Sunday, February 22, 2009

USB Mass Storage or Library Information Systems

USB Mass Storage: Designing and Programming Devices and Embedded Hosts

Author: Jan Axelson

This developer’s guide for designers and programmers of mass-storage devices that use the Universal Serial Bus (USB) interface provides developers with information on how to choose storage media, interface the media to a microcontroller or other CPU, and write device firmware to access the media and perform USB communications. Comparisons of popular storage-media options to help users choose a media type for a project are included, and the types described cover hard drives and flash-memory cards such as the MultiMediaCard (MMC), Secure Digital (SD) card, and CompactFlash card. Helpful tips on developing an embedded host that can access USB mass-storage devices are also covered.

EDN

Jan Axelson knows better than almost anybody else how to write clearly and how to explain complex technical issues.

ECN Magazine

If a design employs a USB mass-storage device connection, you will need this book. I recommend it highly.



Go to: Naruto Uzumaki Chronicles 2 or How to Do Everything with Your iPAQ Pocket PC

Library Information Systems: From Library Automation to Distributed Information Access Solutions

Author: Thomas R Kochtanek

The text gives broad coverage of all the major issues confronting library directors in today's fast-moving technology marketplace, and will be well placed on the shelves of the many libraries faced with the complexities that information technology developments bring to the library. Giving a useful overview of library systems-from their history to current trends in the technology and marketplace that serve libraries-this book includes coverage of telecommunications, standards, planning, managing technology in libraries, system selection, and more. Specifically designed for core units in library automation and information systems, this text gives students a comprehensive overview of one of the most critical areas of library operations, and enables them to take the lead in managing the complexities that information technology brings to the library.



Table of Contents:
1The Evolution of LIS and Enabling Technologies3
2The Library Information Systems Marketplace14
3Design of Integrated Library Systems29
4Open Systems50
5Telecommunications and Networks66
6Standards and Standards Organizations93
7Planning for Information Technology113
8Basic Technology Axioms129
9The Impact of Technology on Library Services136
10System Selection and Implementation156
11Usability of Systems187
12Managing Library Information Systems208
13Technology Trends229
14Digital Libraries239
Conclusions251
Glossary253
Index275

Saturday, February 21, 2009

Microsoft Windows Vista Visual Encyclopedia or Fix Your Laser Printer and Save a Bundle

Microsoft Windows Vista Visual Encyclopedia

Author: Kate Shoup

If you prefer to see what things look like and how to perform a task, instead of just being told, this is your ideal A to Z reference. Part I shows every Windows Vista tool and how to use it. Part II provides step-by-step instructions for more than 140 key tasks and techniques. Both are arranged alphabetically and illustrated in full color. It's the ultimate Visual resource--you'll see!

* Each tool and technique illustrated in full color
* Alphabetical listings for easy reference
* Step-by-step instructions for performing dozens of tasks
* A comprehensive guide for visual learners

A Visual guide to
* Identifying and using Vista tools
* Creating appointments and sharing calendars
* Backing up your PC and encrypting files
* Setting spam and scam filters
* Playing DVDs and creating movies
* Configuring a remote desktop connection



Table of Contents:
Credits.

About the Authors.

Preface.

Introduction.

Part I:Tools.

A.

Add Printer Wizard.

AutoPlay.

B.

Backup and Restore Center.

C.

Calculator.

Calendar.

CardSpace.

Command Prompt.

Computer Folder.

Connect to a Network Projector Wizard.

Connect to a Network Wizard.

Connect to the Internet Wizard.

Contacts.

Content Advisor.

Control Panel.

D.

Details Pane.

Device Manager.

Disk Cleanup.

Documents Folder.

E.

Ease of Access Center.

Easy Transfer.

Event Viewer.

F.

Fax and Scan.

File and Folder Backup Wizard.

Flip 3D.

G.

Gadgets.

Games.

I.

Import Video Wizard.

Internet Explorer.

Internet Explorer Protected Mode.

Internet.

M.

Mail.

Media Library.

Media Player.

Microsoft Management Console.

Movie Maker.

Music Folder.

N.

Narrator.

Navigation Pane.

Network and Sharing Center.

Network Folder.

Network Map.

Notepad.

O.

On-Screen Keyboard.

Open.

P.

Paint.

Parental Controls.

Personal Folder.

Phone and ModemOptions.

Photo Gallery.

Picture Library.

Pictures Folder.

Preview Pane.

Programs and Features Window.

Q.

Quick Launch.

Quick Tabs.

R.

Recent Items.

Recycle Bin.

Regional and Language Options.

Restore Files Wizard.

S.

Save As.

Scanner and Camera Installation Wizard.

Search Box.

Search Folder.

Security Center.

Security Report.

Set Up a Wireless Router or Access Point Wizard.

Sound Notifications.

Speech Recognition.

Start Menu.

Sync Center.

System Information Window.

T.

Task Manager.

Task Scheduler.

Taskbar and Start Menu Properties.

U.

User Account Control.

V.

Video Library.

Volume Mixer.viii

W.

Welcome Center.

Windows Defender.

Windows Firewall.

Windows Live Messenger.

Windows Malicious Software Removal Tool.

Windows Media Center.

Windows Meeting Space.

Windows Sidebar.

Windows SideShow.

Windows Update

WordPad.

Part II: Techniques.

A.

Aero: Set Up Aero.

B.

Background: Set the Desktop Background.

C.

Calendar: Manage Tasks.

Calendar: Publish a Calendar.

Calendar: Set an Appointment.

Calendar: Subscribe to a Calendar.

CardSpace: Create a Personal Information Card.

CDs and DVDs: Burn Data, Music, and Photos.

CompletePC Backup: Back Up Your PC with CompletePC Backup.

Computer Folder: View Free Space and Other Information.

Computer Name: Identify and Change the Computer Name.

Contacts: Import and Export Contacts.

Contacts: Manage Contacts.

Content Advisor: Set Internet Explorer 7 Parental Controls.

D.

Date and Time: Change Your System Date, Time, and Time Zone.

Default Programs Center: Set Windows Default Programs.

Device Manager: Access Device Driver Information.

Device Manager: Remove a Device.

Device Manager: Troubleshoot Issues.

Display Properties: Configure Display Properties.

DVD Maker: Burn a Movie to DVD.

E.

Ease of Access Center: Set Accessibility Options.

Edit: Cut, Copy, and Paste.

Encrypting File System: Encrypt Files and Folders.

F.

Fax and Scan: Scan a Document.

Fax and Scan: Send a Fax.

Fax and Scan: Set Up Your System to Use Fax and Scan.

File and Folder Backup: Make Backups Automatic.

File and Folder Management: Copy and Move Files and Folders.

File and Folder Management: View and Set File and Folder Properties.

File and Folder Sharing: Share Folders and Files.

Folders: Create a New Folder.

Fonts: Add a Font.

Fonts: Manage Installed Fonts.

FTP: Using FTP in Internet Explorer.

G.

Gadgets: Add Gadgets.

Groups: Add Users to Groups.

H.

Help and Support Center: Access Help and Other Information for Windows.

I.

Internet Explorer 7: Search the Web with Internet Explorer 7.

L.

Local Security Policy: Change Local Security Settings.

M.

Mail: Create a Mailing List.

Mail: Filter Spams and Scams.

Mail: Participate in a Newsgroup.

Mail: Send and Receive E-mail Messages.

Mail: Set Up an Account.

Mail: Set Up the Newsreader.

Media Player: Burn a Music CD.

Media Player: Find New Content.

Media Player: Play a CD or DVD.

Media Player: Rip Music.

Microsoft Management Console: Add Management Tools.

Movie Maker: Create a Simple Movie.

Movie Maker: Publish a Movie.

N.

Network Connections Window: Manage Network Connections.

O.

Offline Files: Enable Offline Files.

Offline Files: Make Files Available for Offline Use.

Offline Files: View Synchronization Settings.

Open With Command: Open a File in a Different Program.

P.

Parental Controls: Set Windows Media Center Parental Controls.

Parental Controls: Set Windows Vista Parental Controls.

Partition: Create and Format a Partition.

Passwords: Set a User Password.

Performance Information and Tools: Assess Your Computer’s Performance.

Phishing Filter: Avoid Phishing Scams.

Phone and Modem Options: Set Up a Dialing Location.

Photo Gallery: Create and View a Slide Show.

Photo Gallery: Edit Pictures.

Photo Gallery: Manage Pictures.

Photo Gallery: Print a Picture.

Power Plan: Choose a Power Plan.

Previous Versions: Revert to a Previous Version of a Document.

Print: Print a File.

Printers: Share a Printer.

Problem Reports and Solutions: Review Problem Reports and Find Solutions.

Program Compatibility Wizard: Enable Older Programs to Run.

Q.

Quick Launch: Add and Remove Programs on the Quick Launch Bar.

Quotas: Set Space Quotas.

R.

Ratings: Rate Files.

Recycle Bin: Empty the Recycle Bin.

Regional and Language Options: Add Language Support.

Remote Assistance: Get Help Via Remote Assistance.

Remote Desktop: Configure Remote Desktop Connection.

RSS Feeds: Find and Subscribe to RSS Feeds.

S.

Screen Saver: Choose a Screen Saver.

Search Folder: Save a Search.

Security Zones: Customize Web Site Security Settings.

Shortcuts: Create and Manage Shortcuts.

Sound Scheme: Set Up a Sound Scheme.

Speech Recognition: Set Up Speech Recognition.

Start Menu: Customize the Start Menu.

Start Menu: Open a Program, Folder, File, or Feature.

Startup Folder: Control Which Programs Launch at Startup.

Sync Center: Sync an Offline Folder or Mobile Device.

System Restore: Create a Restore Point.

System Restore: Roll Back with a Restore Point.

System window: View Your System’s Properties.

T.

Tags: Tag Files.

Task Manager: View System Information.

Taskbar: Customize the Taskbar.

Temp Folder: Locate and Manage the Temporary Files Folder.

Temporary Internet Files: Clean the Internet Files Cache.

Themes: Apply a Desktop Theme.

U.

User Accounts: Create a New User Account.

User Accounts: Enable Guest Accounts.

User Accounts: Manage User Accounts.

W.

Windows Defender: Scan for Spyware.

Windows Firewall: Configure the Windows Firewall.

Windows Firewall: Manage Exceptions.

Windows Live Messenger: Create an Account.

Windows Live Messenger: Populate Your Contacts.

Windows Live Messenger: Send and Receive IMs.

Windows Media Center: Burn Digital Video to a DVD.

Windows Media Center: Listen to Music Files.

Windows Media Center: Record TV.

Windows Media Center: Set Up Windows Media Center.

Windows Media Center: Watch Live TV.

Windows Media Center: Watch Recorded TV.

Windows Meeting Space: Share Files, Programs, and Your Desktop.

Windows Meeting Space: Start a Windows Meeting Space Session.

Windows Update: Check for Updates.

Windows Update: Configure Automatic Updates.

Windows Update: Remove a Potential Problem Update.

WordPad: Save a Document.

X.

XPS Documents: View an XPS Document.

XPS Documents: Work with XPS Documents.

Index.

Interesting book: Women for President or The Riverkeepers

Fix Your Laser Printer and Save a Bundle

Author: Paul Lapsansky

Laser printer down and don't know where to begin? Convinced that the local repair shop is not being completely honest? Avoid the hassle of having to reinvent the wheel when trying to troubleshoot and repair monochrome laser printers without the necessary guide. With Fix Your Laser Printer and Save a Bundle, confidently diagnose those repairs or have the peace of mind that what the repair shop is saying is correct.

Fix Your Laser and Save a Bundle includes:

  • Troubleshooting tips for monochrome laser printers from Hewlett-Packard, Apple, IBM/Lexmark and Panasonic.
  • Diagrams and visual defect drawings to better aid in troubleshooting specific problems.
  • Error codes and their meanings.
  • Part lists with manufactures part numbers.
  • Replacement parts sources.

Paul Lapsansky has accumulated over ten years of experience servicing laser printers and has amassed this experience into a wealth of troubleshooting tips to bring to you in Fix Your Laser Printer and Save a Bundle.



Friday, February 20, 2009

Preventing Identity Theft for Dummies or DigiMarketing

Preventing Identity Theft for Dummies

Author: Michael Arata



• Twenty-seven million Americans have been victims of identity theft in the last five years and the total cost of identity theft approaches $48 billion per year (total costs to businesses are $43 billion and the direct cost to consumers is $5 billion)

• These staggering statistics have prompted security consultant Michael Arata to provide readers with the resources they need to guard themselves against identity theft

• In this valuable book, Arata offers easy-to-follow, straightforward advice on understanding identity theft, minimizing risk, maintaining vigilance, choosing who to share personal information with, selecting hard-to-guess PINs, determining victimization, reviewing a credit report, charting a course of action, resolving credit problems, reclaiming good credit, and much more

• Explains how to recover successfully if identity theft does occur

• Author Michael Arata, CISSP, CPP, CFE, ACLM, is a veteran of the security industry with more than fifteen years of experience



Table of Contents:
Introduction1
How This Book Is Organized1
Icons Used in This Book2
Where to Go from Here2
Part IGetting the Scoop on Identity Theft3
Chapter 1Who's Stealing What...and What You Can Do About It5
Taking a Look at the Fastest Growing Crime5
Who it affects7
How it happens7
Knowing What Information Is Vulnerable8
It comes in the mail10
What you throw away can hurt you11
The Role of Technology in Identity Theft12
Encryption13
Authentication15
Safeguarding Your Information in Everyday Ways16
Finding Your Allies17
Getting Back Your Identity and Your Good Reputation19
Chapter 2Keeping Tabs on Your Personal Information23
Discovering Where Your Personal Information Hides23
The important info on the documents you receive24
Finding your information online27
Accounts you have online29
Checks, receipts, and other paper you generate29
Government documents30
Keeping Your Information Safe but Available31
Software to help keep your information safe32
Tips to keep your information safe32
Accessing your information33
Knowing When to Hold 'Em, When to Fold 'Em, and When to Shred 'Em34
What to keep34
Best practices for destroying what you don't keep37
Chapter 3Mike's Anti-Identity-Theft Crash Course39
Tips for Preventing Identity Theft39
Buy and use a shredder42
Order and review your credit report42
Guard your personal information43
Opting out of pre-approved credit card offers44
Opting out of other mailing lists45
Government Laws to Protect You46
Steps to Take If You Are a Victim48
Reporting the crime to law enforcement49
Other essential actions you must take50
Part IIDetermining Whether You're a Victim51
Chapter 4Smelling a Rat: Recognizing When You Are a Victim53
Suspecting a Thief at Your Mailbox53
Recognizing When Something Is Wrong, and What You Can Do About It54
Denied credit for a large purchase56
Receiving credit card bills from cards you didn't apply for57
Receiving calls from bill collectors for stuff you did not buy58
Receiving bills for unknown purchases59
Large unknown purchases on your credit card bills60
Suddenly...several unknown charges on each month's bill62
Chapter 5Homing In on Bank Statements65
Checking Your Bank Statement Religiously65
Identifying an Unwelcome Doppelganger67
Withdrawals you didn't make67
Checks you did not write68
Finding bizarre bank account balances69
Reviewing Investment Account Statements70
Chapter 6Interpreting Your Credit Report73
What Is a Credit Report?73
Obtaining Your Credit Report75
Reviewing the Telltale Information on Your Credit Report79
The personal profile section80
The account history section81
The credit summary section82
The public records section82
The credit inquiries section84
The account history section85
Your credit score85
Sudden unknown credit score change87
Looking for consistency88
Pulling it together89
Disputing Your Credit Report89
Part IIIStaying Ahead of Identity Theft93
Chapter 7Watching What You Set on the Curb95
Protecting Your Mail95
Watching What You Throw Away97
Monthly credit card statements98
Monthly checking account statements99
Utility bills100
Cell phone bills100
Cancelled checks101
Expired driver's licenses101
Chapter 8Practicing Discretion in Public Places103
Carrying Minimal Personal Information103
Do not carry your Social Security Card104
Memorize your bank ATM PIN104
Carry one credit card105
Carry personal checks only when necessary106
The Walls Have Ears and Eyes107
Shoulder surfing107
Be careful about what you say108
Keeping Track of Important Things109
Checking Credit Card Receipts109
Losing your wallet or purse110
Chapter 9Staying Safe Online and on the Phone113
Ordering Stuff by Phone113
Ordering Stuff Online115
Check Your Monthly Card Statement for Surprises117
Beware of Scams to Get Personal Information118
Who is calling?118
Phishing out a thief118
We're from the government119
Why financial information?121
Bank examiner scam121
Part IVTaking Back Your Good Name125
Chapter 10Joining Forces in the Identity Theft Battle127
Filling Out the Initial Reports127
Placing a fraud alert on your credit report128
Reporting the crime to law enforcement128
Completing an ID theft affidavit129
Taking Care of Compromised Accounts: The First Steps132
Call your credit card company133
Call your bank134
Asking for fraud dispute forms135
Getting Straight with the Government136
Filing a complaint with the Federal Trade Commission136
What to do if your SSN has been used to get a job139
Chapter 11Closing Compromised Accounts143
Closing Out Bank Accounts143
When your ATM card goes missing144
Reporting to check-verification companies145
Covering checks that you've already written146
Closing Credit Accounts147
Chapter 12Opening New Accounts149
Opening New Bank Accounts149
Maintaining good records150
Using a new PIN151
Opening New Credit Accounts152
Part VThe Part of Tens153
Chapter 13Ten Tips to Make Reclaiming Your Identity Go More Smoothly155
Follow a Checklist155
Keep a Journal156
Complete a Fraud Affidavit156
Record All Correspondence with Creditors157
Follow-up157
Place a Fraud Alert on Your Credit Report158
File a Police Report159
Dispute Charges You Didn't Make160
Report Your Stolen Checks to One of the Check Verification Companies160
Close Compromised Accounts161
Chapter 14Ten Handy Resources163
Web Sites163
Major Credit Card Issuers164
Credit Report Services166
Registration Services167
Major Banking Institutions168
Chapter 15Ten Common Scams and How to Avoid Them169
Phishing169
The Bank Examiner Scam171
The Doctored ATM171
Phone Fraud172
Card Verification173
You Won the Lottery!174
Bogus Charities174
Bogus Invoices175
Phony Brokerage Firms176
Temporary Suspension of Your Account177
Index179

See also: Die Volkswirtschaft der Klimaveränderung: Die Strenge Rezension

DigiMarketing: The Essential Guide to New Media and Digital Marketing

Author: Ian Fenwick

“We are all DigiMarketers now" - or we should be.  The authors have for the first time provided a lucid, hype-free, business-based and practical guide to the new age of marketing: it is a kind of digital Baedeker, which should be on every businessman's book-shelf. —Miles Young, Chairman,   Ogilvy & Mather Asia Pacific

The digital frontier is now the center of our universe. As Kent Wertime and Ian Fenwick show, marketers must seize this digital opportunity to accelerate their market growth. —John A. Quelch, Senior Associate Dean and Lincoln Filene Professor of Business Administration, Harvard Business School

Too many advertisers are stuck in the primordial soup when it comes to their digital marketing strategy.  However, they need to evolve fast if they are to survive in a multi-channel landscape. This timely book acts like an Origin of the Species, steering hesitant brand owners through the complexities of the digital ecosystem. An impressive blend of academic theory, professional insight and practical advice. —Paul Kemp-Robertson,   Co-founder & Editorial Director, Contagious

DigiMarketing: The Essential Guide to New Marketing & Digital Media is a clear call for companies to evolve their marketing practice. This book is essential reading for anyone seeking a roadmap to the future of business.—Dipak C. Jain, Dean,   Kellogg School of Management

The rise of conversational media new forms of distribution – from blogs tomobile platforms – challenge traditional approaches to marketing, and require every business to have a transition plan. Kent Wertime and Ian Fenwick have written a book that is required reading for any marketers interested in successfully making that transition. —John Battelle,  CEO and Founder, Federated Media Publishing and Author, The Search

Kent Wertime and Ian Fenwick have written the definitive guide to marketing in the digital age. But Digimarketing does more than educate marketing professionals. It describes the new media landscape brilliantly, making it an essential read for anyone who hopes to understand the most important technological revolution of the past fifty years. I wore out three yellow highlighters before realizing that every sentence and every paragraph is worth committing to memory. —Norman Pearlstine,   Former Editor-in-Chief, Time Inc. and  Managing Editor, The Wall Street Journal,  Senior Advisor, Telecommunications & Media, The Carlyle Group



Thursday, February 19, 2009

UML 2 For Dummies or Microsoft Office 2004 for Mac OS X

UML 2 For Dummies

Author: James A Schardt


• Uses friendly, easy-to-understand For Dummies style to help readers learn to model systems with the latest version of UML, the modeling language used by companies throughout the world to develop blueprints for complex computer systems
• Guides programmers, architects, and business analysts through applying UML to design large, complex enterprise applications that enable scalability, security, and robust execution
• Illustrates concepts with mini-cases from different business domains and provides practical advice and examples
• Covers critical topics for users of UML, including object modeling, case modeling, advanced dynamic and functional modeling, and component and deployment modeling



Table of Contents:
Introduction1
Pt. IUML and System Development7
Ch. 1What's UML About, Alfie?9
Ch. 2Following Best Practices19
Pt. IIThe Basics of Object Modeling37
Ch. 3Objects and Classes39
Ch. 4Relating Objects That Work Together61
Ch. 5Including the Parts with the Whole83
Ch. 6Reusing Superclasses: Generalization and Inheritance93
Ch. 7Organizing UML Class Diagrams and Packages111
Pt. IIIThe Basics of Use-Case Modeling129
Ch. 8Introducing Use-Case Diagrams131
Ch. 9Defining the Inside of a Use Case147
Ch. 10Relating Use Cases to Each Other161
Pt. IVThe Basics of Functional Modeling175
Ch. 11Introducing Functional Modeling177
Ch. 12Capturing Scenarios with Sequence Diagrams189
Ch. 13Specifying Workflows with Activity Diagrams213
Ch. 14Capturing How Objects Collaborate227
Ch. 15Capturing the Patterns of Behavior247
Pt. VDynamic Modeling259
Ch. 16Defining the Object's Lives with States261
Ch. 17Interrupting the States by Hosting Events277
Ch. 18Avoiding States of Confusion293
Pt. VIModeling the System's Architecture313
Ch. 19Deploying the System's Components315
Ch. 20Breaking the System into Packages/Subsystems339
Pt. VIIThe Part of Tens359
Ch. 21Ten Common Modeling Mistakes361
Ch. 22Ten Useful UML Web Sites371
Ch. 23Ten Useful UML Modeling Tools377
Ch. 24Ten Diagrams for Quick Development383
Index393

New interesting book: Comptabilité Directoriale :une Introduction aux Concepts, les Méthodes et les Utilisations

Microsoft Office 2004 for Mac OS X (Visual QuickStart Guide Series)

Author: Steven Schwartz

If you're like many people, you wouldn't dream of turning on your computer without also instantly (or almost instantly) launching at least one of the applications included in Microsoft Office. This task-based guide recognizes that and gets down to business fast, taking you step-by-step through all of the key features of the Microsoft Office 2004 suite for Mac OS X: Word 2004, Excel 2004, PowerPoint 2004, Entourage 2004and MSN Messenger Version 4.0. If you're a beginning user, you'll appreciate the friendly, visual approach to all of Office's word processing, spreadsheet, presentation, calendaring, and email features. And if you're an Office veteran, you'll relish the coverage of Office 2004's newest features (many of them exclusive to Macs): Compatibility Reports, which identify and correct discrepancies between different versions of Office documents (including Mac and Windows versions); Word's Notebook Layout View; Excel's Page Layout View; and much more.



Wednesday, February 18, 2009

iMovie 08 iDVD 08 for Mac OS X Visual QuickStart Guide or Sams Teach Yourself Programming with Java in 24 Hours

iMovie 08 & iDVD 08 for Mac OS X [Visual QuickStart Guide]

Author: Jeff Carlson

Visual QuickStart Guide—the quick and easy way to learn!

This full-color, amply illustrated, accessible book teaches readers the essential skills necessary for creating compelling movies with iMovie and iDVD, Apple's consumer-friendly digital movie and DVD-burning software applications. Readers can follow the step-by-step instructions from the beginning to get a tour of the applications or look up specific tasks to learn just what they need to know. Longtime Macintosh and technology writer Jeff Carlson takes extra steps to ensure that readers understand all of the key aspects of digital movie making.


• Easy visual approach uses pictures to guide you through iMovie and iDVD (and how they interact with the other iLife ’08 applications) and show you what to do.
• Concise steps and explanations let you get up and running in no time.
• Page for page, the best content and value around.
• Companion Web site at www.jeffcarlson.com/imovievqs offers links mentioned in the book, sample movies, and ongoing news and information about iMovie, iDVD, and video editing.



See also: SELECT Series or A Design That Cares

Sams Teach Yourself Programming with Java in 24 Hours

Author: Rogers Cadenhead

If you have been wanting to learn Java, check out the newly revised fourth edition of the best-seller Sams Teach Yourself Programming with Java in 24 Hours. This step-by-step tutorial will teach you how to create simple Java programs and applets. Comprised of 24 one-hour lessons, this new edition focuses on key programming concepts and essential Java basics, has been improved by dozens of reader comments, and is reorganized to better cover the latest developments in Java. The book's coverage of core Java programming topics has also been expanded. A great starting point for learning Java, this book is also a great primer to reading sams Teach Yourself Java in 21 Days.



Table of Contents:
Hour 1Becoming a programmer5
Hour 2Writing your first program19
Hour 3Vacationing in Java33
Hour 4Understanding how Java programs work51
Hour 5Storing and changing information in a program65
Hour 6Using strings to communicate83
Hour 7Using conditional tests to make decisions97
Hour 8Repeating an action with loops113
Hour 9Storing information with arrays131
Hour 10Creating your first object147
Hour 11Describing what your object is like165
Hour 12Making the most of existing objects183
Hour 13Building a simple user interface201
Hour 14Laying out a user interface217
Hour 15Responding to user input231
Hour 16Building a complex user interface249
Hour 17Creating interactive Web programs269
Hour 18Handling errors in a program293
Hour 19Creating a threaded program309
Hour 20Reading and writing files327
Hour 21Reading and writing XML data347
Hour 22Using fonts and color361
Hour 23Working with graphics375
Hour 24Creating animation395
Hour 25Creating Web services with XML-RPC411
App. AUsing the Java development kit431
App. BProgramming with the Java development kit455
App. CUsing the NetBeans integrated development environment479

Monday, February 16, 2009

Nature of Computation or Enterprise Modeling with UML

Nature of Computation

Author: Stephan Mertens

In the last decade, the boundary between physics and computer science has become a hotbed of interdisciplinary collaboration. Every passing year shows that physicists and computer scientists have a great deal to say to each other, sharing metaphors, intuitions, and mathematical techniques. In this book, two leading researchers in this area introduce the reader to the fundamental concepts of computational complexity. They go beyond the usual discussion of P, NP and NP-completeness to explain the deep meaning of the P vs. NP question, and explain many recent results which have not yet appeared in any textbook. They then give in-depth explorations of the major interfaces between computer science and physics: phase transitions in NP-complete problems, Monte Carlo algorithms, and quantum computing. The entire book is written in an informal style that gives depth with a minimum of mathematical formalism, exposing the heart of the matter without belabouring technical details. The only mathematical prerequisites are linear algebra, complex numbers, and Fourier analysis (and most chapters can be understood without even these). It can be used as a textbook for graduate students or advanced undergraduates, and will be enjoyed by anyone who is interested in understanding the rapidly changing field of theoretical computer science and its relationship with other sciences.



Interesting textbook: Multithreaded Programming with Java Technology or The Essential Guide to Digital Set Top Boxes and Interactive TV

Enterprise Modeling with UML: Designing Successful Software through Business Analysis

Author: Chris Marshall

Written for practitioners interested in business systems and software applications, this book fuses object technology, workflow, data warehousing, and distributed system concepts into a coherent model that has been successfully implemented worldwide. Enterprises using these concepts are well positioned to thrive in the emerging global business arena. Enterprise Modeling with UML describes specific methods for modeling large, complex, and adaptable enterprise systems, using the Unified Modeling Language (UML) to illustrate its concepts and components.. "Enterprise Modeling with UML addresses in detail the four key elements of an enterprise model: purpose, processes, entities, and organization. Written from a business perspective rather than technical standpoint, the book covers such vital topics as: formalizing business concepts, models, and components; creating and communicating the value of an enterprise; designing, scheduling, tracking, and automating processes; describing business entities in organizational contexts; modeling hierarchical and networked organizations and coordinating such organizations to form value chains; and building adaptable enterprise systems from reusable software components.. "The accompanying CD-ROM contains Java and XML examples of many of the ideas and models presented in the book.

Booknews

A book/CD-ROM guide fuses object technology, workflow, data warehousing, and distributed system concepts into a coherent model. Describes specific methods for modeling large, complex, and adaptable enterprise systems, using the Unified Markup Language (UML) to illustrate concepts and components. Addresses in detail four key elements of an enterprise model: purpose, processes, entities, and organization. The accompanying CD-ROM contains Java and XML examples. The author has managed the design and development of information systems using object technology for some 10 years. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Table of Contents:
PREFACE:

Recent years have seen the convergence of many disciplines, facilitated by extraordinary social, political, economic, and technological change. Not least has been the convergence of business, information, and natural systems thinking into the new discipline of business engineering. This book describes how complex business systems may be designed and implemented using enterprise components and supporting tools. The CD-ROM at the back of the book contains implementations of the components and tools in Java and XML.

Business Engineering

The purpose of this book is to describe a specific way in which to model enterprises. The focus is on business rather than technological aspects, with examples describing large, complex, and adaptable systems. The book is intended primarily for practitioners of the emergent discipline of business engineering, and is of use both to business people who are sensitive to the strategic potential of technology, and to technologists who understand that business requirements must drive systems design and deployment.

Recent developments in computers and communications enable global business systems that are as much between as within organizations. There are no universal standards for such business systems, and such standards are unlikely to be established in the near future. However, concepts based on the principles of contract and law that have existed for thousands of years, and new insights from the study of complex adaptive systems, may be applied to disparate enterprise applications to enable them to work as though they were part of a single global business network. This book attempts to describethemain features of such systems.

The promise of software components has been recognized for many years, based mainly on the experience of other industries. Automobiles were handmade by craftsmen from raw materials until Henry Ford assembled cars using interchangeable parts, and electronic hardware was assembled by skilled technicians from discrete components until Robert Noyce developed the integrated circuit--but information systems must still be coded line by line by talented programmers. However, several key developments now make reusable software components not only viable, but essential to any enterprise that wants to survive into the twenty-first century.

  • Ubiquitous networks connect almost every computer through standard communications protocols.
  • The CORBA, COM+ and EJB component object models make interoperable software components feasible.
  • Component design concepts, methods and notations can be shared using the Unified Modeling Language (UML).
  • Practical e-commerce standards and vocabularies using the Extensible Markup Language (XML) are under development.
  • Enterprise modeling concepts are being developed and standardized in the ISO Reference Model for Open Distributed Processing (RM-ODP).

Each of these is necessary, but not individually sufficient, to enable widespread adoption of software components for enterprise systems. Together they provide the means to revolutionize the software industry to the same extent that the motor and electronics industries have been transformed.

An enterprise and its systems are too complex to understand from a single perspective, so its model is composed of several components, each representing a different area of concern. A component defines an aspect of the model in a specific frame of reference and at a particular level of abstraction, or from the point of view of an organization role. Each role defines a domain of expertise, terminology, and conventions that influence how a role player perceives the business world. For example, what is needed of a vehicle by a driver, an accountant, a transport manager, and a maintenance engineer, differ according to their respective roles. In the past, this has caused organizations and their systems to be fragmented along functional lines, resulting in divergent purpose, discontinuous processes, and "stovepipe" applications. To prevent this from occurring, an architectural framework is required to link the components of the model into a coherent whole.

Structure of the Book

This book describes concepts primarily from the business viewpoint, and assumes that suitable software components can be created if a sufficiently precise business specification exists. The tools and components included in the CD-ROM attempt to illustrate the validity of this assumption. The UML notation and Java and XML languages are used in the design and implementation of these enterprise components.

Chapter 1 is an overview of the management and organization concepts that underpin the models that are described in subsequent chapters. Specific concepts of business purpose, process, entity, and organization are outlined to provide a context for the remainder of the book. The purpose of an organization is described in Chapter 2, with reference to strategy, planning, and contracts. It outlines relationships among data, information, knowledge, understanding, and decision making; which is also needed by an organization to learn and adapt, and to communicate its value to customers and other stakeholders.

Chapter 3 describes business processes as the means by which purpose is achieved. Process design, scheduling, enactment, tracking, improvement, and automation are covered. The concepts, tools, and components are suitable for formal process engineering and for the unstructured activities of ad hoc work. The human, mechanical, material, financial, intellectual, and other entities used and produced by processes are described in Chapter 4. Entities are modeled from various points of view to describe the different aspects of behavior required of them by processes.

Organization concepts are described in Chapter 5 with reference to their roles in adaptive systems, distributed networks, contexts for modeling, and so on. Organizations manage their processes and entities to achieve purpose, and work with others to form value networks. Certain ideas are presented to predict trends in e-commerce. The Appendix illustrates with simple examples how such concepts are used in real applications.

Conventions Used in Book

Each chapter introduces its concepts with text and diagrams that are hopefully comprehensible to business people, without the need for detailed knowledge of technology. Object orientation is introduced through business objects--models that are not necessarily implemented in software--described and diagrammed using the UML notation. In most cases, summary diagrams are used in preference to detailed diagrams to illustrate conceptual rather than detailed design. Words that appear in italic type when first used are defined in the Glossary.

The CD-ROM contains Java and XML implementations of the ideas and models described in the Appendix. Java code conventions are used where practical, but code is abbreviated, and many package statements, documentation, and comments are excluded, in order to simplify the listings Sun 1997. No attempt is made to explore the business engineering process, or to describe business and software engineering artifacts and tools. However, the CD-ROM contains copies of a tool that enables round trip engineering of Java business objects using Rational Rose. It also includes detailed HTML documentation, and a tutorial to help readers acquaint themselves with its contents.

Sunday, February 15, 2009

International Public Private R D Collaborations or Digital Basics for Cable TV Systems

International Public/Private R & D Collaborations: Focus on EU/US Government-University-Industry Research and Technology Development Partnerships

Author: Elias G Carayannis

The book reviews the scale, scope and intensity of cross-national, cross-sectoral research collaboration through the analysis of historical data on co-authorship of scientific publications. The authors look at the pre-existing literature, conduct their own studies and conclude by discussing significant trends and patterns and their implications for further research into these types of collaborations.



Go to: Naked Public Square or The Broken Branch

Digital Basics for Cable TV Systems

Author: Jeffrey L Thomas

Make the transition to digital CATV: the complete, easy-to-read guide!

Cable TV is rapidly moving from the familiar world of analog signals to a new digital world where yesterday's rules for optimizing performance no longer apply. If you install, upgrade, or maintain digital or mixed digital/analog systems, Digital Basics for Cable Television Systems is your complete guide to this new world. Friendly and authoritative, it's all you need to know to deliver digital services with maximum quality and reliability.

  • Simple fundamentals of digital signals and transport.
  • How digital signals differ from analog signals.
  • Complete coverage of digital testing and proof-of-performance.
  • Key digital measurement techniques, including the use of a spectrum analyzer.
  • Digital signal composition features, such as adaptive equalization, error correction, and compression.

With this book's simple illustrations, definitions and examples, you'll find it easy to master key digital CATV concepts such as layering, modulation and multiplexing. You'll learn how to measure digital signal power and burst power, and the impact of distortion, noise and interference on digital signals.

Digital Basics for Cable Television Systems is also a great reference, with a convenient glossary of digital terminology, a performance measurement map, a test equipment survey, exercises with answers, and much more. Whether you're a technician or an engineer, this book will help you maximize your digital system's performance - and your own.

Booknews

Introduces the fundamentals of digital technology, system integration, and quality parameters as they relate to the delivery of digital video over cable and optical fiber systems. The authors also explain how to make realistic measurements on digital systems in a cable system and recognize the symptoms of trouble caused by digital signals in an analog environment. Intended for cable, telephony, and radio frequency and optical fiber system technicians and engineers. Annotation c. by Book News, Inc., Portland, Or.



Table of Contents:
Preface
Ch. 1Digital Signal Measurement Guidelines1
Ch. 2Modulation and Frequency Management15
Ch. 3How an Analog Wave Becomes Digital Data33
Ch. 4Distributing, Layering, and Multiplexing53
Ch. 5Introduction to Digital Modulation Formats67
Ch. 6Viewing Digital Modulation77
Ch. 7Error Correction, Equalization, and Compression99
Ch. 8Digital Signal Quality127
Ch. 9Average Power Measurements155
Ch. 10Peak, Peak-to-Average, and Burst Power Measurements191
Ch. 11Distortion, Noise, and Interference211
App. A - Glossary231
App. BPerformance and Measurement Map247
App. CEquipment for Testing Digital Signals in Cable TV Systems251
App. D - Answers to Chapter Questions261
App. E - Collected Bibliography273
Index277

Thursday, February 12, 2009

Ethics and Technology or Secrets of Video Blogging

Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology

Author: Herman T Tavani

"Herman Tavani has written an excellent introduction to the field of cyberethics. . . . We need a good book in cyberethics to deal with the present and prepare us for an uncertain future. Tavani's Ethics and Technology is such a book."
--from the foreword by James Moor, Dartmouth College

Is there privacy in a world of camera phones and wireless networking?
Does technology threaten your civil liberties?
How will bioinformatics and nanotechnology affect us?
Should you worry about equity and access in a globalized economy?

From privacy and security to free speech and intellectual property to globalization and outsourcing, the issues and controversies of the information age are serious, complex, and pervasive.

In this new edition of his groundbreaking book, Herman Tavani introduces computer professionals to the emerging field of Cyberethics, the interdisciplinary field of study that addresses these new ethical issues from all perspectives: technical, social, and philosophical. Using fascinating real-world examples--including the latest court decisions in such cases as Verizon v. RIAA, MGM v. Grokster, Google versus the Bush Administration, and the Children's Online Pornography Act (CIPA) --as well as hypothetical scenarios, he shows you how to understand and analyze the practical, moral, and legal issues that impact your work and your life. Tavani discusses such cutting-edge areas as:
* Globalization and outsourcing
* Property rights and open source software
* HIPAA (privacy laws) and surveillance
* The Patriot Act and civil liberties
* Bioinformatics and genomics research
* Converging technologies--pervasive computing andnanocomputing
* Children's online pornography laws

Updating and expanding upon the previous edition, Ethics and Technology, Second Edition provides a much-needed ethical compass to help computer and non-computer professionals alike navigate the challenging waters of cyberspace.

About the Author

Herman T. Tavani is Professor of Philosophy at Rivier College and Co-Director of the International Society for Ethics and Information Technology (INSEIT). He is the author, editor, or co-editor of five books on ethical aspects of information technology.

wiley.com/college/tavani



See also: Il coordinatore professionista di affari di allievo: Educatore, capo e responsabile

Secrets of Video Blogging

Author: Michael Verdi

Here’s the perfect introduction to the art of the videoblog, or vlog,
whatever your subject. Filled with both technical and creative tips, this
fun, fast, full-color guide provides everything you need to get started
vlogging. You’ll learn:

• How to find and keep track of your favorite videoblogs
• How to create your own vlog under Windows or Mac OS X
• Where to find free vlog-hosting services
• Tips on lighting, shooting, sound, and video compression for vlogs
• Where to download free, legal music for your vlog
• How to build an audience with RSS feeds
• And many more insider secrets

Vlogging pioneers Michael Verdi and Ryanne Hodson are co-founders of NO
DE101, an international network of videoblog classrooms, and FreeVlog.org,
NO DE101’s online equivalent. Verdi also vlogs at www.michaelverdi.com,
while Hodson produces vlogs at http://ryanedit.blogspot.com and
http://revlog.blogspot.com.

Video training pioneers Diana Weynand and Shirley Craig are co-owners of
Weynand Training International, an Apple Authorized Training Center that
provides training services to the entertainment industry. They vlog at
www.weynand.blogspot.com.



Table of Contents:
Ch. 1Exploring videoblogs1
Ch. 2Finding your story35
Ch. 3Checking your toolbox49
Ch. 4Shooting video63
Ch. 5Editing for vlogs79
Ch. 6Compression 101113
Ch. 7Vlog139
Ch. 8Attracting an audience161

Wednesday, February 11, 2009

Modeling with Technology or ABAP Objects

Modeling with Technology: Mindtools for Conceptual Change

Author: David H Jonassen

This book provides a thorough explanation of MindtoolsM197>alternative ways of using computer applications to engage learners in constructive, higher-order thinking about specific areas of study. It presents a rationale for using these tools, discusses individual Mindtools and their use, and suggests effective ways to teach with each Mindtool. Weaves a critical thinking framework throughout the text. Expands coverage of systems modeling tools with new sections on analysis and reasoning. Adds an entirely new section of the book, which includes chapters on intentional information searching via Internet and visualization tools. For educators and school administrators.



Table of Contents:
Ch. 1Meaningful learning : conceptual change and development3
Ch. 2Model building with mindtools12
Ch. 3Assessing learning by modeling27
Ch. 4Modeling domain knowledge39
Ch. 5Modeling systems47
Ch. 6Modeling problems54
Ch. 7Modeling experiences : capturing and indexing stories71
Ch. 8Modeling thinking by building cognitive simulations81
Ch. 9Modeling with databases91
Ch. 10Modeling with semantic networks : building concept maps101
Ch. 11Modeling with spreadsheets117
Ch. 12Modeling with expert systems133
Ch. 13Modeling with systems and population dynamics tools149
Ch. 14Modeling with teachable agents and direct manipulation environments166
Ch. 15Modeling with visualization tools177
Ch. 16Modeling with hypermedia185
Ch. 17Modeling with structured computer conferences194

Look this: Fine Embellishment Techniques or Better Eyesight

ABAP Objects: Introduction to Programming SAP Applications with CD-ROM

Author: Horst Keller

ABAP (Advanced Business Application Programming) is a powerful programming language created specifically for developing SAP applications. ABAP Objects is the new object-oriented generation of this language, designed to respond to the needs of SAP's future strategies and environments.

Written by two leading experts and approved by SAP's ABAP Language Group, ABAP Objects provides an in-depth and comprehensive introduction to SAP application programming for Release 4.6. The focus is on ABAP Objects, which is treated here not as an add-on, but as an integral part of the ABAP language. An indispensable guide for novice and experienced programmers alike, ABAP Objects includes coverage of these essential topics:


  • The new ABAP Workbench and the most important features of the ABAP language.
  • The fundamentals of ABAP programming, including the ABAP runtime environment.
  • The core ABAP language elements.
  • The two ABAP programming models - classical and object-oriented - and their relevant statements.
  • Advanced concepts of OO programming with ABAP Objects.
  • Programming the SAP user interface.
  • Database access with OpenSQL.
  • ABAP glossary and a complete list of system fields.

The book also includes two CDs carrying a fully operational SAP Basis System, and containing all the example programs from the book.



0201750805B04022002

Booknews

With a focus on ABAP Objects, this textbook introduces SAP programming, with attention to ABAP workbench, programming basics, the runtime environment, core language elements, classical and object- oriented models, OO programming, and database access. A glossary and a list of system fields are included. Two companion CDs contain a fully operational SAP Basis System and all the example programs used in the text. Keller is a programmer with SAP, and Krüger is a consultant. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Monday, February 9, 2009

Advanced Flash Interface Design or Introduction to AutoCAD 2009

Advanced Flash Interface Design

Author: Michael Kemper

As a competent Flash designer, youre probably comfortable with all of the basics that Flash has to offer. However, youve probably looked at some of the amazing Flash sites on the web and thought, "How'd they do that?" Well, youll find out in this book.
Flash allows users to create some amazing interactive interfaces to interact with Rich Internet Applications, eLearning systems, and simple web sites. In this book, two of the most talented Flash designers in the world will show you how to use them effectively to create breathtaking visuals for your Flash web sites. You'll also learn how to take advantage of Flash's powerful built-in vector-based drawing tools.
The authors discuss general background theory, such as site planning, color theory, and Information architecture. They reveal techniques using gradents, layers, lighting and shadowing, 3D objects, animation, and photo editing. Techniques are illustrated and the book concludes with a discussion of usability and final tweaks. There is also a tutorial on testing your work, and exporting and finally publishing it.
Summary of contents:

  • Chapter 1 Flash Overview
  • Chapter 2 Creating Usable and Innovative Experiences
  • Chapter 3 Interface Designers Guide to Color
  • Chapter 4 Planning Your Interface Design
  • Chapter 5 Vector Drawing and Effects in Flash and Illustrator
  • Chapter 6 Understanding the Timeline and Layers
  • Chapter 7 Working with 3D Vectors
  • Chapter 8 Using Video in Flash
  • Chapter 9 Photoshop Techniques
  • Chapter 10 Moving from Photoshop to Flash and Effective PNGs
  • Chapter 11 Creating Animated Effects
  • Chapter 12Flash Textures
  • Chapter 13 Photo Editing in Photoshop and Flash
  • Chapter 14 Finishing Off Your Site



Look this: La Nueva Administración de Personal Pública

Introduction to AutoCAD 2009: A Modern Perspective

Author: Paul Richard

This modern book addresses advances in technology and introduces students to 2- dimensional drawing skills and commands using the current release of AutoCAD. It continuously builds on concepts covered in previous chapters, contains exercises combined with in-text notes, and offers examples that provide the “how and why” of AutoCAD fundamentals. Projects are included at the end of each chapter and provide hands-on experience creating various types of mechanical, architectural, civil and electrical drawings. Engineers. Designers. Anyone interested in learning or involved with AutoCAD.



Table of Contents:

PART ONE: AN INTRODUCTION TO AUTOCAD


1. Introduction to AutoCAD


2. Quick Start



PART TWO: DRAFTING SKILLS: DRAWING WITH AUTOCAD


3. Controlling the Drawing Display


4. Basic Drawing Commands


5. Drawing Tools and Drafting Settings


6. Managing Object Properties



PART THREE: UNDERSTANDING EDITING TECHNIQUES: BASICS THROUGH ADVANCED


7. Basic Editing Techniques


8. Advanced Editing Techniques



PART FOUR: WORKING WITH COMPLEX OBJECTS


9. Drawing and Editing Complex Objects


10. Pattern Fills and Hatching



PART FIVE: ANNOTATING DRAWINGS


11. Adding Text


12. Working with Tables


13. Dimensioning Drawings



PART SIX: OUTPUTTING YOUR WORK


14. Managing Paper Space Layouts


15. Plotting and Publishing



PART SEVEN: ADVANCED DRAWING AND CONSTRUCTION METHODS


16. Blocks and Block Attributes


17. Working with External References


18. File Management Tools and Object Linking and Embedding

Sunday, February 8, 2009

Physical Database Design or Computer Viruses for Dummies

Physical Database Design: The Database Professional's Guide to Exploiting Indexes, Views, Storage, and More

Author: Sam S Lightston

The rapidly increasing volume of information contained in relational databases places a strain on databases, performance, and maintainability: DBAs are under greater pressure than ever to optimize database structure for system performance and administration.

Physical Database Design discusses the concept of how physical structures of databases affect performance, including specific examples, guidelines, and best and worst practices for a variety of DBMSs and configurations. Something as simple as improving the table index design has a profound impact on performance. Every form of relational database, such as Online Transaction Processing (OLTP), Enterprise Resource Management (ERP), Data Mining (DM), or Management Resource Planning (MRP), can be improved using the methods provided in the book.

· The first complete treatment on physical database design, written by the authors of the seminal, Database Modeling and Design: Logical Design, 4th edition.
· Includes an introduction to the major concepts of physical database design as well as detailed examples, using methodologies and tools most popular for relational databases today: Oracle, DB2 (IBM), and SQL Server (Microsoft).
· Focuses on physical database design for exploiting B+tree indexing, clustered indexes, multidimensional clustering (MDC), range partitioning, shared nothing partitioning, shared disk data placement, materialized views, bitmap indexes, automated design tools, and more!



Table of Contents:
1 Introduction to Physical Database Design
2 Basic Indexing Methods
3 Query Optimization and Plan Selection
4 Selecting Indexes
5 Selecting Materialized Views
6 Shared-nothing Partitioning
7 Range Partitioning
8 Multidimensional Clustering
9 The Interdependence Problem
10 Counting and Data Sampling in Physical Design Exploration
11 Query Execution Plans and Physical Design
12 Automated Physical Database Design
13 Down to the Metal: Server Resources and Topology
14 Physical Design for Decision Support, Warehousing, and OLAP
15 Denormalization
16 Distributed Data Allocation Appendix A A Simple Performance Model for Databases Appendix B Technical Comparison of DB2 HADR with Oracle Data Guard for Database Disaster Recovery

See also: Careers Professional Development for Reatailing and Apparel Merchandising or Underwriting 101

Computer Viruses for Dummies (Dummies Series)

Author: Peter H Gregory

Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail.

Fortunately, there are ways to inoculate and protect your computer. Computer Viruses For Dummies helps you:



• Understand the risks and analyze your PC’s current condition

• Select, install, and configure antivirus software

• Scan your computer and e-mail

• Rid your computer of viruses it’s already caught

• Update antivirus software and install security patches

• Use firewalls and spyware blockers

• Protect handheld PDAs from viruses

• Adopt safe computing practices, especially with e-mail and when you’re surfing the Net



Written by Peter H. Gregory, coauthor of CISSP For Dummies and Security + For Dummies, Computer Viruses For Dummies goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phishing scams, spyware, and hoaxes. It also profiles major antivirus software to help you choose the best program(s) for your needs.

Remember, if you don’t protect your computer, not only do you risk having your computer infiltrated and your data contaminated, you risk unknowingly transmitting a virus, worm, or other foul computer germ to everybody in your address book! This guide will help you properly immunize your PC with antivirus software now and install updates and securitypatches that are like booster shots to keep your software protected against new viruses.



Saturday, February 7, 2009

Illustrator CS4 Bible or Understanding Net

Illustrator CS4 Bible

Author: Ted Alspach

The ultimate comprehensive guide to everything from drawing basics to advanced techniques

  • Adobe expert Ted Alspach reveals the latest on Illustrator CS4’s new features and thoroughly explains how to integrate Illustrator with the rest of Creative Suite 4
  • Teaches you step-by-step how to create designs that work beautifully, whether in print or online
  • Covers the basics of drawing, painting, coloring, and uncoloring
  • Offers essential tips for mastering paths, masks, blends, patterns, transparency, and type
  • Introduces you to enhanced Smart Guides and a new Crop Area tool
  • Demonstrates how to work in multiple pages with CS4’s new Artboard tool
  • Packed with practical tips and tricks to improve designs and conquer the Web with scripts and online design techniques



New interesting textbook: Comportamento organizzativo ed amministrazione nell'applicazione di legge

Understanding .Net: Second Edition (Independent Technology Guides Series)

Author: David Chappell

Microsoft's .NET is revolutionizing Windows-based software development. Since its initial release in 2002, .NET has changed significantly, becoming the foundation for a new generation of Windows applications. The .NET Framework and Visual Studio, the two core aspects of this initiative, provide a multilanguage environment in which developers can create Web services, graphical user interfaces, and other kinds of applications. Taken as a whole, the .NET technologies have changed the way nearly every Windows application is built.

Now fully updated for version 2.0 of the .NET Framework and Visual Basic 2005, Understanding .NET, Second Edition, is a concise guide to the landscape of Windows development. Margin notes, detailed diagrams, and lucid writing make this book easy to read and navigate, while analysis sections explore controversial issues and address common concerns. David Chappell's independent perspective and straightforward descriptions clarify both how the .NET technologies work and how they can be used.

Coverage includes

  • An overview of .NET and its goals
  • The Common Language Runtime (CLR)
  • The .NET languages, including C#, Visual Basic, and C++
  • The .NET Framework class library
  • Building Web Applications with ASP.NET
  • Accessing Data with ADO.NET
  • .NET framework integration with SQL Server 2005

The key to using a new technology is to understand the fundamentals. This book provides the robust foundation developers and technical managers need to make the right decisions and maximize the potential of this revolutionary framework.



Friday, February 6, 2009

Adobe Flash CS3 Professional on Demand or The Complete Guide to Digital Color Correction

Adobe Flash CS3 Professional on Demand

Author: Andy Anderson

This book uses real world examples to give you a context in which to perform a task. This book also includes workshops to help you put together individual tasks into projects. The Flash example files that you need for project tasks are available at www.perspection.com.

Perspection has written and produced books on a variety of computer software, including Adobe Flash 8, Adobe Photoshop CS3 and CS2, Adobe Dreamweaver CS3, Microsoft Office 2007 and 2003, Microsoft Windows Vista and XP, Microsoft Expression Web, and Apple Mac OS X Panther. Perspection was founded in 1991, and is committed to providing information and training to help people use software more effectively. Perspection has written more than 80 computer books, and sold more than 5 million copies.



Interesting book: Globalization and New Geographies of Conservation or Economic Concepts for the Social Sciences

The Complete Guide to Digital Color Correction

Author: Michael Walker

There's no more comprehensive and invaluable guide to the use and control of color in digital photography, and print, Web, and multimedia design. This volume brings a fresh perspective
to common color problems, explaining exactly how we see color, what the differences are between human and camera perception, and how to work with a color wheel. There's a full discussion of display issues, including monitor calibration and resolution, color palettes, and consistency across varying platforms, operating systems, and software. A skills "toolkit" provides a detailed look at both computer hardware and image-editing software, and a hands-on workshop provides lessons in adjusting skin tones, retouching and restoring archived photos, and dealing with landscapes, fashion, still lifes, and more.



Table of Contents:
There's no more comprehensive and invaluable guide to the use and control of color in digital photography, and print, Web, and multimedia design. This volume brings a fresh perspective to common color problems, explaining exactly how we see color, what the differences are between human and camera perception, and how to work with a color wheel. There's a full discussion of display issues, including monitor calibration and resolution, color palettes, and consistency across varying platforms, operating systems, and software. A skills "toolkit" provides a detailed look at both computer hardware and image-editing software, and a hands-on workshop provides lessons in adjusting skin tones, retouching and restoring archived photos, and dealing with landscapes, fashion, still lifes, and more.

Thursday, February 5, 2009

High Tech Crimes Revealed or InDesign CS CS2 Killer Tips

High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front

Author: Steven Branigan

Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes.

High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run.

Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice.

Inside, you'll find extensive information on

  • Actual hacker investigations, including the harm caused and how the criminals were tracked and caught
  • The ins and outs of identity theft, a rapidly growing crime with potential for serious damage
  • Using the criminology and psychology of hackers to detect and deter attacks
  • The risks associated with various technologies
  • Do's and don'ts for high-tech criminal investigations

This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen—and what can be done to protect yourself.

"Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it impartsSteven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well."

—Mike Tarrani, Independent Consultant

"Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security."

—Michael Nickle, Lead Consultant, VeriSign

"Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy."

—David Kensiski, Director of Operations, InfiniRoute Networks

"The modern high-tech industry brought new things to our lives. Buying a book, selling a car, or robbing a bank has never been so easy. Why is that? You've got to read this book to find out!"

—Denis Scherbakov, Systems Administrator, MCSA: Security, MCSA, MCP, Security+Atlant Telecom, ISP

"Steven Branigan has been deeply involved with many real incidents of high-tech crimes—some of them I know of are too sensitive to disclose by name. Yet, High-Tech Crimes Revealed gives outsiders an opportunity to find out what actually takes place in this often-misunderstood field. By combining his powerful knowledge of computers and technology with the legal and behavioral considerations that are overlooked by those less experienced, Branigan demonstrates just how much private industry and government need to cooperate in order to find the facts and identify criminals. While his topic is deadly-serious, he conveys his riveting stories with humor and distills observations into clearly understood rules that we all should know as we go about our lives."

—Ed Stroz, Former Supervisory Special Agent of the Federal Bureau of Investigation's Computer Crime Squad in New York and President of Stroz Friedberg LLC

"Steven brings us behind the scenes of some very exciting hacker investigations and interviews, and tells the stories like few others. This book is an exciting read because he describes the people and their actions, showing us how these new-age crimes can affect all of us."

—Steve Jurvetson, Managing Director of Draper Fisher Jurvetson

"Finally, real-life credible stories that deliver first-hand accounts of tactical and strategic high-tech operations. This book is a rare look into what goes on behind the scenes. Take a front row seat with the author as he brings you into a world few have seen."

—Bob Weaver, Retired Deputy Special Agent in Charge, Criminal Investigative Division, U.S. Secret Service, Washington, D.C.

"Steve's intellect and real-world experience in criminal investigations, forensic analysis, and security principles is evident on every page. Sprinkle in some sound advice and a bit of humor and you have a book that is interesting, informative, and most of all, useful. I highly recommend it."

—Fred Staples, Retired Director of Computer and Network Security Consulting for Telcordia Technologies

"This book details story after story of computer crimes and identity theft. The best way to prevent yourself from being a victim is to take these narratives to heart."

—Ben Rothke, Senior Security Consultant, ThruPoint Inc.


© Copyright Pearson Education. All rights reserved.



Book review: Second Helping of Murder or Technology of Cheesemaking

InDesign CS/CS2 Killer Tips

Author: Scott Kelby

If you've wondered how the InDesign pros get twice the work done in half the time, here's the answer: They know every inside tip, every hidden keyboard shortcut, and every little trick that gives them the edge. They know the fastest, smartest, and most efficient way to do just about everything. In short, they know all the "tricks of the trade." And now, you can too.

This book is packed cover-to-cover, wall-to-wall with nothing but those cool little inside tips that can make you faster, better, and have more fun using Adobe InDesign CS2. There are no detailed descriptions on working with hyphenation dictionaries, or long boring discussions on color workflow, it's just tips--short, sweet, and to the point.

So why just tips? When we (you, me, etc.) look at books, if we see the word "Tip" we're all immediately drawn to it. That's because we know we're about to learn something really cool. Maybe it's an undocumented keyboard shortcut, a hidden inside secret, or just a faster, better way to do something we do every day. The only problem with the tips in these books is there's never enough of 'em. That is, until now.

We wanted to create a book that is nothing but these tips, hundreds of tips, but with the added bonus that each tip would have a full color graphic along with it, showing you exactly how it's done. Most importantly, to get in this book they've got to be "Killer Tips." The kind of tip that makes you smile, nod, and then call all your friends and "tune them up" with your new status as InDesign guru.

This book is your ticket to working faster and smarter in Adobe InDesign CS2 than you ever thought you could, and best of all, you'll have a blast doingit.



Table of Contents:
Ch. 1Who's zoomin' who : navigating and other essentials1
Ch. 2Stereo type : tweakin' your text25
Ch. 3Color blind : working with color59
Ch. 4Drawing fire : drawing with InDesign81
Ch. 5Turn the page : working with pages95
Ch. 6Contains graphic images : working with graphics121
Ch. 7Cool Hand Luke : way-cool tips151
Ch. 8Hidden treasure : little-known features163
Ch. 9Portable people : making PDFs181
Ch. 10Waiting tables : working with tables199
Ch. 11Blue prints : printing and the Creative Suite213
Ch. 12New attitude : what's new in InDesign CS2231