Sunday, December 6, 2009

The Art of Darkwatch or Internet Research Skills

The Art of Darkwatch

Author: Farzad Varahramyan

This book showcases the concept art that went into creating Darkwatch. It will demonstrate the process and development of the concepts, as well as the evolution of the intellectual property itself. Steal a glimpse into the true talent, perseverance, and collaborative spirit of the concept artists that contributed to developing Darkwatch.

Visual Futurist - Syd Mead

"The artists who have created and visualized this world developed their imaginative creativity with such fertile cultural elements as Star Wars, Blade Runner, Aliens, Tron, and The Terminator to name but a few of individual inspirations. From the bucolic to the terrifying, these artists all share a common sense of exhilaration that is the signature characteristic of genuine creative facility."



Look this: Boss of You or Saving the Family Cottage

Internet Research Skills

Author: Niall O Dochartaigh

Internet Research Skills is a clear and concise guide to the effective use of the Internet for students in the social sciences. The open web is becoming central to student research practice, not least because of its accessibility, and this clear text describes search strategies and outlines the critical skills necessary to deal with such diverse and disorganized materials.

Internet Research Skills covers all of the essential aspects of Internet research, with each chapter containing a number of illustrations, inset boxes, and short exercises. The first half of the book deals with publications online, devoting separate chapters to the academic articles, books, official publications and news sources which form the core secondary sources for social science research. The second half of the book deals with the open web, a vast and confusing realm of materials, many of which have no direct print counterpart.

Key Features:

  • Inset boxes, including search tips, technical explanations, examples and warning tips on avoiding common pitfalls
  • Exercises at the end of each chapter that cover the key skills
  • Worked examples throughout the book, drawing on a range of social science disciplines
  • Illustration with relevant screengrabs

This concise and accessible introduction to Internet research skills will be a perfect guide for undergraduate students carrying out research projects and for postgraduate students working on theses and dissertations.



Saturday, December 5, 2009

ebXML or Information Systems Management

ebXML: The New Global Standard for Doing Business on the Internet

Author: Alan Kotok

and/or stickers showing their discounted price. More about bargain books

See also: Microeconomics or Knock em Dead 2008

Information Systems Management

Author: Barbara McNurlin

KEY BENEFIT: The authors utilize their years of working with companies on IT management / strategy to provide students with a practical look at the evolution of IT in business.
KEY TOPICS: Topics include leadership issues, the CIO’s responsibilities, uses of IT, information systems planning, essential technologies, managing operations, systems development, decision-making, collaboration, and knowledge work.
MARKET: An excellent reference resource for anyone employed in the information technology sector of business, especially managers of and executives in those departments.




Table of Contents:
Preface
CHAPTER 1 Information Systems Management in the global economy

PART I LEADERSHIP ISSUES IN THE DIGITAL ECONOMY
CHAPTER 2 The Top is Job
CHAPTER 3 Strategic uses of Information Technology
CHAPTER 4 Strategic Information Systems Planning

PART II MANAGING THE ESSENTIAL TECHNOLOGIES IN THE DIGITAL ECONOMY
CHAPTER 5 Designing Corporate IT Architecture
CHAPTER 6 Managing Telecommunications
CHAPTER 7 Managing Corporate Information Resources
CHAPTER 8 Managing Partnership-Based IT Operations

PART III MANAGING SYSTEM DEVELOPMENT
CHAPTER 9 Technology for Developing effective Systems
CHAPTER 10 Management Issues in System Development
CHAPTER 11 Managing Information Security

PART IV SYSTEMS FOR SUPPORTING KNOWLEDGE-BASED WORK
CHAPTER 12 Supporting Information-centric Decision Making
CHAPTER 13 Supporting IT-enabled Collaboration
CHAPTER 14 Supporting Knowledge Work
CHAPTER 15 The Opportunities and Challenges Ahead

Glossary
Index


Thursday, December 3, 2009

Regression Using JMP or Case Problems in Finance Excel Templates CD ROM

Regression Using JMP

Author: Lee Creighton

Filled with examples, Regression Using JMP® introduces you to the basics of regression analysis using JMP® software. You will learn how to perform regression analyses using a wide variety of models including linear and nonlinear models. Taking a tutorial approach, the author cover the customary Fit Y by X and Fit Model platforms, as well as the new features and capabilities of JMP® Version 5, Output is covered in helpful detail.

Thorough discussion of the following is also presented:



• confidence limits

• polynomial and smoothing models

• examples using JMP® scripting language

• regression in the context of linear model methodology

• diagnosis of and remedies for data problems including outliers and collinearity



Statistical consultants familiar with regression analysis and with basic JMP concepts will appreciate the conversational, “what to look for” and “what if” scenarios presented. Non-Statisticians with a working knowledge of statistical concepts will learn to use JMP successfully for each analysis.



Table of Contents:
Acknowledgments
Using This Book
1Regression Concepts1
2Regressions in JMP25
3Observations73
4Collinearity: Detection and Remedial Measures105
5Polynomial and Smoothing Models139
6Special Applications of Linear Models175
7Nonlinear Models215
8Regression with JMP Scripting Language237
References247
Index249

New interesting textbook: Amazing Peace or Skippyjon Jones

Case Problems in Finance + Excel Templates CD-ROM

Author: Carl Kester

Case Problems in Finance is a Harvard case course presenting real business situations that pose debatable alternative courses of action. The cases contain problems that can be narrowed but not always settled by the usual techniques of financial analysis. It will teach students to discover ways of thinking that are productive in handling different types of managerial problems intelligently. The cases are grouped by major topics: financial analysis and forecasting, cost of capital, working capital management, capital budgeting, dividend policy, debt policy, financial execution, and mergers and restructuring.



Wednesday, December 2, 2009

Teaching and Learning with Microsoft Office and FrontPage or Computer Security Basics

Teaching and Learning with Microsoft Office and FrontPage: A Multi-level Approach to Computer Integration

Author: Timothy J Newby

Teaching and Learning with Microsoft Office 2007 and Expression Web
A Multi-Level Approach to Computer Integration
Second Edition
Timothy J. Newby • Judith Oates Lewandowski

Teaching and Learning with Microsoft Office 2007 and Expression Web is designed to give busy and often overwhelmed teachers and students a quick way to see and grasp the basics of key software applications. Readers who use this book will:
= Obtain a foundation of the basics of common application software,
= Learn how to integrate and utilize the software within classroom settings, and
= Learn how to create a learning environment that is engaging, interesting, and effective.

Hallmarks of this Text
= Scaffolds instruction for all skill levels. A unique three-level approach in each chapter helps readers at various levels of expertise.
= Level 1 is for the true beginner/novice.
= Level 2 offers guided assistance as the reader to required to use additional and often more advanced features of the software.
= Level 3 moves the student on to address integration of the software.
= Workout. These features actively engage the reader early and often with the software throughdirectedexercises and projects.
= Examples. Hundreds of examples of the utilization of the software are given across all age groups and content areas.

New to this Edition
= Mentoring videos. Short, concise videos on the text’s web site illustrate the steps needed to complete all of the outlined features withinthe text for all chapters and all levels within each chapter.
= Windows Vista. Chapter 1, Systems Navigation, provides screen captures based on Microsoft’s newest system software.
= Office 2007 software. With the upgrade to Microsoft Office 2007, all chapters have been completely revised to include explanations and screen captures of all of the tool ribbons and other features of Microsoft Word, Excel, PowerPoint, and Publisher.
= Publisher. A new chapter on Microsoft Publisher (Chapter 6) follows the same format as the other chapters while covering both printed publications and how to develop web pages with Publisher.
= Microsoft’s Expression Web software. New projects have been incorporated to reflect the features of this new, more powerful, cleaner software.
= Microsoft’s Access. Located on the text’s companion website, this chapter provides a basic understanding of what Microsoft Access can do and how it can be used.
= Examples and Problem Scenarios. Additional examples and problem scenarios have been added to each chapter.
= Revised National Educational Technology Standards (NETS). NETS Standards for both teachers and students have been included within Level 3 of each chapter.



Table of Contents:

Introduction 1

Ch. 1 System Software - MS Windows Vista: The Basics of Navigating the System 7

Ch. 2 Word Processing - MS Word: The Basics of a Writing Assistant 29

Ch. 3 Spreadsheets - MS Excel: The Basics of a "Number Cruncher" 59

Ch. 4 Data Management - More MS Excel: The Basics of Collecting, Organizing, and Retrieving Loads of Information 91

Ch. 5 Presentation Software - MS PowerPoint: The Basics of Creating Presentations, Handouts, and Much, Much More 115

Ch. 6 Desktop Publishing - MS Publisher: The Basics of Desktop Publishing 153

Ch. 7 Web Editing - Expression Web: The Basics of Web Page Development 185

Appendix National Educational Technology Standards 221

Glossary 225

Index 231

New interesting book: The Business Oriented CIO or 10 Cool Lego Mindstorms Robotics Invention System 2 Projects

Computer Security Basics

Author: Rick Lehtinen

In 1991, computer security was a vague subject that managers and system administrators decided, reluctantly, that they needed to know more about. Most security initiatives were based on the "Orange Book" (Trusted Computer System Evaluation Criteria), a US Department of Defense publication that baffled casual readers. O'Reilly's "Computer Security Basics" contained a readable introduction to the Orange Book -- why it existed, what it contained, and what the different security levels were all about. Over the past 15 years, this classic book has continued to sell steadily.

Today, security is a hot topic, and international (ISO) security standards largely have replaced the Orange Book. But for those of you who need to understand the fundamentals, "Computer Security Basics" is still the best book to consult.

The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For novice security administrators, system administrators, and developers, "Computer Security Basics" offers a clear overview of the security concepts you need to know: access controls, malicious software, security policy, cryptography, biometrics, and government regulations and standards. And it does so in a way that you can easily understand, even if you aren't very familiar with security. This is the must-have book for a must-know field.



Tuesday, December 1, 2009

The Business Oriented CIO or 10 Cool Lego Mindstorms Robotics Invention System 2 Projects

The Business-Oriented CIO: A Guide to Market-Driven Management

Author: George Tillmann

Praise for The Business-Oriented CIO


A Guide to Market-Driven Management

"A must-read for CIOs and senior IT executives. George Tillmann's Market-Driven Management techniques are an outstanding addition to the CIO's arsenal, full of insights for IT organizations wanting to generate real added value from IT investments and services."

—Andre Spatz, former Chief Information Officer, UNICEF

"The Business-Oriented CIO: A Guide to Market-Driven Management is an exciting proposition for CIOs and CEOs trying to make IT more responsive to their organizations' needs. Tillmann's formula for running the IT department as a business within a business can transform a costly, slow-to-respond, always-playing-catch-up function into vibrant, efficient, responsive internal partner."

—Brandt Allen, Professor, Darden Business School, University of Virginia

"Tillmann delivers a thoroughly insightful guide to navigating and managing IT through his market-driven and customer-focused approach to business alignment through governance, strategy, and planning. A must-read for the entire executive suite focused on value-driven information technology."

—Paul Zazzera, former SVP and Chief Information Officer, Time Inc.

"Both experienced and relatively new CIOs can learn a great deal from George's insightful pragmatic guide on the biggest challenge facing CIOs today. Namely, how to position IT, and the CIO, as an integral part of the business. Keep it in your desk drawer for handy reference: you will go to it often."

—Peter Whatnell, Chief Information Officer, Sunoco Inc.

Every CIO's playbook . ..

Written by industry expert George Tillmann, The Business-Oriented CIO offers you important guidance on how to bring IT into the mainstream of your business and how you can make the transition from technical guru to a full member of the executive team. This essential book contains insights from business leaders including Michael Porter on strategy, Harry Markowitz on portfolio theory, C. K. Prahalad and Gary Hamel on core competencies, Robert Kaplan and David Norton on scorecards, and Christian Gronroos on customer service. It reveals the winning formula to take your IT department from a reactive cost center to a proactive business partner.



Table of Contents:
Preface.

Acknowledgements.

Part One: The Fundamentals.

Chapter 1. In Search of Overhead Heroes.

Chapter 2. It Governance.

Chapter 3. IT Strategy and Planning.

Chapter 4. Portfolio Management.

Part Two: Learning from the Best.

Chapter 5. Customer Management.

Chapter 6. Market Intelligence.

Chapter 7. Service Offering Management.

Chapter 8. Performance Management.

Part Three: Pushing the Envelop.

Chapter 9. Organizational Competencies.

Chapter 10. In Search of Customer Service.

Chapter 11. Local Heroes.

Index.

New interesting book: Cobbler Crusade or Ainsley Harriotts All New Meals in Minutes

10 Cool Lego Mindstorms Robotics Invention System 2 Projects: Amazing Projects You Can Build in under an Hour

Author: Syngress

LEGO MINDSTORMS lets you design and program robots that can do just about anything!
The LEGO MINDSTORMS RIS 2.0 is the core set for all MINDSTORMS users, that lets users design and program working robots - limited only by their imagination. Initially designed for users 12 and up, LEGO MINDSTORMS has taken off with LEGO enthusiasts of all ages.
10 Cool LEGO MINDSTORMS RIS 2.0 Projects: Amazing Projects You Can Build in Under an Hour provides step-by-step instructions and detailed illustrations for users of all skill levels and proficiencies.

From out of the box to up and running in less than an hour.
8-page color insert. A color insert illustrates the complete projects in full-detail.
Specifically targeted at new users of the LEGO MINDSTORMS RIS 2.0.



Monday, November 30, 2009

Professional Web APIs with PHP or Arcade Fever

Professional Web APIs with PHP: Ebay, Google, Paypal, Amazon, Fedex Plus Web Feeds

Author: Paul Reinheimer



• Offers hands-on tips and numerous code examples that show Web developers how to leverage content and feeds from today's top Web sites-including Google, eBay, PayPal, Amazon, Yahoo!, and FedEx

• Introduces APIs (Application Program Interfaces) in general and uses real-world examples that show how to produce and document them

• Explains how to use the popular scripting language PHP to create APIs that interact with unrelated applications over the Web

• Examples take readers through each stage of the API process, from basic test implementations to integration with existing sites




Table of Contents:
Ch. 1Introducing Web services3
Ch. 2Introducing Web feeds7
Ch. 3Consuming Web feeds23
Ch. 4Producing Web feeds61
Ch. 5Introduction to Web APIs97
Ch. 6Interacting with the Google API111
Ch. 7Interacting with the Amazon API149
Ch. 8Interacting with the FedEx API177
Ch. 9Interacting with the eBay API199
Ch. 10Interacting with the PayPal API235
Ch. 11Other major APIs263
Ch. 12Producing Web APIs287
App. ASupporting functions315
App. BComplete feed specifications319
App. CDevelopment system333

Go to: Superjuice for Kids or Americas Favorite Food

Arcade Fever: The Fan's Guide to the Golden Age of Video Games

Author: John Sellers

Do you remember the difference between playing 'singles' and 'doubles'? Have you mastered the delicate art of hyperspace? Can you say 'joystick' in polite conversation without blushing? If you№ve answered 'yes' to any of these questions, then Arcade Fever is the book for you‹the world№s first illustrated tribute to Asteroids, Ms. Pac-Man, Galaga, Q*bert, Gauntlet and many more of the mind-blowing games you played in your youth. You want to reminisce about the coolest Atari cartridges, the silliest-named arcade oddities, and the funkiest bass riff ever used in a video game? You want interviews with early arcade heroes like Atari founder Nolan Bushnell, Robotron designer Eugene Jarvis and 'Pac-Man Fever' composers Buckner + Garcia? You want to look at revealing pictures of Dragon№s Lair hottie Princess Daphne? It№s all in Arcade Fever, an infectious celebration of №70s and №80s arcade culture.

Entertainment Weekly

Remember when Space Invaders ruled the planet and "Pac-Man Fever" was a top 10 hit? John Sellers does, and his illustrated history of the arcade's glory days will push any game geek's thrust button. Fever not only describes the joystick controls and strategies that turned millions of teens into addicts in search of a Berzerk fix but puts Frogger into pop-cultural context-as a Saturday-morning Supercade cartoon and Seinfeld sight gag. Sellers, a former Donkey Kong champion, would have won some free credits by including more interviews with game designers, and Dig Dug-ing up the back stories that make some fo the entries blast off. But anyone who longs for the cacophonous wokka-wokka-wokka of the local arcade will give this book a pretty high score. Grade: B.

Time Out New York

Do you long for Pong? Does your heart belong to Ms. Pac-Man? If you're nostalgic for the early days of video games, check out Arcade Fever: The Fan's Guide to the Golden Age of Video Games, written by John Sellers. After you're a few pages into this fond tribute, suddenly vast hazy expanses of your youth will come back into focus.

Philadelphia Weekly

...Sellers' book is magnificently researched, with an enthusiasm for the subject matter that bubbles out through the pages like so many dangling pairs of cherries...Sellers, a onetime writer for Who Wants to Be a Millionaire, has a conversational prose style, dotted with special bonus translations of game sound effects. As might well be expected, the book is filled with pop culture referecnes to Footloose, Battlesatar Galactica and Honeycomb breakfast cereal...It's the forgotten nuggets, like the fact that the rock group Journey was the subject of a game and that Captain

Maxim Online

John Seller№s Arcade Fever takes the reader back to the pre-PlayStation days by profiling virtually all of the classic (and not so classic) games, from the ubiquitous (Space Invaders) to the obscure and OCD-inducing (Bubbles). Each game examined not only gets a write-up, but has each of its vital statistics catalogued, with sidebars on cultural minutae like the Zaxxon board game and Pac-Man television shows, and even some interviews with key figures from video game history. Anyone who remembers a time when Mario wasn№t yet іsuperІ and Moon Patrol was the height of technology will enjoy reliving their high score moments with Arcade Fever. If Arcade Fever is a disease, we don№t need no cure.



Sunday, November 29, 2009

Microsoft Outlook 2007 Bible or Perl Programming for the Absolute Beginner

Microsoft Outlook 2007 Bible

Author: Peter G Aitken

Discover all the ways Outlook can make your life with this book. In the handy package that is Outlook, you get the tools you use constantly: e-mail, a calendar and appointment book, a contacts list, a to-do list, and more. Learn to use them together, and you have a sophisticated system for managing your day. This complete A-to-Z guide can teach you, whether you’re just venturing into Outlook or are ready to customize and tweak it with VBA programming.



Table of Contents:
Introduction.

1. Getting Started with Outlook.

2. Installing and Using Outlook.

3. Email Accounts.

4. Fundamentals of Email.

5. Formatting Your Email Messages.

6. Working with Advanced Email Message Components and Editing.

7. Understanding Email Options.

8. Dealing with Junk Email.

9. Processing Messages with Rules.

10. Managing Your Contacts.

11. Working with the Calendar.

12. Working with Schedules and Meetings.

13. Working with Outlook Notes.

14. Using the Journal.

15. Keeping Track of Tasks.

16. Making Use of RSS Feeds.

17. Making the Most of Outlook Categories.

18. Working with Outlook Folders and Categories.

19. Customizing Outlook to Suit the Way You Work.

20. Managing Security Issues.

21. Using Outlook with Other Applications.

22. Writing Macros and Visual Basic Code in Outlook.

23. Getting Started with VBA.

24. Understanding the Outlook Object Model.

25. Programming Outlook with VBA: Some Examples.

26. Working with Outlook Forms.

27. Going Beyond Basic Forms.

28. Using Outlook with Exchange Server.

29. Using Outlook with SharePoint Services.

Interesting book: Oracle Database 11g SQL or Corel Paint Shop Pro X

Perl Programming for the Absolute Beginner

Author: Jerry Lee Ford

Perl is an enormously popular scripting language that runs on many different operating systems, including Windows, Linux, Unix, and Mac OS X, and provides programmers with a robust and powerful programming language that is easy to learn, yet sufficiently complex to tackle just about any job. As such, it's a perfect programming language for those new to programming to learn. Perl Programming for the Absolute Beginner has been designed to teach you how to develop Perl scripts and to help you become an effective programmer, and teaches concepts through the creation of simple games. Whether you are an experienced programmer looking to learn another language or you are reading this book as the first step in your programming career, you will find that this book's games-based teaching approach makes the learning process a lot more enjoyable. You will also find that the knowledge you?ll gain from developing Perl-based games will provide you with a strong foundation from which you can branch out and tackle more complex challenges.



Saturday, November 28, 2009

Building a Web Site with Ajax Visual Quickproject Guide Series or The Coming Convergence

Building a Web Site with Ajax [Visual Quickproject Guide Series]

Author: Larry Ullman

Ajax is at the heart of the Web 2.0 revolution. It isn't a technology but, rather, is a technique that leverages other technologies and techniques, such as CSS, XML, DHTML, and XHTML. Many Web designers and programmers would like to incorporate Ajax in their projects because of the amazing functionality it can add to a Web site, but they can't because of the steep learning curve. That's where this book steps in. It makes learning Ajax fun and easy -- a great place to start! Visual QuickProject Guides focus on a single project. In this case the project is creating a business employee directory, like an address book. What's being created is a better, new kind of Web site.










Look this: On Call in Hell or Handbook of International Migration

The Coming Convergence: The Surprising Ways Diverse Technologies Interact to Shape Our World and Change the Future

Author: Stanley Schmidt

Imagine direct communication links between the human brain and machines, or tailored materials capable of adapting by themselves to changing environmental conditions, or computer chips and environmental sensors embedded into everyday clothing, or medical technologies that eliminate currently untreatable conditions such as blindness and paralysis. Now imagine all of these developments occurring at the same time. The stuff of science fiction?
Not So. These are actually the reasonable predictions of scientists attempting to forecast a few decades into the future based on the rapid pace of innovation.
• Author Stanley Schmidt-a physicist, a writer, and the editor of Analog: Science Fiction and Fact-explores these and many more amazing yet probable scenarios in this fascinating guide to the near future. He shows how past convergences have led to today's world, then considers tomorrow's main currents in biotechnology, cognitive science, information technology, and nanotechnology. Looking even further downstream he foresees both exciting and potentially dangerous developments:

• Longer, healthier lives
• Cheap, generally available food, energy, and technology
• Reduced pollution and environmental stress
• Economic disruption during transitional periods
• Excessive power in too few hands
• Increased vulnerability from overdependence on technology.

Schmidt notes that even a routine technology such as the CAT scan is the result of three wholly separate innovations started many decades ago which recently converged: the X-ray, the computer, and advances in medicine. On a more ominous note, he also observes that the9/11 terrorist attack on the World Trade Center was made possible by the malicious convergence of two separate trends in modern engineering and technology: the concentration of people in high rises within cities and the success of the passenger airline industry.
The message is clear: the choices we make now will converge to create a near and distant future that will be almost unbelievably wonderful or unimaginably catastrophic, or both. This knowledgeable, fascinating glimpse into the future is a must read for everyone interested in technology, upcoming innovations in business, science fiction, and the future.

Publishers Weekly

It's far easier to describe the past than to predict the future: this principle is unwittingly demonstrated by Schmidt, a physicist and longtime science fiction editor (Analog: Science Fiction and Fact). His book is best when discussing how past technologies have come together, usually in unforeseen ways, to enable social change. Joseph-Marie Jacquard's late-18th-century work on automatic looms controlled by punch cards, for example, can be traced forward to the development of early computers. Schmidt is glib but far less informative when projecting where the confluence of current technologies is likely to take us. He touches on nanotechnology and improvements in computing power, among other fields, and offers projections about how medicine, communication and interpersonal relationships are apt to change, but he largely does so superficially and perhaps overly optimistically: "In the kind of world we can aspire to, everybody will have enough and nobody will have to work very hard to get it." Though he acknowledges that some convergences can be harmful, he dismisses this downside with equal ease, concluding simply that we need to be vigilant about the choices we make. Illus. (Apr.)

Copyright 2007 Reed Business Information



Table of Contents:

Foreword     9
Acknowledgments     13
Introduction: Converging Currents: Then, Now, and Tomorrow     15
From Fabric Looms to the Internet: The Story of Computing     31
Aviation and Big Buildings     49
New Arts and Sciences     69
Looking Inside: New Technologies and Medicine     87
Computers and Genes     101
New Directions in Biotechnology     115
Cognitive Science: How Do We Know?     129
The Explosion in Information Technology     147
Nanotechnology     173
Metaconvergences: When Big Streams Make Still Bigger Streams     185
Potentials and Promises     215
Pitfalls and Perils     223
Getting There from Here: Challenges and Strategies     235
Notes     247
Index     263

Thursday, November 26, 2009

Software Solutions for Engineers and Scientists or Finite Element Method Using MATLAB

Software Solutions for Engineers and Scientists

Author: Julio Sanchez

Engineers and scientists often need to develop software to suit their particular needs, but they do not always have the advanced programming skills that are required to do so. Serving as a comprehensive problem-solving resource, Software Solutions for Engineers and Scientists provides development tools and practical shortcuts for professionals who already have basic programming skills but may lack the knowledge needed to perform sophisticated tasks and difficult mathematic calculations. This book includes mathematical-computation intensive code along with programming techniques that are compatible with both Visual C++ console applications as well as Windows program applications.



New interesting book: Spa Manicuring or View from the Cliff

Finite Element Method Using MATLAB

Author: Young W Kwon

Expanded to include a broader range of problems than the bestselling first edition, Finite Element Method Using MATLAB, Second Edition presents finite element approximation concepts, formulation, and programming in a format that effectively streamlines the learning process.

Booknews

Presenting introductory and some advanced topics of the finite element method (FEM), this text is intended for upper-level undergraduate and lower-level graduate courses; it contains more material than can be covered in a single semester, but some sections can be skipped for a one-semester introductory course. Includes an introduction to MATLAB for those new to the software, as well as analysis of shell structures as one of the most important structural applications of FEM. New to this edition is a chapter on special topics, including analysis of cracks, thermal analysis for multilayered structures, and buckling analysis, both static and dynamic. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Wednesday, November 25, 2009

Data Analysis Using Microsoft Excel or The SSCP Prep Guide

Data Analysis Using Microsoft Excel: Updated for Office XP

Author: Michael R Middleton

Spreadsheet skills are important for a first job, and DATA ANALYSIS USING MICROSOFT EXCEL prepares students to enter the world of work with stronger spreadsheet skills. Designed as a supplement to a main statistics text or as a reference for professionals, this handbook helps students build their proficiency in Microsoft Excel and shows them how to use the built-in capabilities of Excel to analyze data and make decisions. Although many of the examples are business oriented, the step-by-step approach makes this book appropriate for statistical analysis in other courses and academic disciplines.



Table of Contents:
Ch. 1Introduction to Excel1
Ch. 2Managing Files and Printing13
Ch. 3Basic Charts25
Ch. 4Univariate Numerical Data35
Ch. 5Categorical Data49
Ch. 6Bivariate Numerical Data61
Ch. 7Probability Distributions71
Ch. 8Sampling and Simulation85
Ch. 9One-Sample Inference for the Mean97
Ch. 10Quality Control Charts113
Ch. 11Two-Sample Inference for Means123
Ch. 12Chi-Square Tests139
Ch. 13Analysis of Variance149
Ch. 14Simple Linear Regression167
Ch. 15Simple Nonlinear Regression183
Ch. 16Multiple Regression197
Ch. 17Regression Using Categorical Variables207
Ch. 18Autocorrelation and Autoregression219
Ch. 19Time Series Smoothing233
Ch. 20Time Series Seasonality249
AppExcel on the Macintosh271
References273
Index275

Read also Electronic Commerce or Online Retrieval

The SSCP Prep Guide: Mastering the Seven Key Areas of System Security

Author: Debra S Isaac



• SSCP (System Security Certified Practitioner) is the companion test to CISSP, appealing to the practitioners who implement the security policies that the CISSP-certified professionals create

• Organized exactly like the bestselling The CISSP Prep Guide (0-471-41356-9) by Ronald L. Krutz and Russell Dean Vines, who serve as consulting editors for this book

• This study guide greatly enhances the reader's understanding of how to implement security policies, standards, and procedures in order to breeze through the SSCP security certification test

• CD-ROM contains a complete interactive self-test using all the questions and answers from the book, powered by the Boson test engine




Sunday, February 22, 2009

Database Sys with Dbase Place Code or Understanding Bioinformatics

Database Sys with Dbase Place Code

Author: Thomas Connolly

This book places a strong emphasis on good design practice, allowing readers to master design methodology in an accessible, step-by-step fashion. In this book, database design methodology is explicitly divided into three phases: conceptual, logical, and physical. Each phase is described in a separate chapter with an example of the methodology working in practice. Extensive treatment of the Web as an emerging platform for database applications is covered alongside many code samples for accessing databases from the Web including JDBC, SQLJ, ASP, ISP, and Oracle's PSP. A thorough update of later chapters covering object-oriented databases, Web databases, XML, data warehousing, data mining is included in this new edition. A clear introduction to design implementation and management issues, as well as an extensive treatment of database languages and standards, make this book an indispensable, complete reference for database professionals.



Look this: Anlagengebäude & Gemeinschaftsentwicklung

Understanding Bioinformatics

Author: Market Zvelebil

Suitable for advanced undergraduates and graduates, Understanding Bioinformatics provides a definitive guide to this vibrant and evolving discipline. The book takes a conceptual approach, guiding the reader from first principles through to an understanding of the computational techniques and the key algorithms. Understanding Bioinformatics is an invaluable companion for students from their first encounter with the subject through to more advanced studies.

The book is divided into seven sections, with the opening section introducing the basics of nucleic acids, proteins and databases. Subsequent sections are divided into 'applications' and 'theory' chapters, allowing readers to focus their attention effectively. In each section, the applications chapter provides a fast and straightforward route to understanding the main concepts and 'getting started'. Each of these is then followed by theory chapters which give greater detail and present the underlying mathematics. In Section 2, Sequence Alignments, the applications chapter shows the reader how to get started on producing and analyzing sequence alignments, and using sequences for database searching, while the next two chapters look closely at the more advanced techniques and the mathematical algorithms involved. Section 3 covers evolutionary processes and shows how bioinformatics can be used to help build phylogenetic trees. Section 4 looks at the characteristics of whole genomes. In Sections 5 and 6 the focus turns to secondary and tertiary structure - predicting structural conformation and analyzing structure-function relationships. The last section surveys methods of analyzing data from a set of genes orproteins of an organism and is rounded off with an overview of systems biology.

The emphasis throughout Understanding Bioinformatics is on guiding the reader through the subject matter. The writing style is notable for its clarity, while the extensive, full-color artwork has been designed to present the key concepts with simplicity and consistency.



Table of Contents:
SECTION 1 Background Basics
1: Nucleic Acid World
2: Protein Structure
3: Dealing with Databases

SECTION 2 Sequence Alignments
4: Producing and Analyzing Sequence Alignments
5: Pairwise Sequence Alignment
6: Patterns, Profiles and Multiple Alignments

SECTION 3 Evolutionary Processes
7: Recovering Evolutionary History
8: Building Phylogenetic Trees

SECTION 4 Genome Characteristics
9: Revealing Genome Features
10: Principles of Genome Annotation

SECTION 5 Secondary Structures
11: Obtaining Secondary Structure from Sequence
12: Predicting Secondary Structures

SECTION 6 Tertiary Structures
13: Modeling Protein Structure
14: Analyzing Structure-Function Relationships

SECTION 7 Cells and Organisms
15: Proteome and Gene Expression Analysis
16: Clustering Methods and Statistics
17: Systems Biology

APPENDICES Background Theory
Appendix A: Probability and Bayesian Analysis
Appendix B: Molecular Energy Functions
Appendix C: Function Optimization

Saturday, February 21, 2009

Security Policies and Procedures or The Camera Phone Book

Security Policies and Procedures: Principles and Practices

Author: Sari Stern Green

Security Policies and Procedures: Principles and Practices was created to teach information security policies and procedures and provide students with hands-on practice developing a security policy.This book provides an introduction to security policy, coverage of information security regulation and framework, and policies specific to industry sectors, including financial, healthcare and small business.



Books about: Cooked to Perfection or Wolf in Chefs Clothing

The Camera Phone Book: How to Shoot Like a Pro, Print, Store, Display, Send Images, Make a Short Film

Author: Aimee Baldridg

Marketing experts predict that by 2009, nearly 90% of all cell phones will contain a camera, as manufacturers race to create cheaper, easier-to-use models with more sophisticated cameras, more pixels, flash units and even multiple lenses. Already revolutionizing audiovisual communication, it's a trend that will only grow more explosively—and who better than National Geographic to create a how-to book aimed directly at the millions who carry a camera phone everywhere and want to make the most of it?
Created by two top professionals, this generously illustrated nuts-and-bolts guide is the first of its kind to treat these units as genuine cameras instead of novelties, and the only one to include a full-color photo-essay demonstrating the full capabilities of the latest camera phones. In five easy-to-read chapters, the book explains how to choose good equipment; take better pictures; and store, print and send the best images. Readers will find practical tips on preventing or repairing water damage, protecting easily-scratched lenses inside pockets and purses, and retrieving accidentally-erased images. They'll also learn to access the events, advice, and opportunities of the burgeoning camera phone community, from film festivals to news organizations, moblogs, and more.
Featuring the technical savvy of CNet.com's Aimee Baldridge and the creative skill of National Geographic photographer Robert Clark, a camera phone pioneer, this compact yet comprehensive reference combines up-to-the-minute expertise with superb examples, at an inexpensive price that makes it a perfect gift book—or an ideal impulse buy.



Friday, February 20, 2009

PowerPoint 2007 or GIS Tutorial for Health

PowerPoint 2007: The Missing Manual

Author: E A Vander Veer

Like every other application in Microsoft Office suite, PowerPoint is loaded with features. So many, in fact, that even veterans don't know where to find them all. Microsoft solved this problem in PowerPoint 2007 by redesigning the user interface with a tabbed toolbar that makes features easy to locate and use. PowerPoint 2007 also boasts improved graphics, additional templates, the ability to save custom layouts, and improved collaboration through SharePoint. One thing Microsoft hasn't improved is its poor documentation. To learn the ins and outs of all the features in PowerPoint 2007, Microsoft merely offers online help. If you're familiar with previous versions of the program, you may be lost the first time you fire up the new PowerPoint; or you would be if it weren't for PowerPoint 2007: The Missing Manual.

This book, written specifically for this version of the software, not only offers the basics of how to create, save, set up, run, and print a basic bullets-and-background slideshow, but takes you into the world of multimedia, animation, and interactivity. You'll learn how to add pictures, sound, video, animated effects, and controls (buttons and links) to their slides, along with ways to pull text, spreadsheets, and animations created in other programs. You can also create your own reusable design templates and learn to automate repetitive tasks with macros. Learn how to take advantage of advanced functions (such as adding custom background images) that existed in previous PowerPoint versions, but were so cleverly hidden that few people ever found them.



Table of Contents:
The Missing Credits     xiii
Introduction     1
Slideshow Basics
Creating a Basic Presentation     19
Beginning a New Presentation     19
Creating a New Presentation from Scratch     20
Creating a Presentation from an Existing Template, Theme, or Presentation     22
Choosing a Theme for Your Presentation     32
Adding Text     34
Adding Text to an Existing Text Box     34
Adding a New Text Box     36
Adding More Slides     38
Moving Around Inside a Presentation     39
Navigating with the Scroll Bar     40
Navigating with the Slides and Outline Tabs     40
Using Find     42
Adding Speaker Notes     43
Creating and Printing Handouts     44
Saving and Closing a Presentation     46
Running a Presentation     47
Editing Slides     51
Editing Text     51
Selecting Text     52
Cutting Text     53
Copying Text     54
Pasting Text     54
Moving Text     57
Deleting Text     57
Reversing an Action (Undo)     58
Finding andReplacing Text Automatically     58
Spell Check and Other Editorial Tools     60
Checking Spelling     61
Thesaurus     67
Translating Words into Other Languages     69
Researching Stuff     69
Turning on AutoCorrect (for Capitalization and Spelling)     71
Adding Special Characters     74
Non-English Text     75
Formatting and Aligning Your Text     77
Automating Text Formatting     77
Using AutoFormat     79
Using AutoFit     81
Manually Formatting Text Appearance     83
Changing the Font     85
Changing Font Size     86
Bolding, Italicizing, and Underlining Text     89
Changing Text Color and Background Color     90
Adding Special Color Effects     91
Tweaking the Text Outline     97
Adding Special Text Effects     101
Manually Aligning and Indenting Text     104
Aligning Text and Creating Columns     104
Creating Lists     108
Changing Indents     113
Changing Tab Stops     114
Changing Spacing     116
Changing Text Direction      118
Formatting Text Boxes     120
Formatting and Laying Out Your Slides     123
Changing Slide Layout     123
Applying a Canned Layout     124
Switching Orientation from Landscape to Portrait (and Back)     125
Repositioning Text Boxes     126
Help for Positioning Text Boxes: Zoom, Guides, and Grid     128
Changing Background Color     129
Adding a Gradient Effect     133
Reapplying Themes, Colors, and Fonts     136
Reapplying a Theme     136
Reapplying a Color Scheme     138
Reapplying a Font     139
Editing Your Slideshow     141
Viewing Multiple Slides     141
Slides Pane     142
Slide Sorter View     143
Adding, Deleting, and Moving Slides     143
Adding Blank Slides     144
Deleting Slides     145
Moving Slides     146
Duplicating Slides     147
Cutting, Copying, and Pasting Slides     148
Inserting Slides from Other Slideshows     148
Editing Slide and Layout Masters     151
Creating Slide Masters and Layout Masters     157
Creating a New Slide Master      158
Creating a New Layout Master     159
Renaming Slide Masters and Layout Masters     159
Preserving Slide Masters and Layout Masters     160
Applying Multiple Slide Masters     162
Editing Handout Masters     162
Editing the Notes Master     165
Adding Headers and Footers     167
Adding Footers to Your Slides     168
Adding Headers and Footers to Notes Pages and Handouts     169
Adding Charts, Diagrams, and Tables     171
Creating Charts     172
Choosing a Chart Type     173
Creating a Chart     175
Customizing Charts with Prebuilt Layouts and Styles     178
Editing and Tweaking Charts     181
Pasting Existing Charts into PowerPoint     191
Creating Diagrams     193
Adding Diagrams to Slides     194
Turning Lists into Diagrams     195
Applying Prebuilt Styles and Color Themes to Diagrams     197
Tweaking Diagrams     198
Adding, Changing, and Moving Diagram Shapes     200
Changing Diagram Text     203
Creating Tables     204
Creating a Basic Table     204
Tweaking Tables      209
Resizing Tables     217
Repositioning Tables     218
Deleting Tables     218
Presenting Your Slideshow
Delivering Presentations     221
Setting Up a Slideshow     221
Choosing a Slideshow Mode     222
Hiding Individual Slides     225
Matching Your Slideshow to Your Monitor     227
Setting Up a Speaker Notes Screen     227
Setting Up Automatic Timing     227
Looping Continuously     229
Recording Voiceover Narration     230
Turning Off Sounds and Animations     233
Slideshows for Multiple Audiences     233
Creating a Custom Slideshow     234
Editing a Custom Slideshow     236
Presenting Your Slideshow     237
Drawing on Slides During a Presentation     239
Creating PowerPoint Shows     241
Emailing Your Presentation     243
Packaging Presentations for CD     243
Presentations over the Web     247
Converting Your Presentation into One or More Web Pages     248
Converting to Other Formats     251
Optimizing Presentations     255
Go Easy on the Bling     256
Pare Down Objects Outside of PowerPoint     256
Choose Insert over Dragging or Pasting     257
Recycle Your Images     257
Get Rid of Invisible Stuff     257
Compress Your Images     259
Don't Embed Fonts (but if You Have to, Do so Wisely)     261
Download and Install an Optimization Program     262
Printing Presentations     265
Printing Slides (One Slide per Page)     266
Handouts (Multiple Slides per Page)     270
Overhead Transparencies     274
Speaker Notes     275
Presentation Outline     276
Tent Cards     276
Beyond Bullet Points: Multimedia, Animation, and Interactivity
Putting Images and Documents on Slides     281
Drawing on Slides     281
Drawing Lines and Shapes     282
Drawing Connectors     284
Drawing Freehand     285
Modifying Drawings     288
Selecting Lines and Shapes     288
Applying Shape Styles     288
Modifying Lines, Connectors, and Shape Outlines     289
Modifying the Inside of a Shape     290
Applying Special Effects     292
Rotating Drawings     292
Repositioning Lines and Shapes     294
Resizing Drawings     295
Changing the Type of a Shape or Connector     296
Adding Text to Shapes     296
Reshaping and Distorting Shapes     297
Working with Multiple Drawings     297
Grouping Objects     298
Stacking Objects     299
Aligning Shapes and Lines     300
Adding Pictures from Other Programs     302
Inserting a Picture Stored on Your Computer     302
Creating a Photo Album Slideshow     304
Adding Built-in Clip Art Drawings     307
Modifying Pictures     309
Applying a Picture Style     310
Recoloring Your Picture     310
Making Your Picture Transparent     314
Adjusting Brightness and Contrast     314
Applying Special Effects     315
Cropping Your Picture     316
Applying a Picture to a Slide Background     317
Adding Documents from Other Programs     318
Adding an Existing Live Object     319
Creating and Adding a New Document Object     321
Adding Sound and Video     325
Adding Sound     325
Sound File Formats You Can Use in PowerPoint      327
Inserting a Sound Clip from Your Computer     327
Adding a Sound Clip from the Clip Organizer     331
Adding a Sound Clip from an Audio CD     332
Recording and Adding Your Own Sound Clip     335
Creating a Soundtrack     336
Making Sound Clips Presenter-Triggered     336
Adding Video     337
Slide Transitions and Animated Effects     343
Slide Transitions     344
Types of Transitions     344
Adding Transitions Between Slides     345
Custom Animations     349
Applying Entrance Effects     350
Applying Emphasis Effects     357
Applying Exit Effects     359
Motion Path Effects     359
Changing Effects     365
Deleting an Effect     366
Managing Multiple Effects     366
Make Your Slides Clickable     371
Adding Links     374
Linking to Another Slide in the Same Slideshow     374
Linking to a Slide in Another PowerPoint Slideshow     375
Linking to a Web Page     377
Creating (and Linking to) a New Document     378
Linking to an Email Address     380
Adding Screen Tips (Hover Text) to Links     381
Adding Actions     381
Adding Actions to Text or Images     382
Adding Action Buttons     384
Editing Links and Actions     387
Editing Links     387
Edit Actions     388
Deleting Links and Actions     388
Working Faster and More Effectively
Customizing PowerPoint     391
Customizing How PowerPoint Looks     392
Choosing an Overall Look     392
Show (or Hide) the Mini Toolbar     392
Show (or Hide) the Ribbon     394
Show (or Hide) the Developer Tab     394
Select a Theme for All New Slideshows     394
Customize the Quick Access Toolbar     394
Customize the Status Bar     401
Customizing How PowerPoint Behaves     401
Open All Documents in a Certain View     402
Saving Files: How, Where, and How Often     402
Printing     404
Optimizing PowerPoint Files     405
Security     406
Editing and Proofing     408
Displaying the Clipboard     409
Choosing a Standard Chart Type     409
Customizing the Way Your Slideshows Run      409
Show (or Hide) "Ghosted" Navigational Controls     411
Show (or Hide) the Right-Click Menu     411
Give Yourself the Option to Keep Ink Annotations     413
Tell PowerPoint to End Slideshows with a Black Slide (or Not)     413
Installing Add-Ins     414
Macros: Putting Slideshows on Autopilot     417
Creating and Editing Macros     418
Creating a Macro     418
Opening a Macro for Editing     421
Running Macros     422
Setting Security Options     422
Testing a Macro     424
Adding a Macro to a Slideshow     425
Collaborating with Others     429
Preparing for Collaboration     430
Sending Out a File for Review     432
Emailing Using Outlook     433
Emailing Using Other Programs     433
Reviewing with Comments     434
Adding a Comment     435
Reading Comments     436
Editing Comments     436
Deleting Comments     437
Finalizing Presentations     437
SharePoint and Groove     439
SharePoint     439
Groove     440
Security      440
Creating Hard-to-Edit Versions of Your File     440
Password-Protecting Your File     441
Attaching Digital Signature to Files     444
Using Information Rights Management     447
Appendix
Getting Help     451
Index     457

Books about: For the Love of Food or Great Wedding Parties

GIS Tutorial for Health

Author: Kristen S Kurland

In its third edition, GIS Tutorial for Health is fully-revised and updated for ArcGIS 9.3 software compatibility. To better support skill-building and development, this workbook features extended introductions to eleven tutorials addressing significant health care and policy-planning issues. Complete with a new tutorial that utilizes the ArcGIS Spatial Analyst extension, a 180-day trial DVD of ArcView 9.3, and a data CD to complete the exercises, this step-by-step tutorial is a valuable resource for the classroom, as well as the individual user.



Thursday, February 19, 2009

Implementation Patterns or Regular Expression Pocket Reference

Implementation Patterns

Author: Kent Beck

“Kent is a master at creating code that communicates well, is easy to understand, and is a pleasure to read. Every chapter of this book contains excellent explanations and insights into the smaller but important decisions we continuously have to make when creating quality code and classes.”
Erich Gamma, IBM Distinguished Engineer

“Many teams have a master developer who makes a rapid stream of good decisions all day long. Their code is easy to understand, quick to modify, and feels safe and comfortable to work with. If you ask how they thought to write something the way they did, they always have a good reason. This book will help you become the master developer on your team. The breadth and depth of topics will engage veteran programmers, who will pick up new tricks and improve on old habits, while the clarity makes it accessible to even novice developers.”
Russ Rufer, Silicon Valley Patterns Group

“Many people don’t realize how readable code can be and how valuable that readability is. Kent has taught me so much, I’m glad this book gives everyone the chance to learn from him.”
Martin Fowler, chief scientist, ThoughtWorks

“Code should be worth reading, not just by the compiler, but by humans. Kent Beck distilled his experience into a cohesive collection of implementation patterns. These nuggets of advice will make your code truly worth reading.”
Gregor Hohpe, author of Enterprise Integration Patterns
“In this book Kent Beck shows how writing clear and readable codefollows from the application of simple principles. Implementation Patterns will help developers write intention revealing code that is both easy to understand and flexible towards future extensions. A must read for developers who are serious about their code.”
Sven Gorts

Implementation Patterns bridges the gap between design and coding. Beck introduces a new way of thinking about programming by basing his discussion on values and principles.”
Diomidis Spinellis, author of Code Reading and Code Quality
Software Expert Kent Beck Presents a Catalog of Patterns Infinitely Useful for Everyday Programming
Great code doesn’t just function: it clearly and consistently communicates your intentions, allowing other programmers to understand your code, rely on it, and modify it with confidence. But great code doesn’t just happen. It is the outcome of hundreds of small but critical decisions programmers make every single day. Now, legendary software innovator Kent Beck–known worldwide for creating Extreme Programming and pioneering software patterns and test-driven development–focuses on these critical decisions, unearthing powerful “implementation patterns” for writing programs that are simpler, clearer, better organized, and more cost effective.
Beck collects 77 patterns for handling everyday programming tasks and writing more readable code. This new collection of patterns addresses many aspects of development, including class, state, behavior, method, collections, frameworks, and more. He uses diagrams, stories, examples, and essays to engage the reader as he illuminates the patterns. You’ll find proven solutions for handling everything from naming variables to checking exceptions.
This book covers

  • The value of communicating through code and the philosophy behind patterns
  • How and when to create classes, and how classes encode logic
  • Best practices for storing and retrieving state
  • Behavior: patterns for representing logic, including alternative paths
  • Writing, naming, and decomposing methods
  • Choosing and using collections
  • Implementation pattern variations for use in building frameworks

Implementation Patterns will help programmers at all experience levels, especially those who have benefited from software patterns or agile methods. It will also be an indispensable resource for development teams seeking to work together more efficiently and build more maintainable software. No other programming book will touch your day-to-day work more often.

What People Are Saying


“Kent is a master at creating code that communicates well, is easy to understand, and is a pleasure to read. Every chapter of this book contains excellent explanations and insights into the smaller but important decisions we continuously have to make when creating quality code and classes.”

Erich Gamma, IBM Distinguished Engineer

 

“Many teams have a master developer who makes a rapid stream of good decisions all day long. Their code is easy to understand, quick to modify, and feels safe and comfortable to work with. If you ask how they thought to write something the way they did, they always have a good reason. This book will help you become the master developer on your team. The breadth and depth of topics will engage veteran programmers, who will pick up new tricks and improve on old habits, while the clarity makes it accessible to even novice developers.”

Russ Rufer, Silicon Valley Patterns Group

 

“Many people don’t realize how readable code can be and how valuable that readability is. Kent has taught me so much, I’m glad this book gives everyone the chance to learn from him.”

Martin Fowler, chief scientist, ThoughtWorks

 

“Code should be worth reading, not just by the compiler, but by humans. Kent Beck distilled his experience into a cohesive collection of implementation patterns. These nuggets of advice will make your code truly worth reading.”

Gregor Hohpe, author of Enterprise Integration Patterns

 

“In this book Kent Beck shows how writing clear and readable code follows from the application of simple principles. Implementation Patterns will help developers write intention revealing code that is both easy to understand and flexible towards future extensions. A must read for developers who are serious about their code.”

Sven Gorts

 

Implementation Patterns bridges the gap between design and coding. Beck introduces a new way of thinking about programming by basing his discussion on values and principles.”

Diomidis Spinellis, author of Code Reading and Code Quality




New interesting book: Visual Vegetables or Salad Perfection with DVD

Regular Expression Pocket Reference

Author: Tony Stubblebin

This handy little book offers programmers a complete overview of the syntax and semantics of regular expressions that are at the heart of every text-processing application. Ideal as a quick reference, Regular Expression Pocket Reference covers the regular expression APIs for Perl 5.8, Ruby (including some upcoming 1.9 features), Java, PHP, .NET and C#, Python, vi, JavaScript, and the PCRE regular expression libraries.

This concise and easy-to-use reference puts a very powerful tool for manipulating text and data right at your fingertips. Composed of a mixture of symbols and text, regular expressions can be an outlet for creativity, for brilliant programming, and for the elegant solution. Regular Expression Pocket Reference offers an introduction to regular expressions, pattern matching, metacharacters, modes and constructs, and then provides separate sections for each of the language APIs, with complete regex listings including:
Supported metacharacters for each language API
-Regular expression classes and interfaces for Ruby, Java, .NET, and C#
-Regular expression operators for Perl 5.8
-Regular expression module objects and functions for Python
-Pattern-matching functions for PHP and the vi editor
-Pattern-matching methods and objects for JavaScript
-Unicode Support for each of the languages

With plenty of examples and other resources, Regular Expression Pocket Reference summarizes the complex rules for performing this critical text-processing function, and presents this often-confusing topic in a friendly and well-organized format. This guide makes an ideal on-the-job companion.



Table of Contents:
About This Book     1
Introduction to Regexes and Pattern Matching     3
Regex Metacharacters, Modes, and Constructs     5
Unicode Support     13
Regular Expression Cookbook     13
Recipes     14
Perl 5.8     16
Supported Metacharacters     17
Regular Expression Operators     21
Unicode Support     23
Examples     24
Other Resources     25
Java (java.util.regex)     26
Supported Metacharacters     26
Regular Expression Classes and Interfaces     30
Unicode Support     35
Examples     36
Other Resources     38
.NET and C#     38
Supported Metacharacters     38
Regular Expression Classes and Interfaces     42
Unicode Support     47
Examples     47
Other Resources     49
PHP     50
Supported Metacharacters     50
Pattern-Matching Functions     54
Examples     56
Other Resources     58
Python     58
Supported Metacharacters     58
re ModuleObjects and Functions     61
Unicode Support     64
Examples     65
Other Resources     66
RUBY     66
Supported Metacharacters     67
Object-Oriented Interface     70
Unicode Support     75
Examples     75
JavaScript     77
Supported Metacharacters     77
Pattern-Matching Methods and Objects     79
Examples     82
Other Resources     83
PCRE     83
Supported Metacharacters     84
PCRE API     89
Unicode Support     92
Examples     92
Other Resources     96
Apache Web Server     96
Supported Metacharacters     96
RewriteRule     99
Matching Directives     102
Examples     102
vi Editor     103
Supported Metacharacters     103
Pattern Matching     106
Examples     108
Other Resources     108
Shell Tools     109
Supported Metacharacters     109
Other Resources     114
Index      115

Wednesday, February 18, 2009

Expert C Business Objects or Cisco Routers for the Desperate

Expert C# Business Objects

Author: Rockford Lhotka

This book is a translation of Rockford Lhotka's industry-standard title—Expert One-on-One Visual Basic .NET Business Objects—into C# language. Lhotka's ideas remain extremely influential in .NET development, and this book translates those ideas directly to you, the C# programmer.

Expert C# Business Objects reveals the opportunities available through .NET. You will learn to make informed decisions about developing your enterprise C# projects. Further, you will learn how to successfully trade off between performance and flexibility.

This book contains the author's Component-based, Scalable, Logical Architecture (CSLA .NET)—an object-oriented framework that acts as the foundation for a range of enterprise applications—which you are free to examine, use and modify.

About the author: 

Rockford Lhotka is the author of numerous books, including Expert One-on-One Visual Basic .NET and Expert C# Business Objects. He is a Microsoft Software Legend, Regional Director, MVP, and INETA speaker. Rockford speaks at many conferences and user groups around the world and is a columnist for MSDN Online. Rockford is the principal technology evangelist for Magenic Technologies, one of the nation's premiere Microsoft Gold Certified Partners dedicated to solving today's most challenging business problems using 100% Microsoft tools and technology.



Table of Contents:
Ch. 1Distributed architecture1
Ch. 2Framework design41
Ch. 3Key technologies115
Ch. 4Business framework implementation177
Ch. 5Data access and security263
Ch. 6Object-oriented application design359
Ch. 7Business object implementation405
Ch. 8Windows forms UI517
Ch. 9Web forms UI569
Ch. 10Web-service interface645
Ch. 11Reporting and batch processing687
AppNetRun769

Books about: Economic Geographies or Study Guide for Modern Real Estate Practice

Cisco Routers for the Desperate: Router and Switch Management, the Easy Way

Author: Michael Lucas

"Cisco Routers for the Desperate" is a brief, meaty introduction to Cisco routers and switches designed to get you comfortable with the Cisco environment, teach you how to troubleshoot problems, and take you through the basics of switch and router maintenance and integration into an existing network. This compact book is for those times when something goes wrong with the router or switch and you need to fix it, fast. The book doesn't pretend to cover everything related to routers, just what the network administrator needs to know to provide reliable network services. This second edition has been expanded to cover Cisco switches and updated with the latest Cisco terminology. With a tight focus on the needs of the small network administrator, "Cisco Routers for the Desperate" is the book you will reach for when your network goes kaboom.



Monday, February 16, 2009

The Microsoft Case or Data Compression

The Microsoft Case: Antitrust, High Technology, and Consumer Welfare

Author: William H Pag

In 1998, the United States Department of Justice and state antitrust agencies charged that Microsoft was monopolizing the market for personal computer operating systems by suppressing a competitive threat from Netscape’s web browser and Sun Microsystems’ Java technologies. After a celebrated trial, the government won a partial victory, and federal courts issued a series of important decisions that inspired scores of follow-on suits by consumers, rivals, and foreign enforcement agencies.

William H. Page and John E. Lopatka’s The Microsoft Case examines the implications of this momentous litigation from the perspective of consumer welfare. Tracing the development of the case from its conceptual origins through the trial and the key decisions on both liability and remedies, this book evaluates the defining antitrust litigation of our era. The authors argue that, at critical points, the legal system failed consumers by overrating government’s ability to influence outcomes in a dynamic market. This ambitious book is essential reading for business, law, and economics scholars as well as anyone else interested in the ways that technology, economics, and antitrust law have interacted in the digital age.



See also: Segurança de Aviação Comercial

Data Compression

Author: David Salomon

Data compression is one of the most important fields and tools in modern computing. This third edition of "Data Compression" provides a comprehensive, authoritative, and accessible reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, detailed description of the most common methods, and discussions on the use and comparative benefits of methods. The book's logical, clear, and lively presentation is organized around the main branches of data compression.Topics and features: * highly inclusive, yet well-balanced coverage for specialists and nonspecialists * coverage of the new PPM, SCSU, BOCU-1, MLP audio methods for lossless compression * Xmill, a special-purpose compressor for XML files * coverage of video compression, including MPEG-1 and H.261 * fully updated with new methods, standards, performance efficiencies, and algorithms * thorough coverage of wavelets methods, including SPIHT, EZW, DjVu, WSQ, and JPEG 2000 * Shorten, a simple compression algorithm for speech * the Deflate method (popular Zip software) and the PNG image file format This substantially enhanced reference is an essential resource and companion for all computer scientists; computer, electrical, and signal/image processing engineers; and scientists needing a comprehensive compilation of compression methods. It requires only a minimum of mathematics and is well suited to non-specialists and general readers.



Table of Contents:
Preface to the Third Edition
Preface to the Second Edition
Preface to the First Edition
Introduction1
1Basic Techniques15
2Statistical Methods43
3Dictionary Methods165
4Image Compression251
5Wavelet Methods513
6Video Compression637
7Audio Compression691
8Other Methods755
Bibliography835
Glossary855
Joining the Data Compression Community877
Index879

Sunday, February 15, 2009

Digital Cinematography or The 19 Deadly Sins of Software Security

Digital Cinematography

Author: Paul Wheeler

High end digital cinematography can truly challenge the film camera in many of the technical, artistic and emotional aspects of what we think of as 'cinematography'. This book is a guide for practising and aspiring cinematographers and DOPs to digital cinematography essentials - from how to use the cameras to the rapidly emerging world of High Definition cinematography and 24p technology.


This book covers the 'on-the-set' knowledge you need to know - its emphasis lies in practical application, rather than descriptions of technologies, so that in this book you will find usable 'tools' and information to help you get the job done. From 'getting the look' to lighting styles and ratios, what is needed for different types of shoots and the technical preparation required, this is a complete reference to the knowledge and skills required to shoot high end digital films. The book also features a guide to the Sony DVW in-camera menus - showing how to set them up and how they work - a
device to save you time and frustration on set.

Paul Wheeler is a renowned cinematographer/director of photography and trainer, he runs courses on Digital Cinematography at the National Film & Television School and has lectured on the Royal College of Art's MA course and at The London International Film School. He has been twice nominated by BAFTA for a Best Cinematography award and also twice been the winner of the INDIE award for Best Digital Cinematography.

THE first step-by-step guide to high end digital camerawork
Keep up to date with the very latest technology
A practical 'on-the-set' guide that helps you get your job done



Books about: Introducción a Estadística Comercial (con CD-ROM Estudiantil)

The 19 Deadly Sins of Software Security

Author: Michael Howard

This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to secure code, have partnered with John Viega, the man who uncovered the 19 deadly programming sins to write this much-needed book. Coverage includes:

  • Windows, UNIX, Linux, and Mac OS X
  • C, C++, C#, Java, PHP, Perl, and Visual Basic
  • Web, small client, and smart-client applications

Michael Howard is a senior security program manager in the security engineering group at Microsoft Corporation, and a co-author of the award-winning Writing Secure Code. He is a co-author of Basic Training in IEEE Security and Privacy Magazine and a co-author of the National Cyber Security Task Force “Processes to produce Secure Software” document for the Department of Homeland Security. As an author of the Security Development Lifecycle, Michael spends most of his time is spent defining and enforcing security best practice and software development process improvements to deliver more secure software to normal humans.

David LeBlanc, Ph.D., is currently Chief Software Architect for Webroot Software. Prior to joining Webroot, he served as security architect for Microsoft's Office division, was a founding member of the Trustworthy Computing Initiative, and worked as a white-hat hacker in Microsoft's network security group. David is also co-author of Writing Secure Code and Assessing Network Security, as well as numerous articles. On good days, he'll be found ridingthe trails on his horse with his wife, Jennifer.

John Viega discovered the 19 deadly programming flaws that received such press and media attention, and this book is based on his discovery. He is the Founder and Chief Scientist of Secure Software(www.securesoftware.com), is a well-known security expert, and coauthor of Building Secure Software (Addison-Wesley), Network Security with OpenSSL (O'Reilly) an Adjuct Professor of Computer Science at Virginia Tech (Blacksburg, VA) and Senior Policy Researcher at the Cyberspace Policy Institute, and he serves on the Technical Advisory Board for the Open Web Applications Security Project. He also founded a Washington, D.C. area security interest group that conducts monthly lectures presented by leading experts in the field. John is responsible for numerous software security tools, and is the original author of Mailman, the GNU mailing list manager. He holds a B.A. and M.S. in Computer Science from the University of Virginia. He is the author or coauthor of nearly 80 technical publications, including numerous refered research papers and trade articles. He is coauthor of Building Secure Software, Network Security and Cryptography with OpenSSL and The Secure Programming Cookbook for C and C++.



Table of Contents:
1Buffer overruns1
2Format string problems17
3Integer overflows25
4SQL injection45
5Command injection63
6Failing to handle errors73
7Cross-site scripting83
8Failing to protect network traffic99
9Use of magic URLs and hidden form fields113
10Improper use of SSL and TLS125
11Use of weak password-based systems143
12Failing to store and protect data securely161
13Information leakage183
14Improper file access197
15Trusting network name resolution207
16Race conditions217
17Unauthenticated key exchange227
18Cryptographically strong random numbers235
19Poor usability247
AMapping the 19 deadly sins to the OWASP "top ten"261
BSummary of do's and don'ts263

Thursday, February 12, 2009

Tom Clancys Splinter Cell 3 or Practical Guide to Clinical Data Management

Tom Clancy's Splinter Cell 3: Chaos Theory

Author: Prima Temp Authors

• Complete Walkthrough for Every Mission
• All Secret Bonus Objectives Revealed
• Discover Hidden Alternate Paths to Victory
• Killer Co-op Strategies
• Full Coverage of Every Version
• Learn Scores of Deadly Techniques in our Detailed Training Section



Book review: Comunicação Crítica Contínua:Planejamento, Direção, e Resposta

Practical Guide to Clinical Data Management

Author: Susanne Prokscha

Introducing professionals to the role of data management in clinical trials, Practical Guide to Clinical Data Management highlights current thinking about data management, focusing on responsibilities that typical data managers have today. This second edition includes detailed requirements of 21CFR11, the standard for electronic records and signatures. It features new chapters on training of data collection staff as well as controlling access and security. It explores software applications for CDM and explains how to use computerized data collection software. It addresses clinical data for drug and medical device trials. It also presents overviews of various documents for use as templates.



Table of Contents:
Ch. 1The data management plan3
Ch. 2CRF design considerations9
Ch. 3Database design considerations19
Ch. 4Study setup35
Ch. 5Entering data43
Ch. 6Tracking CRF pages and corrections53
Ch. 7Cleaning data61
Ch. 8Managing laboratory data75
Ch. 9Collecting adverse event data89
Ch. 10Creating reports and transferring data99
Ch. 11Locking studies107
Ch. 12Standard operating procedures and guidelines117
Ch. 13Training127
Ch. 14Controlling access and security133
Ch. 15Working with CROs139
Ch. 16Clinical data management systems149
Ch. 17Electronic data capture systems153
Ch. 18Choosing vendor products163
Ch. 19Implementing new systems171
Ch. 20System validation179
Ch. 21Test procedures187
Ch. 22Change control193
Ch. 23Coding dictionaries199
Ch. 24Migrating and archiving data209
App. AData management plan outline215
App. BTypical data management standard operating procedures219
App. CCRO-sponsor responsibility matrix221
App. DImplementation plan outline223
App. EValidation plan outline225
App. FCDISC and HIPAA227