Saturday, January 31, 2009

CCENT Exam Prep or Mastering VBA

CCENT Exam Prep (Exam 640-822)

Author: Jeremy Cioara

Your Complete Certification Solution

In this book you'll learn how to:

  • Understand the foundations of network communication as described in the OSI and TCP/IP models
  • Accurately design and troubleshoot networks using IP subnetting skills
  • Understand the operational components and models of Cisco® routers and switches
  • Perform basic navigation and configurations using Cisco IOS® Software and Cisco Secure Device Manager
  • Apply techniques to secure networks
  • Implement and troubleshoot Distance Vector (RIPv2) routing protocols
  • Implement and troubleshoot NAT, DHCP, and DNS operation on a router
  • Implement and secure wireless LANs (WLANs)
  • Implement and verify basic WAN links

CD Features New Simulation Questions!
The CD features innovative testing software powered by MeasureUp, an electronic copy of the book, and 75 minutes of video instruction that highlight five scenarios to help prepare for simlet questions on the new exams. The MeasureUp testing software gives you an effective tool to assess your readiness for the ICND1 exam:

  • Detailed explanations of correct and incorrect answers
  • Multiple test modes
  • Random questions and order of answers
  • Coverage of all CCENT™ ICND1 exam objectives



    Table of Contents:
    Cisco ICND1 Exam Objectives
    xxv
    Exam Descriptionxxv
    Exam Topicsxxv
      Describe the operation of data networksxxv
      Implement a small switched networkxxv
      Implement an IP addressing scheme and IP services to meet network requirements for a small branch officexxvi
      Implement a small routed networkxxvi
      Explain and select the appropriate administrative tasks required for a WLANxxvii
      Identify security threats to a network and describe general methods to mitigate those threatsxxvii
      Implement and verify WAN linksxxvii
    Introduction1
    How This Book Helps You1
    Network Hardware and Software Requirements3
    Advice on Taking the Exam4
    Chapter 1: Standard Internetworking Models7
    Introduction10
    What Is an Internetwork?10
    Types of Internetworks11
      Local Area Network (LAN)11
      Metropolitan Area Network (MAN)12
      Wide Area Network (WAN)12
      Storage Area Network (SAN)13
      Virtual Private Network (VPN)14
    Open Systems Interconnection (OSI) Model14
      Upper Layers15
      Application Layer15
      Presentation Layer17
      Session Layer18
      Lower Layers18
      Transport Layer18
      Network Layer20
    Data Link Layer21
      Physical Layer23
      OSI Layered Communications23
    TCP/IP Model25
      Application Layer26
      Transport Layer27
      Internet Layer31
      Network Interface Layer33
    Cisco 3-Layer Hierarchical Model33
      Access Layer34
      Distribution Layer35
      Core Layer35
    Chapter Summary37
      Key Terms37
    Apply Your Knowledge40
      Exercises40
      Review Questions41
      Exam Questions41
      Answers to Review Questions45
      Answers to Exam Questions47
      Suggested Readings and Resources49
    Chapter 2: Physical Layer Networking Concepts51
    Introduction54
    Network Topologies54
      The Bus Topology54
      The Ring Topology55
      The Star Topology56
      The Mesh Topology57
    Cabling58
      Coaxial Cable59
      Twisted-Pair Cable60
      Fiber-Optic Cable63
    Wireless64
      Wireless Fidelity (Wi-Fi)65
      Infrared65
      Bluetooth66
    Physical Layer Devices66
      Repeaters66
      Hubs67
      Network Interfaces67
    Chapter Summary68
      Key Terms68
    Apply Your Knowledge69
      Exercises69
      Review Questions70
      Exam Questions70
      Answers to Review Questions77
         Answers to Exam Questions77
      Suggested Readings and Resources79
    Chapter 3: Data Link Networking Concepts81
    Introduction84
    Data Link Protocols84
      Token Ring84
      FDDI86
      Ethernet at the Data Link Layer87
    Physical Ethernet Standards93
      Ethernet93
      Fast Ethernet96
      Gigabit Ethernet97
      10-Gigabit Ethernet (10GbE)99
      Long Reach Ethernet100
    Data Link Layer Devices100
      Bridges101
      Switches104
    Duplex105
    Microsegmentation106
    Chapter Summary107
      Key Terms107
    Apply Your Knowledge109
      Exercises109
      Review Questions110
      Exam Questions110
      Answers to Review Questions114
      Answers to Exam Questions115
      Suggested Readings and Resources117
    Chapter 4: General Network Security119
    Introduction122
    Classes of Attack122
      Access Attacks123
      Reconnaissance Attacks125
      Denial of Service (DoS) Attacks127
    Mitigating Network Threats130
      AAA130
      Cisco ACLs130
      Cisco IOS Secure Management Features131
      Encryption Protocols132
    Security Appliances and Applications132
    Chapter Summary134
      Key Terms134
    Apply Your Knowledge135
      Exercise135
      Review Questions136
      Exam Questions136
      Answers to Review Questions138
      Answers to Exam Questions138
      Suggested Readings and Resources139
    Chapter 5: IP at the Network Layer141
    Introduction144
    Network Layer Functions144
    IP Addressing and Formats145
      Binary145
      Hexadecimal150
      IP Address Classes151
      Subnet Masks154
      Private (RFC 1918) Addressing156
    Subnetting IP156
      Calculating Hosts in a Subnet159
      Calculating Networks in a Subnet161
      The Increment162
      Determining the Range of Valid IPs165
    Network Layer Devices167
      Routers167
      Layer 3 Switches170
    Chapter Summary171
      Key Terms171
    Apply Your Knowledge172
      Exercises172
      Review Questions175
      Exam Questions175
      Answers to Review Questions179
      Answers to Exam Questions181
      Suggested Readings and Resources183
    Chapter 6: Introduction to Cisco Routers and Switches185
    Introduction188
    Interfaces and Modules188
      LAN Interfaces188
      WAN Interfaces189
    Cisco Memory Components192
      ROM193
      Flash193
      RAM193
      NVRAM193
    Cisco Internetworking Operating System193
      Feature Sets194
      IOS Image File Naming195
    Cisco Router Models and Features196
    Cisco Switch Models and Features197
    Chapter Summary199
      Key Terms199
    Apply Your Knowledge200
      Exercises200
      Review Questions200
      Exam Questions201
      Answers to Review Questions203
      Answers to Exam Questions204
      Suggested Readings and Resources205
    Chapter 7: Foundation Cisco IOS Operations207
    Introduction210
    Terminal Options210
      Console Port210
      Auxiliary Port212
      Telnet212
      HTTP and HTTPS212
      SSH213
    Router/Switch Startup Procedures214
      POST214
      Bootstrap215
      IOS Loading215
      Configuration Loading217
    Navigating the IOS220
      User EXEC220
      Privileged EXEC221
      Global Configuration222
      Context-Sensitive Help224
      Abbreviations226
      Shortcut Keys226
      Common Syntax Errors227
    Chapter Summary230
      Key Terms231
    Apply Your Knowledge231
      Exercises231
      Review Questions233
      Exam Questions233
      Answers to Review Questions235
      Answers to Exam Questions236
      Suggested Readings and Resources237
    Chapter 8: Foundation Cisco Configurations239
    Introduction242
    Global Configuration242
      Altering the Boot Sequence242
      Changing the Hostname244
      Creating a Login Banner244
      Assigning a Password for Privileged EXEC Mode245
      Domain Name—Specific Commands246
      Enabling SSH247
    Line Configurations248
      Securing Console Access to User EXEC248
      Securing Auxiliary Access to User EXEC250
      Securing Telnet and SSH Access to User EXEC250
    Router Interface Configurations253
      Assigning an IP Address254
      Enabling the Interface255
      LAN-Specific Commands255
      WAN-Specific Commands256
    Saving Configurations256
    Using the show Command to Get Information258
      Verifying Your Configurations259
      Viewing Interface Statuses and Statistics260
      IOS File Version show Commands264
    Troubleshooting Commands266
    Backing Up and Restoring Configurations and IOS Using TFTP269
    Neighbor Discovery with CDP272
    Using Telnet for Virtual Terminal Access276
      Terminal Monitor277
    IOS DHCP278
    Chapter Summary281
      Key Terms282
    Apply Your Knowledge284
      Exercises284
     Review Questions285
      Exam Questions286
      Answers to Review Questions289
      Answers to Exam Questions290
      Suggested Readings and Resources291
    Chapter 9: Understanding the Cisco SDM293
    Introduction296
    Getting Started296
    Global Configurations298
      Changing the Hostname, Banner, Domain Name, and Secret Password299
      Router Access303
      DNS304
      DHCP305
    Router Interface Configurations308
      Assigning an IP Address308
      Enabling the Interface309
      Saving and Verifying Your Configurations310
    Monitoring310
    Chapter Summary312
      Key Terms312
    Apply Your Knowledge312
      Exercise312
      Review Questions312
      Exam Questions313
     Answers to Review Questions315
      Answers to Exam Questions316
      Suggested Readings and Resources316
    Chapter 10: Introduction to Routing and Routing Protocols317
    Introduction320
    The Default Gateway320
      Verifying and Troubleshooting the Default Gateway322
    Routing Sources323
      Administrative Distance324
    Static Routes325
      Configuring Static Routes326
      Floating Static Routes327
    Default Routes328
    Configuring Static and Default Routes with SDM329
    Verifying Static and Default Routes330
      Dynamic Routing Protocols331
      Routing Metrics332
      Classful and Classless Routing Updates333
    VLSM336
      Interior and Exterior Gateway Routing Protocols340
      Distance Vector Routing Protocols340
      Link-State Routing Protocols341
      Advanced Distance Vector/Hybrid Routing Protocols341
    The Routing Table Revisited342
    Routing Redistribution343
    Chapter Summary345
      Key Terms346
    Apply Your Knowledge347
      Exercises347
      Review Questions348
      Exam Questions348
      Answers to Review Questions351
      Answers to Exam Questions351
      Suggested Readings and Resources353
    Chapter 11: Distance Vector Routing Protocols355
    Introduction358
      Distance Vector Operations358
      Routing Loops360
    Routing Loop Mitigation362
      Counting to Infinity363
      Split Horizon363
      Route Poison, Poison Reverse, and Hold-Down Timers364
      Triggered Updates366
      Invalid/Dead Timers367
    RIP367
      RIP Characteristics367
      RIP Configuration368
      Passive Interfaces371
      RIPv2 Characteristics371
      RIPv2 Configuration372
      Configuring RIP with SDM373
      RIP Verification374
      Troubleshooting RIP375
    Chapter Summary379
      Key Terms380
    Apply Your Knowledge380
      Exercises380
      Review Questions382
      Exam Questions382
      Answers to Review Questions384
      Answers to Exam Questions385
      Suggested Readings and Resources386
    Chapter 12: Enabling Internet Connectivity with NAT387
    Introduction390
    NAT Concepts391
      Static NAT392
      Dynamic NAT393
      NAT Overload and Port Address Translation394
    NAT Terminology395
    Configuring NAT Using Cisco SDM397
      Configuring NAT Overload397
    Verifying NAT Configuration410
    Troubleshooting NAT413
    Chapter Summary415
      Key Terms415
      Review Questions416
    Apply Your Knowledge416
      Exam Questions416
      Answers to Review Questions419
      Answers to Exam Questions419
      Suggested Reading and Resources421
    Chapter 13: Foundation Switching Operations423
    Introduction426
      Switching Functionality426
    Frame Transmission Methods427
      Store-and-Forward428
      Cut-Through428
      Fragment-Free428
    Half- and Full-Duplex Connections429
    Switching Design430
    Spanning Tree Protocol430
      Root Bridge431
      Root Ports432
      Designated Ports434
      Blocked Ports435
    Port State Transitions437
    Initial Switch Configurations438
      Assigning a Management IP Address to a Switch439
      Defining a Default Gateway439
      IP Assignment Using DHCP440
      Configuring Multiple Switch Interfaces441
      Verifying Spanning Tree Protocol442
    Troubleshooting Basic Switch Connectivity442
    Chapter Summary445
      Key Terms445
    Apply Your Knowledge446
      Exercises446
      Review Questions448
      Exam Questions449
      Answers to Review Questions452
      Answers to Exam Questions452
    Suggested Readings and Resources454
    Chapter 14: Implementing Switch Security455
    Introduction458
    Securing Physical Access to the Catalyst Switch458
    Securing Terminal Access to the Catalyst Switch458
      To Telnet or Not to Telnet460
      Additional IOS Security Practices461
    Layer 2 Security461
      Port Security462
      “See”DP464
    Chapter Summary466
      Key Terms466
    Apply Your Knowledge467
      Exercises467
      Review Questions469
      Exam Questions469
      Answers to Review Questions471
      Answers to Exam Questions472
      Suggested Readings and Resources472
    Chapter 15: Understanding Wireless Networking473
    Introduction476
    The Business Case476
    The Players in the 802.11 Market477
    Entering the Radio Frequency World478
      Understanding Wireless Transmission478
      Unlicensed RF Bands479
      The Key to Successful Wireless: Channel Surfing480
    The 802.11 Standards Family483
      Party Like It’s 1999: 802.11a and 802.11b483
       2003 Delivers: 802.11g483
      The Next Generation: 802.11n484
    Chapter Summary485
      Key Terms485
    Apply Your Knowledge486
      Exercise486
      Review Questions486
      Exam Questions487
      Answers to Review Questions489
      Answers to Exam Questions489
      Suggested Readings and Resources490
    Chapter 16: Wireless Security and Implementation Considerations491
    Introduction494
    Understanding the Threats494
      War Driving494
      Direct Hacking495
      Employee Ignorance495
    Deploying a Secure Wireless Network496
      Wireless Encryption496
      Wireless Authentication (802.1x)499
      Wireless Intrusion Prevention System (IPS)500
    Wireless Implementation Guidelines501
      Understanding Wireless Topologies501
      Understanding Wireless Data Rates503
      General Wireless Implementation Steps506
      Wireless Troubleshooting506
    Chapter Summary508
      Key Terms508
    Apply Your Knowledge509
      Review Questions509
      Exam Questions509
      Answers to Review Questions512
      Answers to Exam Questions512
      Suggested Readings and Resources513
    Chapter 17: Wide Area Network Connections515
    See also: Design to Sell Using Microsoft Publisher to Inform Motivate and Persuade or Visio 2007 Bible

    Mastering VBA

    Author: Guy Hart Davis

    Curious to learn how to write macros, automate Office applications, or create custom applications in Word, Excel, PowerPoint, Outlook or Access? With this comprehensive guide to Visual Basic for Applications (VBA), you can master the language that underlines the Microsoft Office products. Revised for the new versions of the language and the Office suite, this book is completely up-to-date. Aimed at everyone from power users to system administrators and professional developers, it covers all Office products in depth. You'll discover that VBA is easily accessible by novice programmers, yet powerful enough for IT professionals who need to create specialized business applications.



Friday, January 30, 2009

Microsoft Visual C 2008 Express Edition or Agile Web Development with Rails

Microsoft Visual C# 2008 Express Edition: Build a Program Now!

Author: Patrice Pelland

In this lively, eye-opening, hands-on book, all you need is a computer and the desire to learn how to program with Microsoft Visual C# 2008 Express Edition. Featuring a full edition of the software, this fun and highly visual guide walks you through a complete programming project-a desktop weather-reporting application-from start to finish. You'll get an introduction to the Microsoft Visual Studior development environment and learn how to put the lightweight, easy-to-use tools in Visual C# Express Edition to work right away-creating, compiling, testing, and delivering your first ready-to-use program. You'll get expert tips, coaching, and visual examples at each step of the way, along with pointers to additional learning resources.

Key Book Benefits:
• This dynamic, full-color, highly-visual book is designed to help novice programmers build fundamental programming skills for Windowsr-quickly and easily
• Provides a quick-start, project-based approach!
• Provides complete software for Visual C# 2008 Express Edition and all the instructions needed to understand and put those tools to work right away
• Features a complete desktop application that can be easily modified and reused-a great learn-by-doing example



Interesting book: La métrique et les Modèles dans l'Ingénierie de Qualité de Logiciel

Agile Web Development with Rails

Author: Dave Thomas

Rails is a full-stack, open-source web framework that enables you to create full-featured, sophisticated web-based applications, but with a twist... A full Rails application probably has less total code than the XML you'd need to configure the same application in other frameworks.

With this book you'll learn how to use ActiveRecord to connect business objects and database tables. No more painful object-relational mapping. Just create your business objects and let Rails do the rest. You'll learn how to use the Action Pack framework to route incoming requests and render pages using easy-to-write templates and components. See how to exploit the Rails service frameworks to send emails, implement web services, and create dynamic, user-centric web-pages using built-in Javascript and Ajax support. There are extensive chapters on testing, deployment, and scaling.

You'll see how easy it is to install Rails using your web server of choice (such as Apache or lighttpd) or using its own included web server. You'll be writing applications that work with your favorite database (MySQL, Oracle, Postgres, and more) in no time at all.

You'll create a complete online store application in the extended tutorial section, so you'll see how a full Rails application is developed---iteratively and rapidly.

Rails strives to honor the Pragmatic Programmer's "DRY Principle" by avoiding the extra work of configuration files and code annotations. You can develop in real-time: make a change, and watch it work immediately.

Forget XML. Everything in Rails, from templates to control flow to business logic, is written in Ruby, the language of choice for programmers who like to get the job donewell(and leave work on time for a change).

Rails is the framework of choice for the new generation of Web 2.0 developers. Agile Web Development with Rails is the book for that generation, written by Dave Thomas (Pragmatic Programmer and author of Programming Ruby) and David Heinemeier Hansson, who created Rails.



Table of Contents:
1Introduction1
2The architecture of rails applications11
3Installing rails21
4Instant gratification27
5The depot application47
6Task A : product maintenance53
7Task B : catalog display71
8Task C : cart creation79
9Task D : checkout!101
10Task E : shipping115
11Task F : administrivia125
12Task T : testing139
13Rails in depth181
14Active record basics199
15More active record253
16Action controller and rails289
17Action view339
18The Web, V2.0385
19Action mailer411
20Web services on rails423
21Securing your rails application439
22Deployment and scaling453
AIntroduction to Ruby481
BConfiguration parameters497

Thursday, January 29, 2009

Wireless Guide to Wireless Communications or OpenGL ES Game Programming

Wireless# Guide to Wireless Communications

Author: Jorge Olenewa

Due to the recent emergence of wireless technologies in business, there has been an increase in demand for skilled wireless professionals. This comprehensive hands-on text explores the latest wireless technologies in the networking industry, including Bluetooth, SWAP, Wireless LANs, 802.11a and 802.11b, cellular telephone, broadband, infrared lasers, microwave, spread spectrum, and satellite. Designed for anyone taking an entry-level wireless technology course, this book also offers important historical coverage of wireless technology to show how we got to where we are today and where we can expect to see wireless networks in the future.



New interesting book: Overdosed America or Que Comeria Jesus

OpenGL-ES Game Programming

Author: Dave Astl

OpenGL ES Game Development provides an in-depth look into the new OpenGL ES standard and what the new embedded systems graphics library will provide for game developers. It compares OpenGL ES to OpenGL, EGL (the new standard windowing APIs for OpenGL ES), game development, and platforms that are currently available. It also provides coverage of the problems involved in mobile game development with OpenGL ES. Additional coverage includes an overview of fixed point math and other areas of cell phone limitation that game developers need to consider before they write mobile games. The authors walk the reader through the steps required to develop a game on multiple mobile platforms, which is the process involved with distributing their game via carriers. This book is ideally suited for readers who have some experience either in making games or in developing applications for cell phones, and who are comfortable with C++ and OpenGL?s core features.



Table of Contents:
Ch. 1Introduction1
Ch. 2The EGL interface5
Ch. 3OpenGL ES35
Ch. 4A fixed point math primer67
Ch. 5Developing OpenGL ES games89
Ch. 6Limitations of the medium125
Ch. 7Audio for mobile devices153
Ch. 83D game engines for mobile devices195
Ch. 9The future239
Ch. 10The mobile business model263

Tuesday, January 27, 2009

XML or Haystack Syndrome

XML: Your visual blueprint for building expert Web sites with CSS, XHTML, and XSL

Author: Rob Huddleston

If you're a visual learner, you'll love the only guidebook series that takes a visual approach to professional-level computer topics. High-resolution screen shots demonstrate over 100 key XML techniques, including choosing a text editor, adding entities and CDATA to XML documents, restricting the recurrence of elements, and generating XML using Access or Excel. Learn to create an XHTML transitional page, loop and sort with XSLT, debug with Firebug, and much more. Succinct explanations walk you through step by step.



Table of Contents:
HOW TO USE THIS BOOK.

1 GETTING STARTED WITH XML.

Introducing XML.

Introducing XSLT.

Introducing XHTML.

Introducing CSS.

View XML in a Browser.

Introducing the Anatomy of an XML Document.

Choose a Good Text Editor.

2 CREATING XML DOCUMENTS.

Create Your First XML Document.

Add Child Elements and Data to Your Document.

Add Attributes.

Add Entities and CDATA.

Using a Namespace.

3 DEFINING THE STRUCTURE OF XML WITH SCHEMAS.

Introducing Schemas.

Using the Schema Namespace.

Add Complex Type Elements.

Add Data Types.

Add Attributes.

Add Simple Elements.

Add Mixed Elements.

Restrict the Recurrence of Elements.

Link Your XML to Your Schema.

Check the Validity of the Document.

Build a Schema Visually Using XMLSpy.

4 USING OTHER VALIDATION SCHEMAS.

Introducing DTDs.

Create a Simple DTD.

Add Attributes.

Add Entities.

Using Parameter Entities.

Introducing RELAX NG.

Create a RELAX NG Document in XML.

Using the RELAX NG Compact Syntax.

5 GENERATING XML FROM EXISTING DATA.

Using Microsoft Access 2003 to Generate XML.

Using Microsoft Access 2007 to Generate XML.

Using Microsoft Excel 2003 to Generate XML.

Using Microsoft Excel 2007 to Generate XML.

6 LEARNING XHTML BASICS.

Introducing XHTML.

Create a Basic XHTML Transitional Page.

Add a Title.

Add Headings.

Add Text.

Using Entities.

Add a Link.

Add an Image.

Add a Table.

Create Lists.

7 TRANSFORMING XML TO XHTML WITH XSLT.

Understanding XSLT.

Understanding the XSLT Namespace.

Understanding XPath.

Specify an Output Format.

Create an XSLT Template.

Transform Element Values.

Add Text to the Transformation.

Apply Templates.

Loop with XSLT.

Sort with XSLT.

Using Conditional Logic in XSLT.

Create an Element.

Include and Import Other XSLT Files.

Using Variables and Parameters.

Run the Transformation with a Web Browser.

Run the Transformation Using Altova XMLSpy.

Run the Transformation Using PHP.

Run the Transformation Using Adobe ColdFusion.

Run the Transformation Using ASP.NET.

Create an XSLT Document Using Adobe Dreamweaver CS3.

8 FORMATTING YOUR WEB SITE USING CSS.

Understanding CSS.

Change the Font.

Change the Color of Text.

Add a Background Color and Image.

Add Borders.

Add Padding and Margins.

Position Elements.

Float Elements.

Combine Floats, Positioning, and Margins for Layout.

Apply Styles with a Class Selector.

Apply Styles with an ID Selector.

Using Contextual Selectors.

Style Headings.

Style Lists.

Style Links.

Using Other Pseudo-Classes and Pseudo-Elements.

Design Content Sections.

Create a Style Guide.

Create a Printable Version of Your Web Pages.

Create a Version of Your Page for Handheld Devices.

9 TRANSLATING LEGACY HTML TO XHTML.

Clean Up HTML with Tidy.

Convert HTML to XHTML Using Adobe Dreamweaver.

Remove Presentational Markup Using Dreamweaver’s Find and Replace.

Strip Tables in Dreamweaver.

Add Alternative Text to All Images.

10 DESIGNING AND BUILDING YOUR WEB SITE.

Lay Out Your Folder Structure.

Plan Your Site’s Navigation.

Create an Index Page.

Create an About You XML File.

Translate the About You File to XHTML.

Create a Favorite Movies XML File.

Translate the Favorite Movies File to XHTML.

Add a Site Icon.

Put Some Advertising on Your Site.

11 PUBLISHING YOUR WEB SITE.

Find a Host.

Get a Domain Name.

Publish Your Web Site Using Windows FTP.

Publish Your Web Site Using Adobe Dreamweaver.

Publish Your Web Site Using SmartFTP.

Get Your Site Found by Search Engines.

12 TESTING AND DEBUGGING.

Validate Your XHTML.

Debug with Firebug.

Validate CSS.

Check Your Site’s Accessibility.

Test Your Links.

Avoid Common XML Mistakes.

Avoid Common XHTML Mistakes.

Avoid Common CSS Mistakes.

Avoid Common XSLT Mistakes.

Avoid Common Browser-Specific Mistakes.

Avoid Common Usability Mistakes.

13 INTEGRATING YOUR WEB SITE WITH OTHER WEB SITES.

Understanding RSS.

Create an RSS Feed.

Show Your Photos with Flickr.

Embed a YouTube Video on Your Site.

Show Your del.icio.us Links.

Embed a Google Map on Your Site.

Add Google Search to Your Site.

APPENDIX A XHTML REFERENCE.

APPENDIX B CSS REFERENCE.

APPENDIX C XSD REFERENCE.

APPENDIX D XSLT REFERENCE.

APPENDIX E XPATH REFERENCE.

Book about: After Cancer Treatment or Silencing the Self

Haystack Syndrome: Sifting Information out of the Data Ocean

Author: Eliyahu M Goldratt

A must for every manager concerned with meeting the challenges of the 21st century. You'll see the differences between data and information in a new light, and understand precisely how misunderstanding those differences can affect the quality of your decision-making process. Starting with the structure of an organization, The Haystack Syndrome ends with a detailed description of the logic that must underpin the information system for any organization to maximize effectiveness.

Part One:
Formalizing the Decision Process - Defining the goal, the measurements, and how to continuously improve the whole system - the Theory of Constraints.

Part Two:
The Architecture of an Information System - Dealing with information as it relates to the real world; quantifying Murphy, the time-buffer concept, directing process improvements, measuring local performance.

Part Three:
Scheduling - how to implement a real process of ongoing improvement requiring interplay between the system and the manager, resolving all conflicts, considering capacity and protection.



Monday, January 26, 2009

Linux Toys II or Definitive Guide to Apache MyFaces and Facelets

Linux Toys II: 9 Cool New Projects for Home, Office, and Entertainment

Author: Christopher Negus


• Builds on the success of the original Linux Toys, with new projects you can build using different Linux distributions

• All-new toys in this edition include a MythTV entertainment center, eMoviX bootable home movies, a BZFlag game client and server, and an Icecast Internet radio station, plus five more.

• Companion Web site, LinuxToys.net, provides information for further enhancing your Linux Toys II projects

• Includes a CD-ROM with scripts, packages, and code for the projects




Interesting textbook: Migraines for Dummies or Pocket Guide to the 12 Steps

Definitive Guide to Apache MyFaces and Facelets

Author: Zubin Wadia

The Definitive Guide to Apache MyFaces and Facelets
is an ideal reference if you're looking to develop real-world applications with the open source lightweight Apache MyFaces and Dojo (the Ajax API). The book focuses less on theory and more on aspects like scalability, design, optimization, and configurability.

This book emphasizes meeting real-world requirements for performance and scalability. It includes lucid code samples that reflect the pattern being described. The "In the Trenches" sections in each chapter give you advice and recommendations based on actual experiences with each pattern. What's more, the "Extreme Extensions" section at the end of each relevant chapter is dedicated to a "freestyle" expression of taking a particular pattern or set of patterns to the max. (This is a great way for you to learn because of the magnification effect.) This is also the first book to embrace the Dojo framework for Ajax (soon to be an Apache project).



Sunday, January 25, 2009

Marketing Kit for Dummies or Pokemon Mystery Dungeon

Marketing Kit for Dummies

Author: Alexander Hiam

In his bestselling book Marketing For Dummies, Alexander Hiam revealed the secrets of effective marketing for every kind of business. In the first edition of Marketing Kit For Dummies, he presented a wealth of practical and effective tools and tactics for implementing effective campaigns quickly and cheaply. This new edition of Marketing For Dummies offers all the proven advice as the first edition, but with new information and state-of-the-art Internet marketing techniques.

Whether your business is large or small, staffed by a few people, a few hundred, or thousands, Marketing Kit For Dummies, 2nd Edition offers everything you need to know — and all the tools you need to implement — for marketing campaigns that drive business results. Straight to the point and full of common wisdom on what works and what doesn’t, this book covers all the bases:



• Tap into the power of the Internet

• Create buzz with publicity

• Research, plan, and budget effectively

• Set up winning sales promotions

• Generate sales with action ads

• Launch winning Web campaigns



Expert author Alexander Hiam — marketing specialist, business professor, and operator of an independent consulting firm — gives you the handy specialized tools that make marketing a breeze. The accompanying CD-ROM is packed with practical tools from marketing plans, to advertising objective worksheet, to proven and effective Web page templates, and even free stock photography! With this marketing toolkit in hand, you’ll learn howto:



• Master the five Ps of marketing

• Evaluate the effectiveness of your marketing plans

• Design a marketing plan that works

• Perform customer research

• Improve your creative skills — and your campaigns

• Write winning marketing copy

• Develop a campaign budget and stick to it

• Brand your business

• Develop promotional campaigns

• Design brochures, catalogs, and newsletters

• Bring customers back with great customer service



In a world of mass media and global business, getting your business noticed is imperative to your success. After all, it doesn’t matter how great your product or service is if your customers don’t know about it. With Marketing Kit For Dummies, 2nd Edition, you’ll have no trouble bringing in new business — and more dollars.



See also: By Invitation Only or Tea Cuisine

Pokemon Mystery Dungeon: Prima Official Game Guide

Author: Prima Temp Authors

* Written by the Pokémon Team! - The makers of the game will be writing the guide, so you can be sure nothing will be missed.
* Full stats on Pokémon
- Pokémon battle with skills that are more or less effective depending on their opponent's attributes. So it's important to know what the Pokémon's powers are so you can choose wisely.
* Complete Mission Details - Our guide will provide complete mission information, including suggestions for what Pokémon to select.
* Covers both versions - The guide will cover both adventures for the DS and GBA.



Saturday, January 24, 2009

Color Management in Digital Photography or Using R for Introductory Statistics

Body of Compassion: Ethics, Medicine, and the Church

Author: Brad Hinkel

In The Body of Compassion, Joel Shuman presents new theological treatment of contemporary bioethics, weaving together personal experience, a critical treatise on bioethics, and an exploration of a Christian theological alternative. This book is sure to be of interest to ethicists, medical professionals, and everyone who is troubled by the conflicts between science and religion.

Library Journal

Religion and ethics instructor Shuman's first book is the latest entry in Westview's ever-intriguing "Radical Traditions" series. Using examples from literature and personal experience, Shuman constructs an interesting case for the primacy of compassion--Christian compassion--in the delivery of healthcare. The standard of moral rectitude he sets for caregivers may seem impossibly high, but his work will be instructive and provocative for many readers. For most collections. Copyright 1999 Cahners Business Information.

Booknews

Shuman (theological ethics, Duke U.) weaves personal experience, contemporary bioethics, and a Christian theological alternative into his treatment. Taking his grandfather's lonely end in a sterile hospital as a goad, he explores how modern medicine has distanced itself from people as living being. He also explores various approaches to bioethics of the past 20 years and finds that each has failed due to the lack of a theological concern for the body that places it in a larger context. Annotation c. by Book News, Inc., Portland, Or.



Table of Contents:
Acknowledgments
List of Credits
Introduction
1Before Bioethics: The Moral Paradox of Modern Medicine1
2The "Birth" of Bioethics: Scientific Expertise and the Justification of the Modern Project47
3After Bioethics: Toward a Christian Theology of the Body and Its Goods79
4Beyond Bioethics: Caring for Christ's Body113
Afterword: Awaiting the Redemption of Our Body - Life and Death in the Meantime157
Notes161
Bibliography201
Index209

Go to: PlumpJack Cookbook or League of Our Own

Using R for Introductory Statistics

Author: John Verzani

The cost of statistical computing software has precluded many universities from installing these valuable computational and analytical tools. R, a powerful open-source software package, was created in response to this issue. It has enjoyed explosive growth since its introduction, owing to its coherence, flexibility, and free availability. While it is a valuable tool for students who are first learning statistics, proper introductory materials are needed for its adoption.

Using R for Introductory Statistics fills this gap in the literature, making the software accessible to the introductory student. The author presents a self-contained treatment of statistical topics and the intricacies of the R software. The pacing is such that students are able to master data manipulation and exploration before diving into more advanced statistical concepts. The book treats exploratory data analysis with more attention than is typical, includes a chapter on simulation, and provides a unified approach to linear models.

This text lays the foundation for further study and development in statistics using R. Appendices cover installation, graphical user interfaces, and teaching with R, as well as information on writing functions and producing graphics. This is an ideal text for integrating the study of statistics with a powerful computational tool.



Friday, January 23, 2009

MCSA MCSE 70 293 Exam Cram or C Programming

MCSA/MCSE 70-293 Exam Cram: Planning and Maintaining a Windows Server 2003 Network Infrastructure

Author: Diana Huggins

MCSA/MCSE 70-293 Exam Cram, Second Edition is the perfect study guide if you need help passing the 70-293 exam. Among exam objectives, you must learn to use remote desktop for administration, manage IIS 6.0, revive a failed server, choose between forest and domain functional levels, and configure software update services. This new edition covers all these topics, includes two full practice exams, and has been updated against Microsoft's official courseware (MOC) that corresponds to this exam. MCSA/MCSE 70-293 Exam Cram, Second Edition is perfect for you if you need a refresher on important concepts as well as a guide to exam topics and objectives. You'll get test-taking strategies, time-saving study tips, a CD-ROM testing engine, and a special Cram Sheet that includes tips, acronyms, and memory joggers not available anywhere else.



Book review: El Guía del Empresario de Derecho comercial

C++ Programming: From Problem Analysis to Program Design

Author: DS Malik

Best-selling author D.S. Malik employs a student-focused approach, using complete programming examples to teach introductory programming concepts.



Table of Contents:
1. An Overview of Computers and Programming Languages
2. Basic Elements of C++
3. Input/Output
4. Control Structures I (Selection)
5. Control Structures II (Repetition)
6. User-Defined Functions I
7. User-Defined Functions II
8. User-Defined Simple Data Types, Namespaces, and the String Type
9. Arrays and Strings
10. Applications of Arrays (Searching and Sorting) and the Vector Type
11. Records (Structs)
12. Class and Data Abstraction
13. Inheritance and Composition
14. Pointers, Classes, Virtual Functions, and Abstract Classes
15. Overloading and Templates
16. Exception Handling
17. Recursion
18. Linked Lists
19. Stacks and Queues
Appendices A: Reserved Words B: Operator Precedence C: Character Sets D: Operators Overloading E: Additional C++ Topics F: Header Files G: Memory Size on a System and Random Number Generator H: Standard Template Library (STL) I: Answers to Odd-Numbered Exercises

Thursday, January 22, 2009

Shoot an Iraqi or Truth about Avoiding Scams

Shoot an Iraqi: Art, Life and Resistance Under the Gun

Author: Wafaa Bilal

Wafaa Bilal's childhood in Iraq was defined by the horrific rule of Saddam Hussein, two wars, a bloody uprising, and time spent interned in chaotic refugee camps in Kuwait and Saudi Arabia. Bilal eventually made it to the United States to become a professor and a successful artist, but when his brother was killed at a checkpoint in Iraq in 2005, he decided to use his art to confront those in the comfort zone with the realities of life in a conflict zone.

Thus the creation and staging of "Domestic Tension," an unsettling interactive performance piece: for one month, Bilal lived alone in a prison cell-sized room in the line of fire of a remote-controlled paintball gun and a camera that connected him to Internet viewers around the world. Visitors to the gallery and a virtual audience that grew by the thousands could shoot at him twenty-four hours a day. The project received overwhelming worldwide attention, garnering the praise of the Chicago Tribune, which called it "one of the sharpest works of political art to be seen in a long time," and Newsweek's assessment "breath taking." It spawned provocative online debates, and ultimately, Bilal was awarded the Chicago Tribune's Artist of the Year Award.

Structured in two parallel narratives, the story of Bilal's life journey and his "Domestic Tension" experience, this first-person account is supplemented with comments on the history and current political situation in Iraq and the context of "Domestic Tension" within the art world, including interviews with art scholars such as Dean of the School of Art at Columbia University, Carol Becker,who also contributes the introduction. Shoot an Iraqi is equally pertinent reading for those who seek insight into the current conflict in Iraq and for those fascinated by interactive art technologies and the ever-expanding world of online gaming.

Wafaa Bilal, a professor of art and technology at the Art Institute of Chicago, has exhibited his art worldwide and lectured extensively. He has been interviewed on NPR, the BBC, CNN, MSNBC, and the History Channel.

Publishers Weekly

Weaving together accounts of Iraq and America, art and violence, performance and reality, past and present, this gripping account all but shakes the reader by the lapels. Iraqi-born artist Bilal records the month he spent confined in his 2007 interactive performance piece entitled Domestic Tension, living under constant fire from a chat room-controlled paintball gun 24 hours a day, his every move dogged and determined by the hostility-or benevolence-of his thousands of online viewers. The nerve-rattling conditions were intended to reflect both decades of suffering endured by millions of Iraqis and Bilal's own life and the costs of surviving Saddam's regime, Gulf War bombardment, Sunni-Shia violence, a brutal Saudi refugee camp and, finally, the difficulties and joys of the American immigrant experience. The author emerges as an Iraqi everyman, and his provocative book brilliantly juxtaposes images and time frames to convey the toll of war on Americans and Iraqis: "We may think we are surviving," Bilal writes, "but as I... twist and turn through sleepless nights, flailing between worlds of comfort and conflict, hope and despair, I wonder." (Dec.)

Copyright © Reed Business Information, a division of Reed Elsevier Inc. All rights reserved.

Booklist

Ultimately the death of his brother back home via an unmanned American drone compelled Bilal to make his greatest artistic statement yet against all that makes the war in Iraq unreal to most outsiders.. . . a powerful and demanding read, that is, frankly, a literary punch to the gut.

John Freeman - Newark Star Ledger

Shoot an Iraqi' tells of Iraq's dissolution from a beacon of education in the Middle East to a locust-eaten state, mugged by a dictator and then punished from abroad for his offenses. Neither Bilal's exhibit nor this absorbing book about it can expiate Iraq's condition. Rather, they brilliantly demonstrate the lengths to which one man went to live history, and the disturbing-and occasionally hopeful-things he learned when he invited the entire world to do it with him.

Shelf Awareness

Shoot an Iraqi' is an invaluable work of political art and a clear-eyed view of the profoundly disturbing fate of present-day Iraq.

The Brooklyn Rail

What is most remarkable about Shoot an Iraqi isn't, however, the chronicle of the project that brought him worldwide attention, but the back story. Weaved amid a narrative of the 31-day experiment is a memoir of his life in Iraq and eventual flight to Kuwait and then Saudi Arabia, followed by his attempt to make a new life in the United States."

Bea Leal - The Socialist Review

[A] highly readable, moving book.

What People Are Saying

Mary Flanagan
Once I picked up this manuscript, I could not put it down. There is something so urgent and compelling about Bilal's story, as though he is speaking to our time. His story is not just for those interested in the arts; it is a human story of the horror, frustration, and tragedies of war. (Mary Flanagan, artist and author of re:skin (MIT Press))


Danny Postel
This is an unsettling and gripping book. It poignantly recounts a dark and imaginative experiment inspired by an excruciating and ghastly reality. Its unsettling effects couldn't be more welcome: we desperately need to be shocked out of our collective zombification, and this book does that by leading us through a wild labyrinth at once aesthetic, political, and existential. Potent stuff. (Danny Postel, author of Reading "Legitimation Crisis" in Tehran)




Read also Leah Chase or Food for Thought

Truth about Avoiding Scams (Truth About Series)

Author: Steve Weisman




"You should read this book and take Steve Weisman's advice. And from the money and assets he helps you protect, take a few dollars and buy a copy for a good friend."


--Alan Colmes, Syndicated radio talk show host and co-host of Hannity and Colmes on Fox News Channel


  


Scams are everywhere...now discover exactly how to protect yourself!


 


·        The truth about recognizing today’s newest scams--online and off


·        The truth about safeguarding your money, health, and reputation


·        The truth about phishing, vishing, pharming, slamming, and more


 


Scams have always been with us, and they always will be - except now, technology makes scammers' jobs even easier, enabling them to reach out from anywhere around the world, and take advantage of more people than ever before. No matter how smart you think you are, you can easily become a victim: in fact, scammers have discovered that educated, sophisticated individuals are among their best targets. The Truth About Avoiding Scams arms you with everything you need to protect yourself: real, up-to-the-minute knowledge, and the "internal sensors" you need to sniff out even the subtlest, most well-crafted scams. Consumer finance expert and nationally syndicated radio host Steve Weisman offers quick, bite-size, just-the-facts information about every type of fraud, from identity scams to computer-based fraud, travel and health scams to phony educational loans andscholarships. Weisman exposes the new epidemic of "affinity fraud," where "people just like you" target you based on your ethnicity, racial group, church, club, or fraternal organization. You'll find up-to-the-minute guidance on avoiding illegitimate online dating services; "cramming" and other phone frauds; tax and Social Security scams; employment, home repair, and investment scams; and a whole lot more.


 


Unlike some books on scams, this one's simple to read, simple to use, up to date, and complete: the only guide you need to keep yourself safe!



Table of Contents:
Introduction  ix


Part I               The Truth About Identity Theft  1


 


Truth 1             Identity theft  1


Truth 2             Go phish  5


Truth 3             Vishing down on the pharm  9


Truth 4             Do Not Call Registry, Patriot Act scams  13


Truth 5             Protect yourself from identity theft  15


 


Part II              The Truth About Computer Scams  19


Truth 6             Trojan horse  19


Truth 7             PayPal, eBay  21


Truth 8             Second chances–eBay  23


Truth 9             Free adult entertainment  25


Truth 10           Two more for the road  27


 


Part III             The Truth About Classic Scams  29


Truth 11           Ponzi scheme  29


Truth 12           Chain letters  33


Truth 13           A couple of the basics  37


Truth 14           Nigerian scam  41


Truth 15           Who knew? A flurry of old champs  45


Truth 16           More reasons to be wary  49


Truth 17           And you thought you’d heard it all  53


Truth 18           Money lost, borrowed, or gambled  57


Truth 19           Lottery and contest scams  61


 


Part IV             The Truth About Getting Personal  65


Truth 20           Exercise scams  65


Truth 21           Weight loss scams  67


Truth 22           The CIA medical scam  71


Truth 23           Education scams  73


Truth 24           Romance scams  77


Truth 25           Rental care insurance  81


Truth 26           Personal information privacy  83


 


Part V              The Truth About Telephone Scams  87


Truth 27           Cramming  87


Truth 28           900 numbers  89


Truth 29           Phony caller ID  93


Truth 30           Area code 809  95


 


Part VI             The Truth About Tax Scams  97


Truth 31           Fear and loathing of the IRS  97


Truth 32           More tax scams  101


Truth 33           It just doesn’t stop  105


 


Part VII            The Truth About Government Assistance  109


Truth 34           Social Security   109


Truth 35           Medicare  113


Truth 36           Veteran scams  115


 


Part VIII           The Truth About Credit Card Scams  119


Truth 37           Credit cards  119


Truth 38           More credit card offers  123


Truth 39           Skimmers and ATM scams  127


Truth 40           Free credit report  133


Truth 41           Credit repair services  139


Truth 42           Credit counseling agencies  143


Truth 43           Credit card rate reduction scam  147


Truth 44           Advance fee credit cards  149


Truth 45           Credit card alarms in the night  153


 


Part IX            The Truth About Employment Scams  155


Truth 46           Work-at-home schemes  155


Truth 47           Easy money  159


Truth 48           More wrong turns  161


Truth 49           Cruise ship employment scam  165


Truth 50           Get a job online scams  167


 


Part X             The Truth About Home Scams  169


Truth 51           Home sweet scam  169


Truth 52           Variations on a theme  173


 


Part XI            The Truth About Investment Scams  177


Truth 53           Stock scams  177


Truth 54           More investment scams  181


Truth 55           Unusual investment opportunities  185


Truth 56           Fees in legitimate investments  189


Truth 57           Free financial seminars  195


 


Part XII           The Truth About Solutions  197


Truth 58           Some solutions  197


Truth 59           Keeping your computer secure  199


Truth 60           Wi-Fi  205


Truth 61           Due diligence  207


 


About the Author  210


 

Tuesday, January 20, 2009

The iPod iTunes Pocket Guide or How to Do Everything with iPod iTunes

The iPod & iTunes Pocket Guide

Author: Christopher Breen

iPod users want to start using their devices as soon as they get their hands on them, and this guide shows them how. In these pages, trusted gadget teacher Christopher Breen reveals the secrets to using the leading portable player. This handy guide offers the quickest way to learn how to use the iTunes Store (including the new movie store!), import songs from CDs, and how to pick the right accessories. Readers will also find thorough coverage of the entire iPod family, including the iPod shuffle ($79-1GB; the world's smallest MP3 player), iPod nano ($149-2GB; $199-4GB; $249-8GB), and the updated iPod ($249-30GB and $349-80GB, which holds up to 20,000 songs or 100 hours of video). Along the way, Christopher offers hints for burning CDs, tips for making the most of the device's storage capabilities,and troubleshooting advice for when the gadgets become uncooperative.



Go to: Restaurant Recipes of the Ozarks Missouri or Make Mine Vodka

How to Do Everything with iPod & iTunes

Author: Guy Hart Davis

Listening to music is just the beginning!

With coverage of the iPod classic, iPod touch, iPod nano, iPod shuffle, and iPhone, How to Do Everything: iPod & iTunes, Fourth Edition shows you how to download and play podcasts and videos, load your calendar and contacts, choose accessories to add versatile features, and even use your iPod as an external drive. You'll also get detailed advice on managing your iTunes library, enhancing audio quality, syncing multiple iPods to the same computer, and much more, all in an easy-to-follow format.

  • Configure your PC or Mac, install iTunes, and connect your iPod or iPhone
  • Load songs, videos, photos, podcasts, contacts, calendars, and more
  • Select accessories, including speakers, cases, adapters, docks, remote controls, and radio transmitters
  • Use your iPod or iPhone as a stereo-at home or in the car
  • Build and manage your iTunes library, and burn CDs and DVDs
  • Create AAC, MP3, and Apple Lossless Encoder files from CDs, cassettes, vinyl, or other sources
  • Recover your songs and videos from your iPod or iPhone
  • Use your iPod as an external drive or backup device
  • Troubleshoot problems with your iPod, iPhone, or iTunes