Sunday, February 22, 2009

An Introduction to Programming Using Interactive Data Language or Adobe Creative Suite 2 Classroom in a Book

An Introduction to Programming Using Interactive Data Language (IDL)

Author: Kenneth P Bowman

In today's information age, scientists and engineers must quickly and efficiently analyze extremely large sets of data. One of the best tools to accomplish this is Interactive Data Language (IDL ®), a programming and visualization environment that facilitates numerical modeling, data analysis, and image processing. IDL's high-level language and powerful graphics capabilities allow users to write more flexible programs much faster than is possible with other programming languages.

An Introduction to Programming with IDL enables students new to programming, as well as those with experience in other programming languages, to rapidly harness IDL's capabilities: fast, interactive performance; array syntax; dynamic data typing; and built-in graphics. Each concept is illustrated with sample code, including many complete short programs.

•Margin notes throughout the text quickly point readers to the relevant sections of IDL manuals

•End-of-chapter summaries and exercises help reinforce learning

•Students who purchase the book are eligible for a substantial discount on a student version of the IDL software

Table of Contents:
Ch. 1Introduction3
Ch. 2IDL manuals and books9
Ch. 3Interactive IDL13
Ch. 4IDL scripts (batch jobs)33
Ch. 5Integer constants and variables39
Ch. 6Floating-point constants and variables39
Ch. 7Using arrays59
Ch. 8Searching and sorting77
Ch. 9Structures83
Ch. 10Printing text93
Ch. 11Reading text101
Ch. 12Writing and reading binary files107
Ch. 13Reading NetCDF files115
Ch. 14Writing NetCDF files127
Ch. 15Procedures and functions137
Ch. 16Program control153
Ch. 17Line graphs161
Ch. 18Contour and surface plots171
Ch. 19Mapping181
Ch. 20Printing graphics193
Ch. 21Color and image display201
Ch. 22Animation219
Ch. 23Statistics and pseudorandom numbers227
Ch. 24Interpolation237
Ch. 25Fourier analysis247

Book about: Quantity Food Sanitation or Evaluating Beer

Adobe Creative Suite 2 Classroom in a Book

Author: Staff of Adobe Press

Adobe Creative Suite 2, Adobe's tightly integrated set of design tools, offers enough goodies to make any graphic designer swoon. Since the Premium edition of this software collection includes Photoshop CS2, Illustrator CS 2, InDesign CS2, GoLive CS2, and Acrobat 7.0 Professional–as well as a handful of other shiny new tools–users will find everything they need to create beautiful content for print, the Web, and mobile devices. Here to make sure you master it quickly and completely is a self-paced guide from Adobe's Creative Team--the folks behind the software. With the Classroom in a Book series, you learn by immersion. Step-by-step, project-based lessons walk you through sample real-life projects, while review questions at the end of each chapter reinforce the new skills you've learned. The companion CD, filled with lesson and media files, will have you working on print, Web and PDF projects in no time. Whether you're a graphic design novice, student, graphic designer, educator, or are just new to the Adobe Creative Suite, this book will give you a solid overview of Adobe's creative design software.

Saturday, February 21, 2009

E Commerce For Dummies or Alternative Digital Photography

E-Commerce For Dummies

Author: Don Jones

"The easy days of being an online merchant are gone!" - IDC in IT Industry Update, 2001
This is the one book that demystifies the world of e-commerce so that you can keep yourself, your business, and your career on the cutting edge.

The ability to do business online is creating another industrial revolution. But e-commerce is tough to understand and even harder to do well, as recent dot-com shakeouts show. E-Commerce For Dummies is THE title that helps break down the world of e-commerce into understandable and manageable terms and concepts. It covers all aspects of both B2B and B2C in a clear, no-nonsense way that cuts through the hype about this quickly evolving and vitally important topic. The book combines valuable business strategies with insight into the technology that makes e-commerce possible, and includes real-life case studies so you can find out what to do-and what not to do-when charting your e-commerce strategies.

Go to: Out of the Shadows or Feng Shui Principles for Building and Remodeling

Alternative Digital Photography

Author: John G Blair

Alternative Digital Photography will lead you through a detailed exploration of alternative techniques in digital photography. Whether you are an amateur photographer, a beginning professional, or an advanced professional looking to add more creativity to your photography, this book will help you develop the skills you need to create unusual, creative, and artistic images using digital photography. It includes hands-on lessons designed to help you quickly develop new and creative ways of viewing the world around you. It is filled with example photographs, outlining the steps taken to achieve each image. It emphasizes simple, creative, and inexpensive suggestions that anyone can use--no need for a professional studio or a large financial investment. The book does also include coverage of advanced techniques as well as expensive tools that allow you to continue using the book as your experience grows.

Daniel Lombardo - Library Journal

The digital photography revolution has freed us from the expense of film and the bother of learning the mechanics of aperture, focus, and light settings. Some argue that the cost may be the loss of the edgy creativity that can be achieved with the classic SLR film camera. Both Blair and Cartwright bring us books that inspire the experimental use of images, before and after they leave the digital camera. Blair (The Glossary of Digital Photography) uses the seemingly endless manipulations of Photoshop to create images that are in styles he calls photoimpressionism, neomysticism, and neosymbolism. He defocuses his camera, uses digital infrared, and even experiments with digital toy cameras.

Accomplished actress and artist Cartwright takes digital images, photos on film, and Polaroids and manipulates them with an array of traditional art materials and techniques. She adds color with acrylic paints, oil sticks, watercolors, dry pigments, and inks. For texture she uses embossing powders, gessoes, pastes, and wax, and for special effects she experiments by printing photos on unusual substratum, by imprinting, and by using tissue and fabric. Both books accomplish their goal admirably, and both are highly recommended.

Table of Contents:
Chapter 1 - Creating Black and White from Color
Chapter 2 - Creating Sepia from Black and White or Color
Chapter 3 - Hand colored Black and White
Chapter 4 - Hand colored Sepia
Chapter 5 - Abstract
Chapter 6 - Pleinart
Chapter 7 - Mosaic
Chapter 8 - Fresco
Chapter 9 - Photoimpressionism
Chapter 10 - Romantic Miniatures
Chapter 11 - Digital Pinhole
Chapter 12 - Digital Infrared

Friday, February 20, 2009

Geekonomics or Murachs Visual Basic 2005

Geekonomics: The Real Cost of Insecure Software

Author: David Ric

“The clarity of David’s argument and the strength of his conviction are truly inspiring. If you don’t believe the world of software affects the world in which you live, you owe it to yourself to read this book.”
–Lenny Zeltzer, SANS Institute faculty member and the New York Security Consulting Manager at Savvis, Inc.


Geekonomics stays with you long after you finish reading the book. You will reconsider every assumption you have had about software costs and benefits.”
–Slava Frid, Gemini Systems, CTO, Resilience Technology Solutions


“Information Security is an issue that concerns governments, companies and, increasingly, citizens. Are the computer systems and software to which we entrust our sensitive and critical information, technologies that are out of control? David Rice has written an important and welcome book that goes to the heart of this issue, and points to solutions that society as a whole needs to debate and embrace.”
–Nick Bleech, IT Security Director, Rolls-Royce


“If you are dependent upon software (and of course, all of us in the modern world are) this book is a fabulous discussion of how and why we should worry.”
–Becky Bace


The Real Cost of Insecure Software

•   In 1996, software defects in a Boeing 757 caused a crash that killed 70 people…

•   In 2003, a software vulnerability helped cause the largest U.S. power outage in decades…

•   In 2004, known softwareweaknesses let a hacker invade T-Mobile, capturing everything from passwords to Paris Hilton’s photos…

•   In 2005, 23,900 Toyota Priuses were recalled for software errors that could cause the cars to shut down at highway speeds…

•   In 2006 dubbed “The Year of Cybercrime,” 7,000 software vulnerabilities were discovered that hackers could use to access private information…

•   In 2007, operatives in two nations brazenly exploited software vulnerabilities to cripple the infrastructure and steal trade secrets from other sovereign nations…

Software has become crucial to the very survival of civilization. But badly written, insecure software is hurting people–and costing businesses and individuals billions of dollars every year. This must change. In Geekonomics, David Rice shows how we can change it.


Rice reveals why the software industry is rewarded for carelessness, and how we can revamp the industry’s incentives to get the reliability and security we desperately need and deserve. You’ll discover why the software industry still has shockingly little accountability–and what we must do to fix that.

Brilliantly written, utterly compelling, and thoroughly realistic, Geekonomics is a long-overdue call to arms. Whether you’re software user, decision maker, employee, or business owner this book will change your life…or even save it.


The Alarming Cost of Insecure, Badly Written Software...

and How to Finally Fix the Problem, Once and for All!


Six billion crash test dummies: why you’re at greater risk than you ever imagined.

You pay the price: why consumers are legally and financially responsible for the mistakes of software manufacturers.

Broken windows: how software promotes epidemic cyber crime and threatens national security.

Who runs the show?: Why software manufacturers fought against the U.S. Food and Drug Administration’s attempts to protect the U.S. blood supply.

Protecting national infrastructure: real incentives for transforming software manufacturing.

Surviving the information superhighway: practical, must-read advice in a world of insecure code.


Preface xiii

Acknowledgments xix

About the Author xx


Chapter 1: The Foundation of Civilization 1

Chapter 2: Six Billion Crash Test Dummies: Irrational Innovation and Perverse Incentives 19

Chapter 3: The Power of Weaknesses: Broken Windows and National Security 73

Chapter 4: Myopic Oversight: Blinded by Speed, Baffled by Churn 131

Chapter 5: Absolute Immunity: You Couldn’t Sue Us Even If You Wanted To 179

Chapter 6: Open Source Software: Free, But at What Cost? 243

Chapter 7: Moving Forward: Rational Incentives for a Different Future 273


Epilogue 321

Notes 325

Index 341



Book about: Fearless Caregiver or My Child Has Cancer

Murach's Visual BASIC, 2005

Author: Anne Boehm

Visual Basic 2005 is designed for productivity...and so is this new addition to Murach’s bestselling VB series. It moves at a professional pace to teach you how to develop Windows Forms applications using all the time-saving new features in Visual Basic 2005 and Visual Studio 2005.

That means you’ll learn how to:
create database applications using the new data sources feature and new data controls that are now layered on top of ADO.NET (database processing is the function that’s changed most dramatically in this release of Visual Basic) use new object-oriented features like generics, My objects, partial classes, and class diagrams that save you time on everyday functions take advantage of new Visual Studio features like code snippets, Auto Correction, and ClickOnce deployment that simplify the tasks of creating, testing, debugging, and deploying applications But if you’re new to VB.NET, you’ll also gain the core skills that haven’t changed. So you’ll learn how to validate data...handle numeric, date, and string repetitive processing using arrays and collections...handle exceptions in a structured with text, binary, and XML files...access data with ADO.NET...and make practical use of OOP features like inheritance and interfaces. What’s more, these classic skills are seamlessly integrated with what’s new, just as you’ll mix new and unchanged features in your own applications.

Thursday, February 19, 2009

Flash CS3 Professional Advanced for Windows and Macintosh or Transcending CSS

Flash CS3 Professional Advanced for Windows and Macintosh: Visual QuickPro Guide

Author: Russell Chun

Adobe Flash CS3 is the leading software for Web designers creating dynamic Web sites. Adobe Flash CS3 Professional Advanced for Windows and Macintosh: Visual QuickPro Guide offers the most efficient way for smart, creative, busy professionals to learn Flash. Updated to include the important new features in Flash CS3, this book covers the latest ActionScript standards that make Flash CS3 so powerful, and details the expanded support for rich media. This handy guide combines a visual approach with straightforward, step-by-step instructions and screenshots, concise explanations of animation techniques, and task-based learning. Taking the highly accessible instructional format of the popularVisual QuickStart Guides to a more advanced level, the book guides readers through all the intricacies and new features of this top-selling Web multimedia application.

Table of Contents:
Introduction     ix
Approaching Advanced Animation     1
Building Complexity     3
Motion Tweening Strategies     4
Shape Tweening Strategies     16
Creating Special Effects     21
Animated and Complex Masks     26
Working with Video     37
Embedding Video into Flash     38
Progressive Download Video into Flash     47
Rotoscoping     53
Interactivity     55
Getting a Handle on ActionScript     57
What Is ActionScript 3.0?     58
About Objects and Classes     59
About Methods and Properties     60
Writing with Dot Syntax     61
More on Punctuation     63
The Actions Panel     64
Editing ActionScript     73
Using Objects     76
About Functions     85
Using Comments     89
Advanced Buttons and Event Handling     91
Listening for Events     92
Mouse Detection     94
The SimpleButton Class     98
Invisible Buttons     102
Animated Buttons and the Movie Clip Symbol     104
Complex Buttons     107
Button-Tracking Options     111
Changing Button Behavior     114
Creating Buttons Dynamically     117
Keyboard Detection     119
The Contextual Menu     122
Creating Continuous Actions     128
A Summary of Events     132
Controlling Multiple Timelines     133
Navigating Timelines with Movie Clips     134
Target Paths     135
Absolute and Relative Paths     139
Using the with Action to Target Objects     141
Movie Clips as Containers     143
Using Frame Labels     147
Managing Outside Communication     151
Communicating through the Web Browser     152
Loading External Flash Movies     168
Controlling Loaded Flash Movies     173
Loading External Images     178
Communicating with External Video     181
Using Projectors and the fscommand Action     188
Communicating with the Printer     191
Detecting Download Progress: Preloaders     200
Transforming Graphics and Sound     209
Controlling & Displaying Graphics     211
Understanding the Display List      212
Changing Graphic Properties     213
Controlling Scaling and Distortion     220
Modifying the Color     224
Blending Colors     230
Applying Special Effects with Filters     233
Creating Drag-and-Drop Interactivity     236
Detecting Collisions     240
Generating Graphics Dynamically     243
Controlling Stacking Order     246
Creating Vector Shapes Dynamically     249
Using Dynamic Masks     266
Customizing Your Pointer     272
Putting It Together: Animating Graphics with ActionScript     274
About Bitmap Images     279
Creating and Accessing Bitmap Data     280
Manipulating Bitmap Images     286
Using Filters on Bitmap Images     296
Putting It Together: Animating Bitmap Images     299
Controlling Sound     303
Using Sounds     304
Playing Sounds from the Library     305
Loading and Playing External Sounds     307
Controlling Sound Playback     309
Modifying Volume and Balance     313
Detecting Sound Events     318
Working with MP3 Song Information     320
Visualizing Sound Data     323
Putting It Together: Dynamic Sound Controls     326
Working with Information     331
Controlling Information Flow     333
Using Variables and Expressions     334
Loading External Variables     338
Storing and Sharing Information     347
Modifying Variables     353
Concatenating Variables and Dynamic Referencing     355
Testing Information with Conditional Statements     357
Providing Alternatives to Conditions     362
Branching Conditional Statements     364
Combining Conditions with Logical Operators     368
Looping Statements     370
Controlling Text     375
Input Text     376
Dynamic Text     378
Selecting Text Field Options     380
Displaying HTML     383
TextField Properties     388
Generating Text Fields Dynamically     398
Modifying Text in Text Fields     400
Formatting Text Fields from an External Style Sheet     410
Detecting the Focus of Text Fields     414
Controlling the Focus and Selection within Text Fields     417
Analyzing Text     419
Modifying Text      429
Manipulating Information     433
Making Calculations with the Math Class     434
Calculating Angles     435
Creating Directional Movement     444
Calculating Distances     448
Generating Random Numbers     450
Ordering Information with Arrays     451
Keeping Track of Objects with Arrays     458
Using the Date and Time     463
Managing Content and Troubleshooting     471
Sharing Library Symbols     472
Sharing Fonts     479
Including External ActionScript     482
Using the Movie Explorer     485
Tracing Variables in the Output Panel     489
Determining a Variable's Data Type     491
Optimizing Your Movie     492
Avoiding Common Mistakes     496
Keyboard Key Codes     497
Index     499

Read also Just Cook It or Nana Lenas Kitchen

Transcending CSS: The Fine Art of Web Design

Author: Andy Clark

As the Web evolves to incorporate new standards and the latest browsers offer new possibilities for creative design, the art of creating Web sites is also changing. Few Web designers are experienced programmers, and as a result, working with semantic markup and CSS 
can create roadblocks to achieving truly beautiful designs using all the resources available. Add to this the pressures of presenting
exceptional design to clients and employers, without compromising efficient workflow, and the challenge deepens for those working 
in a fast-paced environment. As someone who understands these complexities firsthand, author and designer Andy Clarke offers visual 
designe s a progressive approach to creating artistic, usable, and accessible sites using transcendent CSS.

In this groundbreaking book, you’ll discover how to implementhighly original designs through visual demonstrations of the creative 
possibilities using markup and CSS. You’ll learn to use a new design workflow, build prototypes that work well for designers and all team 
members, use grids effectively, visualize markup, and discover every phase of the transcendent design process, from working with the 
latest browsers to incorporating CSS3 to collaborating with team members effectively, and much more. 

Written and edited by Web design and CSS luminaries Andy Clarke and Molly E. Holzschlag, Transcending CSS: The Fine Art of Web Design
• Uses a visual approach to help you learn coding techniques 
• Includes numerous examples of world-class Web sites, photography, and other inspirations that give designers ideas for visualizing their code
• Offers early previews of technical advances in new Web browsers and of the emerging CSS3 specification

Tuesday, February 17, 2009

Autonomous Systems And Intelligent Agents In Power System Control And Operation or Digital Capital

Autonomous Systems And Intelligent Agents In Power System Control And Operation

Author: C Rehtanz

Autonomous systems are one of the most important trends for the next generation of control systems. This book is the first to transfer autonomous systems concepts and intelligent agents theory into the control and operation environment of power systems. The focus of this book is to design a future control system architecture for electrical power systems, which copes with the changed requirements concerning complexity and flexibility and includes several applications for power systems. This book draws the whole circle from the theoretical and IT-concept of autonomous systems for power system control over the required knowledge-based methods and their capabilities to concrete applications within this field.

New interesting textbook: Real World Compositing with Adobe Photoshop CS4 or HTML

Digital Capital: Harnessing the Power of Business Webs

Author: Don Tapscott

When Transmeta unveiled its remarkable new microprocessors earlier this year, the company's founder, David Ditzel, told the media: "The Internet changes everything. In the future you will no more want to leave your home without your Internet connection than you do without your cell phone today."

The Transmeta chips are designed from scratch to facilitate wireless Internet access from Web appliances and ultra-light laptops. Scores of other corporations are scrambling to come up with similar devices.

In Japan, the revolutionary "i-mode" mobile phone is soaring in popularity. These svelte phones are constantly connected to the Internet. You don't have to 'logon' to the Web as you do in North America. The display screen is the size of a business card. More than 350 companies have built a vast array of Web sites for the gadget. Users can receive email, chat, buy and sell securities, download video and music, swap photos, read train schedules, look up their horoscopes, check movie listings, and on and on. The Japanese are hooked.

This constant connectivity to the Net will profoundly effect how we go about our lives. At the early stages we will download straightforward content like music, newspaper clipping and ebooks.

Soon wireless devices that pinpoint your location will be able to answer any questions on services and amenities in the neighbourhood. As you drive through a neighbourhood that you would like to move to, you will be alerted to any houses for sale with the right number of bedrooms and bathrooms. Naturally the device will tell you how to get to each house.

These gadgets will be our constant companions and co-pilots as we go about our work and play. Their ability to extract useful information from the blizzard of digital data will be key. We will insist these devices intimately understand our needs and wants.

As we explore in Digital Capital: Harnessing the Power of Business Webs, corporations are reinventing their business models around the ubiquitous, deep, rich and increasingly functional Internet. Large and diverse sets of people scattered around the world can now, easily and cheaply, gain near real-time access to the information they need to make safe decisions and coordinate complex activities.

Different companies can add knowledge value to a product or service - through innovation, enhancement, cost reduction, or customization - at each step in its lifecycle. Often, specialists do a better value-adding job than vertically integrated firms. In the digital economy, the notion of a separate, electronically negotiated deal at each step of the value cycle becomes a reasonable, often compelling, proposition.

Successful corporations are now distinguished by their ability to identify and accumulate digital capital. They use the Net to blend their intellectual acumen with other companies and leverage the combined insight. They use the Web to develop much deeper relationships with their customers. And they jettison the business models of the industrial age to reinvent their corporations for success in the digital economy.

To repeat: The Internet changes everything. Digital Capital shows how.

Publishers Weekly

Building on concepts that have been around for more than a decade, the authors argue convincingly that the age of the trillion-dollar enterprise, where two or more companies come together to complete one project, and then go their separate ways, competing against one another for the next, may finally be at hand. Managers who are grappling with ways to expand rapidly with limited resources--a description that fits just about every manager--are bound to be intrigued by the argument that Tapscott (The Digital Economy), Ticoll and Lowy--partners at the Alliance for Converging Technologies consulting firm--put forth. As they see it, the Internet eliminates almost all of the transaction problems that have plagued alliances up until now. Alliance partners no longer have to be in the same location, since the Web makes communication instantaneous, which in turn makes managing enterprises easier. Continuous market feedback is possible, since customers can be plugged into the network, along with suppliers and subcontractors. That's intriguing enough, but the authors go further and outline how five possible types of alliances, or "business webs," can be tailored to suit virtually any company. While the authors give relatively short shrift to the "how to" component of constructing these webs and they don't spend as much time as they might on exactly where employees fit into them, those shortcomings don't distract too much from their otherwise trenchant and absorbing presentation. While the future may evolve differently than the authors envision it, they have provided a workable interim blueprint for getting from here to there. (July) Copyright 2000 Cahners Business Information.|

The Standard

Digital Capital, the new book coauthored by Web guru Don Tapscott, functions much like a classic economics primer: It takes a fascinating topic and drains the excitement from it.

Business webs, or b-webs, the authors argue, have emerged as a powerful and profound new form of economic organization. "If the corporation embodied capital in the industrial age, then the b-web does the same for the digital economy," they write.

Tapscott and crew essentially posit b-webs as ubercorporations - amalgams of businesses that join up to reduce transaction costs and inefficiencies. "The b-web is emerging as the generic, universal platform for creating value and wealth," they assure.

There's nothing egregiously wrong with this thoughtful and authoritative book. In fact, the authors provide solid analysis of the new shape of competition. But they do so with such earnestness and heavy-handedness that the book sags.

For example, the authors provide a "b-web taxonomy" with dense descriptions of what they classify as agoras, aggregations, value chains, alliances and distributive networks. They then address how such organizations affect human capital and what they call relationship capital (otherwise known as marketing). The book closes with prescriptions for how to build and profit from b-webs.

Such talk comes across as a complicated and static lecture from gurus with ideas to sell. The turgid vocabulary and tech-heavy content make for intellectual speed bumps to anyone seeking a quick read. And the nature of the book is a mismatch with the environment it describes: The dynamic, fast-moving world of rapidly emerging business models and innovative online companies can't be captured by such an academic and ponderous take.

Moreover, the book's basic premise - the rise of b-webs - assumes that these nascent environments will actually take shape. The largest and most ambitious b-webs, such as AutoExchange, or those in the aerospace or health care industries, have yet to have a meaningful impact on the economy. Like the early venture investments in IT or biotechnology, much of these businesses' value lies in an increasingly uncertain future.

The book's argument rests heavily on the example of as a thriving b-web that has "shaken the foundations of an entire industry." While arguably true, isn't the success story it used to be after the recording industry's successful court ruling against it, which hammered the company's stock and revealed flaws in this new business' structure. Likewise, the authors use the rise of another threatened company - Webvan - as an example of a successful aggregation form of b-web.

Ultimately, this book delivers insight into a profound new economic form, but it's not the final word. Livelier and more relevant reading on Net economics is the 1998 book Information Rules. Hal Varian and Carl Shapiro's primer lends historical context to the economic rules that govern the new economy, as well as gives crisp managerial guidelines for this changed world. Tapscott's book is too self-important and rooted in yesterday's examples to deliver more lasting benefits.

Tom Ehrenfeld writes the Just Managing column for

Internet Book Watch

Ebay, Schwab and others have created revolutionary offerings which have stolen customers from more traditional venues, working with transaction partners which enabled them to move quickly in the changing Internet environment. Digital Capital describes and explains the emerging business web phenomenon and its influences, using key players and detailed information to expose the untold stories behind big successes and offering a strategy for competitive action. Essential for any who would conduct or build a web business.

Business Week - Kirsanov

...the book's research is extensive, and it's surprisingly saavy about technology...if you are trying to understand why some companies are flourishing and others are struggling under old-fashioned business models, Digital Capital is pure enlightenment.

What People Are Saying

Warren Bennis
Digital Capital is unarguably the single best guide to corporate survival in the new economy. If your company wants to be in the phone book in the year 2003 and beyond, read this book.
—Warren Bennis, University Professor and Distinguished Professor of Business Administration, University of Southern California, and Coauthor, Organizing Genius and Co-Leaders

Robert Eaton
The seminal book on business webs and how they can help move your business units into the new, new economy. Every business leader should read this book!
—Robert Eaton, Chairman, DaimlerChrysler

John Chambers
The Internet revolution waits for no one-no country, no company, and no individual. The key to success in this revolution is harnessing the power of the Internet to gain sustainable competitive advantage and to create value for your customers. Tapscott, Ticoll, and Lowy show you how to do this by defining the business model for your company's survival in today's economy. Read this book to stay ahead.
—John Chambers, President and CEO, Cisco Systems

Larry Downes
Exciting and compelling, Digital Capital concisely captures important new thinking on Internet business models and how to apply them today.
—Larry Downes, Coauthor, Unleashing the Killer App

Noel Tichy
Digital Capital is the guidebook for any business leader who wants to win in the e-business world. Well written and provocative, this book provides us with the first practical navigation system for what the authors coin as 'b-webs'-the new platform for winning in the twenty-first century.
—Noel Tichy, Professor, University of Michigan, and Coauthor, The Leadership Engine and Every Business Is a Growth Business

Jeff Papows
Simply a must-read. Digital Capital provides real out-of-the-box insights, and, even more, excites and captivates you.
—Jeff Papows, Author,

William T. Esrey
With a surgeon's precision, Tapscott, Ticoll, and Lowy define and explore new business models and opportunities coming to light in the emerging virtual 'agora.' Digital Capital is the guide to the new world of Internet work.
—William T. Esrey, Chairman and CEO, Sprint Corporation

Michael S. Dell
Digital Capital is an insightful guide to the rules of engagement in the new economy. Its explanation of collaborative business webs-the emerging market models for value creation-should be required reading for anyone who wants to reach the digital customer.
—Michael S. Dell, Chairman and CEO, Dell Computer Corporation

J. Bruce Harreld
By far, the best work on the new business models required to compete in e-business. Pray that your competitors don't read it!
—J. Bruce Harreld, Senior Vice President of Strategy, IBM

Mark Hogan
We created eGM to transform General Motors into a major force in the digital economy. Don Tapscott and the Alliance for Converging Technologies team have greatly influenced out business design and are helping us to chart the future. Digital Capital does a great job of putting the task at hand in clear focus.
—Mark Hogan, President, eGM

Kim Polese
Tired of all the hype and clichйs about e-business? Still don't know how to compete in a dot-com world? You just found your secret weapon. Tapscott, Ticoll, and Lowy cut to the core of what really matters-how to use the Internet for creating powerful business partnerships. You can't find a better guide to winning in the new digital economy.
—Kim Polese, President, Chief Executive Officer, and Cofounder, Marimba, Inc.

Durk Jager
One of the most important challenges facing today's executives is the need to disaggregate and reaggregate their firms to harness the power of business webs. Digital Capital presents an actionable blueprint for meeting this challenge. If you have any responsibility for the future of your business, read this book.
—Durk Jager, Chairman and CEO, Procter & Gamble

Table of Contents:

Monday, February 16, 2009

Open Source for the Enterprise or Managing Industrial Knowledge

Open Source for the Enterprise

Author: Dan Woods

Open source software is changing the world of information technology. But making it work for your company is far more complicated than simply installing a copy of Linux. If you are serious about using open source to cut costs, accelerate development, and reduce vendor lock-in, you must institutionalize skills and create new ways of working. You must understand how open source is different from commercial software and what responsibilities and risks it brings. Open Source for the Enterprise is a thoughtful guide to putting open source to work in the modern IT department.

Open source software is software whose code is freely available to anyone who wants to change and redistribute it. New commercial support services, smaller licensing fees, increased collaboration, and a friendlier platform to sell products and services are just a few of the reasons open source is so attractive to IT departments. Some of the open source projects that are in current, widespread use in businesses large and small include Linux, FreeBSD, Apache, MySQL, PostgreSQL, JBoss, and Perl. Open source has entered a new area where it is being used as a marketing device, a collaborative software development methodology, and a business model.

This book provides something far more valuable than either the cheerleading or the fear-mongering one often hears about open source. The authors are Dan Woods, former CTO of and a consultant and author of several books about IT, and Gautam Guliani, Director of Software Architecture at Kaplan Test Prep & Admissions. Each author has used open source software for some 15 years at IT departments large and small. They have collected the wisdom of a host of experts from IT departments, open source communities, and software companies. Open Source for the Enterprise provides a top to bottom view not only of open source technology, but of the skills required to manage it and the organizational issues that must be addressed.

Table of Contents:
1The nature of open source1
2Measuring the maturity of open source29
3The open source skill set45
4Making the ROI case67
5Designing an open source strategy79
6Support models for open source95
7Making open source projects easy to adopt105
8A comparison of open source licenses117
9Open source under attack127
10Open source empowerment137
AThe open source platform147
BEnd-user computing on the desktop151
COpen source and email159
DGroupware, portals, and collaboration175
EWeb publishing and content management189
FApplication development203

Go to: Meaningful Scents Around the World or The Diabetic Traveler

Managing Industrial Knowledge: Creation, Transfer and Utilization

Author: David J Teec

Managing Industrial Knowledge illuminates the complex processes at work in the creation and successful transfer of corporate knowledge. It is now generally recognized that the competitive advantages of firms depends on their ability to build, utilize and protect knowledge assets. In this volume many of the foremost international authors and pioneers of the study of knowledge in firms present their latest work and insights into organizational knowledge and innovation.

In a world where markets, products, technologies, competitors, regulations, and even societies change rapidly, continuous innovation and the knowledge that produces innovation have become key. The chapters in this keynote volume shed new light on the contextual factors in knowledge creation, the links between knowledge and innovation in all aspects of business life and the processes by which these may be fostered or lost in organizations.

Friday, February 13, 2009

GNU Autoconf Automake and Libtool or Mistake Proofing for Operators

GNU Autoconf, Automake and Libtool

Author: Vaughan

If you are a developer and are looking to participate in the Open Source development growth area you will need to learn new Open Source tools. GNU autoconf, GNU automake and GNU libtool are key tools for Open Source application development. These tools are not easy to learn, so some of the leading authorities on these tools have agreed to work together on this book to teach developers how to boost their productivity and the portability of their application. This book place New Riders/MTP at the center of the Open Source development community. Autoconf, Automake and Libtool is an efficient discourse on the use of autoconf, automake and libtool aimed at reducing the steep learning curve normally associated with these tools. This is a study guide to the interactions between the tools, and how best to get them to cooperate. If you are a developer and have no GNU build environment expertise, this book will help you develop these tools completely and confidently.

Table of Contents:
2How to Run Configure, and The Most Useful Standard Makefile Targets7
3Introducing 'Makefile's17
4Using GNU Autotools to Manage a "Minimal Project"21
5Writing a Protable ''29
6Introducing GNU Automake37
7A Small GNU Autotools Project47
9Introducing GNU Libtool83
10Using GNU Libtool with '' and ''107
11A Large GNU Autotools Project133
12Rolling Distribution Tarballs149
13Installing and Uninstalling Configured Packages155
14Writing Portable C with GNU Autotools163
15Writing Portable C++ with GNU Autotools177
16Dynamic Loading195
17Using GNU libltdl205
18Advanced GNU Automake Usage229
19A Complex GNU Autotools Project233
20GNU M4251
21Writing Portable Bourne Shell267
22Writing New Macros for Autoconf283
23Migrating an Existing Package to GNU Autotools293
24Using Autotools with Cygnus' Cygwin301
25Cross-Compilation with GNU Autotools329
AInstalling GNU Autotools339
CGenerated File Dependencies349
DAutoconf Macro Reference355
EOpen Publication License365

Books about: Para Personas Con Reparos or Herbs Spices and Flavorings

Mistake-Proofing for Operators: The ZQC System

Author: Shigeo Shingo

The Zero Quality Control System (ZQC) is a mistake-proofing approach that prevents defects by monitoring processing conditions at the source and correcting errors that cause defects. Since it is human nature to make mistakes, ZQC does not blame people for errors, but instead finds ways to keep errors from becoming defects. In this breakthrough approach, mistake-proofing devices called poka-yoke are used to check and give feedback about each product or operation in the process, not just a sample. This book introduces operators and assembly workers to the basic methodology of ZQC in an easy-to-read format that covers all aspects of this important manufacturing improvement strategy.

Mistake-Proofing for Operators includes the instructional features that are the signature of the Shopfloor Series. In this series Productivity Press has taken the lead in adult education by teaming with instructional designers to develop complete programs for frontline learning. The goal: to place powerful and proven improvement tools such as ZQC and mistake-proofing in the hands of your company's entire workforce.

It includes:

  • A universal reading level.
  • Margin icons that highlight key learning points.
  • Real-life examples to reinforce new ideas.
  • Reflection questions throughout that help readers apply the concepts.
  • Drawings, illustrations, and photographs.

Winner of the 1990 Shingo Prize for Excellence in Manufacturing,Mistake-Proofing for Operators is based on by Shigeo Shingo

Thursday, February 12, 2009

Survey of Operating Systems or Caught in the Net

Survey of Operating Systems

Author: Charles Holcomb

This textbook offers a survey of all the major microcomputer operating systems through real-world case studies, annotated illustrations, and step-by-step tutorials and projects. It is designed for IT students who want to learn how to install, configure, and troubleshoot operating systems. This book will teach the basic functions of an operating system, such as the graphical user interface, memory management, device management, and file management. It also explains how to install, configure, and troubleshoot each of the major microcomputer operating systems, including DOS, Windows, Macintosh, UNIX, and, Linux, as well as explain the purpose of operating systems in different hardware environments, such as microcomputers and networks.

Table of Contents:
Foreword from Mike Meyers
Ch. 1Introduction to Operating Systems1
Ch. 2DOS39
Ch. 3The Windows Desktop87
Ch. 4Windows NT 4.0 Workstation125
Ch. 5Windows 98179
Ch. 6Windows 2000 Professional231
Ch. 7Windows XP Professional287
Ch. 8Macintosh OS 9 and OS X327
Ch. 9Linux369

New interesting book: Chasing Life or Fitness in American Culture

Caught in the Net: How to Recognize the Signs of Internet Addiction - And a Winning Strategy for Recovery

Author: Kimberly S Young

"I don't even help [my children] with their homework in the evening because I'm in the chat rooms, and I don't help put them to bed because I don't realize how late it is. I also don't help them get ready for school in the morning like I used to do because I'm checking my e-mail. And I just can't stop myself."-Raymond, an Internet addict.

Internet addiction is real. Like alcoholism, drug addiction, or compulsive gambling, it has devastating effects on the lives of addicts and their families: divorce, job loss, falling productivity at work, failure in school, and, in extreme cases, criminal behavior. The problem has already reached epidemic proportions in the United States, and the number of "netaholics" continues to grow rapidly as more households and businesses go on-line. Yet, until now, no one from the mental health community has come forward with a specific description of Internet addiction and its effects or a strategy for treatment and recovery.

In Caught in the Net, Kimberly Young shares the results of her three-year study of Internet abuse. Often using the words of the Internet addicts themselves, she presents the stories of dozens of lives that were shattered by an overwhelming compulsion to surf the Net, play MUD games, or chat with distant and invisible neighbors in the timeless limbo of cyberspace.

Why is the Internet so seductive? What are the warning signs of Internet addiction? Is recovery possible? Dr. Young answers these questions and many more. She provides a questionnaire to help Net users determine whether they are addicts, and offers concrete steps to help problem users regulate Internet usage and devise a more balanced place for it intheir daily lives.

For Internet addicts as well as their parents, spouses, friends, and employers, Caught in the Net offers guidance on where and how to seek help from counselors, therapists, and other professionals who take this affliction seriously. For mental health professionals, this book provides insights into the nature and causes of Internet addiction and encourages counselors and therapists to expand their addiction recovery programs to address the specific problems of Internet addicts.

"Think that computer addiction is a joke? Think again. This groundbreaking book is the first to explore on-line addiction in a serious way and to consider the effects on individuals and their families. Caught in the Net is an important book for anyone who spends mornings and evenings connected to the Net."-Clifford Stoll, author of The Cuckoo's Egg and Silicon Snake Oil.

"An excellent account of the dangers of the burgeoning Internet industry. Dr. Young carefully outlines the traps into which people can fall and offers pragmatic self-help suggestions. Caught in the Net is valuable for both consumers and the professionals who deal with them."-Maressa Hecht Orzack, PhD, Founder and Coordinator, Computer Addiction Services, McLean Hospital Lecturer, Harvard University Medical School

"I don't mean to spend all my time this way, but I can't stop. It's the only place my opinion matters and I feel important."-bobage38.automechanic.internet.addict

"I feel guilty about it, but when I tried to break free, I simply didn't have the strength....I'm a long-time smoker, but I've found the craving to go on the Internet first thing every morning is stronger than my urge to light a cigarette."-marylouage40.motheroffour.internet.addict

"When you're talking about the Internet, you're talking about power. It's the most powerful information tool I have ever known. When I explore the on-line world, I feel like that robot in the movie Short Circuit. I need more input! More input!"-daveage28.militarytelecommunicationsexpert.internet.addict

"I feel the rush every time my mind gets connected to this intensely powerful information whirlpool. When I enter cyberspace, I become one with my mind. It's like Mr. Spock doing the Vulcan mind meld."-joshage29.computerprogrammer.internet.addict and view her website at:


What you might have thought was only a joke is real: net addiction can destroy lives in the same way that compulsive gambling or alcoholism can. Young (psychology, U. of Pittsburgh) shares the results of her three-year study of internet addiction. She offers a questionnaire for net users to determine if they have a problem, points out several ways that internet friendships are superficial while seeming the opposite, and lists numerous strategies for recovery. Annotation c. by Book News, Inc., Portland, Or.

Wednesday, February 11, 2009

Learning AspNet 20 with Ajax or Microsoft Office Publisher 2003 Illustrated Introductory

Learning Asp.Net 2.0 with Ajax: A Practical Hands-On Guide

Author: Jesse Liberty

With this book, web developers can build engaging and interactive sites and applications using Microsoft's latest web development tools -- ASP.NET 2.0 and the new ASP.NET AJAX framework. You learn to create applications that have all the great tricks you see on popular commercial web sites, such as order forms and the ability to interact with a database. And you can build pages that display information interactively without a page refresh. This straightforward tutorial explains how. Learning ASP.NET 2.0 with AJAX helps you master the concepts and techniques of Microsoft's tools with plenty of annotated examples, review quizzes, web construction exercises and chapter summaries, so you can practice new skills and test your understanding as you go. With it, you'll learn to: Master the fundamental skills of ASP.NET 2.0 to build professional quality web applications Integrate new Ajax tools and CSS with ASP.NET 2.0 for flashier and more interactive sites Build applications with minimal coding using Visual Studio or its free counterpart, Visual Web Developer Connect your site with a database so that users can retrieve, interact and save data Debug your application, deal with unexpected problems, and protect your site from malicious users Use the community-maintained ASP.NET AJAX Control Toolkit to extend the controls that come with ASP.NET AJAX Use personalization tools to give your site a customized look for each user Ideal for beginning web developers, or those who are new to ASP.NET, this book gets you involved with your own learning through hands-on lessons that are clear and to the point. You get the chance to try out new techniques on the spot. Want to join the world of modernwebdevelopment? This book will get you started.

See also: Hyperactivity or Yoga

Microsoft Office Publisher 2003 ? Illustrated Introductory

Author: Elizabeth Eisner Reding

Part of the Illustrated series, this text offers a visual, flexible way to build Microsoft Publisher 2003 skills. Lessons are presented in a clean, easy-to-follow 2-page spread layout that features action steps on the left-hand page and colorful, large illustrations and screen shots on the right-hand page.

Table of Contents:
Unit AGetting started with Microsoft Office Publisher 20031
Unit BCreating a publication25
Unit CWorking with text49
Unit DWorking with graphic objects75
Unit EEnhancing a publication101
Unit FImproving a design127
Unit GWorking with multiple pages149
Unit HUsing advanced features175
Unit IWorking efficiently201
Unit JCreating Web documents225

Monday, February 9, 2009

Kingdom under Fire or HTTP

Kingdom under Fire: Circle of Doom: Prima Official Game Guide

Author: Jim Mazurek

•Complete walkthroughs for all six acts and characters!
•All quests shown in full-detail!
•Learn how to build end-game characters with our detailed character section.
•Secrets: Mighty Sword! All Quest Bosses! Synthesize Abilities with Weapons!
•Introductory gameplay strategy helps novice, intermediate and advanced players!

Look this: Pro T SQL 2008 or Adobe AIR 15

HTTP: The Definitive Guide

Author: David Gourley

Behind every successful web transaction lurks the Hypertext Transfer Protocol (HTTP), the language by which web clients and servers exchange documents and information. HTTP is commonly known as the workhorse behind the browsers we use every day to access our company intranets, locate out-of-print books, or research census information. But HTTP is used for far more than browsing the Web: the simplicity and ubiquity of HTTP also have made it the choice protocol for many other networked applications, most notably through web services such as SOAP and XML-RPC.

As the title suggests, HTTP: The Definitive Guide explains the HTTP protocol: how it works and how to use it to develop web-based applications. However, this book is not just about HTTP; it's also about all the other core Internet technologies that HTTP depends on to work effectively. Although HTTP is at the center of the book, the essence of HTTP: The Definitive Guide is in understanding how the Web works and how to apply that knowledge to web programming and administration. The book explains the technical workings, motivations, performance considerations, and objectives of HTTP and the technologies around which it revolves.

Written by experts with years of practical experience, this book uses clear, concise language and a plethora of detailed illustrations to help readers visualize what goes on behind the scenes, providing a complete understanding of the story behind each query on the Web.

All web programmers, administrators, and application developers need to be familiar with HTTP in order to work effectively. There are many books that explain how to use the Web, but this is the book that explains how the Web works.

Table of Contents:
Pt. IHTTP: The Web's Foundation
1Overview of HTTP3
2URLs and Resources23
3HTTP Messages43
4Connection Management74
Pt. IIHTTP Architecture
5Web Servers109
8Integration Points: Gateways, Tunnels, and Relays197
9Web Robots215
Pt. IIIIdentification, Authorization, and Security
11Client Identification and Cookies257
12Basic Authentication277
13Digest Authentication286
14Secure HTTP307
Pt. IVEntities, Encodings, and Internationalization
15Entities and Encodings341
17Content Negotiation and Transcoding395
Pt. VContent Publishing and Distribution
18Web Hosting411
19Publishing Systems424
20Redirection and Load Balancing448
21Logging and Usage Tracking483
Pt. VIAppendixes
App. AURI Schemes499
App. BHTTP Status Codes505
App. CHTTP Header Reference508
App. DMIME Types533
App. EBase-64 Encoding570
App. FDigest Authentication574
App. GLanguage Tags581
App. HMIME Charset Registry602

Sunday, February 8, 2009

Digital Boudoir Photography or The Rough Guide to the Internet

Digital Boudoir Photography: A Step-By-Step Guide to Creating Fabulous Images of Any Woman

Author: John G Blair

Boudoir photography does not require its subject to be a beautiful, physically flawless woman. It does not require the use of extravagantly expensive equipments, props, and studio space. In fact, the very essence of boudoir photography is the idea that its subject is not a professional model and is not even necessarily in the boudoir. No longer confined to the idea of heavy makeup, lingerie, and the bedroom, the new age of boudoir photography is casual, sensual, and sexy. That is the premise behind Digital Boudoir Photography. Firmly grasping the freedom that digital photography affords, this book offers tips and techniques that allow anyone with a digital camera the ability to take attractive photographs of any woman.

Book review: The Simple Path to Health or Qi Gong For Beginners

The Rough Guide to the Internet

Author: Peter Buckley

This multi-million-selling Internet book is still the ultimate handbook for novices and experts alike. Written in plain English, it covers everything from getting online for the first time to newsfeeds, Internet telephony and advanced tips and tricks guaranteed to turn casual surfers into Net gurus. This fully revised guide covers all the latest sites and crazes, including Skype, blogging, myspace and other social networks and online video. Whether you’ve never sent an email or you just want to keep up with the latest developments, this is the book for you.

Saturday, February 7, 2009

Asterisk or Hacking Exposed

Asterisk: The Future of Telephony

Author: Jim Van Meggelen

This bestselling book is now the standard guide to building phone systems with Asterisk, the open source IP PBX that has traditional telephony providers running scared! Revised for the 1.4 release of the software, the new edition of Asterisk: The Future of Telephony reveals how you can save money on equipment and support, and finally be in control of your telephone system.

If you've worked with telephony in the past, you're familiar with the problem: expensive and inflexible systems that are tuned to the vendor's needs, not yours. Asterisk isn't just a candle in the darkness, it's a whole fireworks show. Because Asterisk is so powerful, configuring it can seem tricky and difficult. This book steps you through the process of installing, configuring, and integrating Asterisk with your existing phone system.

You'll learn how to write dialplans, set up applications including speech synthesis and voice recognition, how to script Asterisk, and much more -- everything you need to design a simple but complete system with little or no Asterisk experience, and no more than rudimentary telecommunications knowledge. The book includes:
-A new chapter on managing/administering your Asterisk system
-A new chapter on using Asterisk with databases
-Coverage of features in Asterisk 1.4
-A new appendix on dialplan functions
-A simplified installation chapter
-New simplified SIP configuration, including examples for several popular SIP clients (soft phones and IP telephones)
-Revised chapters and appendicies reviewed and updated for the latest in features, applications, trends and best-practices

Asterisk is revolutionizing the telecom industry, due in large part to the way it gets along with other network applications. While other PBXs are fighting their inevitable absorption into the network, Asterisk embraces it. If you need to take control of your telephony systems, move to Asterisk and see what the future of telecommunications looks like.

Table of Contents:
1A telephony revolution1
2Preparing a system for Asterisk9
3Installing Asterisk31
4Initial configuration of Asterisk58
5Dialplan basics77
6More Dialplan concepts99
7Understanding telephony119
8Protocols for VoIP137
9The Asterisk gateway interface (AGI)156
10Asterisk for the uber-geek175
11Asterisk : the future of telephony190
AVoIP channels209
BApplication reference229
CAGI reference292
DConfiguration files301
EAsterisk command-line interface reference337

Book about: Fundamentos de Desenho Gráficos

Hacking Exposed

Author: Stuart McClur

The tenth anniversary edition of the world's bestselling computer security book!

The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using their proven methodology, the authors reveal how to locate and patch system vulnerabilities. The book includes new coverage of ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, mobile devices, and more.

Hacking Exposed 6 applies the authors' internationally renowned computer security methodologies, technical rigor, and "from-the-trenches" experience to make computer technology usage and deployments safer and more secure for businesses and consumers.

"A cross between a spy novel and a tech manual." --Mark A. Kellner, Washington Times
"The seminal book on white-hat hacking and countermeasures . . . Should be required reading for anyone with a server or a network to secure." --Bill Machrone, PC Magazine

"A must-read for anyone in security . . . One of the best security books available." --Tony Bradley, CISSP,

Stuart McClure, CISSP, CNE, CCSE, was founder, president, and CTO of Foundstone, and ran the worldwide AVERT team at McAfee.

Joel Scambray, CISSP, is chief strategy officer for Leviathan Security Group and was a senior director at Microsoft Corporation focusing on security.

George Kurtz, CISSP, former CEO of Foundstone, is senior vice president and general manager of McAfee's Risk &Compliance Business Unit. All three are the coauthors of the previous editions of Hacking Exposed.

Friday, February 6, 2009

Numerical Recipes in FORTRAN 77 or Readings in Database Systems 4th Edition

Numerical Recipes in FORTRAN 77: Volume 1, Volume 1 of Fortran Numerical Recipes: The Art of Scientific Computing

Author: William Press

This is the greatly revised and greatly expanded Second Edition of the hugely popular Numerical Recipes: The Art of Scientific Computing. The product of a unique collaboration among four leading scientists in academic research and industry Numerical Recipes is a complete text and reference book on scientific computing. In a self-contained manner it proceeds from mathematical and theoretical considerations to actual practical computer routines. With over 100 new routines bringing the total to well over 300, plus upgraded versions of the original routines, this new edition remains the most practical, comprehensive handbook of scientific computing available today. Highlights of the new material include: -A new chapter on integral equations and inverse methods -Multigrid and other methods for solving partial differential equations -Improved random number routines - Wavelet transforms-The statistical bootstrap method -A new chapter on "less-numerical" algorithms including compression coding and arbitrary precision arithmetic. The book retains the informal easy-to-read style that made the first edition so popular, while introducing some more advanced topics. It is an ideal textbook for scientists and engineers and an indispensable reference for anyone who works in scientific computing. The Second Edition is availabe in FORTRAN, the traditional language for numerical calculations and in the increasingly popular C language.

New interesting book: Principles of Object Oriented Modeling and Simulation with Modelica 21 or Assessing and Managing Security Risk in IT Systems

Readings in Database Systems, 4th Edition

Author: Joseph M Hellerstein

Lessons from database research have been applied in academic fields ranging from bioinformatics to next-generation Internet architecture and in industrial uses including Web-based e-commerce and search engines. The core ideas in the field have become increasingly influential. This text provides both students and professionals with a grounding in database research and a technical context for understanding recent innovations in the field. The readings included treat the most important issues in the database area -- the basic material for any DBMS professional.

This fourth edition has been substantially updated and revised, with 21 of the 48 papers new to the edition, four of them published for the first time. Many of the sections have been newly organized, and each section includes a new or substantially revised introduction that discusses the context, motivation, and controversies in a particular area, placing it in the broader perspective of database research. Two introductory articles, never before published, provide an organized, current introduction to basic knowledge of the field; one discusses the history of data models and query languages and the other offers an architectural overview of a database system. The remaining articles range from the classical literature on database research to treatments of current hot topics, including a paper on search engine architecture and a paper on application servers, both written expressly for this edition. The result is a collection of papers that are seminal and also accessible to a reader who has a basic familiarity with database systems.

Table of Contents:
What goes around comes around2
Anatomy of a database system42
Access path selection in a relational database management system103
Join processing in database systems with large main memories115
Parallel database systems : the future of high performance database systems141
Encapsulation of parallelism in the volcano query processing system155
AlphaSort : a RISC machine sort165
R optimizer validation and performance evaluation for distributed queries175
Mariposa : a wide-area distributed database system186
The R-tree : an efficient and robust access method for points and rectangles207
Operating system support for database management217
The five-minute rule ten years later, and other computer storage rules of thumb224
A case for redundant arrays of inexpensive disks (RAID)230
Granularity of locks and degrees of consistency in a shared data base244
On optimistic methods for concurrency control274
Concurrency control performance modeling : alternatives and implications288
Efficient locking for concurrent operations on B-tress334
ARIES : a transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging355
Transaction management in the R distributed database management system424
The dangers of replication and a solution443
Inclusion of new types in relational data base systems459
Generalized search trees for database systems467
Grammar-like functional rules for representing query optimization alternatives479
AutoAdmin "what-if" index analysis utility492
Applying model management to classical meta data problems504
Algorithms for creating indexes for very large tables without quiescing updates516
An overview of data warehousing and OLAP technology532
Improved query performance with variant indexes542
DataCube : a relational aggregation operator generalizing group-by, cross-tab, and sub-totals554
An array-based algorithm for simultaneous multidimensional aggregates579
Deriving production rules for incremental view maintenance591
Informix under CONTROL : online query processing604
DynaMat : a dynamic view management system for data warehouses638
BIRCH : an efficient data clustering method for very large databases656
SPRINT : a scalable parallel classifier for data mining668
Fast algorithms for mining association rules680
Efficient evaluation of queries with mining predicates693
Combining systems and databases : a search engine retrospective711
The anatomy of a large-scale hypertextual web search engine725
The BINGO! system for information portal generation and expert web search745
Data management in application servers757
Querying semi-structured data768
DataGuides : enabling query formulation and optimization in semistructured databases786
NiagaraCQ : a scalable continuous query system for the internet databases796
Scalable trigger processing814
The design and implementation of a sequence database system824
Eddies : continuously adaptive query processing836
Retrospective on Aurora

Thursday, February 5, 2009

Information Graphics or Legal Aspects of Managing Technology

Information Graphics: A Comprehensive Illustrated Reference

Author: Robert L Harris

This beautifully illustrated book is the first complete handbook to visual information. Well written, easy to use, and carefully indexed, it describes the full range of charts, graphs, maps, diagrams, and tables used daily to manage, analyze, and communicate information. It features over 3,000 illustrations, making it an ideal source for ideas on how to present information. It is an invaluable tool for anyone who writes or designs reports, whether for scientific journals, annual reports, or magazines and newspapers.

Go to: I principi fondamentali di FMEA

Legal Aspects of Managing Technology

Author: Lee B Burgunder

Whether you plan a career in management, engineering, architecture, biology, computer science, or other field that deals with innovations in any technological field, LEGAL ASPECTS OF MANAGING TECHNOLOGY will give you the understanding of the fundamental legal issues pertinent to technology management you need to competently create strategic plans in consultation with their attorneys. Up-to-date coverage focuses on integral technology law topics, including a intellectual property rights, privacy, biotechnology, e-commerce and antitrust.

Tuesday, February 3, 2009

Visual Basic 6 Complete or Technical Charting for Profits

Visual Basic 6 Complete

Author: Steve Brown

Visual Basic 6 Complete is a one-of-a-kind computer book-valuable both for its broad content and its low price. This book contains the essentials you need to know about programming with Visual Basic and VBA, for use in building Windows applications, scripting, and extending and integrating Office applications.

With Visual Basic 6 Complete, you'll learn all about building Visual Basic applications - from working with forms and controls to using the Windows API and debugging Web applications -- and you'll quickly take advantage of all that Visual Basic has to offer. Get up to speed with Visual Basic, then move on to scripting objects, VBA, and building internet applications and interactive Web sites.

As you become more proficient with Visual Basic, you'll find the Visual Basic 6 Language Reference to be an invaluable daily tool. This comprehensive reference quickly puts every built-in function and statement at your fingertips.

Visual Basic 6 Complete introduces you to the work of some of the finest Sybex authors, so you'll know where to go to learn even more about what's possible with Visual Basic.


Introduction to Visual Basic
* Mastering the Integrated Development Environment (IDE)
* Working with forms and controls
* Understanding object-oriented programming
* Building sample VB applications Practical Visual Basic
* Debugging Visual Basic applications
* Extending VB with the Windows API
* Accessing the Windows Registry
* Building screen savers, and displaying an icon in the system tray with VB Visual Basic Scripting and the Internet
* Adding scripting support to your application
* Scripting objects
*Building Web-based applications with VB Visual Basic for Applications
* An Introduction to VBA
* The Word Object model
* The Access Object model revisited
* Professional development with VBA Visual Basic References
* Complete Visual Basic 6 Language Reference
* Visual Basic 6 Function Reference

Table of Contents:
Pt. IIntroduction to Visual Basic1
Ch. 1Mastering the Integrated Development Environment (IDE)3
Ch. 2Working with Forms39
Ch. 3Selecting and Using Controls75
Ch. 4Object Programming with Visual Basic169
Ch. 5Visual Basic Projects227
Pt. IIPractical Visual Basic273
Ch. 6Debugging Visual Basic Programs275
Ch. 7Visual Basic and the Windows API299
Ch. 8Making Visual Basic Do What You Want371
Pt. IIIIntroduction to Visual Basic Scripting and the Internet413
Ch. 9Adding Scripting Support to Your Application415
Ch. 10Scripting Objects453
Ch. 11Visual Basic and the Web515
Pt. IVIntroduction to Visual Basic for Applications567
Ch. 12An Introduction to VBA569
Ch. 13The Word Object Model621
Ch. 14Introducing the Access Object Model649
Ch. 15Professional Development with VBA687
Pt. VVisual Basic Reference739
Reference 1The Complete Visual Basic 6 Language Reference741
Reference 2Visual Basic 6 Function Reference907

Go to: My Office Is Killing Me or Users Guide to Heart Healthy Nutrients

Technical Charting for Profits

Author: Mark L Larson

An introduction to technical analysis with a free software and data offer from one of the top names in the business

This indispensable book will guide traders and individual investors through the most important-and profitable-advances in today's investment arena. Technical Charting for Profits explains technical analysis topics to traders in an accessible manner, and covers how to apply them in actual trading practice. Filled with helpful sample charts, graphs, and end-of-chapter quizzes, Technical Charting for Profits:

• Teaches you the basics of understanding and using indicators

• Includes a CD-ROM video and 30-day free data trial of the most widely distributed charting software package in the industry

• Covers both theory and practice of technical analysis Chart your course for financial success today with the priceless lessons in this much-needed book.


This book/CD-ROM package explains advanced technical analysis (the reading of price and volume charts) in an accessible manner, and shows traders and individual investors how to apply them in actual trading for both bullish and bearish market conditions. Includes an overview of the history of the stock market, plus chapter quizzes. Examples are taken from TC2000, the most widely distributed charting software package, to teach how to understand and use indicators. The CD-ROM contains a video and a 30-day trial version of TC2000. Larson is founder of an investment firm. Annotation c. Book News, Inc., Portland, OR (

Monday, February 2, 2009

Ajax or Securing Web Services with WS Security


Author: Thomas A Powell

Build, manage, and secure AJAX applications 

Here is a practical and comprehensive programming guide to AJAX (Asynchronous JavaScript and XML)--the revolutionary new technique for creating interactive Web applications. You will get thorough coverage of AJAX technologies, the advanced JavaScript necessary to use AJAX properly, and how AJAX works with PHP, ASP.NET, JSP, and Ruby. Core information about network, data, and user interface design in support of AJAX is also included.

Table of Contents:

Core Ideas

Introduction to Ajax

Traditional JavaScript Remoting

XMLHttpRequest Object

Data Formats

Applied Ajax

Developing an Ajax Library

Network Considerations

Security Concerns

User Interface Design

Application and Site Architecture

Advanced Topics

Web Services and Beyond


Appendix A: Core JavaScript Quick Reference

Appendix B: HTTP 1.1 Reference

New interesting textbook: Análisis Microeconómico

Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

Author: Jothy Rosenberg

You know how to build Web service applications using XML, SOAP, and WSDL, but can you ensure that those applications are secure? Standards development groups such as OASIS and W3C have released several specifications designed to provide security -- but how do you combine them in working applications?

Securing Web Services with WS-Security will help you take your Web services securely to production, with insight into the latest security standards.

Jothy Rosenberg and David Remy, both business, technology, and security visionaries, demystify these standards with practical examples including a fully developed case study application showing these tools at work. A pragmatic approach is taken showing which Web Services Security standards are needed when faced with a variety of security challenges. The authors understand that security remains one of the largest remaining impediments to deploying major Web services in business-critical situations. The goal of this book is to remove those impediments by providing a detailed understanding of all the available security technologies and how and when to employ them.