Sunday, December 6, 2009

Making Music with Your Computer or Elements of Compiler Design

Making Music with Your Computer

Author: Stephen Bennett

These days, nearly everyone with musical aspirations alsohas a computer. This same computer can double as a highquality recording studio capable of producing professionalrecordings. This book tells you what software and hardwareyou will need to get the best results.

You'll learn about recording techniques, software andeffects, mixing, mastering and CD production.

Suitable for PC and Mac users, the book is full of tips,'how to do' topics and illustrations. It's the perfectanswer to the question 'How do I use my computer to producemy own CD?'

See also: Careers with Animals or Nonprofit Kit For Dummies

Elements of Compiler Design

Author: Alexander Meduna

Providing both theoretical and practical approaches, Elements of Compiler Design offers a comprehensive introduction to compilers. From a theoretical perspective, this book presents fundamental models underlying compilation and demonstrates the concepts, methods, and techniques based on these models. It also examines the mathematical foundations of the theory of formal languages, automata, and transducers. From a practical point of view, the text describes how various compiler techniques are implemented and features a continuous case study that illustrates the design of a new programming language and construction of a compiler for this language.

Friday, December 4, 2009

Understanding the Digital Economy or C Network Programming Volume I

Understanding the Digital Economy: Data, Tools, and Research

Author: Erik Brynjolfsson

The rapid growth of electronic commerce, along with changes in information, computing, and communications, is having a profound effect on the United States economy. President Clinton recently directed the National Economic Council, in consultation with executive branch agencies, to analyze the economic implications of the Internet and electronic commerce domestically and internationally, and to consider new types of data collection and research that could be undertaken by public and private organizations.

This book contains work presented at a conference held by executive branch agencies in May 1999 at the Department of Commerce. The goals of the conference were to assess current research on the digital economy, to engage the private sector in developing the research that informs investment and policy decisions, and to promote better understanding of the growth and socioeconomic implications of information technology and electronic commerce. Aspects of the digital economy addressed include macroeconomic assessment, organizational change, small business, access, market structure and competition, and employment and the workforce.

New interesting textbook: The Boys Beer Book or Seasonal Country Kitchen

C++ Network Programming, Volume I: Mastering Complexity with ACE and Patterns

Author: Douglas C Schmidt

As networks, devices, and systems continue to evolve, software engineers face the unique challenge of creating reliable distributed applications within frequently changing environments. C++ Network Programming, Volume 1, provides practical solutions for developing and optimizing complex distributed systems using the ADAPTIVE Communication Environment (ACE), a revolutionary open-source framework that runs on dozens of hardware platforms and operating systems.

This book guides software professionals through the traps and pitfalls of developing efficient, portable, and flexible networked applications. It explores the inherent design complexities of concurrent networked applications and the tradeoffs that must be considered when working to master them.

C++ Network Programming begins with an overview of the issues and tools involved in writing distributed concurrent applications. The book then provides the essential design dimensions, patterns, and principles needed to develop flexible and efficient concurrent networked applications. The book's expert author team shows you how to enhance design skills while applying C++ and patterns effectively to develop object-oriented networked applications.

Readers will find coverage of:

  • C++ network programming, including an overview and strategies for addressing common development challenges The ACE Toolkit
  • Connection protocols, message exchange, and message-passing versus shared memory
  • Implementation methods for reusable networked application services
  • Concurrency in object-oriented network programming
  • Design principles and patterns for ACE wrapfacades

With this book, C++ developers have at their disposal the most complete toolkit available for developing successful, multiplatform, concurrent networked applications with ease and efficiency.


Explains how to use the adaptive communication environment (ACE) to develop networked applications. The authors, one of whom created ACE, review the core native OS mechanisms available on popular OS platforms, and illustrate how C++ and patterns are applied in ACE to encapsulate these mechanisms in class library wrapper facades that improve application portability and robustness. Annotation c. Book News, Inc., Portland, OR (

Table of Contents:

(NOTE: All chapters end with a Summary.)
About This Book.
Design Challenges, Middleware Solutions, and ACE.
Challenges of Networked Applications.
Networked Application Design Dimensions.
Object-Oriented Middleware Solutions.
An Overview of the ACE Toolkit.
Example Application: A Networked Logging Service.


1. Communication Design Dimensions.
Connectionless versus Connection-oriented Protocols.
Synchronous versus Asynchronous Message Exchange.
Message Passing versus Shared Memory.

2. An Overview of the Socket API.
An Overview of Operating System IPC Mechanisms.
The Socket API.
Limitations of the Socket API.

3. The ACE Socket Wrapper Facades.
The ACE Addr and ACE INET Addr Classes.
The ACE IPC SAP Class.
The ACE SOCK Class.
The ACE SOCK Connector Class.
The ACE SOCK Stream and ACE SOCK IO Classes..
The ACE SOCK Acceptor Class.

4. Implementing the Networked Logging Service.
The ACE Message Block Class.
The ACE InputCDR and ACE OutputCDR Classes.
The Initial Logging Server.
The Client Application.


5.Concurrency Design Dimensions.
Iterative, Concurrent, and Reactive Servers.
Processes versus Threads.
Process/Thread Spawning Strategies.
User, Kernel, and Hybrid Threading Models.
Time-shared and Real-time Scheduling Classes.
Task- vs. Message-based Architectures.

6. An Overview of Operating System Concurrency Mechanisms.
Synchronous Event Demultiplexing.
MultiProcessing Mechanisms.
MultiThreading Mechanisms.
Synchronization Mechanisms.
Limitations with OS Concurrency Mechanisms.

7. The ACE Synchronous Event Demultiplexing Wrapper Facades.
The ACE Handle Set Class.
The ACE Handle Set Iterator Class.
The ACE::select() Methods.

8. The ACE Process Wrapper Facades.
The ACE Process Class.
The ACE Process Options Class.
The ACE Process Manager Class.

9. The ACE Threading Wrapper Facades.
The ACE Thread Manager Class.
The ACE Sched Params Class.
The ACE TSS Class.

10. The ACE Synchronization Wrapper Facades.
The ACE Guard Classes.
The ACE Mutex Classes.
The ACE Readers/Writer Lock Classes.
The ACE Semaphore Classes.
The ACE Condition Variable Classes.

A Design Principles for ACE C++ Wrapper Facades.
Use Wrapper Facades to Enhance Type Safety.
Simplify for the Common Case.
Use Hierarchies to Enhance Design Clarity and Extensibility.
Hide Platform Differences Whenever Possible.
Optimize for Efficiency.

B The Past, Present, and Future of ACE.
The Evolution of ACE.
The Road Ahead.
Concluding Remarks.


Thursday, December 3, 2009

The ABCs of LDAP or Photoshop CS for Beginners DVD

The ABCs of LDAP: How to Install, Run, and Administer LDAP Services

Author: Reinhard Volgmaier

Until now, it has been difficult to find the right source of information on LDAP and directory server implementations: books on the subject are overly product-specific, and a search on the Web results in information overload. The ABCs of LDAP: How to Install, Run, and Administer LDAP Services strikes the right balance, providing a synopsis of LDAP fundamentals without getting wrapped up in one particular implementation. This book is for network and systems administrators who want to begin using LDAP more extensively. It delivers the theoretical background needed to understand how these servers work, resulting in clear, concise examples of implementations in both commercial and OpenLDAP environments. The text is structured so that each chapter can stand on its own, with brief descriptions of terms supplemented by references to more detailed explanations in other chapters. You also benefit from a concise overview of how to design a directory, preparing you to execute directory deployments for email, PKI, DNS, NIS servers, and many other productivity-enhancing applications. Topics include major LDAP APIs, such as PHP, Perl, and Java, as well as distributed command line tools. The book covers ways to integrate LDAP into existing systems, and provides hands-on examples within working implementations.

See also: The Movement and the Sixties or The Age of Turbulence

Photoshop CS for Beginners DVD

Author: Scott Kelby

There's nothing like having a teacher at your side as you learn a new program--especially one as powerful and complex as Photoshop CS. But a private tutor is a luxury few users can afford. With this DVD, you don't need one! On it, Adobe Certified Trainer Dave Cross provides all the essential info you need to dive right in and start using the image manipulation program immediately--no experience required! Throughout, the focus is on the practical advice that will get you playing around with the program fast. In short order, Dave provides clear, succinct explanations of pixels, resolution, color modes, and file sizes; how to set up the workspace; which tools to use for what; how to take advantage of the History palette and layers for making changes; how to use Photoshop's selection tools effectively (and why this is so crucial); methods for adjusting and retouching images; techniques for cropping, transforming, and using filters; and more. A slew of timesaving tips and shortcuts ease the way!

Wednesday, December 2, 2009

CCNA or Computer Security Fundamentals


Author: Michael Valentin

The CCNA Exam Cram 2, Second Edition is a concise, comprehensive study aid that is perfect for anyone preparing for the CCNA exam. Some changes to the exam are expected in late 2005, and this updated edition to the popular Exam Cram will keep you up to date. This newest edition continues to provide you with specific, targeted explanations of the concepts and commands that you will find on the actual CCNA exam.


You will be able to focus on exam objectives, without having to first wade through lots of extra information that you don't need for the test. You will also be able to gain specific skills to improve your testing ability, not only in CCNA knowledge, but with proven test-taking strategies designed to improve your score. The CCNA Exam Cram 2, Second Edition's focus on objectives, exam alerts, and strategies will give you some of the best study preparation material available. It truly is "The Smartest Way to Get Certified!"

Table of Contents:
Ch. 1Networking fundamentals1
Ch. 2Network models13
Ch. 3Concepts in IP addressing37
Ch. 4Working with Cisco equipment65
Ch. 5Managing your router85
Ch. 6Catalyst switch operations and configuration99
Ch. 7VLANs125
Ch. 8IP access lists147
Ch. 9Routing171
Ch. 10Wide area networks209
Ch. 11Advanced IP concepts241
Ch. 12CCNA practice labs269
Ch. 13Practice exam #1281
Ch. 14Answer key to practice test #1305
Ch. 15Practice exam #2321
Ch. 16Answer key to practice test #2339

See also: Natural Healing for Headaches or From the Heart

Computer Security Fundamentals

Author: William Easttom

KEY BENEFIT: This gateway into the world of computer security provides one-volume coverage of all the basic concepts, terminology and issues, along with practical skills essential to security.  Topics covered range from those commonly found in security books such as virus attacks, buffer overflow, hacking spyware and network defense, as well as more specialized areas including cyber terrorism, industrial espionage and encryption.  Providing a comprehensive introduction, this volumes examines assessing a target system, denial of service attacks, malware, basics of assessing and securing a system, encryption, Internet fraud, and cyber crime, industrial espionage, cyber terrorism and information warfare, cyber detective, security hardware and software.  For system analysts network administrators, network security professionals and security audit professionals.

Tuesday, December 1, 2009

Pro NetBeans IDE 55 Enterprise Edition or The Scheme Programming Language 3rd Edition

Pro NetBeans IDE 5.5 Enterprise Edition

Author: Adam Myatt

Written for Java(tm) developers of varying skill and familiarity with the open source NetBeans(tm) IDE as well as Java IDEs in general, Pro NetBeans(tm) IDE 5.5 Enterprise Edition focuses on using NetBeans IDE as a professional Java EE 5 software development platform.

Experienced author Adam Myatt provides a comprehensive guide to mapping out the functionality of NetBeans IDE and its enterprise add-ons: Enterprise Pack and Visual Web Pack. Coverage of such diverse topics as web applications, web services, and UML modeling, along with real-life case studies and clear, topical information, all combine to offer everything you need to get started with the NetBeans IDE 5.5 Enterprise Edition platform.

So whether you're an experienced IDE user or a Java developer who works only with Emacs, you'll find what you need in this book to get started with the more vibrant, more productive extensible NetBeans platform project.

Book review: Learn Excel 97 through Excel 2007 from Mr Excel or Momentum

The Scheme Programming Language, 3rd Edition

Author: R Kent Dybvig

This thoroughly updated edition of The Scheme Programming Language provides an introduction to Scheme and a definitive reference for standard Scheme, presented in a clear and concise manner. Written for professionals and students with some prior programming experience, it begins by leading the programmer gently through the basics of Scheme and continues with an introduction to some of the more advanced features of the language. Many exercises are presented to help reinforce the lessons learned, and answers to the exercises are given in a new appendix. Most of the remaining chapters are dedicated to the reference material, which describes in detail the standard features of Scheme included in the Revised Report on Scheme and the ANSI/IEEE standard for Scheme.

Numerous examples are presented throughout the introductory and reference portions of the text, and a unique set of extended example programs and applications, with additional exercises, are presented in the final chapter. Reinforcing the book's utility as a reference text are appendixes that present the formal syntax of Scheme, a summary of standard forms and procedures, and a bibliography of Scheme resources. The Scheme Programming Language stands alone as an introduction to and essential reference for Scheme programmers. It is also useful as a supplementary text for any course that uses Scheme.

The Scheme Programming Language is illustrated by artist Jean-Pierre Hebert, who writes Scheme programs to extend his ability to create sophisticated works of digital art.


An introduction to the language for readers with some programming experience, progressing from simple to difficult examples and exercises that illustrate each of the major features of the language. After coverage of aspects such as binding forms, control structures, and syntactic extension facilities, a final chapter includes sample programs and packages with an overview of each package with additional examples and exercises. Annotation c. Book News, Inc., Portland, OR (

Table of Contents:
2Getting Started11
3Going Further55
4Procedures and Variable Bindings83
5Control Operations93
6Operations on Objects119
7Input and Output169
8Syntactic Extension181
9Extended Examples211
Answers to Selected Exercises261
Formal Syntax of Scheme277
Summary of Forms281