tag:blogger.com,1999:blog-13748407061160444242024-03-07T23:33:59.780-08:00Teaching Computer BooksUnknownnoreply@blogger.comBlogger86125tag:blogger.com,1999:blog-1374840706116044424.post-13730083311506609552009-12-06T05:39:00.000-08:002009-12-06T05:50:28.981-08:00The Art of Darkwatch or Internet Research Skills<h4>The Art of Darkwatch </h4> <p>Author: <strong>Farzad Varahramyan</strong> <p><p>This book showcases the concept art that went into creating Darkwatch. It will demonstrate the process and development of the concepts, as well as the evolution of the intellectual property itself. Steal a glimpse into the true talent, perseverance, and collaborative spirit of the concept artists that contributed to developing Darkwatch.</p><h4>Visual Futurist - Syd Mead</h4><p>"The artists who have created and visualized this world developed their imaginative creativity with such fertile cultural elements as Star Wars, Blade Runner, Aliens, Tron, and The Terminator to name but a few of individual inspirations. From the bucolic to the terrifying, these artists all share a common sense of exhilaration that is the signature characteristic of genuine creative facility."</p><br><br> <p>Look this: <strong><a href="http://livro-2009.blogspot.com/2009/12/boss-of-you-or-saving-family-cottage.html">Boss of You or Saving the Family Cottage</a></strong> <h4>Internet Research Skills </h4> <p>Author: <strong>Niall O Dochartaigh</strong> <p><p><p>Internet Research Skills is a clear and concise guide to the effective use of the Internet for students in the social sciences. The open web is becoming central to student research practice, not least because of its accessibility, and this clear text describes search strategies and outlines the critical skills necessary to deal with such diverse and disorganized materials. </p> <p>Internet Research Skills covers all of the essential aspects of Internet research, with each chapter containing a number of illustrations, inset boxes, and short exercises. The first half of the book deals with publications online, devoting separate chapters to the academic articles, books, official publications and news sources which form the core secondary sources for social science research. The second half of the book deals with the open web, a vast and confusing realm of materials, many of which have no direct print counterpart. </p> <p>Key Features: </p> <ul> <li>Inset boxes, including search tips, technical explanations, examples and warning tips on avoiding common pitfalls</li> <li>Exercises at the end of each chapter that cover the key skills</li> <li>Worked examples throughout the book, drawing on a range of social science disciplines</li> <li>Illustration with relevant screengrabs </li> </ul> <p>This concise and accessible introduction to Internet research skills will be a perfect guide for undergraduate students carrying out research projects and for postgraduate students working on theses and dissertations. </p></p><br><br> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-25827729381222720802009-12-05T01:28:00.000-08:002009-12-05T01:39:08.109-08:00ebXML or Information Systems Management<h4>ebXML: The New Global Standard for Doing Business on the Internet </h4> <p>Author: <strong>Alan Kotok</strong> <p> and/or stickers showing their discounted price. More about bargain books</p> <p>See also: <strong><a href="http://livres-2009.blogspot.com">Microeconomics or Knock em Dead 2008</a></strong> <h4>Information Systems Management </h4> <p>Author: <strong>Barbara McNurlin</strong> <p><p><b>KEY BENEFIT</b>: The authors utilize their years of working with companies on IT management / strategy to provide students with a practical look at the evolution of IT in business.<br><b>KEY TOPICS</b>: Topics include leadership issues, the CIO’s responsibilities, uses of IT, information systems planning, essential technologies, managing operations, systems development, decision-making, collaboration, and knowledge work.<br><b>MARKET</b>: An excellent reference resource for anyone employed in the information technology sector of business, especially managers of and executives in those departments.<br><br> <br> </p><br><br> <p><h5>Table of Contents:</h5>Preface<br>CHAPTER 1 Information Systems Management in the global economy <br><br>PART I LEADERSHIP ISSUES IN THE DIGITAL ECONOMY<br>CHAPTER 2 The Top is Job<br>CHAPTER 3 Strategic uses of Information Technology<br>CHAPTER 4 Strategic Information Systems Planning<br><br>PART II MANAGING THE ESSENTIAL TECHNOLOGIES IN THE DIGITAL ECONOMY<br>CHAPTER 5 Designing Corporate IT Architecture<br>CHAPTER 6 Managing Telecommunications<br>CHAPTER 7 Managing Corporate Information Resources<br>CHAPTER 8 Managing Partnership-Based IT Operations<br><br>PART III MANAGING SYSTEM DEVELOPMENT<br>CHAPTER 9 Technology for Developing effective Systems<br>CHAPTER 10 Management Issues in System Development<br>CHAPTER 11 Managing Information Security<br><br>PART IV SYSTEMS FOR SUPPORTING KNOWLEDGE-BASED WORK<br>CHAPTER 12 Supporting Information-centric Decision Making <br>CHAPTER 13 Supporting IT-enabled Collaboration <br>CHAPTER 14 Supporting Knowledge Work<br>CHAPTER 15 The Opportunities and Challenges Ahead<br><br>Glossary<br>Index <br><br> <br> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-68035065936369008012009-12-03T21:16:00.000-08:002009-12-03T21:27:46.843-08:00Regression Using JMP or Case Problems in Finance Excel Templates CD ROM<h4>Regression Using JMP </h4> <p>Author: <strong>Lee Creighton</strong> <p><p>Filled with examples, <i>Regression Using JMP<sup>®</sup></i> introduces you to the basics of regression analysis using JMP<sup>®</sup> software. You will learn how to perform regression analyses using a wide variety of models including linear and nonlinear models. Taking a tutorial approach, the author cover the customary Fit Y by X and Fit Model platforms, as well as the new features and capabilities of JMP<sup>®</sup> Version 5, Output is covered in helpful detail. <br> <br> Thorough discussion of the following is also presented:<br> <P><br> <br> • confidence limits<br> <br> • polynomial and smoothing models<br> <br> • examples using JMP<sup>®</sup> scripting language<br> <br> • regression in the context of linear model methodology<br> <br> • diagnosis of and remedies for data problems including outliers and collinearity<br> <P> <br> <br> Statistical consultants familiar with regression analysis and with basic JMP concepts will appreciate the conversational, “what to look for” and “what if” scenarios presented. Non-Statisticians with a working knowledge of statistical concepts will learn to use JMP successfully for each analysis.<br> </p><br><br> <p><h5>Table of Contents:</h5><TABLE><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">Acknowledgments</TD><TD WIDTH="10%" ALIGN="RIGHT"></TD><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">Using This Book</TD><TD WIDTH="10%" ALIGN="RIGHT"></TD><TR><TD WIDTH="20%">1</TD><TD WIDTH="70%">Regression Concepts</TD><TD WIDTH="10%" ALIGN="RIGHT">1</TD><TR><TD WIDTH="20%">2</TD><TD WIDTH="70%">Regressions in JMP</TD><TD WIDTH="10%" ALIGN="RIGHT">25</TD><TR><TD WIDTH="20%">3</TD><TD WIDTH="70%">Observations</TD><TD WIDTH="10%" ALIGN="RIGHT">73</TD><TR><TD WIDTH="20%">4</TD><TD WIDTH="70%">Collinearity: Detection and Remedial Measures</TD><TD WIDTH="10%" ALIGN="RIGHT">105</TD><TR><TD WIDTH="20%">5</TD><TD WIDTH="70%">Polynomial and Smoothing Models</TD><TD WIDTH="10%" ALIGN="RIGHT">139</TD><TR><TD WIDTH="20%">6</TD><TD WIDTH="70%">Special Applications of Linear Models</TD><TD WIDTH="10%" ALIGN="RIGHT">175</TD><TR><TD WIDTH="20%">7</TD><TD WIDTH="70%">Nonlinear Models</TD><TD WIDTH="10%" ALIGN="RIGHT">215</TD><TR><TD WIDTH="20%">8</TD><TD WIDTH="70%">Regression with JMP Scripting Language</TD><TD WIDTH="10%" ALIGN="RIGHT">237</TD><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">References</TD><TD WIDTH="10%" ALIGN="RIGHT">247</TD><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">Index</TD><TD WIDTH="10%" ALIGN="RIGHT">249</TD></TABLE> <p>New interesting textbook: <strong><a href="http://for-children-books.blogspot.com/2009/12/amazing-peace-or-skippyjon-jones.html">Amazing Peace or Skippyjon Jones</a></strong> <h4>Case Problems in Finance + Excel Templates CD-ROM </h4> <p>Author: <strong>Carl Kester</strong> <p><p>Case Problems in Finance is a Harvard case course presenting real business situations that pose debatable alternative courses of action. The cases contain problems that can be narrowed but not always settled by the usual techniques of financial analysis. It will teach students to discover ways of thinking that are productive in handling different types of managerial problems intelligently. The cases are grouped by major topics: financial analysis and forecasting, cost of capital, working capital management, capital budgeting, dividend policy, debt policy, financial execution, and mergers and restructuring. </p><br><br> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-56908806820440217092009-12-02T17:05:00.000-08:002009-12-02T17:16:20.900-08:00Teaching and Learning with Microsoft Office and FrontPage or Computer Security Basics<h4>Teaching and Learning with Microsoft Office and FrontPage: A Multi-level Approach to Computer Integration </h4> <p>Author: <strong>Timothy J Newby</strong> <p><p><I>Teaching and Learning with Microsoft Office 2007 and Expression Web</I> <br><I>A Multi-Level Approach to Computer Integration</I> <br>Second Edition <br>Timothy J. Newby • Judith Oates Lewandowski <br> <br><I>Teaching and Learning with Microsoft Office 2007 and Expression Web</I> is designed to give busy and often overwhelmed teachers and students a quick way to see and grasp the basics of key software applications. Readers who use this book will: <br>= Obtain a foundation of the basics of common application software, <br>= Learn how to integrate and utilize the software within classroom settings, and <br>= Learn how to create a learning environment that is engaging, interesting, and effective. <br> <br><I>Hallmarks of this Text</I> <br>= <B>Scaffolds instruction for all skill levels</B>. A unique three-level approach in each chapter helps readers at various levels of expertise. <br>= Level 1 is for the true beginner/novice. <br>= Level 2 offers guided assistance as the reader to required to use additional and often more advanced features of the software. <br>= Level 3 moves the student on to address integration of the software. <br>= <B>Workout. </B>These features actively engage the reader early and often with the software throughdirectedexercises and projects. <br>= <B>Examples</B>. Hundreds of examples of the utilization of the software are given across all age groups and content areas. <br> <br><I>New to this Edition</I> <br>= <B>Mentoring videos</B>. Short, concise videos on the text’s web site illustrate the steps needed to complete all of the outlined features withinthe text for all chapters and all levels within each chapter. <br>= <B>Windows Vista</B>. Chapter 1, Systems Navigation, provides screen captures based on Microsoft’s newest system software. <br>= <B>Office 2007 software</B>. With the upgrade to Microsoft Office 2007, all chapters have been completely revised to include explanations and screen captures of all of the tool ribbons and other features of Microsoft Word, Excel, PowerPoint, and Publisher. <br>= <B>Publisher</B>. A new chapter on Microsoft Publisher (Chapter 6) follows the same format as the other chapters while covering both printed publications and how to develop web pages with Publisher. <br>= <B>Microsoft’s Expression Web</B> <B>software</B>. New projects have been incorporated to reflect the features of this new, more powerful, cleaner software. <br>= <B>Microsoft’s Access.</B> Located on the text’s companion website, this chapter provides a basic understanding of what Microsoft Access can do and how it can be used. <br>= <B>Examples and Problem Scenarios.</B> Additional examples and problem scenarios have been added to each chapter. <br>= <B>Revised National Educational Technology Standards (NETS).</B> NETS Standards for both teachers and students have been included within Level 3 of each chapter. </p><br><br> <p><h5>Table of Contents:</h5><P>Introduction 1<P>Ch. 1 System Software - MS Windows Vista: The Basics of Navigating the System 7<P>Ch. 2 Word Processing - MS Word: The Basics of a Writing Assistant 29<P>Ch. 3 Spreadsheets - MS Excel: The Basics of a "Number Cruncher" 59<P>Ch. 4 Data Management - More MS Excel: The Basics of Collecting, Organizing, and Retrieving Loads of Information 91<P>Ch. 5 Presentation Software - MS PowerPoint: The Basics of Creating Presentations, Handouts, and Much, Much More 115<P>Ch. 6 Desktop Publishing - MS Publisher: The Basics of Desktop Publishing 153<P>Ch. 7 Web Editing - Expression Web: The Basics of Web Page Development 185<P>Appendix National Educational Technology Standards 221<P>Glossary 225<P>Index 231 <p>New interesting book: <strong><a href="http://teaching-computer-books.blogspot.com">The Business Oriented CIO or 10 Cool Lego Mindstorms Robotics Invention System 2 Projects</a></strong> <h4>Computer Security Basics </h4> <p>Author: <strong>Rick Lehtinen</strong> <p><p>In 1991, computer security was a vague subject that managers and system administrators decided, reluctantly, that they needed to know more about. Most security initiatives were based on the "Orange Book" (Trusted Computer System Evaluation Criteria), a US Department of Defense publication that baffled casual readers. O'Reilly's "Computer Security Basics" contained a readable introduction to the Orange Book -- why it existed, what it contained, and what the different security levels were all about. Over the past 15 years, this classic book has continued to sell steadily. <p> Today, security is a hot topic, and international (ISO) security standards largely have replaced the Orange Book. But for those of you who need to understand the fundamentals, "Computer Security Basics" is still the best book to consult. <p> The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For novice security administrators, system administrators, and developers, "Computer Security Basics" offers a clear overview of the security concepts you need to know: access controls, malicious software, security policy, cryptography, biometrics, and government regulations and standards. And it does so in a way that you can easily understand, even if you aren't very familiar with security. This is the must-have book for a must-know field. </p><br><br> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-74242242537668981732009-12-01T12:54:00.000-08:002009-12-01T13:06:49.019-08:00The Business Oriented CIO or 10 Cool Lego Mindstorms Robotics Invention System 2 Projects<h4>The Business-Oriented CIO: A Guide to Market-Driven Management </h4> <p>Author: <strong>George Tillmann</strong> <p><p>Praise for The Business-Oriented CIO </p> <br>A Guide to Market-Driven Management<br><br>"A must-read for CIOs and senior IT executives. George Tillmann's Market-Driven Management techniques are an outstanding addition to the CIO's arsenal, full of insights for IT organizations wanting to generate real added value from IT investments and services."<br> <br>—Andre Spatz, former Chief Information Officer, UNICEF<br><br>"The Business-Oriented CIO: A Guide to Market-Driven Management is an exciting proposition for CIOs and CEOs trying to make IT more responsive to their organizations' needs. Tillmann's formula for running the IT department as a business within a business can transform a costly, slow-to-respond, always-playing-catch-up function into vibrant, efficient, responsive internal partner." <br> <br>—Brandt Allen, Professor, Darden Business School, University of Virginia<br><br>"Tillmann delivers a thoroughly insightful guide to navigating and managing IT through his market-driven and customer-focused approach to business alignment through governance, strategy, and planning. A must-read for the entire executive suite focused on value-driven information technology."<br> <br>—Paul Zazzera, former SVP and Chief Information Officer, Time Inc.<br><br>"Both experienced and relatively new CIOs can learn a great deal from George's insightful pragmatic guide on the biggest challenge facing CIOs today. Namely, how to position IT, and the CIO, as an integral part of the business. Keep it in your desk drawer for handy reference: you will go to it often."<br> <br>—Peter Whatnell, Chief Information Officer, Sunoco Inc.<br><br>Every CIO's playbook . ..<br><br>Written by industry expert George Tillmann, The Business-Oriented CIO offers you important guidance on how to bring IT into the mainstream of your business and how you can make the transition from technical guru to a full member of the executive team. This essential book contains insights from business leaders including Michael Porter on strategy, Harry Markowitz on portfolio theory, C. K. Prahalad and Gary Hamel on core competencies, Robert Kaplan and David Norton on scorecards, and Christian Gronroos on customer service. It reveals the winning formula to take your IT department from a reactive cost center to a proactive business partner.<br> </p><br><br> <p><h5>Table of Contents:</h5>Preface. <br> <br>Acknowledgements. <br> <br><b>Part One: The Fundamentals.</b> <br> <br>Chapter 1. In Search of Overhead Heroes. <br> <br>Chapter 2. It Governance. <br> <br>Chapter 3. IT Strategy and Planning. <br> <br>Chapter 4. Portfolio Management. <br> <br><b>Part Two: Learning from the Best.</b> <br> <br>Chapter 5. Customer Management. <br> <br>Chapter 6. Market Intelligence. <br> <br>Chapter 7. Service Offering Management. <br> <br>Chapter 8. Performance Management. <br> <br><b>Part Three: Pushing the Envelop.</b> <br> <br>Chapter 9. Organizational Competencies. <br> <br>Chapter 10. In Search of Customer Service. <br> <br>Chapter 11. Local Heroes. <br> <br>Index.<br> <p>New interesting book: <strong><a href="http://recipes-books.blogspot.com">Cobbler Crusade or Ainsley Harriotts All New Meals in Minutes</a></strong> <h4>10 Cool Lego Mindstorms Robotics Invention System 2 Projects: Amazing Projects You Can Build in under an Hour </h4> <p>Author: <strong>Syngress</strong> <p><p><P>LEGO MINDSTORMS lets you design and program robots that can do just about anything!<br>The LEGO MINDSTORMS RIS 2.0 is the core set for all MINDSTORMS users, that lets users design and program working robots - limited only by their imagination. Initially designed for users 12 and up, LEGO MINDSTORMS has taken off with LEGO enthusiasts of all ages. <br>10 Cool LEGO MINDSTORMS RIS 2.0 Projects: Amazing Projects You Can Build in Under an Hour provides step-by-step instructions and detailed illustrations for users of all skill levels and proficiencies.<br><br>From out of the box to up and running in less than an hour. <br>8-page color insert. A color insert illustrates the complete projects in full-detail.<br>Specifically targeted at new users of the LEGO MINDSTORMS RIS 2.0. </p><br><br> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-71567359230022404052009-11-30T08:42:00.000-08:002009-11-30T08:53:24.617-08:00Professional Web APIs with PHP or Arcade Fever<h4>Professional Web APIs with PHP: Ebay, Google, Paypal, Amazon, Fedex Plus Web Feeds </h4> <p>Author: <strong>Paul Reinheimer</strong> <p><p><P><br><br>• Offers hands-on tips and numerous code examples that show Web developers how to leverage content and feeds from today's top Web sites-including Google, eBay, PayPal, Amazon, Yahoo!, and FedEx<br><br>• Introduces APIs (Application Program Interfaces) in general and uses real-world examples that show how to produce and document them<br><br>• Explains how to use the popular scripting language PHP to create APIs that interact with unrelated applications over the Web<br><br>• Examples take readers through each stage of the API process, from basic test implementations to integration with existing sites<br><P><br> </p><br><br> <p><h5>Table of Contents:</h5><TABLE><TR><TD WIDTH="20%">Ch. 1</TD><TD WIDTH="70%">Introducing Web services</TD><TD WIDTH="10%" ALIGN="RIGHT">3</TD><TR><TD WIDTH="20%">Ch. 2</TD><TD WIDTH="70%">Introducing Web feeds</TD><TD WIDTH="10%" ALIGN="RIGHT">7</TD><TR><TD WIDTH="20%">Ch. 3</TD><TD WIDTH="70%">Consuming Web feeds</TD><TD WIDTH="10%" ALIGN="RIGHT">23</TD><TR><TD WIDTH="20%">Ch. 4</TD><TD WIDTH="70%">Producing Web feeds</TD><TD WIDTH="10%" ALIGN="RIGHT">61</TD><TR><TD WIDTH="20%">Ch. 5</TD><TD WIDTH="70%">Introduction to Web APIs</TD><TD WIDTH="10%" ALIGN="RIGHT">97</TD><TR><TD WIDTH="20%">Ch. 6</TD><TD WIDTH="70%">Interacting with the Google API</TD><TD WIDTH="10%" ALIGN="RIGHT">111</TD><TR><TD WIDTH="20%">Ch. 7</TD><TD WIDTH="70%">Interacting with the Amazon API</TD><TD WIDTH="10%" ALIGN="RIGHT">149</TD><TR><TD WIDTH="20%">Ch. 8</TD><TD WIDTH="70%">Interacting with the FedEx API</TD><TD WIDTH="10%" ALIGN="RIGHT">177</TD><TR><TD WIDTH="20%">Ch. 9</TD><TD WIDTH="70%">Interacting with the eBay API</TD><TD WIDTH="10%" ALIGN="RIGHT">199</TD><TR><TD WIDTH="20%">Ch. 10</TD><TD WIDTH="70%">Interacting with the PayPal API</TD><TD WIDTH="10%" ALIGN="RIGHT">235</TD><TR><TD WIDTH="20%">Ch. 11</TD><TD WIDTH="70%">Other major APIs</TD><TD WIDTH="10%" ALIGN="RIGHT">263</TD><TR><TD WIDTH="20%">Ch. 12</TD><TD WIDTH="70%">Producing Web APIs</TD><TD WIDTH="10%" ALIGN="RIGHT">287</TD><TR><TD WIDTH="20%">App. A</TD><TD WIDTH="70%">Supporting functions</TD><TD WIDTH="10%" ALIGN="RIGHT">315</TD><TR><TD WIDTH="20%">App. B</TD><TD WIDTH="70%">Complete feed specifications</TD><TD WIDTH="10%" ALIGN="RIGHT">319</TD><TR><TD WIDTH="20%">App. C</TD><TD WIDTH="70%">Development system</TD><TD WIDTH="10%" ALIGN="RIGHT">333</TD></TABLE> <p>Go to: <strong><a href="http://confectionery-books.blogspot.com">Superjuice for Kids or Americas Favorite Food</a></strong> <h4>Arcade Fever: The Fan's Guide to the Golden Age of Video Games </h4> <p>Author: <strong>John Sellers</strong> <p><p>Do you remember the difference between playing 'singles' and 'doubles'? Have you mastered the delicate art of hyperspace? Can you say 'joystick' in polite conversation without blushing? If you№ve answered 'yes' to any of these questions, then Arcade Fever is the book for you‹the world№s first illustrated tribute to Asteroids, Ms. Pac-Man, Galaga, Q*bert, Gauntlet and many more of the mind-blowing games you played in your youth. You want to reminisce about the coolest Atari cartridges, the silliest-named arcade oddities, and the funkiest bass riff ever used in a video game? You want interviews with early arcade heroes like Atari founder Nolan Bushnell, Robotron designer Eugene Jarvis and 'Pac-Man Fever' composers Buckner + Garcia? You want to look at revealing pictures of Dragon№s Lair hottie Princess Daphne? It№s all in Arcade Fever, an infectious celebration of №70s and №80s arcade culture.</p><h4>Entertainment Weekly</h4><p>Remember when Space Invaders ruled the planet and "Pac-Man Fever" was a top 10 hit? John Sellers does, and his illustrated history of the arcade's glory days will push any game geek's thrust button. Fever not only describes the joystick controls and strategies that turned millions of teens into addicts in search of a Berzerk fix but puts Frogger into pop-cultural context-as a Saturday-morning Supercade cartoon and Seinfeld sight gag. Sellers, a former Donkey Kong champion, would have won some free credits by including more interviews with game designers, and Dig Dug-ing up the back stories that make some fo the entries blast off. But anyone who longs for the cacophonous wokka-wokka-wokka of the local arcade will give this book a pretty high score. Grade: B. </p><h4>Time Out New York</h4><p>Do you long for Pong? Does your heart belong to Ms. Pac-Man? If you're nostalgic for the early days of video games, check out Arcade Fever: The Fan's Guide to the Golden Age of Video Games, written by John Sellers. After you're a few pages into this fond tribute, suddenly vast hazy expanses of your youth will come back into focus. </p><h4>Philadelphia Weekly</h4><p>...Sellers' book is magnificently researched, with an enthusiasm for the subject matter that bubbles out through the pages like so many dangling pairs of cherries...Sellers, a onetime writer for Who Wants to Be a Millionaire, has a conversational prose style, dotted with special bonus translations of game sound effects. As might well be expected, the book is filled with pop culture referecnes to Footloose, Battlesatar Galactica and Honeycomb breakfast cereal...It's the forgotten nuggets, like the fact that the rock group Journey was the subject of a game and that Captain </p><h4>Maxim Online</h4><p>John Seller№s Arcade Fever takes the reader back to the pre-PlayStation days by profiling virtually all of the classic (and not so classic) games, from the ubiquitous (Space Invaders) to the obscure and OCD-inducing (Bubbles). Each game examined not only gets a write-up, but has each of its vital statistics catalogued, with sidebars on cultural minutae like the Zaxxon board game and Pac-Man television shows, and even some interviews with key figures from video game history. Anyone who remembers a time when Mario wasn№t yet іsuperІ and Moon Patrol was the height of technology will enjoy reliving their high score moments with Arcade Fever. If Arcade Fever is a disease, we don№t need no cure. </p><br><br> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-22246525593003484842009-11-29T04:31:00.000-08:002009-11-29T04:41:56.135-08:00Microsoft Outlook 2007 Bible or Perl Programming for the Absolute Beginner<h4>Microsoft Outlook 2007 Bible </h4> <p>Author: <strong>Peter G Aitken</strong> <p><p>Discover all the ways Outlook can make your life with this book. In the handy package that is Outlook, you get the tools you use constantly: e-mail, a calendar and appointment book, a contacts list, a to-do list, and more. Learn to use them together, and you have a sophisticated system for managing your day. This complete A-to-Z guide can teach you, whether you’re just venturing into Outlook or are ready to customize and tweak it with VBA programming.<br> </p><br><br> <p><h5>Table of Contents:</h5>Introduction. <br> <br>1. Getting Started with Outlook. <br> <br>2. Installing and Using Outlook. <br> <br>3. Email Accounts. <br> <br>4. Fundamentals of Email. <br> <br>5. Formatting Your Email Messages. <br> <br>6. Working with Advanced Email Message Components and Editing. <br> <br>7. Understanding Email Options. <br> <br>8. Dealing with Junk Email. <br> <br>9. Processing Messages with Rules. <br> <br>10. Managing Your Contacts. <br> <br>11. Working with the Calendar. <br> <br>12. Working with Schedules and Meetings. <br> <br>13. Working with Outlook Notes. <br> <br>14. Using the Journal. <br> <br>15. Keeping Track of Tasks. <br> <br>16. Making Use of RSS Feeds. <br> <br>17. Making the Most of Outlook Categories. <br> <br>18. Working with Outlook Folders and Categories. <br> <br>19. Customizing Outlook to Suit the Way You Work. <br> <br>20. Managing Security Issues. <br> <br>21. Using Outlook with Other Applications. <br> <br>22. Writing Macros and Visual Basic Code in Outlook. <br> <br>23. Getting Started with VBA. <br> <br>24. Understanding the Outlook Object Model. <br> <br>25. Programming Outlook with VBA: Some Examples. <br> <br>26. Working with Outlook Forms. <br> <br>27. Going Beyond Basic Forms. <br> <br>28. Using Outlook with Exchange Server. <br> <br>29. Using Outlook with SharePoint Services.<br> <p>Interesting book: <strong><a href="http://science-computer-book.blogspot.com/2009/11/oracle-database-11g-sql-or-corel-paint.html">Oracle Database 11g SQL or Corel Paint Shop Pro X</a></strong> <h4>Perl Programming for the Absolute Beginner </h4> <p>Author: <strong>Jerry Lee Ford</strong> <p><p>Perl is an enormously popular scripting language that runs on many different operating systems, including Windows, Linux, Unix, and Mac OS X, and provides programmers with a robust and powerful programming language that is easy to learn, yet sufficiently complex to tackle just about any job. As such, it's a perfect programming language for those new to programming to learn. Perl Programming for the Absolute Beginner has been designed to teach you how to develop Perl scripts and to help you become an effective programmer, and teaches concepts through the creation of simple games. Whether you are an experienced programmer looking to learn another language or you are reading this book as the first step in your programming career, you will find that this book's games-based teaching approach makes the learning process a lot more enjoyable. You will also find that the knowledge you?ll gain from developing Perl-based games will provide you with a strong foundation from which you can branch out and tackle more complex challenges. </p><br><br> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-57988278168011150912009-11-28T00:19:00.000-08:002009-11-28T00:30:34.373-08:00Building a Web Site with Ajax Visual Quickproject Guide Series or The Coming Convergence<h4>Building a Web Site with Ajax [Visual Quickproject Guide Series] </h4> <p>Author: <strong>Larry Ullman</strong> <p><p>Ajax is at the heart of the Web 2.0 revolution. It isn't a technology but, rather, is a technique that leverages other technologies and techniques, such as CSS, XML, DHTML, and XHTML. Many Web designers and programmers would like to incorporate Ajax in their projects because of the amazing functionality it can add to a Web site, but they can't because of the steep learning curve. That's where this book steps in. It makes learning Ajax fun and easy -- a great place to start! Visual QuickProject Guides focus on a single project. In this case the project is creating a business employee directory, like an address book. What's being created is a better, new kind of Web site. <br><br><br><br><br> <br><br><br><br> </p><br><br> <p>Look this: <strong><a href="http://monetary-policy-books.blogspot.com/2009/11/on-call-in-hell-or-handbook-of.html">On Call in Hell or Handbook of International Migration</a></strong> <h4>The Coming Convergence: The Surprising Ways Diverse Technologies Interact to Shape Our World and Change the Future </h4> <p>Author: <strong>Stanley Schmidt</strong> <p><p>Imagine direct communication links between the human brain and machines, or tailored materials capable of adapting by themselves to changing environmental conditions, or computer chips and environmental sensors embedded into everyday clothing, or medical technologies that eliminate currently untreatable conditions such as blindness and paralysis. Now imagine all of these developments occurring at the same time. The stuff of science fiction?<br> Not So. These are actually the reasonable predictions of scientists attempting to forecast a few decades into the future based on the rapid pace of innovation.<br> • Author Stanley Schmidt-a physicist, a writer, and the editor of Analog: Science Fiction and Fact-explores these and many more amazing yet probable scenarios in this fascinating guide to the near future. He shows how past convergences have led to today's world, then considers tomorrow's main currents in biotechnology, cognitive science, information technology, and nanotechnology. Looking even further downstream he foresees both exciting and potentially dangerous developments:<br> <br> • Longer, healthier lives<br> • Cheap, generally available food, energy, and technology<br> • Reduced pollution and environmental stress<br> • Economic disruption during transitional periods<br> • Excessive power in too few hands<br> • Increased vulnerability from overdependence on technology.<br> <br> Schmidt notes that even a routine technology such as the CAT scan is the result of three wholly separate innovations started many decades ago which recently converged: the X-ray, the computer, and advances in medicine. On a more ominous note, he also observes that the9/11 terrorist attack on the World Trade Center was made possible by the malicious convergence of two separate trends in modern engineering and technology: the concentration of people in high rises within cities and the success of the passenger airline industry.<br> The message is clear: the choices we make now will converge to create a near and distant future that will be almost unbelievably wonderful or unimaginably catastrophic, or both. This knowledgeable, fascinating glimpse into the future is a must read for everyone interested in technology, upcoming innovations in business, science fiction, and the future.<br> <br> </p><h4>Publishers Weekly</h4><p><P>It's far easier to describe the past than to predict the future: this principle is unwittingly demonstrated by Schmidt, a physicist and longtime science fiction editor (<I>Analog: Science Fiction and Fact</I>). His book is best when discussing how past technologies have come together, usually in unforeseen ways, to enable social change. Joseph-Marie Jacquard's late-18th-century work on automatic looms controlled by punch cards, for example, can be traced forward to the development of early computers. Schmidt is glib but far less informative when projecting where the confluence of current technologies is likely to take us. He touches on nanotechnology and improvements in computing power, among other fields, and offers projections about how medicine, communication and interpersonal relationships are apt to change, but he largely does so superficially and perhaps overly optimistically: "In the kind of world we can aspire to, everybody will have enough and nobody will have to work very hard to get it." Though he acknowledges that some convergences can be harmful, he dismisses this downside with equal ease, concluding simply that we need to be vigilant about the choices we make. Illus. <I>(Apr.)</I></P>Copyright 2007 Reed Business Information </p><br><br> <p><h5>Table of Contents:</h5><P>Foreword 9<br>Acknowledgments 13<br>Introduction: Converging Currents: Then, Now, and Tomorrow 15<br>From Fabric Looms to the Internet: The Story of Computing 31<br>Aviation and Big Buildings 49<br>New Arts and Sciences 69<br>Looking Inside: New Technologies and Medicine 87<br>Computers and Genes 101<br>New Directions in Biotechnology 115<br>Cognitive Science: How Do We Know? 129<br>The Explosion in Information Technology 147<br>Nanotechnology 173<br>Metaconvergences: When Big Streams Make Still Bigger Streams 185<br>Potentials and Promises 215<br>Pitfalls and Perils 223<br>Getting There from Here: Challenges and Strategies 235<br>Notes 247<br>Index 263 Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-41317979601639944812009-11-26T20:06:00.000-08:002009-11-26T20:16:49.660-08:00Software Solutions for Engineers and Scientists or Finite Element Method Using MATLAB<h4>Software Solutions for Engineers and Scientists </h4> <p>Author: <strong>Julio Sanchez</strong> <p><p><P>Engineers and scientists often need to develop software to suit their particular needs, but they do not always have the advanced programming skills that are required to do so. Serving as a comprehensive problem-solving resource, Software Solutions for Engineers and Scientists provides development tools and practical shortcuts for professionals who already have basic programming skills but may lack the knowledge needed to perform sophisticated tasks and difficult mathematic calculations. This book includes mathematical-computation intensive code along with programming techniques that are compatible with both Visual C++ console applications as well as Windows program applications.</P> </p><br><br> <p>New interesting book: <strong><a href="http://weight-control-book.blogspot.com/2009/02/spa-manicuring-or-view-from-cliff.html">Spa Manicuring or View from the Cliff</a></strong> <h4>Finite Element Method Using MATLAB </h4> <p>Author: <strong>Young W Kwon</strong> <p><p><P>Expanded to include a broader range of problems than the bestselling first edition, Finite Element Method Using MATLAB, Second Edition presents finite element approximation concepts, formulation, and programming in a format that effectively streamlines the learning process.</P> </p><h4>Booknews</h4><p>Presenting introductory and some advanced topics of the finite element method (FEM), this text is intended for upper-level undergraduate and lower-level graduate courses; it contains more material than can be covered in a single semester, but some sections can be skipped for a one-semester introductory course. Includes an introduction to MATLAB for those new to the software, as well as analysis of shell structures as one of the most important structural applications of FEM. New to this edition is a chapter on special topics, including analysis of cracks, thermal analysis for multilayered structures, and buckling analysis, both static and dynamic. Annotation c. Book News, Inc., Portland, OR (booknews.com) </p><br><br> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-85375509057356692332009-11-25T15:54:00.000-08:002009-11-25T16:05:32.851-08:00Data Analysis Using Microsoft Excel or The SSCP Prep Guide<h4>Data Analysis Using Microsoft Excel: Updated for Office XP </h4> <p>Author: <strong>Michael R Middleton</strong> <p><p>Spreadsheet skills are important for a first job, and DATA ANALYSIS USING MICROSOFT EXCEL prepares students to enter the world of work with stronger spreadsheet skills. Designed as a supplement to a main statistics text or as a reference for professionals, this handbook helps students build their proficiency in Microsoft Excel and shows them how to use the built-in capabilities of Excel to analyze data and make decisions. Although many of the examples are business oriented, the step-by-step approach makes this book appropriate for statistical analysis in other courses and academic disciplines.<br> </p><br><br> <p><h5>Table of Contents:</h5><TABLE><TR><TD WIDTH="20%">Ch. 1</TD><TD WIDTH="70%">Introduction to Excel</TD><TD WIDTH="10%" ALIGN="RIGHT">1</TD><TR><TD WIDTH="20%">Ch. 2</TD><TD WIDTH="70%">Managing Files and Printing</TD><TD WIDTH="10%" ALIGN="RIGHT">13</TD><TR><TD WIDTH="20%">Ch. 3</TD><TD WIDTH="70%">Basic Charts</TD><TD WIDTH="10%" ALIGN="RIGHT">25</TD><TR><TD WIDTH="20%">Ch. 4</TD><TD WIDTH="70%">Univariate Numerical Data</TD><TD WIDTH="10%" ALIGN="RIGHT">35</TD><TR><TD WIDTH="20%">Ch. 5</TD><TD WIDTH="70%">Categorical Data</TD><TD WIDTH="10%" ALIGN="RIGHT">49</TD><TR><TD WIDTH="20%">Ch. 6</TD><TD WIDTH="70%">Bivariate Numerical Data</TD><TD WIDTH="10%" ALIGN="RIGHT">61</TD><TR><TD WIDTH="20%">Ch. 7</TD><TD WIDTH="70%">Probability Distributions</TD><TD WIDTH="10%" ALIGN="RIGHT">71</TD><TR><TD WIDTH="20%">Ch. 8</TD><TD WIDTH="70%">Sampling and Simulation</TD><TD WIDTH="10%" ALIGN="RIGHT">85</TD><TR><TD WIDTH="20%">Ch. 9</TD><TD WIDTH="70%">One-Sample Inference for the Mean</TD><TD WIDTH="10%" ALIGN="RIGHT">97</TD><TR><TD WIDTH="20%">Ch. 10</TD><TD WIDTH="70%">Quality Control Charts</TD><TD WIDTH="10%" ALIGN="RIGHT">113</TD><TR><TD WIDTH="20%">Ch. 11</TD><TD WIDTH="70%">Two-Sample Inference for Means</TD><TD WIDTH="10%" ALIGN="RIGHT">123</TD><TR><TD WIDTH="20%">Ch. 12</TD><TD WIDTH="70%">Chi-Square Tests</TD><TD WIDTH="10%" ALIGN="RIGHT">139</TD><TR><TD WIDTH="20%">Ch. 13</TD><TD WIDTH="70%">Analysis of Variance</TD><TD WIDTH="10%" ALIGN="RIGHT">149</TD><TR><TD WIDTH="20%">Ch. 14</TD><TD WIDTH="70%">Simple Linear Regression</TD><TD WIDTH="10%" ALIGN="RIGHT">167</TD><TR><TD WIDTH="20%">Ch. 15</TD><TD WIDTH="70%">Simple Nonlinear Regression</TD><TD WIDTH="10%" ALIGN="RIGHT">183</TD><TR><TD WIDTH="20%">Ch. 16</TD><TD WIDTH="70%">Multiple Regression</TD><TD WIDTH="10%" ALIGN="RIGHT">197</TD><TR><TD WIDTH="20%">Ch. 17</TD><TD WIDTH="70%">Regression Using Categorical Variables</TD><TD WIDTH="10%" ALIGN="RIGHT">207</TD><TR><TD WIDTH="20%">Ch. 18</TD><TD WIDTH="70%">Autocorrelation and Autoregression</TD><TD WIDTH="10%" ALIGN="RIGHT">219</TD><TR><TD WIDTH="20%">Ch. 19</TD><TD WIDTH="70%">Time Series Smoothing</TD><TD WIDTH="10%" ALIGN="RIGHT">233</TD><TR><TD WIDTH="20%">Ch. 20</TD><TD WIDTH="70%">Time Series Seasonality</TD><TD WIDTH="10%" ALIGN="RIGHT">249</TD><TR><TD WIDTH="20%">App</TD><TD WIDTH="70%">Excel on the Macintosh</TD><TD WIDTH="10%" ALIGN="RIGHT">271</TD><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">References</TD><TD WIDTH="10%" ALIGN="RIGHT">273</TD><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">Index</TD><TD WIDTH="10%" ALIGN="RIGHT">275</TD></TABLE> <p>Read also <strong><a href="http://educational-software-books.blogspot.com/2009/11/electronic-commerce-or-online-retrieval.html">Electronic Commerce or Online Retrieval</a></strong> <h4>The SSCP Prep Guide: Mastering the Seven Key Areas of System Security </h4> <p>Author: <strong>Debra S Isaac</strong> <p><p><P><br><br>• SSCP (System Security Certified Practitioner) is the companion test to CISSP, appealing to the practitioners who implement the security policies that the CISSP-certified professionals create<br><br>• Organized exactly like the bestselling The CISSP Prep Guide (0-471-41356-9) by Ronald L. Krutz and Russell Dean Vines, who serve as consulting editors for this book<br><br>• This study guide greatly enhances the reader's understanding of how to implement security policies, standards, and procedures in order to breeze through the SSCP security certification test<br><br>• CD-ROM contains a complete interactive self-test using all the questions and answers from the book, powered by the Boson test engine<br><P><br> </p><br><br> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-57252528618622481642009-02-22T16:46:00.000-08:002009-02-22T16:53:43.743-08:00Database Sys with Dbase Place Code or Understanding Bioinformatics<h4>Database Sys with Dbase Place Code </h4> <p>Author: <strong>Thomas Connolly</strong> <p><p><P> This book places a strong emphasis on good design practice, allowing readers to master design methodology in an accessible, step-by-step fashion. In this book, database design methodology is explicitly divided into three phases: conceptual, logical, and physical. Each phase is described in a separate chapter with an example of the methodology working in practice. Extensive treatment of the Web as an emerging platform for database applications is covered alongside many code samples for accessing databases from the Web including JDBC, SQLJ, ASP, ISP, and Oracle's PSP. A thorough update of later chapters covering object-oriented databases, Web databases, XML, data warehousing, data mining is included in this new edition. A clear introduction to design implementation and management issues, as well as an extensive treatment of database languages and standards, make this book an indispensable, complete reference for database professionals. </P> </p><br><br> <p>Look this: <strong><a href="http://bestsellerbucher.blogspot.com/2009/02/anlagengebaude-gemeinschaftsentwicklung.html">Anlagengebäude & Gemeinschaftsentwicklung</a></strong> <h4>Understanding Bioinformatics </h4> <p>Author: <strong>Market Zvelebil</strong> <p><p>Suitable for advanced undergraduates and graduates, <i>Understanding Bioinformatics</i> provides a definitive guide to this vibrant and evolving discipline. The book takes a conceptual approach, guiding the reader from first principles through to an understanding of the computational techniques and the key algorithms. Understanding Bioinformatics is an invaluable companion for students from their first encounter with the subject through to more advanced studies. <br><br>The book is divided into seven sections, with the opening section introducing the basics of nucleic acids, proteins and databases. Subsequent sections are divided into 'applications' and 'theory' chapters, allowing readers to focus their attention effectively. In each section, the applications chapter provides a fast and straightforward route to understanding the main concepts and 'getting started'. Each of these is then followed by theory chapters which give greater detail and present the underlying mathematics. In Section 2, Sequence Alignments, the applications chapter shows the reader how to get started on producing and analyzing sequence alignments, and using sequences for database searching, while the next two chapters look closely at the more advanced techniques and the mathematical algorithms involved. Section 3 covers evolutionary processes and shows how bioinformatics can be used to help build phylogenetic trees. Section 4 looks at the characteristics of whole genomes. In Sections 5 and 6 the focus turns to secondary and tertiary structure - predicting structural conformation and analyzing structure-function relationships. The last section surveys methods of analyzing data from a set of genes orproteins of an organism and is rounded off with an overview of systems biology.<br><br>The emphasis throughout <i>Understanding Bioinformatics</i> is on guiding the reader through the subject matter. The writing style is notable for its clarity, while the extensive, full-color artwork has been designed to present the key concepts with simplicity and consistency.<p> </p><br><br> <p><h5>Table of Contents:</h5>SECTION 1 Background Basics<br>1: Nucleic Acid World <br>2: Protein Structure <br>3: Dealing with Databases <br><br>SECTION 2 Sequence Alignments <br>4: Producing and Analyzing Sequence Alignments <br>5: Pairwise Sequence Alignment <br>6: Patterns, Profiles and Multiple Alignments <br><br>SECTION 3 Evolutionary Processes<br>7: Recovering Evolutionary History <br>8: Building Phylogenetic Trees <br><br>SECTION 4 Genome Characteristics<br>9: Revealing Genome Features <br>10: Principles of Genome Annotation <br><br>SECTION 5 Secondary Structures<br>11: Obtaining Secondary Structure from Sequence <br>12: Predicting Secondary Structures <br><br>SECTION 6 Tertiary Structures<br>13: Modeling Protein Structure <br>14: Analyzing Structure-Function Relationships <br><br>SECTION 7 Cells and Organisms<br>15: Proteome and Gene Expression Analysis <br>16: Clustering Methods and Statistics <br>17: Systems Biology<br><br>APPENDICES Background Theory<br>Appendix A: Probability and Bayesian Analysis <br>Appendix B: Molecular Energy Functions <br>Appendix C: Function Optimization Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-6142499614964662992009-02-21T12:35:00.000-08:002009-02-21T12:42:25.898-08:00Security Policies and Procedures or The Camera Phone Book<h4>Security Policies and Procedures: Principles and Practices </h4> <p>Author: <strong>Sari Stern Green</strong> <p><p><P style="MARGIN: 0in 0in 0pt"><I>Security Policies and Procedures: Principles and Practices </I>was created to teach information security policies and procedures and provide students with hands-on practice developing a security policy.This book provides an introduction to security policy, coverage of information security regulation and framework, and policies specific to industry sectors, including financial, healthcare and small business.</P> </p><br><br> <p>Books about: <strong><a href="http://diet-nutrition-books.blogspot.com">Cooked to Perfection or Wolf in Chefs Clothing</a></strong> <h4>The Camera Phone Book: How to Shoot Like a Pro, Print, Store, Display, Send Images, Make a Short Film </h4> <p>Author: <strong>Aimee Baldridg</strong> <p><p>Marketing experts predict that by 2009, nearly 90% of all cell phones will contain a camera, as manufacturers race to create cheaper, easier-to-use models with more sophisticated cameras, more pixels, flash units and even multiple lenses. Already revolutionizing audiovisual communication, it's a trend that will only grow more explosively—and who better than National Geographic to create a how-to book aimed directly at the millions who carry a camera phone everywhere and want to make the most of it?<br>Created by two top professionals, this generously illustrated nuts-and-bolts guide is the first of its kind to treat these units as genuine cameras instead of novelties, and the <i>only</i> one to include a full-color photo-essay demonstrating the full capabilities of the latest camera phones. In five easy-to-read chapters, the book explains how to choose good equipment; take better pictures; and store, print and send the best images. Readers will find practical tips on preventing or repairing water damage, protecting easily-scratched lenses inside pockets and purses, and retrieving accidentally-erased images. They'll also learn to access the events, advice, and opportunities of the burgeoning camera phone community, from film festivals to news organizations, moblogs, and more. <br>Featuring the technical savvy of CNet.com's Aimee Baldridge and the creative skill of National Geographic photographer Robert Clark, a camera phone pioneer, this compact yet comprehensive reference combines up-to-the-minute expertise with superb examples, at an inexpensive price that makes it a perfect gift book—or an ideal impulse buy. </p><br><br> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-38862320252412896282009-02-20T08:23:00.000-08:002009-02-20T08:30:09.824-08:00PowerPoint 2007 or GIS Tutorial for Health<h4>PowerPoint 2007: The Missing Manual </h4> <p>Author: <strong>E A Vander Veer</strong> <p><p><P>Like every other application in Microsoft Office suite, PowerPoint is loaded with features. So many, in fact, that even veterans don't know where to find them all. Microsoft solved this problem in PowerPoint 2007 by redesigning the user interface with a tabbed toolbar that makes features easy to locate and use. PowerPoint 2007 also boasts improved graphics, additional templates, the ability to save custom layouts, and improved collaboration through SharePoint. One thing Microsoft hasn't improved is its poor documentation. To learn the ins and outs of all the features in PowerPoint 2007, Microsoft merely offers online help. If you're familiar with previous versions of the program, you may be lost the first time you fire up the new PowerPoint; or you would be if it weren't for PowerPoint 2007: The Missing Manual. <p> This book, written specifically for this version of the software, not only offers the basics of how to create, save, set up, run, and print a basic bullets-and-background slideshow, but takes you into the world of multimedia, animation, and interactivity. You'll learn how to add pictures, sound, video, animated effects, and controls (buttons and links) to their slides, along with ways to pull text, spreadsheets, and animations created in other programs. You can also create your own reusable design templates and learn to automate repetitive tasks with macros. Learn how to take advantage of advanced functions (such as adding custom background images) that existed in previous PowerPoint versions, but were so cleverly hidden that few people ever found them. </p><br><br> <p><h5>Table of Contents:</h5>The Missing Credits xiii<br>Introduction 1<br>Slideshow Basics<br>Creating a Basic Presentation 19<br>Beginning a New Presentation 19<br>Creating a New Presentation from Scratch 20<br>Creating a Presentation from an Existing Template, Theme, or Presentation 22<br>Choosing a Theme for Your Presentation 32<br>Adding Text 34<br>Adding Text to an Existing Text Box 34<br>Adding a New Text Box 36<br>Adding More Slides 38<br>Moving Around Inside a Presentation 39<br>Navigating with the Scroll Bar 40<br>Navigating with the Slides and Outline Tabs 40<br>Using Find 42<br>Adding Speaker Notes 43<br>Creating and Printing Handouts 44<br>Saving and Closing a Presentation 46<br>Running a Presentation 47<br>Editing Slides 51<br>Editing Text 51<br>Selecting Text 52<br>Cutting Text 53<br>Copying Text 54<br>Pasting Text 54<br>Moving Text 57<br>Deleting Text 57<br>Reversing an Action (Undo) 58<br>Finding andReplacing Text Automatically 58<br>Spell Check and Other Editorial Tools 60<br>Checking Spelling 61<br>Thesaurus 67<br>Translating Words into Other Languages 69<br>Researching Stuff 69<br>Turning on AutoCorrect (for Capitalization and Spelling) 71<br>Adding Special Characters 74<br>Non-English Text 75<br>Formatting and Aligning Your Text 77<br>Automating Text Formatting 77<br>Using AutoFormat 79<br>Using AutoFit 81<br>Manually Formatting Text Appearance 83<br>Changing the Font 85<br>Changing Font Size 86<br>Bolding, Italicizing, and Underlining Text 89<br>Changing Text Color and Background Color 90<br>Adding Special Color Effects 91<br>Tweaking the Text Outline 97<br>Adding Special Text Effects 101<br>Manually Aligning and Indenting Text 104<br>Aligning Text and Creating Columns 104<br>Creating Lists 108<br>Changing Indents 113<br>Changing Tab Stops 114<br>Changing Spacing 116<br>Changing Text Direction 118<br>Formatting Text Boxes 120<br>Formatting and Laying Out Your Slides 123<br>Changing Slide Layout 123<br>Applying a Canned Layout 124<br>Switching Orientation from Landscape to Portrait (and Back) 125<br>Repositioning Text Boxes 126<br>Help for Positioning Text Boxes: Zoom, Guides, and Grid 128<br>Changing Background Color 129<br>Adding a Gradient Effect 133<br>Reapplying Themes, Colors, and Fonts 136<br>Reapplying a Theme 136<br>Reapplying a Color Scheme 138<br>Reapplying a Font 139<br>Editing Your Slideshow 141<br>Viewing Multiple Slides 141<br>Slides Pane 142<br>Slide Sorter View 143<br>Adding, Deleting, and Moving Slides 143<br>Adding Blank Slides 144<br>Deleting Slides 145<br>Moving Slides 146<br>Duplicating Slides 147<br>Cutting, Copying, and Pasting Slides 148<br>Inserting Slides from Other Slideshows 148<br>Editing Slide and Layout Masters 151<br>Creating Slide Masters and Layout Masters 157<br>Creating a New Slide Master 158<br>Creating a New Layout Master 159<br>Renaming Slide Masters and Layout Masters 159<br>Preserving Slide Masters and Layout Masters 160<br>Applying Multiple Slide Masters 162<br>Editing Handout Masters 162<br>Editing the Notes Master 165<br>Adding Headers and Footers 167<br>Adding Footers to Your Slides 168<br>Adding Headers and Footers to Notes Pages and Handouts 169<br>Adding Charts, Diagrams, and Tables 171<br>Creating Charts 172<br>Choosing a Chart Type 173<br>Creating a Chart 175<br>Customizing Charts with Prebuilt Layouts and Styles 178<br>Editing and Tweaking Charts 181<br>Pasting Existing Charts into PowerPoint 191<br>Creating Diagrams 193<br>Adding Diagrams to Slides 194<br>Turning Lists into Diagrams 195<br>Applying Prebuilt Styles and Color Themes to Diagrams 197<br>Tweaking Diagrams 198<br>Adding, Changing, and Moving Diagram Shapes 200<br>Changing Diagram Text 203<br>Creating Tables 204<br>Creating a Basic Table 204<br>Tweaking Tables 209<br>Resizing Tables 217<br>Repositioning Tables 218<br>Deleting Tables 218<br>Presenting Your Slideshow<br>Delivering Presentations 221<br>Setting Up a Slideshow 221<br>Choosing a Slideshow Mode 222<br>Hiding Individual Slides 225<br>Matching Your Slideshow to Your Monitor 227<br>Setting Up a Speaker Notes Screen 227<br>Setting Up Automatic Timing 227<br>Looping Continuously 229<br>Recording Voiceover Narration 230<br>Turning Off Sounds and Animations 233<br>Slideshows for Multiple Audiences 233<br>Creating a Custom Slideshow 234<br>Editing a Custom Slideshow 236<br>Presenting Your Slideshow 237<br>Drawing on Slides During a Presentation 239<br>Creating PowerPoint Shows 241<br>Emailing Your Presentation 243<br>Packaging Presentations for CD 243<br>Presentations over the Web 247<br>Converting Your Presentation into One or More Web Pages 248<br>Converting to Other Formats 251<br>Optimizing Presentations 255<br>Go Easy on the Bling 256<br>Pare Down Objects Outside of PowerPoint 256<br>Choose Insert over Dragging or Pasting 257<br>Recycle Your Images 257<br>Get Rid of Invisible Stuff 257<br>Compress Your Images 259<br>Don't Embed Fonts (but if You Have to, Do so Wisely) 261<br>Download and Install an Optimization Program 262<br>Printing Presentations 265<br>Printing Slides (One Slide per Page) 266<br>Handouts (Multiple Slides per Page) 270<br>Overhead Transparencies 274<br>Speaker Notes 275<br>Presentation Outline 276<br>Tent Cards 276<br>Beyond Bullet Points: Multimedia, Animation, and Interactivity<br>Putting Images and Documents on Slides 281<br>Drawing on Slides 281<br>Drawing Lines and Shapes 282<br>Drawing Connectors 284<br>Drawing Freehand 285<br>Modifying Drawings 288<br>Selecting Lines and Shapes 288<br>Applying Shape Styles 288<br>Modifying Lines, Connectors, and Shape Outlines 289<br>Modifying the Inside of a Shape 290<br>Applying Special Effects 292<br>Rotating Drawings 292<br>Repositioning Lines and Shapes 294<br>Resizing Drawings 295<br>Changing the Type of a Shape or Connector 296<br>Adding Text to Shapes 296<br>Reshaping and Distorting Shapes 297<br>Working with Multiple Drawings 297<br>Grouping Objects 298<br>Stacking Objects 299<br>Aligning Shapes and Lines 300<br>Adding Pictures from Other Programs 302<br>Inserting a Picture Stored on Your Computer 302<br>Creating a Photo Album Slideshow 304<br>Adding Built-in Clip Art Drawings 307<br>Modifying Pictures 309<br>Applying a Picture Style 310<br>Recoloring Your Picture 310<br>Making Your Picture Transparent 314<br>Adjusting Brightness and Contrast 314<br>Applying Special Effects 315<br>Cropping Your Picture 316<br>Applying a Picture to a Slide Background 317<br>Adding Documents from Other Programs 318<br>Adding an Existing Live Object 319<br>Creating and Adding a New Document Object 321<br>Adding Sound and Video 325<br>Adding Sound 325<br>Sound File Formats You Can Use in PowerPoint 327<br>Inserting a Sound Clip from Your Computer 327<br>Adding a Sound Clip from the Clip Organizer 331<br>Adding a Sound Clip from an Audio CD 332<br>Recording and Adding Your Own Sound Clip 335<br>Creating a Soundtrack 336<br>Making Sound Clips Presenter-Triggered 336<br>Adding Video 337<br>Slide Transitions and Animated Effects 343<br>Slide Transitions 344<br>Types of Transitions 344<br>Adding Transitions Between Slides 345<br>Custom Animations 349<br>Applying Entrance Effects 350<br>Applying Emphasis Effects 357<br>Applying Exit Effects 359<br>Motion Path Effects 359<br>Changing Effects 365<br>Deleting an Effect 366<br>Managing Multiple Effects 366<br>Make Your Slides Clickable 371<br>Adding Links 374<br>Linking to Another Slide in the Same Slideshow 374<br>Linking to a Slide in Another PowerPoint Slideshow 375<br>Linking to a Web Page 377<br>Creating (and Linking to) a New Document 378<br>Linking to an Email Address 380<br>Adding Screen Tips (Hover Text) to Links 381<br>Adding Actions 381<br>Adding Actions to Text or Images 382<br>Adding Action Buttons 384<br>Editing Links and Actions 387<br>Editing Links 387<br>Edit Actions 388<br>Deleting Links and Actions 388<br>Working Faster and More Effectively<br>Customizing PowerPoint 391<br>Customizing How PowerPoint Looks 392<br>Choosing an Overall Look 392<br>Show (or Hide) the Mini Toolbar 392<br>Show (or Hide) the Ribbon 394<br>Show (or Hide) the Developer Tab 394<br>Select a Theme for All New Slideshows 394<br>Customize the Quick Access Toolbar 394<br>Customize the Status Bar 401<br>Customizing How PowerPoint Behaves 401<br>Open All Documents in a Certain View 402<br>Saving Files: How, Where, and How Often 402<br>Printing 404<br>Optimizing PowerPoint Files 405<br>Security 406<br>Editing and Proofing 408<br>Displaying the Clipboard 409<br>Choosing a Standard Chart Type 409<br>Customizing the Way Your Slideshows Run 409<br>Show (or Hide) "Ghosted" Navigational Controls 411<br>Show (or Hide) the Right-Click Menu 411<br>Give Yourself the Option to Keep Ink Annotations 413<br>Tell PowerPoint to End Slideshows with a Black Slide (or Not) 413<br>Installing Add-Ins 414<br>Macros: Putting Slideshows on Autopilot 417<br>Creating and Editing Macros 418<br>Creating a Macro 418<br>Opening a Macro for Editing 421<br>Running Macros 422<br>Setting Security Options 422<br>Testing a Macro 424<br>Adding a Macro to a Slideshow 425<br>Collaborating with Others 429<br>Preparing for Collaboration 430<br>Sending Out a File for Review 432<br>Emailing Using Outlook 433<br>Emailing Using Other Programs 433<br>Reviewing with Comments 434<br>Adding a Comment 435<br>Reading Comments 436<br>Editing Comments 436<br>Deleting Comments 437<br>Finalizing Presentations 437<br>SharePoint and Groove 439<br>SharePoint 439<br>Groove 440<br>Security 440<br>Creating Hard-to-Edit Versions of Your File 440<br>Password-Protecting Your File 441<br>Attaching Digital Signature to Files 444<br>Using Information Rights Management 447<br>Appendix<br>Getting Help 451<br>Index 457 <p>Books about: <strong><a href="http://mexican-cooking-book.blogspot.com">For the Love of Food or Great Wedding Parties</a></strong> <h4>GIS Tutorial for Health </h4> <p>Author: <strong>Kristen S Kurland</strong> <p><p><P>In its third edition, GIS Tutorial for Health is fully-revised and updated for ArcGIS 9.3 software compatibility. To better support skill-building and development, this workbook features extended introductions to eleven tutorials addressing significant health care and policy-planning issues. Complete with a new tutorial that utilizes the ArcGIS Spatial Analyst extension, a 180-day trial DVD of ArcView 9.3, and a data CD to complete the exercises, this step-by-step tutorial is a valuable resource for the classroom, as well as the individual user. </p><br><br> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-50503498070994213962009-02-19T04:11:00.000-08:002009-02-19T04:18:44.623-08:00Implementation Patterns or Regular Expression Pocket Reference<h4>Implementation Patterns </h4> <p>Author: <strong>Kent Beck</strong> <p><p>“Kent is a master at creating code that communicates well, is easy to understand, and is a pleasure to read. Every chapter of this book contains excellent explanations and insights into the smaller but important decisions we continuously have to make when creating quality code and classes.” <br>–<I>Erich Gamma, IBM Distinguished Engineer</I> <br><I> </I> <br>“Many teams have a master developer who makes a rapid stream of good decisions all day long. Their code is easy to understand, quick to modify, and feels safe and comfortable to work with. If you ask how they thought to write something the way they did, they always have a good reason. This book will help you become the master developer on your team. The breadth and depth of topics will engage veteran programmers, who will pick up new tricks and improve on old habits, while the clarity makes it accessible to even novice developers.” <br>–<I>Russ Rufer, Silicon Valley Patterns Group</I> <br><I> </I> <br>“Many people don’t realize how readable code can be and how valuable that readability is. Kent has taught me so much, I’m glad this book gives everyone the chance to learn from him.” <br>–<I>Martin Fowler, chief scientist, ThoughtWorks</I> <br><I> </I> <br>“Code should be worth reading, not just by the compiler, but by humans. Kent Beck distilled his experience into a cohesive collection of implementation patterns. These nuggets of advice will make your code truly worth reading.” <br>–<I>Gregor Hohpe, author of </I>Enterprise Integration Patterns <br>“In this book Kent Beck shows how writing clear and readable codefollows from the application of simple principles. <I>Implementation Patterns </I>will help developers write intention revealing code that is both easy to understand and flexible towards future extensions. A must read for developers who are serious about their code.” <br>–<I>Sven Gorts</I> <br><I> </I> <br>“<I>Implementation Patterns </I>bridges the gap between design and coding. Beck introduces a new way of thinking about programming by basing his discussion on values and principles.” <br>–<I>Diomidis Spinellis, author of </I>Code Reading <I>and </I>Code Quality <br><B>Software Expert Kent Beck Presents a Catalog of Patterns Infinitely Useful for Everyday Programming</B> <br>Great code doesn’t just function: it clearly and consistently communicates your intentions, allowing other programmers to understand your code, rely on it, and modify it with confidence. But great code doesn’t just happen. It is the outcome of hundreds of small but critical decisions programmers make every single day. Now, legendary software innovator Kent Beck–known worldwide for creating Extreme Programming and pioneering software patterns and test-driven development–focuses on these critical decisions, unearthing powerful “implementation patterns” for writing programs that are simpler, clearer, better organized, and more cost effective. <br>Beck collects 77 patterns for handling everyday programming tasks and writing more readable code. This new collection of patterns addresses many aspects of development, including class, state, behavior, method, collections, frameworks, and more. He uses diagrams, stories, examples, and essays to engage the reader as he illuminates the patterns. You’ll find proven solutions for handling everything from naming variables to checking exceptions. <br>This book covers <UL> <LI>The value of communicating through code and the philosophy behind patterns</LI> <LI>How and when to create classes, and how classes encode logic</LI> <LI>Best practices for storing and retrieving state</LI> <LI>Behavior: patterns for representing logic, including alternative paths</LI> <LI>Writing, naming, and decomposing methods</LI> <LI>Choosing and using collections</LI> <LI>Implementation pattern variations for use in building frameworks</LI></UL> <br><B><I>Implementation Patterns</I></B> will help programmers at all experience levels, especially those who have benefited from software patterns or agile methods. It will also be an indispensable resource for development teams seeking to work together more efficiently and build more maintainable software. No other programming book will touch your day-to-day work more often. </p><h4>What People Are Saying</h4><p><strong></strong><br><P style="MARGIN: 0px">“Kent is a master at creating code that communicates well, is easy to understand, and is a pleasure to read. Every chapter of this book contains excellent explanations and insights into the smaller but important decisions we continuously have to make when creating quality code and classes.”</P> <P style="MARGIN: 0px">–<I>Erich Gamma, IBM Distinguished Engineer</I></P> <P style="MARGIN: 0px"><I> </I></P> <P style="MARGIN: 0px">“Many teams have a master developer who makes a rapid stream of good decisions all day long. Their code is easy to understand, quick to modify, and feels safe and comfortable to work with. If you ask how they thought to write something the way they did, they always have a good reason. This book will help you become the master developer on your team. The breadth and depth of topics will engage veteran programmers, who will pick up new tricks and improve on old habits, while the clarity makes it accessible to even novice developers.”</P> <P style="MARGIN: 0px">–<I>Russ Rufer, Silicon Valley Patterns Group</I></P> <P style="MARGIN: 0px"><I> </I></P> <P style="MARGIN: 0px">“Many people don’t realize how readable code can be and how valuable that readability is. Kent has taught me so much, I’m glad this book gives everyone the chance to learn from him.”</P> <P style="MARGIN: 0px">–<I>Martin Fowler, chief scientist, ThoughtWorks</I></P> <P style="MARGIN: 0px"><I> </I></P> <P style="MARGIN: 0px">“Code should be worth reading, not just by the compiler, but by humans. Kent Beck distilled his experience into a cohesive collection of implementation patterns. These nuggets of advice will make your code truly worth reading.”</P> <P style="MARGIN: 0px">–<I>Gregor Hohpe, author of </I>Enterprise Integration Patterns</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">“In this book Kent Beck shows how writing clear and readable code follows from the application of simple principles. <I>Implementation Patterns </I>will help developers write intention revealing code that is both easy to understand and flexible towards future extensions. A must read for developers who are serious about their code.”</P> <P style="MARGIN: 0px">–<I>Sven Gorts</I></P> <P style="MARGIN: 0px"><I> </I></P> <P style="MARGIN: 0px">“<I>Implementation Patterns </I>bridges the gap between design and coding. Beck introduces a new way of thinking about programming by basing his discussion on values and principles.”</P> <P style="MARGIN: 0px">–<I>Diomidis Spinellis, author of </I>Code Reading <I>and </I>Code Quality</P></p><br><br><br> <p>New interesting book: <strong><a href="http://grilling-books.blogspot.com/2009/02/visual-vegetables-or-salad-perfection.html">Visual Vegetables or Salad Perfection with DVD</a></strong> <h4>Regular Expression Pocket Reference </h4> <p>Author: <strong>Tony Stubblebin</strong> <p><p>This handy little book offers programmers a complete overview of the syntax and semantics of regular expressions that are at the heart of every text-processing application. Ideal as a quick reference, <i>Regular Expression Pocket Reference</i> covers the regular expression APIs for Perl 5.8, Ruby (including some upcoming 1.9 features), Java, PHP, .NET and C#, Python, vi, JavaScript, and the PCRE regular expression libraries. <br><br> This concise and easy-to-use reference puts a very powerful tool for manipulating text and data right at your fingertips. Composed of a mixture of symbols and text, regular expressions can be an outlet for creativity, for brilliant programming, and for the elegant solution. <i>Regular Expression Pocket Reference</i> offers an introduction to regular expressions, pattern matching, metacharacters, modes and constructs, and then provides separate sections for each of the language APIs, with complete regex listings including: <br> Supported metacharacters for each language API <br> -Regular expression classes and interfaces for Ruby, Java, .NET, and C# <br> -Regular expression operators for Perl 5.8 <br> -Regular expression module objects and functions for Python <br> -Pattern-matching functions for PHP and the vi editor <br> -Pattern-matching methods and objects for JavaScript <br> -Unicode Support for each of the languages <br><br> With plenty of examples and other resources, <i>Regular Expression Pocket Reference</i> summarizes the complex rules for performing this critical text-processing function, and presents this often-confusing topic in a friendly and well-organized format. This guide makes an ideal on-the-job companion. </p><br><br> <p><h5>Table of Contents:</h5>About This Book 1<br>Introduction to Regexes and Pattern Matching 3<br>Regex Metacharacters, Modes, and Constructs 5<br>Unicode Support 13<br>Regular Expression Cookbook 13<br>Recipes 14<br>Perl 5.8 16<br>Supported Metacharacters 17<br>Regular Expression Operators 21<br>Unicode Support 23<br>Examples 24<br>Other Resources 25<br>Java (java.util.regex) 26<br>Supported Metacharacters 26<br>Regular Expression Classes and Interfaces 30<br>Unicode Support 35<br>Examples 36<br>Other Resources 38<br>.NET and C# 38<br>Supported Metacharacters 38<br>Regular Expression Classes and Interfaces 42<br>Unicode Support 47<br>Examples 47<br>Other Resources 49<br>PHP 50<br>Supported Metacharacters 50<br>Pattern-Matching Functions 54<br>Examples 56<br>Other Resources 58<br>Python 58<br>Supported Metacharacters 58<br>re ModuleObjects and Functions 61<br>Unicode Support 64<br>Examples 65<br>Other Resources 66<br>RUBY 66<br>Supported Metacharacters 67<br>Object-Oriented Interface 70<br>Unicode Support 75<br>Examples 75<br>JavaScript 77<br>Supported Metacharacters 77<br>Pattern-Matching Methods and Objects 79<br>Examples 82<br>Other Resources 83<br>PCRE 83<br>Supported Metacharacters 84<br>PCRE API 89<br>Unicode Support 92<br>Examples 92<br>Other Resources 96<br>Apache Web Server 96<br>Supported Metacharacters 96<br>RewriteRule 99<br>Matching Directives 102<br>Examples 102<br>vi Editor 103<br>Supported Metacharacters 103<br>Pattern Matching 106<br>Examples 108<br>Other Resources 108<br>Shell Tools 109<br>Supported Metacharacters 109<br>Other Resources 114<br>Index 115 Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-19833305860092475402009-02-18T00:00:00.000-08:002009-02-18T00:07:13.416-08:00Expert C Business Objects or Cisco Routers for the Desperate<h4>Expert C# Business Objects </h4> <p>Author: <strong>Rockford Lhotka</strong> <p><p><P>This book is a translation of Rockford Lhotka's industry-standard title—Expert One-on-One Visual Basic .NET Business Objects—into C# language. Lhotka's ideas remain extremely influential in .NET development, and this book translates those ideas directly to you, the C# programmer. </P> <P>Expert C# Business Objects reveals the opportunities available through .NET. You will learn to make informed decisions about developing your enterprise C# projects. Further, you will learn how to successfully trade off between performance and flexibility. </P> <P>This book contains the author's Component-based, Scalable, Logical Architecture (CSLA .NET)—an object-oriented framework that acts as the foundation for a range of enterprise applications—which you are free to examine, use and modify.</P> <P><STRONG>About the author:</STRONG> </P> <P>Rockford Lhotka is the author of numerous books, including Expert One-on-One Visual Basic .NET and Expert C# Business Objects. He is a Microsoft Software Legend, Regional Director, MVP, and INETA speaker. Rockford speaks at many conferences and user groups around the world and is a columnist for MSDN Online. Rockford is the principal technology evangelist for Magenic Technologies, one of the nation's premiere Microsoft Gold Certified Partners dedicated to solving today's most challenging business problems using 100% Microsoft tools and technology.</P></p><br><br> <p><h5>Table of Contents:</h5><TABLE><TR><TD WIDTH="20%">Ch. 1</TD><TD WIDTH="70%">Distributed architecture</TD><TD WIDTH="10%" ALIGN="RIGHT">1</TD><TR><TD WIDTH="20%">Ch. 2</TD><TD WIDTH="70%">Framework design</TD><TD WIDTH="10%" ALIGN="RIGHT">41</TD><TR><TD WIDTH="20%">Ch. 3</TD><TD WIDTH="70%">Key technologies</TD><TD WIDTH="10%" ALIGN="RIGHT">115</TD><TR><TD WIDTH="20%">Ch. 4</TD><TD WIDTH="70%">Business framework implementation</TD><TD WIDTH="10%" ALIGN="RIGHT">177</TD><TR><TD WIDTH="20%">Ch. 5</TD><TD WIDTH="70%">Data access and security</TD><TD WIDTH="10%" ALIGN="RIGHT">263</TD><TR><TD WIDTH="20%">Ch. 6</TD><TD WIDTH="70%">Object-oriented application design</TD><TD WIDTH="10%" ALIGN="RIGHT">359</TD><TR><TD WIDTH="20%">Ch. 7</TD><TD WIDTH="70%">Business object implementation</TD><TD WIDTH="10%" ALIGN="RIGHT">405</TD><TR><TD WIDTH="20%">Ch. 8</TD><TD WIDTH="70%">Windows forms UI</TD><TD WIDTH="10%" ALIGN="RIGHT">517</TD><TR><TD WIDTH="20%">Ch. 9</TD><TD WIDTH="70%">Web forms UI</TD><TD WIDTH="10%" ALIGN="RIGHT">569</TD><TR><TD WIDTH="20%">Ch. 10</TD><TD WIDTH="70%">Web-service interface</TD><TD WIDTH="10%" ALIGN="RIGHT">645</TD><TR><TD WIDTH="20%">Ch. 11</TD><TD WIDTH="70%">Reporting and batch processing</TD><TD WIDTH="10%" ALIGN="RIGHT">687</TD><TR><TD WIDTH="20%">App</TD><TD WIDTH="70%">NetRun</TD><TD WIDTH="10%" ALIGN="RIGHT">769</TD></TABLE> <p>Books about: <strong><a href="http://marketing-textbooks.blogspot.com/2009/02/economic-geographies-or-study-guide-for.html">Economic Geographies or Study Guide for Modern Real Estate Practice</a></strong> <h4>Cisco Routers for the Desperate: Router and Switch Management, the Easy Way </h4> <p>Author: <strong>Michael Lucas</strong> <p><p><P>"Cisco Routers for the Desperate" is a brief, meaty introduction to Cisco routers and switches designed to get you comfortable with the Cisco environment, teach you how to troubleshoot problems, and take you through the basics of switch and router maintenance and integration into an existing network. This compact book is for those times when something goes wrong with the router or switch and you need to fix it, fast. The book doesn't pretend to cover everything related to routers, just what the network administrator needs to know to provide reliable network services. This second edition has been expanded to cover Cisco switches and updated with the latest Cisco terminology. With a tight focus on the needs of the small network administrator, "Cisco Routers for the Desperate" is the book you will reach for when your network goes kaboom. </p><br><br> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-83822678663032600792009-02-16T19:48:00.000-08:002009-02-16T19:55:57.814-08:00The Microsoft Case or Data Compression<h4>The Microsoft Case: Antitrust, High Technology, and Consumer Welfare </h4> <p>Author: <strong>William H Pag</strong> <p><p>In 1998, the United States Department of Justice and state antitrust agencies charged that Microsoft was monopolizing the market for personal computer operating systems by suppressing a competitive threat from Netscape’s web browser and Sun Microsystems’ Java technologies. After a celebrated trial, the government won a partial victory,<B> </B>and federal courts issued a series of important decisions that inspired scores of follow-on suits by consumers, rivals, and foreign enforcement agencies.<BR><BR>William H. Page and John E. Lopatka’s <I>The Microsoft Case</I> examines the implications of this momentous litigation from the perspective of consumer welfare. Tracing the development of the case from its conceptual origins through the trial and the key decisions on both liability and remedies, this book evaluates the defining antitrust litigation of our era. The authors argue that, at critical points, the legal system failed consumers by overrating government’s ability to influence outcomes in a dynamic market. This ambitious book is essential reading for business, law, and economics scholars as well as anyone else interested in the ways that technology, economics, and antitrust law have interacted in the digital age.</P> </p><br><br> <p>See also: <strong><a href="http://livro-rev.blogspot.com/2009/02/seguranca-de-aviacao-comercial.html">Segurança de Aviação Comercial</a></strong> <h4>Data Compression </h4> <p>Author: <strong>David Salomon</strong> <p><p>Data compression is one of the most important fields and tools in modern computing. This third edition of "Data Compression" provides a comprehensive, authoritative, and accessible reference for the many different types and methods of compression. Included are a detailed and helpful taxonomy, detailed description of the most common methods, and discussions on the use and comparative benefits of methods. The book's logical, clear, and lively presentation is organized around the main branches of data compression.Topics and features: * highly inclusive, yet well-balanced coverage for specialists and nonspecialists * coverage of the new PPM, SCSU, BOCU-1, MLP audio methods for lossless compression * Xmill, a special-purpose compressor for XML files * coverage of video compression, including MPEG-1 and H.261 * fully updated with new methods, standards, performance efficiencies, and algorithms * thorough coverage of wavelets methods, including SPIHT, EZW, DjVu, WSQ, and JPEG 2000 * Shorten, a simple compression algorithm for speech * the Deflate method (popular Zip software) and the PNG image file format This substantially enhanced reference is an essential resource and companion for all computer scientists; computer, electrical, and signal/image processing engineers; and scientists needing a comprehensive compilation of compression methods. It requires only a minimum of mathematics and is well suited to non-specialists and general readers. </p><br><br> <p><h5>Table of Contents:</h5><TABLE><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">Preface to the Third Edition</TD><TD WIDTH="10%" ALIGN="RIGHT"></TD><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">Preface to the Second Edition</TD><TD WIDTH="10%" ALIGN="RIGHT"></TD><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">Preface to the First Edition</TD><TD WIDTH="10%" ALIGN="RIGHT"></TD><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">Introduction</TD><TD WIDTH="10%" ALIGN="RIGHT">1</TD><TR><TD WIDTH="20%">1</TD><TD WIDTH="70%">Basic Techniques</TD><TD WIDTH="10%" ALIGN="RIGHT">15</TD><TR><TD WIDTH="20%">2</TD><TD WIDTH="70%">Statistical Methods</TD><TD WIDTH="10%" ALIGN="RIGHT">43</TD><TR><TD WIDTH="20%">3</TD><TD WIDTH="70%">Dictionary Methods</TD><TD WIDTH="10%" ALIGN="RIGHT">165</TD><TR><TD WIDTH="20%">4</TD><TD WIDTH="70%">Image Compression</TD><TD WIDTH="10%" ALIGN="RIGHT">251</TD><TR><TD WIDTH="20%">5</TD><TD WIDTH="70%">Wavelet Methods</TD><TD WIDTH="10%" ALIGN="RIGHT">513</TD><TR><TD WIDTH="20%">6</TD><TD WIDTH="70%">Video Compression</TD><TD WIDTH="10%" ALIGN="RIGHT">637</TD><TR><TD WIDTH="20%">7</TD><TD WIDTH="70%">Audio Compression</TD><TD WIDTH="10%" ALIGN="RIGHT">691</TD><TR><TD WIDTH="20%">8</TD><TD WIDTH="70%">Other Methods</TD><TD WIDTH="10%" ALIGN="RIGHT">755</TD><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">Bibliography</TD><TD WIDTH="10%" ALIGN="RIGHT">835</TD><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">Glossary</TD><TD WIDTH="10%" ALIGN="RIGHT">855</TD><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">Joining the Data Compression Community</TD><TD WIDTH="10%" ALIGN="RIGHT">877</TD><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">Index</TD><TD WIDTH="10%" ALIGN="RIGHT">879</TD></TABLE> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-17742107631064764572009-02-15T15:37:00.000-08:002009-02-15T15:44:15.392-08:00Digital Cinematography or The 19 Deadly Sins of Software Security<h4>Digital Cinematography </h4> <p>Author: <strong>Paul Wheeler</strong> <p><p>High end digital cinematography can truly challenge the film camera in many of the technical, artistic and emotional aspects of what we think of as 'cinematography'. This book is a guide for practising and aspiring cinematographers and DOPs to digital cinematography essentials - from how to use the cameras to the rapidly emerging world of High Definition cinematography and 24p technology.<br><br><br>This book covers the 'on-the-set' knowledge you need to know - its emphasis lies in practical application, rather than descriptions of technologies, so that in this book you will find usable 'tools' and information to help you get the job done. From 'getting the look' to lighting styles and ratios, what is needed for different types of shoots and the technical preparation required, this is a complete reference to the knowledge and skills required to shoot high end digital films. The book also features a guide to the Sony DVW in-camera menus - showing how to set them up and how they work - a<br>device to save you time and frustration on set.<br> <br>Paul Wheeler is a renowned cinematographer/director of photography and trainer, he runs courses on Digital Cinematography at the National Film & Television School and has lectured on the Royal College of Art's MA course and at The London International Film School. He has been twice nominated by BAFTA for a Best Cinematography award and also twice been the winner of the INDIE award for Best Digital Cinematography.<br><br>THE first step-by-step guide to high end digital camerawork<br>Keep up to date with the very latest technology <br>A practical 'on-the-set' guide that helps you get your job done </p><br><br> <p>Books about: <strong><a href="http://finance-investing-books.blogspot.com/2009/02/introduccion-estadistica-comercial-con.html">Introducción a Estadística Comercial (con CD-ROM Estudiantil)</a></strong> <h4>The 19 Deadly Sins of Software Security </h4> <p>Author: <strong>Michael Howard</strong> <p><p><p>This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to secure code, have partnered with John Viega, the man who uncovered the 19 deadly programming sins to write this much-needed book. Coverage includes:</p><ul><li>Windows, UNIX, Linux, and Mac OS X <li>C, C++, C#, Java, PHP, Perl, and Visual Basic <li>Web, small client, and smart-client applications</ul><p><b>Michael Howard</b> is a senior security program manager in the security engineering group at Microsoft Corporation, and a co-author of the award-winning Writing Secure Code. He is a co-author of Basic Training in IEEE Security and Privacy Magazine and a co-author of the National Cyber Security Task Force “Processes to produce Secure Software” document for the Department of Homeland Security. As an author of the Security Development Lifecycle, Michael spends most of his time is spent defining and enforcing security best practice and software development process improvements to deliver more secure software to normal humans.<p><b>David LeBlanc</b>, Ph.D., is currently Chief Software Architect for Webroot Software. Prior to joining Webroot, he served as security architect for Microsoft's Office division, was a founding member of the Trustworthy Computing Initiative, and worked as a white-hat hacker in Microsoft's network security group. David is also co-author of Writing Secure Code and Assessing Network Security, as well as numerous articles. On good days, he'll be found ridingthe trails on his horse with his wife, Jennifer.<p><b>John Viega</b> discovered the 19 deadly programming flaws that received such press and media attention, and this book is based on his discovery. He is the Founder and Chief Scientist of Secure Software(www.securesoftware.com), is a well-known security expert, and coauthor of <i>Building Secure Software</i> (Addison-Wesley), <i>Network Security with OpenSSL</i> (O'Reilly) an Adjuct Professor of Computer Science at Virginia Tech (Blacksburg, VA) and Senior Policy Researcher at the Cyberspace Policy Institute, and he serves on the Technical Advisory Board for the Open Web Applications Security Project. He also founded a Washington, D.C. area security interest group that conducts monthly lectures presented by leading experts in the field. John is responsible for numerous software security tools, and is the original author of Mailman, the GNU mailing list manager. He holds a B.A. and M.S. in Computer Science from the University of Virginia. He is the author or coauthor of nearly 80 technical publications, including numerous refered research papers and trade articles. He is coauthor of <i>Building Secure Software, Network Security and Cryptography with OpenSSL and The Secure Programming Cookbook for C and C++.</i> </p><br><br> <p><h5>Table of Contents:</h5><TABLE><TR><TD WIDTH="20%">1</TD><TD WIDTH="70%">Buffer overruns</TD><TD WIDTH="10%" ALIGN="RIGHT">1</TD><TR><TD WIDTH="20%">2</TD><TD WIDTH="70%">Format string problems</TD><TD WIDTH="10%" ALIGN="RIGHT">17</TD><TR><TD WIDTH="20%">3</TD><TD WIDTH="70%">Integer overflows</TD><TD WIDTH="10%" ALIGN="RIGHT">25</TD><TR><TD WIDTH="20%">4</TD><TD WIDTH="70%">SQL injection</TD><TD WIDTH="10%" ALIGN="RIGHT">45</TD><TR><TD WIDTH="20%">5</TD><TD WIDTH="70%">Command injection</TD><TD WIDTH="10%" ALIGN="RIGHT">63</TD><TR><TD WIDTH="20%">6</TD><TD WIDTH="70%">Failing to handle errors</TD><TD WIDTH="10%" ALIGN="RIGHT">73</TD><TR><TD WIDTH="20%">7</TD><TD WIDTH="70%">Cross-site scripting</TD><TD WIDTH="10%" ALIGN="RIGHT">83</TD><TR><TD WIDTH="20%">8</TD><TD WIDTH="70%">Failing to protect network traffic</TD><TD WIDTH="10%" ALIGN="RIGHT">99</TD><TR><TD WIDTH="20%">9</TD><TD WIDTH="70%">Use of magic URLs and hidden form fields</TD><TD WIDTH="10%" ALIGN="RIGHT">113</TD><TR><TD WIDTH="20%">10</TD><TD WIDTH="70%">Improper use of SSL and TLS</TD><TD WIDTH="10%" ALIGN="RIGHT">125</TD><TR><TD WIDTH="20%">11</TD><TD WIDTH="70%">Use of weak password-based systems</TD><TD WIDTH="10%" ALIGN="RIGHT">143</TD><TR><TD WIDTH="20%">12</TD><TD WIDTH="70%">Failing to store and protect data securely</TD><TD WIDTH="10%" ALIGN="RIGHT">161</TD><TR><TD WIDTH="20%">13</TD><TD WIDTH="70%">Information leakage</TD><TD WIDTH="10%" ALIGN="RIGHT">183</TD><TR><TD WIDTH="20%">14</TD><TD WIDTH="70%">Improper file access</TD><TD WIDTH="10%" ALIGN="RIGHT">197</TD><TR><TD WIDTH="20%">15</TD><TD WIDTH="70%">Trusting network name resolution</TD><TD WIDTH="10%" ALIGN="RIGHT">207</TD><TR><TD WIDTH="20%">16</TD><TD WIDTH="70%">Race conditions</TD><TD WIDTH="10%" ALIGN="RIGHT">217</TD><TR><TD WIDTH="20%">17</TD><TD WIDTH="70%">Unauthenticated key exchange</TD><TD WIDTH="10%" ALIGN="RIGHT">227</TD><TR><TD WIDTH="20%">18</TD><TD WIDTH="70%">Cryptographically strong random numbers</TD><TD WIDTH="10%" ALIGN="RIGHT">235</TD><TR><TD WIDTH="20%">19</TD><TD WIDTH="70%">Poor usability</TD><TD WIDTH="10%" ALIGN="RIGHT">247</TD><TR><TD WIDTH="20%">A</TD><TD WIDTH="70%">Mapping the 19 deadly sins to the OWASP "top ten"</TD><TD WIDTH="10%" ALIGN="RIGHT">261</TD><TR><TD WIDTH="20%">B</TD><TD WIDTH="70%">Summary of do's and don'ts</TD><TD WIDTH="10%" ALIGN="RIGHT">263</TD></TABLE> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-65036649368869335662009-02-12T07:32:00.000-08:002009-02-12T07:39:36.177-08:00Tom Clancys Splinter Cell 3 or Practical Guide to Clinical Data Management<h4>Tom Clancy's Splinter Cell 3: Chaos Theory </h4> <p>Author: <strong>Prima Temp Authors</strong> <p><p>• Complete Walkthrough for Every Mission <br> • All Secret Bonus Objectives Revealed <br> • Discover Hidden Alternate Paths to Victory <br> • Killer Co-op Strategies <br> • Full Coverage of Every Version <br> • Learn Scores of Deadly Techniques in our Detailed Training Section </p><br><br> <p>Book review: <strong><a href="http://livros-2009.blogspot.com">Comunicação Crítica Contínua:Planejamento, Direção, e Resposta</a></strong> <h4>Practical Guide to Clinical Data Management </h4> <p>Author: <strong>Susanne Prokscha</strong> <p><p><P>Introducing professionals to the role of data management in clinical trials, Practical Guide to Clinical Data Management highlights current thinking about data management, focusing on responsibilities that typical data managers have today. This second edition includes detailed requirements of 21CFR11, the standard for electronic records and signatures. It features new chapters on training of data collection staff as well as controlling access and security. It explores software applications for CDM and explains how to use computerized data collection software. It addresses clinical data for drug and medical device trials. It also presents overviews of various documents for use as templates.</P> </p><br><br> <p><h5>Table of Contents:</h5><TABLE><TR><TD WIDTH="20%">Ch. 1</TD><TD WIDTH="70%">The data management plan</TD><TD WIDTH="10%" ALIGN="RIGHT">3</TD><TR><TD WIDTH="20%">Ch. 2</TD><TD WIDTH="70%">CRF design considerations</TD><TD WIDTH="10%" ALIGN="RIGHT">9</TD><TR><TD WIDTH="20%">Ch. 3</TD><TD WIDTH="70%">Database design considerations</TD><TD WIDTH="10%" ALIGN="RIGHT">19</TD><TR><TD WIDTH="20%">Ch. 4</TD><TD WIDTH="70%">Study setup</TD><TD WIDTH="10%" ALIGN="RIGHT">35</TD><TR><TD WIDTH="20%">Ch. 5</TD><TD WIDTH="70%">Entering data</TD><TD WIDTH="10%" ALIGN="RIGHT">43</TD><TR><TD WIDTH="20%">Ch. 6</TD><TD WIDTH="70%">Tracking CRF pages and corrections</TD><TD WIDTH="10%" ALIGN="RIGHT">53</TD><TR><TD WIDTH="20%">Ch. 7</TD><TD WIDTH="70%">Cleaning data</TD><TD WIDTH="10%" ALIGN="RIGHT">61</TD><TR><TD WIDTH="20%">Ch. 8</TD><TD WIDTH="70%">Managing laboratory data</TD><TD WIDTH="10%" ALIGN="RIGHT">75</TD><TR><TD WIDTH="20%">Ch. 9</TD><TD WIDTH="70%">Collecting adverse event data</TD><TD WIDTH="10%" ALIGN="RIGHT">89</TD><TR><TD WIDTH="20%">Ch. 10</TD><TD WIDTH="70%">Creating reports and transferring data</TD><TD WIDTH="10%" ALIGN="RIGHT">99</TD><TR><TD WIDTH="20%">Ch. 11</TD><TD WIDTH="70%">Locking studies</TD><TD WIDTH="10%" ALIGN="RIGHT">107</TD><TR><TD WIDTH="20%">Ch. 12</TD><TD WIDTH="70%">Standard operating procedures and guidelines</TD><TD WIDTH="10%" ALIGN="RIGHT">117</TD><TR><TD WIDTH="20%">Ch. 13</TD><TD WIDTH="70%">Training</TD><TD WIDTH="10%" ALIGN="RIGHT">127</TD><TR><TD WIDTH="20%">Ch. 14</TD><TD WIDTH="70%">Controlling access and security</TD><TD WIDTH="10%" ALIGN="RIGHT">133</TD><TR><TD WIDTH="20%">Ch. 15</TD><TD WIDTH="70%">Working with CROs</TD><TD WIDTH="10%" ALIGN="RIGHT">139</TD><TR><TD WIDTH="20%">Ch. 16</TD><TD WIDTH="70%">Clinical data management systems</TD><TD WIDTH="10%" ALIGN="RIGHT">149</TD><TR><TD WIDTH="20%">Ch. 17</TD><TD WIDTH="70%">Electronic data capture systems</TD><TD WIDTH="10%" ALIGN="RIGHT">153</TD><TR><TD WIDTH="20%">Ch. 18</TD><TD WIDTH="70%">Choosing vendor products</TD><TD WIDTH="10%" ALIGN="RIGHT">163</TD><TR><TD WIDTH="20%">Ch. 19</TD><TD WIDTH="70%">Implementing new systems</TD><TD WIDTH="10%" ALIGN="RIGHT">171</TD><TR><TD WIDTH="20%">Ch. 20</TD><TD WIDTH="70%">System validation</TD><TD WIDTH="10%" ALIGN="RIGHT">179</TD><TR><TD WIDTH="20%">Ch. 21</TD><TD WIDTH="70%">Test procedures</TD><TD WIDTH="10%" ALIGN="RIGHT">187</TD><TR><TD WIDTH="20%">Ch. 22</TD><TD WIDTH="70%">Change control</TD><TD WIDTH="10%" ALIGN="RIGHT">193</TD><TR><TD WIDTH="20%">Ch. 23</TD><TD WIDTH="70%">Coding dictionaries</TD><TD WIDTH="10%" ALIGN="RIGHT">199</TD><TR><TD WIDTH="20%">Ch. 24</TD><TD WIDTH="70%">Migrating and archiving data</TD><TD WIDTH="10%" ALIGN="RIGHT">209</TD><TR><TD WIDTH="20%">App. A</TD><TD WIDTH="70%">Data management plan outline</TD><TD WIDTH="10%" ALIGN="RIGHT">215</TD><TR><TD WIDTH="20%">App. B</TD><TD WIDTH="70%">Typical data management standard operating procedures</TD><TD WIDTH="10%" ALIGN="RIGHT">219</TD><TR><TD WIDTH="20%">App. C</TD><TD WIDTH="70%">CRO-sponsor responsibility matrix</TD><TD WIDTH="10%" ALIGN="RIGHT">221</TD><TR><TD WIDTH="20%">App. D</TD><TD WIDTH="70%">Implementation plan outline</TD><TD WIDTH="10%" ALIGN="RIGHT">223</TD><TR><TD WIDTH="20%">App. E</TD><TD WIDTH="70%">Validation plan outline</TD><TD WIDTH="10%" ALIGN="RIGHT">225</TD><TR><TD WIDTH="20%">App. F</TD><TD WIDTH="70%">CDISC and HIPAA</TD><TD WIDTH="10%" ALIGN="RIGHT">227</TD></TABLE> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-27731564271571066442009-02-11T03:21:00.000-08:002009-02-11T03:28:00.128-08:00Deploying Voice over Wireless LANs or Schaums Outline of Computer Architecture<h4>Deploying Voice over Wireless LANs </h4> <p>Author: <strong>Jim Geier</strong> <p><p><P style="MARGIN: 0px"><I>Deploying Voice over Wireless LANs</I></P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">The definitive guide to planning, architecting, deploying, supporting, and creating Voice over Wireless LAN solutions</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Recent advances make it possible to deliver high-quality voice and video communications over a wireless LAN (WLAN), replacing costly wired telephone and video surveillance systems and dramatically reducing support costs. However, today’s new voice over WLAN (VoWLAN) technologies require fundamentally different skills and techniques from those used in traditional voice and video systems. Now, there’s a complete guide to every facet of VoWLAN deployment: planning, design, installation, security, maintenance, and troubleshooting. </P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Authored by wireless industry expert and leader Jim Geier, Deploying Voice over Wireless LANs draws on Geier’s extensive experience with real-world VoWLAN deployments. Geier brings together state-of-the-art insights into VoWLAN technologies, standards, products, services, implementation strategies, and much more. </P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Geier begins by introducing key components of today’s VoWLAN systems, including phones, client software, and voice encoders/decoders, as well as VoWLAN signaling essentials such as analog-to-digital (A/D) conversion and compression. Using examples drawn from actual enterprise settings, you’ll learn exactly how VoWLANproducts integrate with existing IP infrastructure. </P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Next, he introduces crucial emerging 802.11 standards for effective VoWLAN deployment, including 802.11e quality of service (QoS) standards, 802.11r to minimize packet loss between access points, and 802.11k network discovery. He carefully reviews the security implications of VoWLAN voice, systematically covering both risks and countermeasures. Finally, Geier walks through implementation from start to finish, thoroughly covering analysis, design, installation, configuration, testing, and support. </P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Whatever your role in planning, delivering, managing, or creating wireless voice and video solutions, Deploying Voice over Wireless LANs is your most comprehensive, authoritative resource.</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Jim Geier founded Wireless-Nets, Ltd., and serves as its principal consultant. His 25 years of experience includes the analysis, design, software development, installation, and support of numerous wireless networking systems. He has been active within the Wi-Fi Alliance and the IEEE 802.11 Working Group and helped develop international standards for WLANs. His books include Wireless Networks First Step (Cisco Press), Wireless LANs (Sams), Wireless Networking Handbook (MTP), and Network Reengineering.</P> <P style="MARGIN: 0px"> </P> <UL> <LI>Understand VoWLAN components, applications, and benefits</LI> <LI>See VoWLAN at work in actual enterprise environments</LI> <LI>Master VoWLAN signaling, including voice signal characteristics, A/D conversion, and compression </LI> <LI>Discover the latest 802.11 VoWLAN standards, including 802.11e, 802.11r, and 802.11k</LI> <LI>Secure IP-based VoWLAN systems against intrusion and compromise</LI> <LI>Analyze your organization’s requirements and design an optimal VoWLAN solution </LI> <LI>Plan for capacity, roaming, and integration with cellular systems</LI> <LI>Install, configure, test, verify, and validate your VoWLAN system</LI> <LI>Plan for operational support and implement appropriate administration tools and methods</LI> <LI>Includes a complete VoWLAN glossary</LI></UL> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">This book is part of the Networking Technology Series from Cisco Press®, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Category: Cisco Press—Networking</P> <P style="MARGIN: 0px">Covers: Voice over Wireless LAN Solutions</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">$60.00 USA / $75.00 CAN</P> <P style="MARGIN: 0px"> </P> </p><br><br> <p><h5>Table of Contents:</h5><P style="MARGIN: 0px"><B>Part I Fundamental Elements</B></P> <P style="MARGIN: 0px"><B>Chapter 1</B> VoWLAN Applications and Benefits</P> <P style="MARGIN: 0px">The Role of VoWLAN Solutions</P> <P style="MARGIN: 0px">History of VoWLANs</P> <P style="MARGIN: 0px"> VoIP</P> <P style="MARGIN: 0px"> Wireless LANs</P> <P style="MARGIN: 0px">Healthcare</P> <P style="MARGIN: 0px">Enterprises</P> <P style="MARGIN: 0px">Universities</P> <P style="MARGIN: 0px">Retail</P> <P style="MARGIN: 0px">Warehouses</P> <P style="MARGIN: 0px">Manufacturing</P> <P style="MARGIN: 0px">Small Offices and Homes</P> <P style="MARGIN: 0px">Security Systems</P> <P style="MARGIN: 0px">Determining ROI</P> <P style="MARGIN: 0px"> Initial Analysis</P> <P style="MARGIN: 0px"> Costs</P> <P style="MARGIN: 0px"> Savings</P> <P style="MARGIN: 0px"> Payback Period</P> <P style="MARGIN: 0px">Chapter Summary</P> <P style="MARGIN: 0px">Chapter Review Questions</P> <P style="MARGIN: 0px"><B>Chapter 2</B> VoWLAN System Components</P> <P style="MARGIN: 0px">VoWLAN System Overview</P> <P style="MARGIN: 0px">Cisco 7920 Wireless IP Phone</P> <P style="MARGIN: 0px">Cisco IP Softphone</P> <P style="MARGIN: 0px">Cisco CallManager</P> <P style="MARGIN: 0px">Cisco CallManager Express</P> <P style="MARGIN: 0px">Linksys Wi-Fi Video Cameras</P> <P style="MARGIN: 0px">Wireless Network Infrastructures</P> <P style="MARGIN: 0px"> Traditional Access Point Networks</P> <Pstyle="MARGIN: 0px"> Wireless Switched Networks</P> <P style="MARGIN: 0px"> Mesh Networks</P> <P style="MARGIN: 0px">Chapter Summary</P> <P style="MARGIN: 0px">Chapter Review Questions</P> <P style="MARGIN: 0px"><B>Chapter 3</B> VoWLAN Signaling Fundamentals</P> <P style="MARGIN: 0px">Voice Attributes</P> <P style="MARGIN: 0px">Video Attributes</P> <P style="MARGIN: 0px">VoIP Call Flow</P> <P style="MARGIN: 0px"> H.323</P> <P style="MARGIN: 0px"> Skinny Client Control Protocol (SCCP)</P> <P style="MARGIN: 0px"> Session Initiation Protocol (SIP)</P> <P style="MARGIN: 0px">Radio Frequency (RF) Signals</P> <P style="MARGIN: 0px"> Modulation</P> <P style="MARGIN: 0px"> RF Signal Characteristics</P> <P style="MARGIN: 0px"> Gain</P> <P style="MARGIN: 0px"> Signal-to-Noise Ratio</P> <P style="MARGIN: 0px"> Spread Spectrum</P> <P style="MARGIN: 0px"> Orthogonal Frequency Division Multiplexing (OFDM)</P> <P style="MARGIN: 0px"> FCC Rules</P> <P style="MARGIN: 0px">Wireless Impairments</P> <P style="MARGIN: 0px"> Poor Signal Coverage</P> <P style="MARGIN: 0px"> Latency</P> <P style="MARGIN: 0px"> RF Interference</P> <P style="MARGIN: 0px"> Limited Capacity</P> <P style="MARGIN: 0px"> Multipath</P> <P style="MARGIN: 0px">Chapter Summary</P> <P style="MARGIN: 0px">Chapter Review Questions</P> <P style="MARGIN: 0px"><B>Part II Critical Technologies</B></P> <P style="MARGIN: 0px"><B>Chapter 4</B> Wireless LAN Technologies</P> <P style="MARGIN: 0px">Infrastructure Mode</P> <P style="MARGIN: 0px"> Scanning</P> <P style="MARGIN: 0px"> Data Transfer</P> <P style="MARGIN: 0px"> Roaming</P> <P style="MARGIN: 0px">Ad Hoc Mode</P> <P style="MARGIN: 0px">Wireless Medium Access</P> <P style="MARGIN: 0px"> DCF</P> <P style="MARGIN: 0px"> PCF</P> <P style="MARGIN: 0px">802.11 Physical Layer Standards</P> <P style="MARGIN: 0px"> 802.11a</P> <P style="MARGIN: 0px"> 802.11b</P> <P style="MARGIN: 0px"> 802.11g</P> <P style="MARGIN: 0px"> 802.11n</P> <P style="MARGIN: 0px"> Comparison of 802.11 Standards</P> <P style="MARGIN: 0px">Wireless Configuration Parameters</P> <P style="MARGIN: 0px"> SSID</P> <P style="MARGIN: 0px"> RF Channels</P> <P style="MARGIN: 0px"> Transmit Power</P> <P style="MARGIN: 0px"> Data Rates</P> <P style="MARGIN: 0px"> Power-Save Mode</P> <P style="MARGIN: 0px"> RTS/CTS</P> <P style="MARGIN: 0px"> Fragmentation</P> <P style="MARGIN: 0px"> RTS/CTS and Fragmentation Summary</P> <P style="MARGIN: 0px">Chapter Summary</P> <P style="MARGIN: 0px">Chapter Review Questions</P> <P style="MARGIN: 0px"><B>Chapter 5</B> VoWLAN Security Solutions</P> <P style="MARGIN: 0px">Security Implications</P> <P style="MARGIN: 0px"> Passive Monitoring</P> <P style="MARGIN: 0px"> Unauthorized Access</P> <P style="MARGIN: 0px"> Denial of Service</P> <P style="MARGIN: 0px">Encryption</P> <P style="MARGIN: 0px"> WEP</P> <P style="MARGIN: 0px"> TKIP</P> <P style="MARGIN: 0px"> AES</P> <P style="MARGIN: 0px"> WPA</P> <P style="MARGIN: 0px"> 802.11i</P> <P style="MARGIN: 0px"> Virtual Private Networks</P> <P style="MARGIN: 0px">Authentication</P> <P style="MARGIN: 0px"> Open System Authentication</P> <P style="MARGIN: 0px"> Shared Key Authentication</P> <P style="MARGIN: 0px"> IEEE 802.1X</P> <P style="MARGIN: 0px"> Cisco LEAP</P> <P style="MARGIN: 0px">Tips for Enhancing Security</P> <P style="MARGIN: 0px"> SSID Broadcasting</P> <P style="MARGIN: 0px"> Systems Management</P> <P style="MARGIN: 0px"> Access Point Installation</P> <P style="MARGIN: 0px"> Rogue Access Points</P> <P style="MARGIN: 0px"> Signal Propagation</P> <P style="MARGIN: 0px">Chapter Summary</P> <P style="MARGIN: 0px">Chapter Review Questions</P> <P style="MARGIN: 0px"><B>Part III Implementation Steps</B></P> <P style="MARGIN: 0px"><B>Chapter 6</B> Analyzing VoWLAN Requirements</P> <P style="MARGIN: 0px">Overall Requirements Analysis Steps</P> <P style="MARGIN: 0px">Identifying Potential Requirements</P> <P style="MARGIN: 0px"> Applications</P> <P style="MARGIN: 0px"> Users</P> <P style="MARGIN: 0px"> Utilization</P> <P style="MARGIN: 0px"> Coverage Areas</P> <P style="MARGIN: 0px"> Roaming</P> <P style="MARGIN: 0px"> Environment</P> <P style="MARGIN: 0px"> Security</P> <P style="MARGIN: 0px"> Client Devices</P> <P style="MARGIN: 0px"> Existing Systems</P> <P style="MARGIN: 0px"> Policies and Preferences</P> <P style="MARGIN: 0px"> Budget</P> <P style="MARGIN: 0px"> Schedules</P> <P style="MARGIN: 0px">Verifying and Validating Requirements</P> <P style="MARGIN: 0px">Documenting Requirements</P> <P style="MARGIN: 0px">Chapter Summary</P> <P style="MARGIN: 0px">Chapter Review Questions</P> <P style="MARGIN: 0px"><B>Chapter 7</B> Designing a VoWLAN Solution</P> <P style="MARGIN: 0px">Overall Design Steps</P> <P style="MARGIN: 0px">Deployment Models</P> <P style="MARGIN: 0px"> Single-Site Architecture</P> <P style="MARGIN: 0px"> Multisite WAN with Centralized Call Processing</P> <P style="MARGIN: 0px"> Multisite WAN with Distributed Call Processing</P> <P style="MARGIN: 0px">Roaming</P> <P style="MARGIN: 0px">Security</P> <P style="MARGIN: 0px">Network Infrastructure</P> <P style="MARGIN: 0px"> Virtual LANs</P> <P style="MARGIN: 0px"> Multicasting</P> <P style="MARGIN: 0px"> Switch Recommendations</P> <P style="MARGIN: 0px"> Quality of Service</P> <P style="MARGIN: 0px">Placement of Access Points</P> <P style="MARGIN: 0px"> Wireless Capacity Analysis</P> <P style="MARGIN: 0px"> RF Site Survey</P> <P style="MARGIN: 0px">Document Findings</P> <P style="MARGIN: 0px">Chapter Summary</P> <P style="MARGIN: 0px">Chapter Review Questions</P> <P style="MARGIN: 0px"><B>Chapter 8</B> Installing, Configuring, and Testing a VoWLAN System</P> <P style="MARGIN: 0px">Installing Access Points</P> <P style="MARGIN: 0px"> Getting Started</P> <P style="MARGIN: 0px"> Mounting Practices</P> <P style="MARGIN: 0px"> Antenna Alignment</P> <P style="MARGIN: 0px"> Electrical Power Distribution</P> <P style="MARGIN: 0px">Configuring Access Points</P> <P style="MARGIN: 0px"> Configuration Setting Access</P> <P style="MARGIN: 0px"> Firmware</P> <P style="MARGIN: 0px"> VLANs</P> <P style="MARGIN: 0px"> SSID</P> <P style="MARGIN: 0px"> Transmit Power</P> <P style="MARGIN: 0px"> RF Channel</P> <P style="MARGIN: 0px"> Data Rates</P> <P style="MARGIN: 0px"> Filtering</P> <P style="MARGIN: 0px"> Protection Mechanisms</P> <P style="MARGIN: 0px">Installing and Configuring Cisco CallManager Software</P> <P style="MARGIN: 0px"> Cisco CallManager Software Installation</P> <P style="MARGIN: 0px"> System Parameters</P> <P style="MARGIN: 0px"> Subscriber Setup</P> <P style="MARGIN: 0px"> Device Mobility Issues</P> <P style="MARGIN: 0px">Configuring Wireless IP Phones</P> <P style="MARGIN: 0px"> Firmware</P> <P style="MARGIN: 0px"> Network Settings</P> <P style="MARGIN: 0px"> RF Settings</P> <P style="MARGIN: 0px"> Phone Settings</P> <P style="MARGIN: 0px">Verifying System Operation</P> <P style="MARGIN: 0px"> Association Tests</P> <P style="MARGIN: 0px"> Authentication Tests</P> <P style="MARGIN: 0px"> Registration Tests</P> <P style="MARGIN: 0px"> Phone Call Tests</P> <P style="MARGIN: 0px"> Load Tests</P> <P style="MARGIN: 0px"> Follow-up Tests</P> <P style="MARGIN: 0px"> Battery Life Issues</P> <P style="MARGIN: 0px">Chapter Summary</P> <P style="MARGIN: 0px">Chapter Review Questions</P> <P style="MARGIN: 0px"><B>Chapter 9 </B>Supporting a VoWLAN System</P> <P style="MARGIN: 0px">Configuration Management</P> <P style="MARGIN: 0px"> RF Channel Changes</P> <P style="MARGIN: 0px"> Transmit Power Changes</P> <P style="MARGIN: 0px"> New Applications</P> <P style="MARGIN: 0px"> Signal Coverage</P> <P style="MARGIN: 0px"> Firmware Version</P> <P style="MARGIN: 0px"> Security Improvement</P> <P style="MARGIN: 0px">Network Monitoring</P> <P style="MARGIN: 0px"> Performance Monitoring</P> <P style="MARGIN: 0px"> Coverage Monitoring</P> <P style="MARGIN: 0px"> Configuration Monitoring</P> <P style="MARGIN: 0px"> Security Policy Management</P> <P style="MARGIN: 0px">Security Assessment Steps</P> <P style="MARGIN: 0px"> Review Existing Security Policies</P> <P style="MARGIN: 0px"> Review the System Architecture</P> <P style="MARGIN: 0px"> Review Operational Support Tools and Procedures</P> <P style="MARGIN: 0px"> Interview Users</P> <P style="MARGIN: 0px"> Verify Configurations of Wireless Devices</P> <P style="MARGIN: 0px"> Investigate Physical Installations of Access Points</P> <P style="MARGIN: 0px"> Identify Rogue Access Points</P> <P style="MARGIN: 0px"> Perform Penetration Tests</P> <P style="MARGIN: 0px"> Analyze Security Gaps</P> <P style="MARGIN: 0px"> Recommend Improvements</P> <P style="MARGIN: 0px">Maintenance Functions</P> <P style="MARGIN: 0px"> Inoperative Access Points</P> <P style="MARGIN: 0px"> Poor Performance</P> <P style="MARGIN: 0px"> Poor Signal Coverage</P> <P style="MARGIN: 0px"> Broken Hardware</P> <P style="MARGIN: 0px"> Keep Firmware Up to Date</P> <P style="MARGIN: 0px"> Monitor Performance</P> <P style="MARGIN: 0px"> Verify Coverage</P> <P style="MARGIN: 0px"> Inspect Access Points</P> <P style="MARGIN: 0px">Engineering Functions</P> <P style="MARGIN: 0px"> Advanced Problem Resolution</P> <P style="MARGIN: 0px"> Coverage Expansion</P> <P style="MARGIN: 0px"> Capacity Increases</P> <P style="MARGIN: 0px"> Firmware Review</P> <P style="MARGIN: 0px"> Technology Upgrade</P> <P style="MARGIN: 0px"> Design Review</P> <P style="MARGIN: 0px">Help Desk Planning</P> <P style="MARGIN: 0px"> Connection Problems</P> <P style="MARGIN: 0px"> Poor Signal Coverage</P> <P style="MARGIN: 0px"> Poor Performance</P> <P style="MARGIN: 0px"> System Status</P> <P style="MARGIN: 0px"> Additional Considerations</P> <P style="MARGIN: 0px">CiscoWorks Wireless LAN Solution Engine</P> <P style="MARGIN: 0px"> Automatic Access Point Configuration</P> <P style="MARGIN: 0px"> Assisted Site Surveys</P> <P style="MARGIN: 0px"> Centralized Firmware Updates</P> <P style="MARGIN: 0px"> Dynamic Grouping</P> <P style="MARGIN: 0px"> VLAN Configuration</P> <P style="MARGIN: 0px"> Multiple SSID Support</P> <P style="MARGIN: 0px"> Customizable Thresholds</P> <P style="MARGIN: 0px"> Fault Status</P> <P style="MARGIN: 0px"> Intrusion Detection System</P> <P style="MARGIN: 0px"> Security Policy Monitoring</P> <P style="MARGIN: 0px"> Secure User Interface</P> <P style="MARGIN: 0px"> Air/RF Scanning and Monitoring</P> <P style="MARGIN: 0px"> Self-healing Functions</P> <P style="MARGIN: 0px"> Reporting, Trending, Planning, and Troubleshooting</P> <P style="MARGIN: 0px">Chapter Summary</P> <P style="MARGIN: 0px">Chapter Review Questions</P> <P style="MARGIN: 0px"><B>Appendix A </B>Answers to Chapter Review Questions</P> <P style="MARGIN: 0px"><B>Glossary</B></P> <P style="MARGIN: 0px"><B> </B></P> <P style="MARGIN: 0px">1587052318 TOC 2/12/2007</P> <p>New interesting textbook: <strong><a href="http://graphics-design-books.blogspot.com/2009/02/macromedia-flash-mx-game-design.html">Macromedia Flash MX Game Design Demystified or New Perspectives on JavaScript Comprehensive</a></strong> <h4>Schaum's Outline of Computer Architecture </h4> <p>Author: <strong>Nick Carter</strong> <p><p><ul><li>A problem/solution manual, integrating general principles and laboratory exercises, that provides students with the hands-on experience needed to master the basics of modern computer system design <li>Features more than 200 detailed problems, with step-by-step solutions; many detailed graphics and charts; chapter summaries with additional "rapid-review" questions; and expert sidebar tips <li>Describes analytical methods for quantifying real-world design choices regarding instruction sets, pipelining, cache, memory, I/O, and other critical hardware and software elements involved in building computers <li>An ideal educational resource for the more than 70,000 undergraduate and graduate students who, each year, enroll in computer architecture and related courses</ul><p>Nick Carter, Ph.D. (Urbana, IL) is an assistant professor at the University of Illinois, Urbana-Champaign. He holds a doctorate in computer science from MIT, has worked at IBM’s Yorktown, NY, research facility and was the memory system architect on MIT’s prestigious M-Machine project. </p><br><br> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-30832200805920933072009-02-09T23:09:00.000-08:002009-02-09T23:16:31.203-08:00Fast Track to MDX or Build the Best Data Center Facility for Your Business<h4>Fast Track to MDX </h4> <p>Author: <strong>Robert Zar</strong> <p><p>Fast Track to MDX gives you all the necessary background to let you write useful, powerful MDX expressions and introduces the most frequently used MDX functions and constructs. No prior knowledge is assumed and examples are used throughout the book to rapidly develop your MDX skills to the point where you can solve real business problems. </p><br><br> <p>Interesting book: <strong><a href="http://vitamins-book.blogspot.com/2009/02/one-minute-or-omega-rx-zone.html">The One Minute or The Omega Rx Zone</a></strong> <h4>Build the Best Data Center Facility for Your Business </h4> <p>Author: <strong>Douglas Alger</strong> <p><p>A comprehensive, step-by-step guide to designing and managing robust, flexible, and productive data center facilities <LI>Includes step-by-step instructions on every major decision involved in designing flexible and productive data center facilities <LI>Shows how to maximize infrastructure, avoid downtime, and save millions by extending data center lifespan <LI>Covers strategies for retrofitting an overburdened data center <LI>Addresses common construction errors and includes design templates <P>Data centers are specialized environments that safeguard a company's most valuable equipment and intellectual property, housing the devices that process business transactions, host web sites, store data, maintain financial records, and route e-mail. A well-planned and effectively managed data center facility supports these functions and increases company productivity by providing reliable network availability and faster processing. This book undertakes all major decisions involved in the design and construction of a data center facility. It also provides instruction on how to effectively manage a data center so downtime is minimized, troubleshooting is easier, and the room's infrastructure is maximized, allowing a company to get more from its financial investment. Chapters are arranged in the order in which decisions must be made when planning a data center project. Part I covers physical infrastructure details: sizing the room, cabinet layout, electrical systems, data cabling, cooling, and fire suppression system. Part II addresses how to successfully manage the environment: organizing equipment, labeling, standardization, operations standards, documentation, and cleaning practices. </LI> </p><br><br> <p><h5>Table of Contents:</h5><TABLE><TR><TD WIDTH="20%">Ch. 1</TD><TD WIDTH="70%">Approaching the data center project</TD><TD WIDTH="10%" ALIGN="RIGHT">5</TD><TR><TD WIDTH="20%">Ch. 2</TD><TD WIDTH="70%">Choosing an optimal site</TD><TD WIDTH="10%" ALIGN="RIGHT">33</TD><TR><TD WIDTH="20%">Ch. 3</TD><TD WIDTH="70%">Quantifying data center space</TD><TD WIDTH="10%" ALIGN="RIGHT">57</TD><TR><TD WIDTH="20%">Ch. 4</TD><TD WIDTH="70%">Laying out the data center</TD><TD WIDTH="10%" ALIGN="RIGHT">83</TD><TR><TD WIDTH="20%">Ch. 5</TD><TD WIDTH="70%">Overhead or under-floor installation?</TD><TD WIDTH="10%" ALIGN="RIGHT">111</TD><TR><TD WIDTH="20%">Ch. 6</TD><TD WIDTH="70%">Creating a robust electrical system</TD><TD WIDTH="10%" ALIGN="RIGHT">135</TD><TR><TD WIDTH="20%">Ch. 7</TD><TD WIDTH="70%">Designing a scalable network infrastructure</TD><TD WIDTH="10%" ALIGN="RIGHT">161</TD><TR><TD WIDTH="20%">Ch. 8</TD><TD WIDTH="70%">Keeping it cool</TD><TD WIDTH="10%" ALIGN="RIGHT">195</TD><TR><TD WIDTH="20%">Ch. 9</TD><TD WIDTH="70%">Removing skeletons from your server closet</TD><TD WIDTH="10%" ALIGN="RIGHT">215</TD><TR><TD WIDTH="20%">Ch. 10</TD><TD WIDTH="70%">Organizing your way to an easier job</TD><TD WIDTH="10%" ALIGN="RIGHT">237</TD><TR><TD WIDTH="20%">Ch. 11</TD><TD WIDTH="70%">Labeling and signage</TD><TD WIDTH="10%" ALIGN="RIGHT">249</TD><TR><TD WIDTH="20%">Ch. 12</TD><TD WIDTH="70%">Stocking and standardizing</TD><TD WIDTH="10%" ALIGN="RIGHT">273</TD><TR><TD WIDTH="20%">Ch. 13</TD><TD WIDTH="70%">Safeguarding the servers</TD><TD WIDTH="10%" ALIGN="RIGHT">293</TD><TR><TD WIDTH="20%">Ch. 14</TD><TD WIDTH="70%">Mapping, monitoring, and metrics</TD><TD WIDTH="10%" ALIGN="RIGHT">317</TD><TR><TD WIDTH="20%">Ch. 15</TD><TD WIDTH="70%">Maintaining a world-class environment</TD><TD WIDTH="10%" ALIGN="RIGHT">335</TD></TABLE> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-43418479600450879992009-02-08T18:58:00.000-08:002009-02-08T19:05:09.084-08:00Pro T SQL 2008 or Adobe AIR 15<h4>Pro T-SQL 2008 </h4> <p>Author: <strong>Michael Coles</strong> <p><p><P><p>Discussing new and existing features, SQL Server designer and administrator <strong>Michael Coles</strong> takes you on an expert guided tour of Transact–SQL functionality in SQL Server 2008 in his book Pro T–SQL 2008 Programmer’s Guide. Fully functioning examples and downloadable source code bring Coles’ technically accurate and engaging treatment of Transact–SQL into your own hands. Step–by–step explanations ensure clarity, and an advocacy of best–practices will steer you down the road to success.</p><p>Pro T–SQL 2008 Programmer’s Guide is every developer’s key to making full use of SQL Server 2008’s powerful, built–in Transact–SQL language. Transact–SQL is the language developers and DBAs use to interact with SQL Server. It’s used for everything from querying data, to writing stored procedures, to managing the database. New features in SQL Server 2008 include a spatial data type, SQLCLR integration, the MERGE statement, a dramatically improved and market–leading XML feature set, and support for encryption—all of which are covered in this book</p><h4>What you’ll learn</h4><p><li>Write stored procedures, functions, and triggers using Transact–SQL </li><li>Apply best–practices when centralizing procedural logic inside your SQL Server database.</li><li>Seamlessly work with XML data using XQuery, XPath, and the XML type.</li><li>Use SQLCLR to write .NET code that runs inside SQL Server.</li><li>Implement full–text search within your database.</li><li>Load data more efficiently using the new MERGE statement.</li><li>Learn about the newgeography type for storing spatial data.</li><p><h4>Who is this book for? </h4><p>Pro T–SQL 2008 Programmer’s Guide is written for SQL Server and Transact–SQL developers who want to implement best–practices and take full advantage of all that SQL Server has to offer. .NET programmers will find the book helpful in showing how to run .NET code within SQL Server. Database administrators who need to write triggers and the occasional stored procedure will also benefit from the book.</p><h4>About the Apress Pro Series</h4><p>The Apress Pro series books are practical, professional tutorials to keep you on and moving up the professional ladder.</p><p>You have gotten the job, now you need to hone your skills in these tough competitive times. The Apress Pro series expands your skills and expertise in exactly the areas you need. Master the content of a Pro book, and you will always be able to get the job done in a professional development project. Written by experts in their field, Pro series books from Apress give you the hard–won solutions to problems you will face in your professional programming career.</p> </p><br><br> <p>Read also <strong><a href="http://economics-books-online.blogspot.com">Corporate Advocacy or Customer Service</a></strong> <h4>Adobe Air 1.5: Solutions and Examples for Rich Internet Application Developers </h4> <p>Author: <strong>David Tucker</strong> <p><p><P>Thoroughly vetted by Adobe's AIR development team, Adobe AIR Cookbook addresses fundamentals, best practices, and topics that web developers and application designers inquire about most. The hands-on recipes in this cookbook help you solve a variety of tasks and scenarios you may encounter using Adobe AIR to build Rich Internet Applications for the desktop. It's an ideal way to learn the nuances of Adobe AIR, with practical solutions you can use right away, and detailed explanations of why and how they work. These recipes will help you: Build an AIR application with Flex, Flash, or HTML and Ajax Create a database and connect it to your application Put together native menus for PCs and Macs Work with the Service Monitor Framework Utilize the Adobe AIR Update Framework Create branded desktop experiences with custom chrome and custom application icons Distribute your AIR application with the Seamless Install Badge <p> And more. Adobe AIR Cookbook includes dozens of recipes from rising stars in the AIR development community-David Tucker, Rich Tretola, Marco Casario, and Koen De Weggheleire-along with the best solutions posted by visitors to the Adobe AIR Cookbook community website hosted by Adobe and O'Reilly (adobe.com/go/air_cookbook). If you're ready to expand your skill set with Adobe AIR, this is the book you've been waiting for. </p><br><br> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-22034755131517126862009-02-07T14:46:00.000-08:002009-02-07T14:53:35.030-08:00Mixing Audio or Final Cut Express HD for Mac OS X<h4>Mixing Audio: Concepts, Practices and Tools </h4> <p>Author: <strong>Roey Izhaki</strong> <p><p><P>Mixing remains one of the most illusive arts of recording practice and can take a life time to master. Looking at practices, concepts, tools and mixing instruments the author provides a comprehensive insight to the art and science of mixing.<br><br>Whether a hobbyist of professional this book covers basic concepts to advanced techniques as well as tips and tricks and is a vital read for anyone wanting to succeed in the field of mixing.<br><br>The book is accompanied by the website mixingaudio.com, featuring a sample chapter, illustrations, audio and a user forum.<P>* Rounded, extensive and complete coverage of music mixing<br>* Includes a DVD with over 700 audio samples and 4 sample mixes<br>* Covers new topics and mixing trends such as computer centred mixing </p><br><br> <p><h5>Table of Contents:</h5>Introduction<br><br>Part I: Concepts and Practices<br><br>Music and mixing<br> Music - an extremely short introduction<br> The role and importance of the mix<br> The perfect mix Some axioms and other gems<br> Louder perceived better<br> Percussives weight less<br> Importance<br> Natual vs. artificial Learning to mix<br> What makes a great mixing engineer?<br> Methods of learning<br> Mixing analysis<br> Reference tracks The process of mixing<br> Mixing and the production chain<br> The mix as a composite<br> Where to start?<br> Deadlocks<br> Milestones<br> Finalizing and stabilizing the mix Related issues<br> How long does it take?<br> Breaks<br> Using solos<br> Mono listening<br> Bouncing<br> Housekeeping<br> Mix Edits<br> Mastering Mixing domains and objectives<br> Mixing objectives<br> Frequency domain<br> Level domain<br> Stereo domain<br> Depth<br><br>Part II: Tools<br><br>Monitoring<br> How did we get here?<br> Choosing monitors<br> The room factor<br> Positioning monitors Meters<br> Peak meters<br> Average meters<br> Phase meters Mixing consoles<br> Processors vs. effects<br> Basic signal flow<br> Groups<br> In-line consoles<br> The monitor section<br> Solos<br> Correct gain structure<br> The digital console Software mixers<br> Tracks and mixer strips<br> Routing<br> The internal architecture Phase<br> What is phase?<br> Problems<br> Tricks Faders<br> Types<br> Scales<br> Working with faders Panning<br> How stereo works?<br> Pan controls<br> Types of tracks<br> Panning techniques<br> Beyond pan pots Equalizers<br> Applications<br> The frequency spectrum<br> Types and controls<br> In practice<br> Equalizing various instruments Introduction to dynamic range processors<br>Dynamic Range<br> Dynamics<br> Dynamic Range Processors in a nutshell Compressors<br> Principle of operation and core controls<br> Additional controls<br> Controls in practice<br> Applications<br> Tricks<br> More on compressors Limiters Gates<br> Controls<br> Applications<br> In practice<br> Tricks Expanders<br> Controls<br> In practice<br> Upward Expanders Duckers<br> Operation and controls<br> Applications Delays<br> Delay basics<br> Types<br> In practice<br> Applications Other modulation tools<br> Vibrato<br> ADT<br> Chorus<br> Flanging<br> Phasing<br> Tremolo Reverbs<br> Applications<br> Types<br> Reverb programs<br> Reverb properties and parameters<br> Reverbs and stereo<br> Other reverb types<br> Reverbs in practice Distortion<br> Distortion basics<br> Ways to generate distortion Drum Triggering<br> Methods of drum triggering Other tools<br> MS<br> Pitch shifters and harmonizers<br> Exciters and enhancers<br> Transient designers Automation<br> The automation process<br> Automation alternatives<br> Control surfaces<br><br>Part III: Sample Mixes<br><br>Hero (rock)<br>The Hustler (drum n' bass)<br>Temps (hip hop)<br>Donna Pomini (dance)<br><br>Appendices<br><br>Appendix 1: Notes and frequencies Appendix 2: Delay time chart <p>Interesting textbook: <strong><a href="http://body-care-book.blogspot.com/2009/02/human-cardiovascular-control-or.html">Human Cardiovascular Control or Preparing for Weight Loss Surgery</a></strong> <h4>Final Cut Express HD for Mac OS X (Visual QuickStart Guide Series) </h4> <p>Author: <strong>Lisa Brenneis</strong> <p><p>It's the year of High Definition video, and Final Cut Express is ready with a brand-new HD version chockfull of advanced titling and soundtrack creation tools. Here to ensure that users start taking advantage of Final Cut Express HD's real-time HD editing capabilities immediately is a thoroughly updated task-based guide to the program from best-selling author and digital video expert Lisa Brenneis. Users who are eager to make effective, compelling videos but don't want to invest heavily in training or equipment will welcome Lisa's simple step-by-step instructions, strong visual approach, and sound professional advice. In short order, they'll find themselves editing video; applying special effects and transitions; mastering the program's compositing, titling, and audio tools; and outputting their finished work. Readers will also learn about all that's new in this major upgrade: LiveType for creating HD-quality animated text and graphics, Soundtrack for producing custom musical scores, direct timeline file placement from Motion, Digital Cinema Desktop, direct import of iMovie projects, and much more. <br> </p><br><br> Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-1374840706116044424.post-19764833910666476942009-02-06T10:35:00.000-08:002009-02-06T10:42:06.396-08:00Building Online Stores with osCommerce or Dreamweaver MX 2004 Bible<h4>Building Online Stores with osCommerce: Professional Edition </h4> <p>Author: <strong>David Mercer</strong> <p><p>Building Online Stores with osCommerce: Professional Edition will teach you how to use build and maintain a complex, powerful e-commerce Website using osCommerce. As well as everything you need to get started with osCommerce, this book goes onto cover how to:<p></p><b>*</b>Increase your sales through cross-selling and up-selling<br><b>*</b>Offer custom discounts and support the use of gift certificates<br><b>*</b>Incorporate your own RSS feed to enhance the content of the site<br><b>*</b>Use and control banners to market popular or profitable products within your store<br><b>*</b>Customize the osCommerce code to make your site more robust, eliminate bugs, and increase flexibility and customer appeal<br><b>*</b>Understand the security technologies involved in e-commerce and develop your own security and backup strategies<br><b>*</b>Build your business by utilizing various advertising techniques, search engine optimization, affiliate and drop-shipping schemes<br><b>*</b>Learn the principles and methods used by professional programmers to empower you to continue creating and building your online business<p></p>These techniques will enable you to build a unique and powerful site, giving you an ideal platform to enter the competitive world of e-commerce.<p></p>Through this complete, comprehensive education in osCommerce you will develop the confidence to experiment with your own enhancements and modifications, leaving you with a truly unique online store. Practical demonstrations and well considered advice will ensure that your store will always be developed to the highest standards.<p>As you become serious with osCommerce, this book will show you how to make the most of osCommerce's open source development process and community. You will see how to use the community as an excellent resource for developing your business strategies and practices, as well as making it easy to continuously enhance your customers' shopping experience.</p><br><br> <p>Look this: <strong><a href="http://brownies-biscuits.blogspot.com/2009/02/whisky-companion-or-professional.html">The Whisky Companion or Professional Cooking</a></strong> <h4>Dreamweaver MX 2004 Bible </h4> <p>Author: <strong>Joseph W Lowery</strong> <p><p>Packed with hands-on instruction and step by step tutorials, the <b>Dreamweaver MX 2004 Bible</b> is everything you need to harness the power of this amazing web development tool. Starting with the basics, expert author and well-known Dreamweaver guru Joe Lowery guides you through the ins and outs of Dreamweaver MX 2004 and will have you building your very own dynamic, data-driven sites in no time. Coverage includes:<P><br>• Building interactive forms<br><br>• Creating client-side image maps<br><br>• Connecting to a live database<br><br>• Inserting, deleting and updating data from your web pages<br><br>• Working with layers, Style Sheets and Dynamic HTML<br><br>• Integration with Flash, Fireworks and ColdFusion<br><br>• Designing with templates<br><br>• Extending Dreamweaver with your own extensions<br><br>• And more.<P> <br> <br>The value-packed CD ROM includes the Dreamweaver MX 2004 Try-Out Edition, complete Dreamweaver web sites and databases you can customize for your own use, as well as add itional web development software. </p><h4>Library Journal</h4><p>Dreamweaver (see also Computer Media, LJ 1/03) reigns as the editor of choice for many web designers, and MX 2004 adds better Cascading Style Sheet (CSS) handling and other features that may spur demand for updated guides. Teach Yourself, rather basic for most users, takes a step-by-step, full-color, screen shot-heavy approach to accomplishing common tasks. A good overview for beginners, appropriate for all public libraries. The more comprehensive Missing Manual addresses beginning to intermediate users, with special attention to using CSS. Sidebars include additional info for power users, FAQs, definitions, and other useful topics. Its clear, step-by-step tutorials on each major subject (with downloadable files and finished examples), plus links to additional resources, make this an especially useful self-study guide; highly recommended for all libraries. For intermediate to advanced users, Bible and Complete Reference strive for thorough coverage. Bible's CD contains a trial version of Dreamweaver MX 2004, plus project files; Complete's CD, meanwhile, offers trial versions of each MX 2004 product, Dreamweaver extensions, and sample code. Bible goes through each Dreamweaver feature, from touring menu commands to adding extensions and customizing the software. New features are highlighted in the text; notes, cautions, and tips add info; cross references help navigate and collect relevant information for specific tasks; and chapter summaries aid in assimilating the information provided. Its attention to workflow and collaboration will help designers working on large projects. Complete's coverage ranges from Dreamweaver basics to extensions; its links to additional resources aid users in extending Dreamweaver's functionality. It walks readers through the entire process of creating a web site and using the various aspects of the software. Both Bible and Complete are appropriate for larger public libraries and for academic libraries serving design and computer science programs; Bible's clarity gives it the edge if you need only one title. Copyright 2004 Reed Business Information. </p><br><br> <p><h5>Table of Contents:</h5><TABLE><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">Foreword</TD><TD WIDTH="10%" ALIGN="RIGHT"></TD><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">Preface</TD><TD WIDTH="10%" ALIGN="RIGHT"></TD><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">Acknowledgments</TD><TD WIDTH="10%" ALIGN="RIGHT"></TD><TR><TD WIDTH="20%">Pt. I</TD><TD WIDTH="70%">Dreamweaver MX 2004 Basics</TD><TD WIDTH="10%" ALIGN="RIGHT">1</TD><TR><TD WIDTH="20%">Ch. 1</TD><TD WIDTH="70%">Introducing Dreamweaver MX 2004</TD><TD WIDTH="10%" ALIGN="RIGHT">3</TD><TR><TD WIDTH="20%">Ch. 2</TD><TD WIDTH="70%">A Dreamweaver Workflow Example</TD><TD WIDTH="10%" ALIGN="RIGHT">35</TD><TR><TD WIDTH="20%">Ch. 3</TD><TD WIDTH="70%">Touring Dreamweaver</TD><TD WIDTH="10%" ALIGN="RIGHT">57</TD><TR><TD WIDTH="20%">Ch. 4</TD><TD WIDTH="70%">Setting Your Preferences</TD><TD WIDTH="10%" ALIGN="RIGHT">137</TD><TR><TD WIDTH="20%">Ch. 5</TD><TD WIDTH="70%">Setting Up Sites and Servers</TD><TD WIDTH="10%" ALIGN="RIGHT">177</TD><TR><TD WIDTH="20%">Pt. II</TD><TD WIDTH="70%">Web Design and Layout Fundamentals</TD><TD WIDTH="10%" ALIGN="RIGHT">211</TD><TR><TD WIDTH="20%">Ch. 6</TD><TD WIDTH="70%">Accessing the Code Directly</TD><TD WIDTH="10%" ALIGN="RIGHT">213</TD><TR><TD WIDTH="20%">Ch. 7</TD><TD WIDTH="70%">Building Style Sheet Web Pages</TD><TD WIDTH="10%" ALIGN="RIGHT">267</TD><TR><TD WIDTH="20%">Ch. 8</TD><TD WIDTH="70%">Working with Text</TD><TD WIDTH="10%" ALIGN="RIGHT">301</TD><TR><TD WIDTH="20%">Ch. 9</TD><TD WIDTH="70%">Inserting Images</TD><TD WIDTH="10%" ALIGN="RIGHT">357</TD><TR><TD WIDTH="20%">Ch. 10</TD><TD WIDTH="70%">Establishing Web Links</TD><TD WIDTH="10%" ALIGN="RIGHT">397</TD><TR><TD WIDTH="20%">Pt. III</TD><TD WIDTH="70%">Advanced Design Tools and Techniques</TD><TD WIDTH="10%" ALIGN="RIGHT">413</TD><TR><TD WIDTH="20%">Ch. 11</TD><TD WIDTH="70%">Working with Divs and Layers</TD><TD WIDTH="10%" ALIGN="RIGHT">415</TD><TR><TD WIDTH="20%">Ch. 12</TD><TD WIDTH="70%">Using Behaviors</TD><TD WIDTH="10%" ALIGN="RIGHT">449</TD><TR><TD WIDTH="20%">Ch. 13</TD><TD WIDTH="70%">Setting Up Tables</TD><TD WIDTH="10%" ALIGN="RIGHT">485</TD><TR><TD WIDTH="20%">Ch. 14</TD><TD WIDTH="70%">Interactive Forms</TD><TD WIDTH="10%" ALIGN="RIGHT">531</TD><TR><TD WIDTH="20%">Ch. 15</TD><TD WIDTH="70%">Creating Lists</TD><TD WIDTH="10%" ALIGN="RIGHT">565</TD><TR><TD WIDTH="20%">Ch. 16</TD><TD WIDTH="70%">Making Client-Side Image Maps</TD><TD WIDTH="10%" ALIGN="RIGHT">589</TD><TR><TD WIDTH="20%">Ch. 17</TD><TD WIDTH="70%">Using Frames and Framesets</TD><TD WIDTH="10%" ALIGN="RIGHT">607</TD><TR><TD WIDTH="20%">Pt. IV</TD><TD WIDTH="70%">Incorporating Dynamic Data</TD><TD WIDTH="10%" ALIGN="RIGHT">637</TD><TR><TD WIDTH="20%">Ch. 18</TD><TD WIDTH="70%">Establishing Connections and Recordsets</TD><TD WIDTH="10%" ALIGN="RIGHT">639</TD><TR><TD WIDTH="20%">Ch. 19</TD><TD WIDTH="70%">Making Data Dynamic</TD><TD WIDTH="10%" ALIGN="RIGHT">669</TD><TR><TD WIDTH="20%">Ch. 20</TD><TD WIDTH="70%">Managing Data</TD><TD WIDTH="10%" ALIGN="RIGHT">689</TD><TR><TD WIDTH="20%">Ch. 21</TD><TD WIDTH="70%">Working with Live Data</TD><TD WIDTH="10%" ALIGN="RIGHT">707</TD><TR><TD WIDTH="20%">Ch. 22</TD><TD WIDTH="70%">Crafting Multiple-Page Applications</TD><TD WIDTH="10%" ALIGN="RIGHT">723</TD><TR><TD WIDTH="20%">Pt. V</TD><TD WIDTH="70%">Adding Multimedia Elements</TD><TD WIDTH="10%" ALIGN="RIGHT">759</TD><TR><TD WIDTH="20%">Ch. 23</TD><TD WIDTH="70%">Fireworks Integration</TD><TD WIDTH="10%" ALIGN="RIGHT">761</TD><TR><TD WIDTH="20%">Ch. 24</TD><TD WIDTH="70%">Inserting Flash and Shockwave Elements</TD><TD WIDTH="10%" ALIGN="RIGHT">783</TD><TR><TD WIDTH="20%">Ch. 25</TD><TD WIDTH="70%">Adding Video to Your Web Page</TD><TD WIDTH="10%" ALIGN="RIGHT">815</TD><TR><TD WIDTH="20%">Ch. 26</TD><TD WIDTH="70%">Using Audio on Your Web Page</TD><TD WIDTH="10%" ALIGN="RIGHT">837</TD><TR><TD WIDTH="20%">Pt. VI</TD><TD WIDTH="70%">Enhancing Web Site Management and Workflow</TD><TD WIDTH="10%" ALIGN="RIGHT">855</TD><TR><TD WIDTH="20%">Ch. 27</TD><TD WIDTH="70%">Using Dreamweaver Templates</TD><TD WIDTH="10%" ALIGN="RIGHT">857</TD><TR><TD WIDTH="20%">Ch. 28</TD><TD WIDTH="70%">Using Repeating Elements</TD><TD WIDTH="10%" ALIGN="RIGHT">899</TD><TR><TD WIDTH="20%">Ch. 29</TD><TD WIDTH="70%">Maximizing Browser Targeting</TD><TD WIDTH="10%" ALIGN="RIGHT">913</TD><TR><TD WIDTH="20%">Ch. 30</TD><TD WIDTH="70%">Building Web Sites with a Team</TD><TD WIDTH="10%" ALIGN="RIGHT">933</TD><TR><TD WIDTH="20%">Ch. 31</TD><TD WIDTH="70%">Integrating with XML</TD><TD WIDTH="10%" ALIGN="RIGHT">971</TD><TR><TD WIDTH="20%">Pt. VII</TD><TD WIDTH="70%">Extending Dreamweaver</TD><TD WIDTH="10%" ALIGN="RIGHT">979</TD><TR><TD WIDTH="20%">Ch. 32</TD><TD WIDTH="70%">Customizing Dreamweaver</TD><TD WIDTH="10%" ALIGN="RIGHT">981</TD><TR><TD WIDTH="20%">Ch. 33</TD><TD WIDTH="70%">Creating and Using Objects</TD><TD WIDTH="10%" ALIGN="RIGHT">1027</TD><TR><TD WIDTH="20%">Ch. 34</TD><TD WIDTH="70%">Creating a Behavior</TD><TD WIDTH="10%" ALIGN="RIGHT">1051</TD><TR><TD WIDTH="20%">Ch. 35</TD><TD WIDTH="70%">Handling Server Behaviors</TD><TD WIDTH="10%" ALIGN="RIGHT">1087</TD><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">App.: What's on the CD-ROM</TD><TD WIDTH="10%" ALIGN="RIGHT">1123</TD><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">Index</TD><TD WIDTH="10%" ALIGN="RIGHT">1127</TD><TR><TD WIDTH="20%"></TD><TD WIDTH="70%">End-User License Agreement</TD><TD WIDTH="10%" ALIGN="RIGHT">1181</TD></TABLE> Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1374840706116044424.post-16518592623850912052009-02-05T06:23:00.000-08:002009-02-05T06:30:10.609-08:00Microsoft Windows Vista Help Desk or Pro ADONET Data Services<h4>Microsoft Windows Vista Help Desk </h4> <p>Author: <strong>Andy Walker</strong> <p><p>What do you do when your squeaky new Microsoft operating system doesn't work? You moan and complain and get personal about Bill Gates's haircut while you wait for Microsoft to figure it out and issue a fix in a hefty service pack in a year or so. Or you could take the smart way out and use this definitive troubleshooting book that will cure your illin' Vista PC in no time flat. <br><br> This book exposes the flaws and nuances of Vista and teaches you how to work with its quirky personality and fix the problems you have with it so you can get back to your regularly scheduled life. <i>Microsoft Windows Vista Help Desk</i> digs deep inside the operating system to unveil expert-level tools and techniques. It offers a step-by-step, head-patting, hand-holding experience on how to use Vista as if you are a trained professional. This book covers hiccups, coughs, crashes, blue screens, reboots, system failures, malware infections, and other forehead-aching issues that make happy users clench their fists and profane the good name of the sweet and kind geeks in Redmond, Washington. <br><br> -Troubleshoot your Vista PC every inch of the way–including Internet problems, printing problems, network problems, and user interface problems<br> -Use the troubleshooting flowcharts to step your way through a problem to find the right solution<br> -Designed for home users, cubicle dwellers, and students everywhere<br> -Quickly sort through complex problems to determine whether Vista, your hardware, or a random piece of software is the culprit<br> -Track down and eradicate viruses, spyware, and other Internet nasties<br> -Deal with annoying networking issues that have brought your wireless network to its knees<br> -Set up and troubleshoot multiple user accounts so that you, your spouse, your kids, and even the family pooch can share the same PC </p><br><br> <p><h5>Table of Contents:</h5>Introduction</B><P>Don’t Let Vista Torment You . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1</P> <P>How This Book Is Organized . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2</P> <P>Special Elements Used in This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6</P> <P>Reader Competition…of Sorts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6</P> <P>Extra Vista Help and Getting in Touch with Me . . . . . . . . . . . . . . . . . . . . . . . . . 7</P> <P><B>PART I: VISTA BASICS</B></P> <P><B>Chapter 1</B><B>: Windows Vista: A Crash Course on Your New OS</B>. . . . <B>. .11</B></P> <P>Welcome to Windows Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12</P> <P>Vista for XP Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12</P> <P>Does Aero Need Windex? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12</P> <P>Ease of Use: Anatomy of a Vista Window . . . . . . . . . . . . . . . . . . . . . . . . . . . 14</P> <P> Search and Vista Will Find . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15</P> <P>Vista Security: Cancel or Allow! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17</P> <P> Windows Defender. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17</P> <P> Internet Protected Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18</P> <P> Anti-phishing Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18</P> <P> User Account Control (UAC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18</P> <P> Users Versus Administrators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20</P> <P> Parental Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20</P> <P>Vista Versions: Not Quite 31 Flavors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20</P> <P>Vista’s Hardcore Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24</P> <P>Vista Goodness: Features You’ll Love . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24</P> <P>Vista Gotchas: Bugs and Features You’ll Hate . . . . . . . . . . . . . . . . . . . . . . . . 26</P> <P>Vista Persona: Hottie, Freak, and Statesman . . . . . . . . . . . . . . . . . . . . . . . . . 27</P> <P><B>Chapter 2: Basic Vista Troubleshooting</B>. . . . . . . . . . . <B>29</B></P> <P>How to Be a Vista Doctor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30</P> <P>Cyberwalker’s Five Immutable Laws of PC Troubleshooting . . . . . . . . . . . . . . . 30</P> <P>If Microsoft Was NASA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31</P> <P>If in Doubt, Wait for a Service Pack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32</P> <P> ERIDA Your Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33</P> <P> Evaluate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34</P> <P> Replicate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34</P> <P> Investigate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36</P> <P> Diagnose. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37</P> <P> Act . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37</P> <P> Good Computer Doctors Gather Information . . . . . . . . . . . . . . . . . . . . . . . 39</P> <P> The Devil Is in the Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42</P> <P> Fonzie Says: SIT on It. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44</P> <P> From Despair to Freeware. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45</P> <P> What Version Is It? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46</P> <P><B>PART II: PERFORMANCE TROUBLESHOOTING</B></P> <P><B> <P>Chapter 3: Startup and Shutdown Issues . . . . . . . . . . . .53</P> <P></B> </P> <P>Not Enough Memory or Hardware Resources . . . . . . . . . . . . . . . . . . . . . . . . . 54</P> <P>Weasely Software That Loads on Startup. . . . . . . . . . . . . . . . . . . . . . . . . . . . 57</P> <P> Why You Will Love System Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 58</P> <P> Vista Startup Quick Fix. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59</P> <P> How to Tweak the Vista Startup to Your Liking . . . . . . . . . . . . . . . . . . . . . . 60</P> <P> Stopping Viruses and Spyware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62</P> <P> Memory Hogging Applets You Can Switch Off. . . . . . . . . . . . . . . . . . . . . . . 63</P> <P> Root Out Even More Memory Hogs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64</P> <P> Tips for the Advanced, Brazen, and Stupid. . . . . . . . . . . . . . . . . . . . . . . . . 65</P> <P> Here’s a Noose: Don’t Put It Around Your Neck . . . . . . . . . . . . . . . . . . . . . 66</P> <P> Selective Startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67</P> <P>My System Won’t Sleep, Shut Down, or Restart . . . . . . . . . . . . . . . . . . . . . . . 68</P> <P> Power-Down Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69</P> <P>Shut-the-#@$!-Off: Fixing Shutdowns and Sleep . . . . . . . . . . . . . . . . . . . . . . . 70</P> <P> Update Your Graphics Card Driver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70</P> <P> Update Your Chipset Drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73</P> <P> Update Your BIOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74</P> <P> Wake On LAN Setting Sticks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74</P> <P> Unplug USB Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75</P> <P> Finicky High-End Keyboards and Mice . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76</P> <P> Privacy Software Delays Shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77</P> <P> Troubleshooting Sleep Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78</P> <P>The Bottom Line. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79</P> <P><B> <P>Chapter 4: Optimizing a Sluggish System. . . . . . . . . . 81</P> <P></B>Super-Charge Vista! Or at Least Give It a Prod . . . . . . . . . . . . . . . . . . . . . . . . 82</P> <P>Hardware Requirements: The Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82</P> <P> Microsoft’s Minimum Vista Specifications . . . . . . . . . . . . . . . . . . . . . . . . . 83</P> <P> Microsoft’s Recommended Specifications . . . . . . . . . . . . . . . . . . . . . . . . . 83</P> <P> Andy’s “Don’t Believe the Hype” Vista Specs. . . . . . . . . . . . . . . . . . . . . . . 84</P> <P>Hardware Upgrades for Vista Bliss . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86</P> <P>More Memory: Cheap, Easy, and Quick . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87</P> <P>Bigger, Better Video Card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90</P> <P> What You’ll Need . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91</P> <P> Determining DirectX on XP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92</P> <P> Upgrading Your Graphics Card: The Nitty Gritty . . . . . . . . . . . . . . . . . . . . . . 94</P> <P>Installing a Faster CPU: Not an Easy Upgrade Option . . . . . . . . . . . . . . . . . . . 94</P> <P>Andy’s Recommended Upgrade Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95</P> <P>Boost Vista with Your USB Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96</P> <P> Alternative Ways to Enable ReadyBoost. . . . . . . . . . . . . . . . . . . . . . . . . . . 98</P> <P> ReadyBoost Is a Ready Bust on My USB Key . . . . . . . . . . . . . . . . . . . . . . . 99</P> <P>Tweak Your OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100</P> <P> Adjust Your Performance Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100</P> <P> Optimize Your Startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102</P> <P>Boost Your System with Basic Maintenance. . . . . . . . . . . . . . . . . . . . . . . . . 104</P> <P> Empty Your Recycle Bin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105</P> <P> Remove Unused Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105</P> <P> Clean Up Your Temporary Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107</P> <P> Clean Up Temporary Files in Alternate Browsers . . . . . . . . . . . . . . . . . . . 108</P> <P> Delete Large Useless Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109</P> <P> Virtual Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110</P> <P> Defrag Is Not a Panacea, but It Might Help . . . . . . . . . . . . . . . . . . . . . . . 112</P> <P> Optimize Scratch Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113</P> <P>The Fruits of Your Efforts: Performance Monitoring . . . . . . . . . . . . . . . . . . . . 114</P> <P><B>PART III: REFORMAT AND REINSTALL</B></P> <P><B> <P>Chapter 5: Preparation and Backup. . . . . . . . . 119</P> <P></B> </P> <P>What You Need to Know Beforehand . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120</P> <P> Registry: Bunged Up Like an Atkins Dieter. . . . . . . . . . . . . . . . . . . . . . . . 120</P> <P> Startup: Waiting for GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120</P> <P> Malware: Bad Programs That Do Naughty Things . . . . . . . . . . . . . . . . . . . 121</P> <P> Corrupted Files: Watch Out for Cosmic Rays . . . . . . . . . . . . . . . . . . . . . . 121</P> <P> Snoutware: Rude Programs and Settings. . . . . . . . . . . . . . . . . . . . . . . . . 122</P> <P>Reformat Early, Reformat Often . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123</P> <P>Say Goodbye to Your Saturday and Reformat . . . . . . . . . . . . . . . . . . . . . . . . 123</P> <P>Back Up: Don’t Be a Loser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124</P> <P> New Vista Backup Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125</P> <P>DIY Backups: Safeguarding Data by Hand . . . . . . . . . . . . . . . . . . . . . . . . . . 135</P> <P> Outlook . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136</P> <P> Windows Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137</P> <P> General Email Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138</P> <P> Favorites, Cookies, and Feeds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140</P> <P> Personal Documents and Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142</P> <P> Windows Media Player . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144</P> <P> Microsoft Office 2003 Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145</P> <P> Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145</P> <P> Network and Internet Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145</P> <P>A Last Poke Around . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149</P> <P>Mission-Critical Tools: Disks You’ll Need . . . . . . . . . . . . . . . . . . . . . . . . . . . 150</P> <P> Came with the Computer: System Recovery Disk . . . . . . . . . . . . . . . . . . . 150</P> <P> Built-in: System Recovery on a Partition . . . . . . . . . . . . . . . . . . . . . . . . . 150</P> <P> Store-Bought: Windows Vista Retail Disk . . . . . . . . . . . . . . . . . . . . . . . . . 151</P> <P> Product Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152</P> <P> Software Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152</P> <P> Gather Critical Drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153</P> <P><B>Chapter 6: Reformat and Reinstall . . . . . . . . . 157</B></P> <P>Wipe the Disk: Time to Clean the Hard Drive . . . . . . . . . . . . . . . . . . . . . . . . 158</P> <P>How to Install by Booting from Your DVD . . . . . . . . . . . . . . . . . . . . . . . . . . . 160</P> <P>How to Install Vista from the Desktop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163</P> <P> Installing a Fresh Copy of Windows Vista. . . . . . . . . . . . . . . . . . . . . . . . . 164</P> <P>A Few More Things to Do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168</P> <P> Create an Admin Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168</P> <P> Name Your Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169</P> <P> Turn On Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170</P> <P> Finish Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171</P> <P><B>Chapter 7: Restart and Restore . . . . . . . . 173</B></P> <P>What to Do After Vista Is Installed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174</P> <P>“Must Do” Versus “Do When You Have Time” . . . . . . . . . . . . . . . . . . . . . . . 176</P> <P>Tweak Your Security Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177</P> <P> User Account Control (UAC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177</P> <P> Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178</P> <P> Internet Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179</P> <P>Restore Your Internet Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180</P> <P> Broadband . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181</P> <P> Dial-Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187</P> <P>Run Windows Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188</P> <P>Restore Your Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189</P> <P>Install and Update Security Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . 191</P> <P> Antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191</P> <P> Antispyware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192</P> <P>Update Drivers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192</P> <P> Post-Reinstall Driver Woes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194</P> <P>Reinstall Your Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194</P> <P>Worst-Case Scenario: Restore the System Image . . . . . . . . . . . . . . . . . . . . 196</P> <P><B>PART IV: HARDWARE AND SOFTWARE TROUBLESHOOTING</B></P> <P><B>Chapter 8: Hardware <B>Headaches</B></B>. . . . . . . . . . . <B>203</B></P> <P>Hardware Hiccups and Horrors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204</P> <P>Diagnosing Hardware with Device Manager . . . . . . . . . . . . . . . . . . . . . . . . . 204</P> <P>Dealing with Disabled Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206</P> <P> Starting the System BIOS Setup Program . . . . . . . . . . . . . . . . . . . . . . . . 207</P> <P> Enabling Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208</P> <P>Updating the BIOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210</P> <P> Performing a Windows-Based BIOS Upgrade . . . . . . . . . . . . . . . . . . . . . . 211</P> <P> Performing a BIOS Upgrade with a Boot Disk . . . . . . . . . . . . . . . . . . . . . . 211</P> <P>USB Problems–Solved! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215</P> <P> Unplug, Plug, Then Play . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215</P> <P> Driver and Device-Recognition Woes and Solutions . . . . . . . . . . . . . . . . . 217</P> <P> USB Port and Hub Power Woes and Solutions . . . . . . . . . . . . . . . . . . . . . 218</P> <P> Missing in Action! USB 2.0 Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219</P> <P>Graphics Adapters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221</P> <P> I’m Not Sure I Can Attach a Secondary Display . . . . . . . . . . . . . . . . . . . . 221</P> <P> I Can’t Use My Secondary Display. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222</P> <P> I Want the Same Information on Both Displays . . . . . . . . . . . . . . . . . . . . 222</P> <P> My Program Runs in the Wrong Display . . . . . . . . . . . . . . . . . . . . . . . . . . 223</P> <P> My 3D Game Looks Lousy or Runs Very Slowly . . . . . . . . . . . . . . . . . . . . 223</P> <P>Hard Drives and Storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224</P> <P> I Installed a Hard Disk, But Windows Can’t Find It . . . . . . . . . . . . . . . . . . 224</P> <P> My Hard Disk Is Failing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225</P> <P>Check Your RAM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226</P> <P>My Mouse Doesn’t Work. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226</P> <P> Check Your Mouse Port and Mouse . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227</P> <P> Check Your Driver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227</P> <P> Check Device Manager with the Keyboard . . . . . . . . . . . . . . . . . . . . . . . . 229</P> <P> I Want to Customize Mouse Movement . . . . . . . . . . . . . . . . . . . . . . . . . . 230</P> <P>I Can’t Print . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231</P> <P> The Printer Is Offline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231</P> <P> You Are Not Using the Default Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . 231</P> <P> Windows Vista Doesn’t Recognize My Printer. . . . . . . . . . . . . . . . . . . . . . 232</P> <P> My Print Spooler Is Full, But Nothing Is Coming Out! . . . . . . . . . . . . . . . . 232</P> <P> Oh, the Printer Prints All Right, But Look at the Print Quality! . . . . . . . . . . 233</P> <P>I Can’t Scan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234</P> <P> Scanner Not Recognized by Computer. . . . . . . . . . . . . . . . . . . . . . . . . . . 234</P> <P> Scanner Recognized, But Not Working . . . . . . . . . . . . . . . . . . . . . . . . . . . 235</P> <P> Scanner Won’t Work with Certain Programs . . . . . . . . . . . . . . . . . . . . . . . 235</P> <P>I Can’t Burn a CD or DVD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235</P> <P> Drive Not Recognized by Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235</P> <P> Drive Recognized, But I Can’t Burn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236</P> <P> I Can Burn with One Program, But Not Another . . . . . . . . . . . . . . . . . . . . 237</P> <P>I Can’t Save. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237</P> <P><B> <P>Chapter 9: Software Troubles . . . . . . . . . . 239</P> <P></B> </P> <P>Bad Software! Sit. Stay. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240</P> <P>System Restore: Easy, Quick Fix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241</P> <P>Shadow Copy: New File Recovery Feature . . . . . . . . . . . . . . . . . . . . . . . . . . 243</P> <P>Application Repair 101: Patch or Upgrade? . . . . . . . . . . . . . . . . . . . . . . . . . 246</P> <P> Software Fixes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246</P> <P> Automatic Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246</P> <P> Version Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247</P> <P>Undo a Bad Software Install: The Simple Way . . . . . . . . . . . . . . . . . . . . . . . 248</P> <P> Last Known Good Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248</P> <P> Safe Mode: Water Wings for Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . 249</P> <P>Undo a Bad Software Install: The Hard Way . . . . . . . . . . . . . . . . . . . . . . . . 251</P> <P> Before You Get Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252</P> <P> Set a Restore Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252</P> <P> Clean Out the Registry: Phase 1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253</P> <P> Find Files and Folders, Then Nuke ‘em . . . . . . . . . . . . . . . . . . . . . . . . . . 256</P> <P> Remove Startup and Services Settings . . . . . . . . . . . . . . . . . . . . . . . . . . 257</P> <P> Clean Out Your Registry: The Clean Up . . . . . . . . . . . . . . . . . . . . . . . . . . 260</P> <P>Drivers: Update or Roll ‘em Back . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261</P> <P> Get Jiggy with the Device Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262</P> <P> How to Update a Driver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265</P> <P> Driver Downloaded! Now Comes the Hard Work . . . . . . . . . . . . . . . . . . . . 267</P> <P> In Case of Emergency: Roll Back the Driver . . . . . . . . . . . . . . . . . . . . . . . 268</P> <P>Windows Update: Mother of All Bug Fixers . . . . . . . . . . . . . . . . . . . . . . . . . 269</P> <P> Undo Windows Update Hotfixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270</P> <P>Troubleshooting a Software Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272</P> <P> Installation Successful! But, It Doesn’t Work . . . . . . . . . . . . . . . . . . . . . . 273</P> <P> Program Compatibility Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275</P> <P> Set Compatibility Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275</P> <P> Helpful Hints: Problem Reports and Solutions . . . . . . . . . . . . . . . . . . . . . 277</P> <P>White Window of Death . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278</P> <P> What You Can Do. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279</P> <P>Fix Your Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280</P> <P>I Can’t Receive Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280</P> <P> General Tab: Generally, This Isn’t a Problem . . . . . . . . . . . . . . . . . . . . . . 282</P> <P> Servers Tab: Post Offices for Your Email . . . . . . . . . . . . . . . . . . . . . . . . . 282</P> <P> Connection Tab: Is the Internet On? . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284</P> <P> Security Tab: For Advanced Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284</P> <P> Advanced Tab: Where the Fun Stuff Is Kept . . . . . . . . . . . . . . . . . . . . . . . 284</P> <P>I Can’t Send Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286</P> <P> Are You Online? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286</P> <P> Is Your Outbound Server Address Correct? . . . . . . . . . . . . . . . . . . . . . . . 287</P> <P> Check Server Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287</P> <P> Is Your Attachment Too Big? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288</P> <P> Modify Your SMTP Port Number?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289</P> <P> Other Email-Blocking Culprits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290</P> <P>Fix Your Browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292</P> <P> I Can’t Download Add-ins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293</P> <P> I Can’t Install Add-ins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294</P> <P><B> <P>PART V: NETWORK TROUBLESHOOTING</P> <P></B> </P><B> <P>Chapter 10: Internet Disconnect . . . . . . . . . . . .299</P> <P></B> </P> <P>Internet Connections 102. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300</P> <P>Network Troubleshooting for Helmet Wearers . . . . . . . . . . . . . . . . . . . . . . . . 300</P> <P> Reboot: It’s Annoying, But It Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300</P> <P> More Rebooting: Restart All Your Network Gear . . . . . . . . . . . . . . . . . . . . 301</P> <P> Check Your Cables. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302</P> <P> Fix Your NIC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302</P> <P> Use the Network Diagnostics Repair Wizards. . . . . . . . . . . . . . . . . . . . . . 305</P> <P> Remove Connection-Changing Programs . . . . . . . . . . . . . . . . . . . . . . . . . 306</P> <P>Broadband Disconnect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309</P> <P> I Can’t Connect to the Internet with a Cable Modem. . . . . . . . . . . . . . . . . . . 311</P> <P> Check Your Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311</P> <P> Let Vista Diagnose It . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311</P> <P> Check for Custom Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313</P> <P> Cable Internet Troubleshooting Summary. . . . . . . . . . . . . . . . . . . . . . . . . 314</P> <P>I Can’t Connect to the Internet Via DSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315</P> <P> Check Your Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315</P> <P> Check the DSL Dialer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317</P> <P> Let Vista Diagnose Your DSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319</P> <P> Dive a Little Deeper into DSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320</P> <P> DSL Troubleshooting Review. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322</P> <P>I Can’t Connect to the Internet Via My Home Router. . . . . . . . . . . . . . . . . . . 322</P> <P> Check Your Router Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324</P> <P> Get Inside the Router. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325</P> <P> Configure Your Router’s Broadband Connection . . . . . . . . . . . . . . . . . . . . 328</P> <P> Check the Connection, Then Celebrate . . . . . . . . . . . . . . . . . . . . . . . . . . 330</P> <P> Reset Vista’s Network Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331</P> <P> Router Troubleshooting Review . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332</P> <P>I Can’t Connect to a Wireless Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332</P> <P> Check the Wireless Adapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333</P> <P> Make Sure the Wireless Radio Is Turned On . . . . . . . . . . . . . . . . . . . . . . 334</P> <P> Check the Router. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335</P> <P> Attempt a Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335</P> <P> Is Wireless Security Shutting You Out? . . . . . . . . . . . . . . . . . . . . . . . . . . 338</P> <P> WEP–Wired Equivalency Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338</P> <P> How to Disable WEP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338</P> <P> WPA–Wi-Fi Protected Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339</P> <P> How to Disable WPA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339</P> <P> MAC Address Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340</P> <P> How to Disable MAC Address Filtering. . . . . . . . . . . . . . . . . . . . . . . . . . . 340</P> <P>Troubleshooting a Dial-Up Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341</P> <P>Extreme Geek Techniques: Hard-Core Troubleshooting . . . . . . . . . . . . . . . . . 343</P> <P> Reset Your NIC: Secrets of IPConfig . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344</P> <P> Ping: Are You There Device? It’s Me, User.. . . . . . . . . . . . . . . . . . . . . . . . 347</P> <P> Traceroute Basics: Tracking Packets Like Kangaroos . . . . . . . . . . . . . . . . 349</P> <P> DNS Is Dead . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350</P> <P> Network Good, ISP Bad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351</P> <P> Time to Call the Internet RotoRooter . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352</P> <P><B> <P>Chapter 11: Network Nightmares . . . . . . . . . . . . . 353</P> <P></B> </P> <P>Troubleshooting Your Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354</P> <P> Basic Network Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354</P> <P>Networking Vista to Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356</P> <P> Method #1: Access an Explicitly Shared File or Folder . . . . . . . . . . . . . . . 357</P> <P> Method #2: Access Files by Using User Credentials. . . . . . . . . . . . . . . . . 359</P> <P> Method #3: Share a File Using Public Folders . . . . . . . . . . . . . . . . . . . . . 359</P> <P> Troubleshooting Vista-to-Vista Networking . . . . . . . . . . . . . . . . . . . . . . . . 361</P> <P>Networking Vista to a Windows XP Computer . . . . . . . . . . . . . . . . . . . . . . . . 362</P> <P> Recommended: Convert Your XP Computer to NTFS . . . . . . . . . . . . . . . . . 362</P> <P> Create a Password-Protected User on XP. . . . . . . . . . . . . . . . . . . . . . . . . 363</P> <P> Disable Simple File Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364</P> <P> Enable File and Printer Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365</P> <P> Synchronize Workgroup Names. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365</P> <P> How to Change the Workgroup in XP . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366</P> <P> How to Change the Workgroup in Vista . . . . . . . . . . . . . . . . . . . . . . . . . 366</P> <P> Testing 1,2,3: Is This Network On? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367</P> <P> Troubleshooting XP-to-Vista Networking . . . . . . . . . . . . . . . . . . . . . . . . . . 368</P> <P>How to Share a Folder on XP Home to Vista . . . . . . . . . . . . . . . . . . . . . . . . 369</P> <P>How to Share a Folder on XP Pro with Vista . . . . . . . . . . . . . . . . . . . . . . . . . 371</P> <P> Access a Shared XP Folder with Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . 372</P> <P> File-Sharing Troubleshooting Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374</P> <P>Sharing from Vista to XP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375</P> <P> Share a Vista Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376</P> <P> Access a Folder on Vista from Your XP Machine. . . . . . . . . . . . . . . . . . . . 376</P> <P>Networking Vista to a Mac . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376</P> <P> Enable a Password on the Mac’s User Account . . . . . . . . . . . . . . . . . . . . 377</P> <P> Enable Windows File Sharing on the Mac . . . . . . . . . . . . . . . . . . . . . . . . 378</P> <P> Set Up Vista to Access Your Mac . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379</P> <P>Vista-to-Mac Troubleshooting Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380</P> <P> Tweak the Local Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381</P> <P> Check the Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382</P> <P>Access Vista from Your Mac . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383</P> <P> Prep Your Mac to Access Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384</P> <P><B> <P>PART VI: EMERGENCY PROBLEMS</P> <P></B> </P><B> <P>Chapter 12: Security Troubles . . . . . . . . . . . .389</P> <P></B> </P> <P>Introduction to Vista Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390</P> <P>New Security Tools in Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390</P> <P> User Account Control (UAC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390</P> <P> Data Execution Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392</P> <P> Windows Defender. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392</P> <P> Internet Protected Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393</P> <P> Improved Standard User Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393</P> <P> New Anti-Phishing Protection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394</P> <P>Vista Security Snapshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394</P> <P>How Vista Measures Up to Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395</P> <P>Preventing Viruses on Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397</P> <P> Antivirus for Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397</P> <P>Preventing Spyware on Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400</P> <P>Virus and Spyware Removal on Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403</P> <P> Do Your Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403</P> <P> Disconnect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403</P> <P> Back Up Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403</P> <P> Disable System Restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404</P> <P> Work in Safe Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404</P> <P> Scan with Security Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404</P> <P> Clean Out Windows Startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405</P> <P> Clean Out the Registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405</P> <P> Disable Malware That Runs as a Windows Service. . . . . . . . . . . . . . . . . . 406</P> <P> Delete Files and Folders Related to the Malware . . . . . . . . . . . . . . . . . . . 406</P> <P> Restart and Check. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406</P> <P> Scan and Restore Your Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406</P> <P>Rootkit Removal on Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407</P> <P> What About Free Anti-Rootkit Scanners? . . . . . . . . . . . . . . . . . . . . . . . . . 407</P> <P>Troubleshooting the Windows Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409</P> <P> Block/Unblock Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409</P> <P> Advanced Windows Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410</P> <P> A Few More Firewall Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411</P> <P>Troubleshooting Internet Protected Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . 411</P> <P>Use an Alternate Web Browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412</P> <P> Firefox. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412</P> <P> Safari . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412</P> <P> Opera . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412</P> <P>Run Vista with UAC Disabled. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413</P> <P>How to Turn Off UAC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414</P> <P> Partially Disabling UAC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415</P> <P> Adjust UAC for Screen Readers and Capture Utilities . . . . . . . . . . . . . . . . 415</P> <P>Standard User Versus Administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416</P> <P>Tweaking Data Execution Prevention (DEP) . . . . . . . . . . . . . . . . . . . . . . . . . . 418</P> <P> Disabling/Enabling DEP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418</P> <P> Turn DEP On for Ultimate Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419</P> <P> Exclude Some Applications from DEP . . . . . . . . . . . . . . . . . . . . . . . . . . . 420</P> <P><B> <P>Chapter 13: Bad System Boots and Lockouts. . . . . . . . . . . . . 421</P> <P></B> </P> <P>How to Boot Your System, When It Won’t Boot Normally . . . . . . . . . . . . . . . . 422</P> <P>Running Automatic Startup Repairs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427</P> <P>Using System Recovery Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430</P> <P> Startup Bad? Startup Repair Good!. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430</P> <P> “Back, Back in Time” with System Restore . . . . . . . . . . . . . . . . . . . . . . . 431</P> <P> Doc RAM, Doc RAM, STAT! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432</P> <P>Locked Out of Windows? Here’s a Crowbar! . . . . . . . . . . . . . . . . . . . . . . . . . 434</P> <P> Creating and Using a Password Reset Disk . . . . . . . . . . . . . . . . . . . . . . . 435</P> <P> BitLocker Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437</P> <P> Reinstall Windows Vista . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439</P> <P>Hard Disk or Vista? Which One’s the Culprit?. . . . . . . . . . . . . . . . . . . . . . . . 439</P> <P> Rounding Up “The Usual Suspects” . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439</P> <P> First Things First . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440</P> <P> Bad Hard Disk, Bad! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442</P> <P><B>PART VII: MULTIMEDIA TROUBLES</B></P> <P><B> <P>Chapter 14: Troubleshooting Sound . . . . . . . . . . . .449</P> <P></B> </P> <P>Troubleshooting Sound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450</P> <P>Hardware Connection Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451</P> <P> Check Your Speakers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451</P> <P> Check Your Sound Card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452</P> <P> Ensuring That Your Sound Card Is Installed . . . . . . . . . . . . . . . . . . . . . . . 453</P> <P> Working with More Than One Sound Adapter . . . . . . . . . . . . . . . . . . . . . . 454</P> <P> Ensuring That Your Speakers Are Powered On . . . . . . . . . . . . . . . . . . . . . 455</P> <P> Checking Hardware Volume Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456</P> <P> Software Volume Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456</P> <P>Tweaking Your Vista Sound Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457</P> <P> Setting Software Volume Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458</P> <P> Troubleshooting Your Speakers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459</P> <P>Making Vista Sound Better . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460</P> <P> Checking the Audio Source Quality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460</P> <P> Understanding Bitrate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461</P> <P> Checking Speaker Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463</P> <P>Dealing with Codecs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465</P> <P> Audio Codec Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467</P> <P> Audio Codec Fixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468</P> <P> Fix #1: Play It Elsewhere . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469</P> <P> Fix #2: Listen on Another Player . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469</P> <P> Fix #3: DVDs That Play No Audio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472</P> <P> Fix #4: Determining Which Codecs You Need. . . . . . . . . . . . . . . . . . . . . . 472</P> <P> Multiple Players = Multiple Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . 475</P> <P>Nothing Worked and I Am Going Bonkers . . . . . . . . . . . . . . . . . . . . . . . . . . . 477</P> <P> Check Your Vista Audio Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478</P> <P>Microphone Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479</P> <P> Check Your Hardware Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479</P> <P> Check the Setup and Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480</P> <P> Tweak the Advanced Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480</P> <P> Final Thoughts on Your Microphone. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482</P> <P><B>Chapter 15: Fix and Tweak Graphics and Video . . . . . . . . . . . .485</B></P> <P>Fix Your Pixels: Dealing with Display Issues . . . . . . . . . . . . . . . . . . . . . . . . . 486</P> <P>Aero? What Aero? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487</P> <P> Which Version of Vista? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 488</P> <P> Did Someone Turn Off Aero?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489</P> <P> You Are Deluded . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489</P> <P>My Colors Are Ugly and Chunky . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490</P> <P> How to Fix Color Depth. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491</P> <P>There’s No Room on My Screen! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493</P> <P>My LCD Is Blurry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495</P> <P> …And My Desktop Is Bigger Than the Screen . . . . . . . . . . . . . . . . . . . . . 496</P> <P> The Fix: Adjust the Resolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496</P> <P>Text on My Screen Is Too Small! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497</P> <P>My Screen Is Sluggish . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498</P> <P> Turn Off Transitions and Animations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498</P> <P> Lower the Bit Depth or Resolution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499</P> <P> Adjust Hardware Acceleration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499</P> <P>My Graphics Driver Needs an Update! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500</P> <P> Easy Video Driver Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500</P> <P> Driver Update That’s a Bit More Difficult . . . . . . . . . . . . . . . . . . . . . . . . . 501</P> <P> Installing Video Drivers from the Manufacturer’s Website . . . . . . . . . . . . . 501</P> <P>My Screen Won’t Display Anything! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504</P> <P> Tweaking Settings Bungled Your Video. . . . . . . . . . . . . . . . . . . . . . . . . . . 505</P> <P> New Video Driver Wreaking Havoc. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505</P> <P>My Video Won’t Play! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505</P> <P>Windows Media Player 11 Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . 507</P> <P>If Windows Media Player WiMP’s Out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509</P> <P> AVI Weirdness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510</P> <P>Get Your Codecs Here . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511</P> <P>I Can’t Play My DVDs!. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512</P> <P> Install a DVD Codec. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512</P> <P> Check the DVD for Damage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514</P> <P> Check Your DVD Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514</P> <P><B>Chapter 16: Gaming Optimization . . . . . . . . . . . . . 517</B></P> <P>Game Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518</P> <P>Vista, the Hardware Hog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518</P> <P>Sweet, Sweet DirectX 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520</P> <P> DX10 Games. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521</P> <P> DX10 Video Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521</P> <P> DX10 Sound Cards? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522</P> <P>Slumming It with DX9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522</P> <P>Basic Gaming System Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522</P> <P> Sloppy, Choppy Video . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522</P> <P> Perk Up Your System with Performance Fixes. . . . . . . . . . . . . . . . . . . . . . 523</P> <P>Crashes, Stutters, and General Weirdness . . . . . . . . . . . . . . . . . . . . . . . . . . 525</P> <P> Update Your Drivers, Dude . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525</P> <P> Rebuild the BIOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525</P> <P> Chipset Driver Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527</P> <P>Joyless Joysticks: How to Fix Your Controller . . . . . . . . . . . . . . . . . . . . . . . . 528</P> <P> Customize Your Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529</P> <P>My Older Games Won’t Run . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530</P> <P>Check for a Patch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531</P> <P>Problems with Legacy Game Sound. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533</P> <P>Thwarted by Parental Controls? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534</P> <P>Index. . . . . . . . . . . . . . . 537</P> <p>Look this: <strong><a href="http://business-life-careers.blogspot.com">Poverty Vulnerability and Agricultural Extension or The Most Typical Avant Garde</a></strong> <h4>Pro ADO.NET Data Services: Working with RESTful Data </h4> <p>Author: <strong>John Shaw</strong> <p><p><P><p>Pro ADO.NET Data Services: Working with RESTful Data is aimed at developers interested in taking advantage of the new REST–style data services that ADO.NET Data Services (formerly code–named Astoria) provides. The book shows how to incorporate ADO.NET Data Services into a wide range of common environments including BizTalk, MS Office, AJAX and Silverlight front ends, and WPF desktop applications. </p><p>The material is intended for professional developers who are comfortable with the .NET 3.5 Framework but are coming to ADO.NET Data Services for the first time and want to understand how to integrate it into their own applications and enterprise solutions. The book is packed with extensive real–world solutions and exercises, ensuring you walk away with a deep understanding of how to use ADO.NET Data Services to your best advantage.</p><h4>What you’ll learn</h4><p><li>Implement software solutions using ADO.NET Data Services within a variety of enterprise–level environments.</li><li>Integrate ADO.NET Data Services into enterprise applications such as SharePoint, BizTalk Server, and LOB systems like JDE.</li><li>Take advantage of ADO.NET Data Services in standard and AJAX/Silverlight–enabled ASP.NET applications, as well as traditional .NET applications.</li><li>Understand when to apply traditional SOAP programming methods vs. REST–style programming to achieve the best possible results.</li><li>Incorporate ADO.NET Data Services into the latest Microsoft technologies in the cleanest possible way. </li><p><br><h4>About the Apress Pro Series</h4><p>The Apress Pro series books are practical, professional tutorials to keep you on andmoving up the professional ladder.</p><p>You have gotten the job, now you need to hone your skills in these tough competitive times. The Apress Pro series expands your skills and expertise in exactly the areas you need. Master the content of a Pro book, and you will always be able to get the job done in a professional development project. Written by experts in their field, Pro series books from Apress give you the hard–won solutions to problems you will face in your professional programming career.</p> </p><br><br> Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-1374840706116044424.post-62034230640067302442009-02-04T02:11:00.000-08:002009-02-04T02:18:38.010-08:00Storage Networks Explained or Mainframe Basics for Security Professionals<h4>Storage Networks Explained: Basics and Application of Fibre Channel SAN, NAS, ISCSI and InfiniBand </h4> <p>Author: <strong>Rachael Waddington</strong> <p><p>“<i>Storage Networks Explained</i> has much to recommend it.<br> …a rarity in the literature of digital data storage – a complete exposition of both the base subject matter and its applications, which at the same time offers a level of readability making it suitable as an introduction to the subject. <i>Storage Networks Explained</i> is also flexible. It can be read cover-to-cover, browsed, or used as a reference. I recommend <i>Storage Networks Explained</i> as an essential component of any active information technology library.” <br> <blockquote dir="ltr"> <br> <br> <b>Paul Massiglia</b>, Technical Director, VERITAS Software Corporation<br> </blockquote> <br> <br> Storage networks will become a basic technology like databases or local area networks. According to market research, 700f external storage devices will be connected via storage networks in 2003. The authors have hands-on experience of network storage hardware and software, they teach customers about concrete network storage products, they understand the concepts behind storage networks, and show customers how storage networks address their business needs.  <br> <br> Storage networks provide shared access to stored data from multiple computers and servers, thus increasing storage efficiency  and availability. They permit information management functions such as backup and recovery, data mirroring, disaster recovery, and data migration to be performed quickly and efficiently, with a minimum of system overhead. <br> <br> This book explains how to use storage networks to fix malfunctioning business processes, covering the technologies as well as applications. A hot topic thatwill become increasingly important in the coming years.<br> <P><br> <br> •  One of the first books to focus on using rather than building storage networks, and how to solve problems.<br> <br> •  Looking beyond technology and showing the true benefits of storage networks.<br> <br> • Covers fibre channel SAN, Network Attached Storage, iSCSI and InfiniBand technologies.<br> <br> • Contains several case studies (e.g. the example of a travel portal, protecting a critical database)<br> <br> • Endorsed by the Storage Networking Industry Association.<br> <br> • Written by very experienced professionals who tailored the book specifically to meet customer needs including support with supplementry material on Troppens website and Preface written by Tony Clark.<br> <P> <br> <br> Provides basic application information key for systems administrators, database administrators and managers who need to know about the networking aspects of their systems. As well as systems architects, network managers, information management directors and decision makers.<br> This book also supports applications for graduate students and other relevant courses in the field. <br> <br> <b>Awarded Best System Administration Book 2005 by the <i>Linux Journal</i></b><br> </p><br><br> <p>Read also <strong><a href="http://women-health-book.blogspot.com/2009/02/laboratory-handbook-for-fractionation.html">Laboratory Handbook for the Fractionation of Natural Extracts or Physical Activity and Nutrition for Health</a></strong> <h4>Mainframe Basics for Security Professionals: Getting Started with RACF </h4> <p>Author: <strong>Ori Pomerantz</strong> <p><p>Leverage Your Security Expertise in IBM<SUP>®</SUP> System z™ Mainframe Environments <p>For over 40 years, the IBM mainframe has been the backbone of the world’s largest enterprises. If you’re coming to the IBM System z mainframe platform from UNIX<SUP>®</SUP>, Linux<SUP>®</SUP>, or Windows<SUP>®</SUP>, you need practical guidance on leveraging its unique security capabilities. Now, IBM experts have written the first authoritative book on mainframe security specifically designed to build on your experience in other environments. <p>Even if you’ve never logged onto a mainframe before, this book will teach you how to run today’s z/OS<SUP>®</SUP> operating system command line and ISPF toolset and use them to efficiently perform every significant security administration task. (Don’t have a mainframe available for practice? This book’s companion Web site contains step-by-step videos walking you through dozens of key techniques.) <p>The authors illuminate the mainframe’s security model and call special attention to z/OS security techniques that differ from UNIX, Linux, and Windows. They thoroughly introduce IBM’s powerful Resource Access Control Facility (RACF) security subsystem and demonstrate how mainframe security integrates into your enterprise-wide IT security infrastructure. If you’re an experienced system administrator or security professional, there’s no faster way to extend your expertise into “big iron” environments. <p>Coverage includes <UL> <LI>Mainframe basics: logging on, allocating and editing data sets, running JCL jobs, using UNIX System Services, and accessingdocumentation <LI>Creating, modifying, and deleting users and groups <LI>Protecting data sets, UNIX file system files, databases, transactions, and other resources <LI>Manipulating profiles and managing permissions <LI>Configuring the mainframe to log security events, filter them appropriately, and create usable reports <LI>Using auditing tools to capture static configuration data and dynamic events, identify weaknesses, and remedy them <LI>Creating limited-authority administrators: how, when, and why</UL> </p><br><br> <p><h5>Table of Contents:</h5>Foreword xv<br>Preface xvii<br>Acknowledgments xix<br>About the Authors xxi<br>Introduction to the Mainframe 1<br>Why Use a Mainframe? 1<br>A Little History 1<br>Why Are Mainframes Different? 2<br>Mainframe vs. Client/Server 3<br>Getting Started 4<br>What You Will Need 4<br>Logging in to the Mainframe 5<br>"Hello, World" from TSO 6<br>Job Control Language (JCL) 7<br>Introduction to JCL 8<br>Data Sets 9<br>Using ISPF to Create and Run Batch Jobs 10<br>JCL Syntax 15<br>Viewing the Job Output 16<br>z/OS UNIX System Services 19<br>Getting Help 22<br>Context-Sensitive Help 22<br>The Manuals 24<br>Additional Information 25<br>Users and Groups 27<br>Creating a User 27<br>How to Modify a User for OMVS Access 31<br>Modifying the User 31<br>Creating the OMVS Home Directory (and Modifying Users from TSO) 34<br>Verifying MYUSER Has OMVS Access 36<br>Groups 36<br>Searching Groups 36<br>Displaying a Group 38<br>Connecting Users to a Group 39<br>zSecure 42<br>Additional Information 43<br>Protecting Data Sets and Other Resources 45<br>Protecting Data Sets 45<br>Default Permissions 45<br>Access Control List Permissions 49<br>Project Groups and Generic Profiles 53<br>Other Resources 57<br>Gathering Information 57<br>Activating UNIXPRIV 59<br>Delegating chown Privileges 61<br>Verifying the Change 63<br>Deleting Resource Profiles 63<br>Security Data (Levels, Categories, and Labels) 64<br>Defining the Policy 64<br>Assigning Security Levels and Categories 65<br>Security Labels (SECLABELs) 66<br>Securing UNIX System Services (USS) Files 68<br>zSecure 70<br>Additional Information 71<br>Logging 73<br>Configuring Logging 73<br>SMF Configuration 74<br>RACF Configuration 80<br>Generating Reports 82<br>Unloading Log Data to Sequential Text Files 82<br>Understanding Sequential Reports 85<br>Generating Reports with ICETOOL 87<br>Other Types of Reports 91<br>UNIX System Services (USS) Logging 91<br>Classes for USS Logging 92<br>SMF Settings for USS 93<br>Specifying Logging in USS 93<br>Viewing the USS Log Records 95<br>Logging in zSecure 95<br>Additional Information 97<br>Auditing 99<br>Auditing 99<br>The RACF Data Security Monitor (DSMON) 100<br>Running DSMON 101<br>The System Report 102<br>The Program Properties Table Report 103<br>The RACF Authorized Caller Table (ICHAUTAB) Report 104<br>The RACF Exits Report 104<br>The Selected User Attribute Report 105<br>The Selected Data Sets Report 106<br>The Set RACF Options (SETROPTS) Command 108<br>The RACF Database Unload Utility (IRRDBU00) 110<br>Removing IDs with IRRRID00 111<br>The RACF Health Checks 114<br>RACF_SENSITIVE_RESOURCES 114<br>RACF_IBMUSER_REVOKED 117<br>RACF Classes Active Health Checks 117<br>zSecure Auditing 118<br>Additional Information 120<br>Limited-Authority RACF Administrators 121<br>Profiles Owned by Users 121<br>Group-Owned Profiles and Group Authorities 122<br>The group-AUDITOR Authority 124<br>The group-SPECIAL Authority 127<br>The group-OPERATIONS Authority 128<br>System-Level Authorities 128<br>Manipulating Users 129<br>Creating Users 129<br>Manipulating Users 131<br>Additional Information 133<br>Mainframes in the Enterprise-Wide Security Infrastructure 135<br>What Is an Enterprise? 136<br>Enterprise Components 137<br>Security across Enterprise Components 139<br>Communication Protocols 141<br>Enterprise Security Administration 144<br>Authentication and Authorization 145<br>Credential Propagation and Transformation 145<br>Communicating between Enterprises-and Beyond 148<br>Additional Information 149<br>Index 151 Unknownnoreply@blogger.com0