and Systems Engineering

Author: Duane Hybertson

Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security Patterns addresses the full spectrum of security in systems design, using best practice solutions to show how to integrate security in the broader engineering process.

• Essential for designers building large-scale systems who want best practice solutions to typical security problems

• Real world case studies illustrate how to use the patterns in specific domains

For more information visit

Sunday, February 15, 2009

Dissecting a C Application or Step by Step Composition Techniques for Digital Photographers

Dissecting a C# Application: Inside SharpDevelop

Author: Christain Holm

Learn advanced .NET programming techniques by getting an insiders' look at a complete application!

SharpDevelop is a complete Integrated Development Environment, written in C#. It includes all the advanced features that programmers expect from a modern IDE and, of course, implementing these features has required some advanced programming techniques.

The developers who created SharpDevelop give you an inside track on application development with a guided tour of the sourcecode for SharpDevelop. They will show you the most important code features and explain how you can use these techniques in your own projects. You will gain valuable experience of building an application on this scale, learning from the decisions, mistakes, problems and solutions that lead to the current version on SharpDevelop.

The SharpDevelop team will show you how to:

  • Build a highly modular application
  • Provide a flexible, extendable, customizable user interface
  • Manage the efforts of translators for effcient internationalization
  • Represent and manipulate text efficiently
  • Code search and replace functionality
  • Construct reusable controls
  • Implement a parser to provide syntax highlightingauto-completion as users type
  • Use reflection to access information about .NET classes
  • Create a Windows Forms designer
  • Generate code programmatically

    All of these techniques are shown in the context of the source of the SharpDevelop application - a real piece of software that you can download and user yourself. This means that there are no 'toy' examples or theory that will not work in practice - just solid, real-world code and frank discussions of how it was created.

    Table of Contents:
    Chapter 1: Features at a Glance
    Chapter 2: Designing the Architecture
    Chapter 3: Implementing the Core
    Chapter 4: Building the Application with Add?ins
    Chapter 5: Providing Functionality with Workspace Services
    Chapter 6: The User Interface
    Chapter 7: Internationalization
    Chapter 8: Document Management
    Chapter 9: Syntax Highlighting
    Chapter 10: Search and Replace
    Chapter 11: Writing the Editor Control
    Chapter 12: Writing the Parser
    Chapter 13: Code Completion and Method Insight
    Chapter 14: Navigating Code with the Class Scout and the Assembly Scout
    Chapter 15: The Designer Infrastructure
    Chapter 16: mplementing a Windows Forms Designer
    Chapter 17: Code Generation

    Book about: Commercializzazione di servizi: La gente, tecnologia, strategia

    Step-by-Step Composition Techniques for Digital Photographers: Learn to Capture More Dramatic and Appealing Images

    Author: Ernst Wildi

    This series of step-by-step guides acquaints amateur digital photographers with the full spectrum of techniques and technology they need to attain the professional edge in digital imaging. The manuals offer a clear, no-nonsense approach to teaching basic skills, such as understanding the basic functions of the digital camera and how to arrange a photograph artistically, while more experienced photographers will profit from the guides that focus on complex issues, including effective posing and lighting strategies, color and image balancing methods, and design techniques for perfecting the digital image in Adobe Photoshop Elements.

    This thorough composition guide details the various components involved in composing a professional-looking, artistically arranged photograph. Basic elements of photography, different image formats and backgrounds, and the importance of color and image balance are discussed along with tips on subject placement, such as using attention-grabbing elements and naturally existing lines to help a scene or subject look its best. How to keep the image simple and improve backgrounds post-capture are also reviewed.

  • Thursday, February 12, 2009

    Business the Amazoncom Way or First Course in Database Systems

    Business the Way: Secrets of the World's Most Astonishing Web Business (Big Shots Series)

    Author: Rebecca Saunders

    Having toppled the bookselling giants on-line, Jeff Bezos is now leading its list, not to mention a makeover for the web's most recognisable site, is Amazon pushing its luck or positioning for the future of e-commerce? The so-called 'market correction' has questioned the future of e-retailing, but for Amazon the future is still bright.
    Now completely updated for this new edition, Business the Way shows how Jeff Bezos is leading Amazon into the harvesting phase, promising a great ride for investors, a great experience for shoppers and a model for entrepreneurs and business leaders everywhere.

    Books about: Pasta Perfection with DVD or Salads and Side Dishes from around the World

    First Course in Database Systems

    Author: Jeffrey D Ullman

    Written by well-known computer scientists, this accessible and succinct introduction to database systems focuses on database design and use. It provides in-depth coverage of databases from the point of view of the database designer, user, and application programmer. The authors provide an overview of important programming systems (e.g., SQL, JDBC, PSM, CLI, PHP, XQuery, etc.) and the intellectual framework to put them into context.  For software engineers, database engineers, and programmers.


    Designed for a one-semester advanced-undergraduate or beginning- graduate course introducing database design, programming, and other aspects that will be elaborated in further courses for computer- science students. Assumes a sophomore-level knowledge of data structures, algorithms, discrete math, software systems and engineering, and programming languages. Support is available on the World Wide Web. Annotation c. by Book News, Inc., Portland, Or.

    Table of Contents:
    1The Worlds of Database Systems1
    2Database Modeling25
    3The Relational Data Model85
    4Operations in the Relational Model173
    5The Database Language SQL243
    6Constraints and Triggers in SQL327
    7System Aspects of SQL361
    8Object-Oriented Query Languages411

    Wednesday, February 11, 2009

    Palm for Dummies or The Art and technique of Digital Color Correction

    Palm for Dummies (2nd Edition)

    Author: Bill Dyszel

    * Covers the capabilities of the latest Palm operating system, OS 5.0, including the ability to make phone calls and access "always-on" corporate e-mail.
    * Author is a nationally-known expert on personal information and sales automation technology.

    Table of Contents:
    Pt. IGetting to Know Your Palm Organizer9
    Ch. 1What Can a Palm Device Do?11
    Ch. 2Going in Stylus35
    Ch. 3Making Your Palm Device Your Own53
    Ch. 4Tips for Saving Time with Your Palm Computer75
    Pt. IIGetting Down to Business83
    Ch. 5Names and Addresses in a Zip85
    Ch. 6Doing It NOW with To-Dos105
    Ch. 7Thanks for the Memos127
    Ch. 8The Date Game145
    Pt. IIIPalm Organizers and the Outside World163
    Ch. 9Beaming Data165
    Ch. 10Doing Business Everywhere with Documents To Go175
    Ch. 11Using the PalmModem187
    Pt. IVMaking the Palm Connection to Bigger Things201
    Ch. 12Operating the Palm Desktop Program203
    Ch. 13Managing Palm Data233
    Ch. 14Installing and HotSyncing to the Desktop Program245
    Pt. VGoing Outside the Box with Your Palm251
    Ch. 15Wireless Wonderland253
    Ch. 16Professional Palm Software273
    Ch. 17Special Delivery: Using Palm Mail287
    Ch. 18Brain-Building with Palm Expansion Cards309
    Pt. VIThe Part of Tens315
    Ch. 19Ten Nifty Palm Accessories317
    Ch. 20Ten Internet Resources for Palm Computing321
    App. AEnterprise Applications: Palm Software for Big Business327
    App. B: Which Palm Device Is Which?331

    Go to: Microsoft Office 2007 or Essentials of Business Information Systems

    The Art and technique of Digital Color Correction

    Author: Steve Hullfish

    "Color correction has always been a true tradecraft. The only way you learned was by sitting at the feet of a master.
    Steve has demystified much of that and given both beginners and professionals a fantastic resource. Reading this is like sitting at the feet of the masters."
    — Lucas Wilson, ASSIMILATE, INC.

    "...demystifies the technical art of color correction by patiently distilling the wisdom of over a dozen professional colorists down to a skillset any dedicated editor or motion graphics artist can learn."
    — Chris Meyer, Founding Partner, CyberMotion; author — Creating Motion Graphics with After Effects, currently in its 4th Edition; After Effects Apprentice

    "...great for editors who are tackling their first color-grading job as well as those who do it every day, but want a deeper understanding of how to turn color correction into color enhancement.... Hullfish goes past the 'how-to' so you alsounderstand the 'why'. This book is a must-have for anyone involved in color correction for video."
    — Oliver Peters, President and Founder, Oliver Peters Post Production Services

    Containing decades of industry experience and know-how, The Art and Technique of Digital Color Correction shows postproduction professionals how to take their art to the next level. Featuring correction techniques performed in a variety of color correction software applications (Apple's Color, Synthetic Aperture's Color Finesse, Avid Xpress Pro, among others), this book turns what has long been a misunderstood 'black art' into a set of skills that any dedicated editor or motion graphics artist can begin to master. Packed with explanations, tips, and concepts thatbuild on each other, The Art and Technique of Digital Color Correction will teach you how to:

    •Fix poorly exposed shots and shots with color casts
    •Create looks
    •Match shots
    •Master secondary color correction techniques
    •Use color correction to advance a story

    The Art and Technique of Digital Color Correction features unprecedented insight into the skills needed to master this essential art. The book allows you to improve your grading art and craft with techniques and inspiration from the masters, as more than a dozen industry professionals guide you through their grading process, explaining the "hows" and "whys" of each grade. Colorists looking to hone their skills can work side-by-side with these pros by examining each color-grading step they make on the tutorial video files included on the companion DVD.

    Steve Hullfish has been a producer and on-line editor for over 20 years. Through his company, Verascope Pictures, he produces and consults for clients such as Universal Studios, NBC Television, Turner Networks, HIT Entertainment and VeggieTales.