Sunday, December 6, 2009

Improving Learning Transfer in Organizations or Hacking Gmail

Improving Learning Transfer in Organizations

Author: Elwood F Holton III

Improving Learning Transfer in Organizations features contributions from leading experts in the field learning transfer, and offers the most current information, ideas, and theories on the topic and aptly illustrates how to put transfer systems into action. In this book, the authors move beyond explanation to intervention by contributing their most recent thinking on how best to intervene in organizational contexts to influence the transfer of learning. Written for chief learning officers, training and development practitioners, management development professionals, and human resource management practitioners, this important volume shows how to create systems that ensure employees are getting and retaining the information, skills, and knowledge necessary to accomplish tasks on the job.

Improving Learning Transfer in Organizations addresses learning transfer on both the individual and organizational level. This volume shows how to diagnose learning transfer systems, create a transfer-ready profile, and assess and place employees to maximize transfer. The book includes information on how to determine what process should be followed to design an organization-specific learning transfer system intervention. The authors focus on the actual learning process and show how to use front-end analysis to avoid transfer problems. In addition, they outline the issues associated with such popular work-based learning initiatives as action learning and communities of practice, and they also present applications on learning transfer within e-learning and team training contexts.



Book review: True Professionalism or Introduction to Managerial Accounting

Hacking Gmail

Author: Ben Hammersley



• The first book to unlock the true power behind Gmail, Hacking Gmail will immediately appeal to Google and Gmail fans

• This is serious, down-and-dirty, under-the-hood, code-level hacking that will have readers eliminating the default settings, customizing appearance, disabling advertising, and taking control over their Gmail accounts

• Covers turning Gmail into an online hard drive for backing up files, using it as a blogging tool, and even creating customized Gmail tools and hacks

• Shows readers how to check their Gmail without visiting the site; use Gmail APIs in Perl, Python, PHP, and other languages, or create their own; and maximize Gmail as a host for message boards, photo galleries, even a blog




Table of Contents:
Acknowledgments.

Introduction.

Part I: Starting to Use Gmail.

Chapter 1: Desktop Integration.

Chapter 2: Integrating Your Existing Mail.

Chapter 3: Gmail Power Tips.

Part II: Getting Inside Gmail.

Chapter 4: Skinning Gmail.

Chapter 5: How Gmail Works.

Chapter 6: Gmail and Greasemonkey.

Chapter 7: Gmail Libraries.

Chapter 8: Checking for Mail.

Chapter 9: Reading Mail.

Chapter 10: Sending Mail.

Part III: Conquering Gmail.

Chapter 11: Dealing with Labels.

Chapter 12: Addressing Addresses.

Chapter 13: Building an API from the HTML-Only Version of Gmail.

Chapter 14: Exporting Your Mail.

Chapter 15: Using Gmail to.

Chapter 16: Using GmailFS.

Appendix: Long Code Listings.

Index.

Friday, December 4, 2009

Mobile Telemedicine or Embedded Systems Building Blocks

Mobile Telemedicine: A Computing and Networking Perspecive

Author: Yang Xiao

Technical problems are inherent to telemedicine. Not only does the practical development and application of telemedicine depend on computing and networking techniques, but many ethical, social, and political problems arising in telemedicine need technical solutions as well. Mobile Telemedicine addresses such problems in detail, including video and audio compression and transmission, robotics, networking, security, and privacy. It explores patient and health care provider interactions with network systems, remote consultation challenges, wireless sensors in telemedicine, application protocols, as well as network and system solutions for hospital and emergency room monitoring.



See also: The Big Fix or Cambridge Handbook of Psychology Health and Medicine

Embedded Systems Building Blocks

Author: Jean J Labross

- This second edition features revisions that support the latest version of the author's popular operating system and book, MicroC/OS-II - Complete and ready-to-use modules in C Get a clear explanation of functional code modules and microcontroller theory You get hands-on experience with real-time system modules provided by the author and functional code modules that may be used to create basic embedded system functions. This second edition features a new chapter on PC services and uses the updated MicroC/OS-II.



Table of Contents:

Thursday, December 3, 2009

A Practical Guide to Trusted Computing or HyperText 30

A Practical Guide to Trusted Computing

Author: David Challener

Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what's needed is secure hardware. The Trusted Platform Module (TPM) makes that possible by providing a complete, open industry standard for implementing trusted computing hardware subsystems in PCs. Already available from virtually every leading PC manufacturer, TPM gives software professionals powerful new ways to protect their customers. Now, there's a start-to-finish guide for every software professional and security specialist who wants to utilize this breakthrough security technology.

Authored by innovators who helped create TPM and implement its leading-edge products, this practical book covers all facets of TPM technology: what it can achieve, how it works, and how to write applications for it. The authors offer deep, real-world insights into both TPM and the Trusted Computing Group (TCG) Software Stack. Then, to demonstrate how TPM can solve many of today's most challenging security problems, they present four start-to-finish case studies, each with extensive C-based code examples.

Coverage includes:

  • What services and capabilities are provided by TPMs
  • TPM device drivers: solutions for code running in BIOS, TSS stacks for new operating systems, and memory-constrained environments
  • Using TPM to enhance the security of a PC's boot sequence
  • Key management, in depth: key creation, storage, loading, migration, use, symmetric keys, and much more
  • Linking PKCS#11 and TSS stacks to support applications with middleware services
  • What you need to know about TPM and privacy—including how to avoid privacy problems
  • Moving from TSS 1.1 to the new TSS 1.2 standard
  • TPM and TSS command references and a complete function library



New interesting textbook: Twilight in the Desert or The Fifties

HyperText 3.0: Critical Theory and New Media in an Era of Globalization

Author: George P Landow

George Landow's widely acclaimed Hypertext was the first book to bring together the worlds of literary theory and computer technology. Landow was one of the first scholars to explore the implications of giving readers instant, easy access to a virtual library of sources as well as unprecedented control of what and how they read. In hypermedia, Landow saw a strikingly literal embodiment of many major points of contemporary literary theory, particularly Derrida's idea of "de-centering" and Barthes's conception of the "readerly" versus "writerly" text.

From Intermedia to Microcosm, Storyspace, and the World Wide Web, Landow offers specific information about the kinds of hypertext, different modes of linking, attitudes toward technology, and the proliferation of pornography and gambling on the Internet. For the third edition he includes new material on developing Internet-related technologies, considering in particular their increasingly global reach and the social and political implications of this trend as viewed from a postcolonial perspective. He also discusses blogs, interactive film, and the relation of hypermedia to games. Thoroughly expanded and updated, this pioneering work continues to be the "ur-text" of hypertext studies.



Wednesday, December 2, 2009

HTML Illustrated Complete Third Edition or A Practical Guide to Unix for Mac OS X Users

HTML Illustrated Complete, Third Edition

Author: Elizabeth Eisner Reding

This exciting and much anticipated third edition is updated to bring students the latest in HTML, conforming to XML and XHTML coding standards.



Books about: Pharaohs Feast or Exotic Appetites

A Practical Guide to Unix for Mac OS X Users

Author: Mark G Sobell

The Most Useful UNIX Guide for Mac OS X Users Ever, with Hundreds of High-Quality Examples!

Beneath Mac OS® X’s stunning graphical user interface (GUI) is the most powerful operating system ever created: UNIX®. With unmatched clarity and insight, this book explains UNIX for the Mac OS X user—giving you total control over your system, so you can get more done, faster. Building on Mark Sobell’s highly praised A Practical Guide to the UNIX System, it delivers comprehensive guidance on the UNIX command line tools every user, administrator, and developer needs to master—together with the world’s best day-to-day UNIX reference.

This book is packed with hundreds of high-quality examples. From networking and system utilities to shells and programming, this is UNIX from the ground up—both the “whys” and the “hows”—for every Mac user. You’ll understand the relationships between GUI tools and their command line counterparts. Need instant answers? Don’t bother with confusing online “manual pages”: rely on this book’s example-rich, quick-access, 236-page command reference!

Don’t settle for just any UNIX guidebook. Get one focused on your specific needs as a Mac user!

A Practical Guide to UNIX® for Mac OS® X Users is the most useful, comprehensive UNIX tutorial and reference for Mac OS X and is the only book that delivers

  • Better, more realistic examples covering tasks you’ll actually need to perform
  • Deeper insight, based on the authors’ immense knowledge of every UNIX and OS X nook and cranny
  • Practical guidance for experienced UNIX users moving to Mac OS X
  • Exclusive discussions of Mac-only utilities, including plutil, ditto, nidump, otool, launchctl, diskutil, GetFileInfo, and SetFile
  • Techniques for implementing secure communications with ssh and scp—plus dozens of tips for making your OS X system more secure
  • Expert guidance on basic and advanced shell programming with bash and tcsh
  • Tips and tricks for using the shell interactively from the command line
  • Thorough guides to vi and emacs designed to help you get productive fast, and maximize your editing efficiency
  • In-depth coverage of the Mac OS X filesystem and access permissions, including extended attributes and Access Control Lists (ACLs)
  • A comprehensive UNIX glossary
  • Dozens of exercises to help you practice and gain confidence
  • And much more, including a superior introduction to UNIX programming tools such as awk, sed, otool, make, gcc, gdb, and CVS




About the Author

Mark G. Sobell is president of Sobell Associates Inc., a consulting firm that specializes in UNIX/Linux training, support, and custom software development. He is the author of many best-selling UNIX and Linux books and has more than twenty-five years of experience working with UNIX and Linux.

Peter Seebach, a freelance writer specializing in UNIX development, has published dozens of technical articles for IBM developerWorks.



Table of Contents:

Preface xxvii

Chapter 1: Welcome to Linux 1

The GNU-Linux Connection 2

The Heritage of Linux: UNIX 5

What Is So Good About Linux? 6

Overview of Linux 10

Additional Features of Linux 15

Chapter Summary 16

Exercises 17 PART i: The Linux Operating System 19 Chapter 2: Getting Started 21

Conventions Used in This Book 22

Logging In 24

Working with the Shell 25

Curbing Your Power: Superuser Access 28

Getting the Facts: Where to Find Documentation 29

More About Logging In 35

Chapter Summary 38

Exercises 39

Advanced Exercises 39 Chapter 3: Command Line Utilities 41

Special Characters 42

Basic Utilities 43

Working with Files 45

(Pipe): Communicates Between Processes 52

Four More Utilities 53

Compressing and Archiving Files 56

Locating Commands 61

Obtaining User and System Information 63

Communicating with Other Users 67

Email 69

Chapter Summary 69

Exercises 72

Advanced Exercises 73 Chapter 4: The Linux Filesystem 75

The Hierarchical Filesystem 76

Directory and Ordinary Files 77

Working with Directories 88

Access Permissions 91

Links 96

Chapter Summary 102

Exercises 103

Advanced Exercises 105 Chapter 5: The Shell 107

The Command Line 108

Standard Input and Standard Output 113

Running a Program in the Background 125

Filename Generation/Pathname Expansion 127

Builtins 132

Chapter Summary 133

Exercises 134

Advanced Exercises 136 PART ii: The Editors 137 Chapter 6: The vim Editor 139

History 140

Tutorial: Creating and Editing a File with vim 141

The compatible Parameter 148

Introduction to vim Features 148

Command Mode: Moving the Cursor 154

Input Mode 158

Command Mode: Deletingand Changing Text 160

Searching and Substituting 164

Miscellaneous Commands 170

Yank, Put, and Delete Commands 171

Reading and Writing Files 174

Setting Parameters 175

Advanced Editing Techniques 180

Units of Measure 184

Chapter Summary 188

Exercises 193

Advanced Exercises 194 Chapter 7: The emacs Editor 195

History 196

Tutorial: Getting Started with emacs 198

Basic Editing Commands 204

Online Help 209

Advanced Editing 212

Language-Sensitive Editing 225

Customizing emacs 235

More Information 240

Chapter Summary 241

Exercises 248

Advanced Exercises 250 PART iii: The Shells 253 Chapter 8: The Bourne Again Shell 255

Background 256

Shell Basics 257

Parameters and Variables 277

Processes 292

History 295

Aliases 312

Functions 315

Controlling bash Features and Options 318

Processing the Command Line 322

Chapter Summary 332

Exercises 334

Advanced Exercises 336 Chapter 9: The TC Shell 339

Shell Scripts 340

Entering and Leaving the TC Shell 341

Features Common to the Bourne Again and TC Shells 343

Redirecting Standard Error 349

Working with the Command Line 350

Variables 355

Control Structures 368

Builtins 377

Chapter Summary 381

Exercises 382

Advanced Exercises 384 PART iv: Programming Tools 385 Chapter 10: Programming Tools 387

Programming in C 388

Using Shared Libraries 396

make: Keeps a Set of Programs Current 399

Debugging C Programs 407

Threads 417

System Calls 417

Source Code Management 420

Chapter Summary 430

Exercises 431

Advanced Exercises 432 Chapter 11: Programming the Bourne Again Shell 435

Control Structures 436

File Descriptors 470

Parameters and Variables 474

Builtin Commands 487

Expressions 501

Shell Programs 510

Chapter Summary 520

Exercises 522

Advanced Exercises 524 Chapter 12: The gawk Pattern Processing Language 527

Syntax 528

Arguments 528

Options 529

Notes 529

Language Basics 530

Examples 537

Advanced gawk Programming 554

Error Messages 559

Chapter Summary 560

Exercises 561

Advanced Exercises 561 Chapter 13: The sed Editor 563

Syntax 564

Arguments 564

Options 564

Editor Basics 565

Examples 568

Chapter Summary 578

Exercises 579 PART v: Command Reference 581

Standard Multiplicative Suffixes 586

Common Options 587

The sample Utility 587

sample: Very brief description of what the utility does 588

aspell: Checks a file for spelling errors 589

at: Executes commands at a specified time 593

bzip2: Compresses or decompresses files 596

cal: Displays a calendar 598

cat: Joins and displays files 599

cd: Changes to another working directory 601

chgrp: Changes the group associated with a file 603

chmod: Changes the access mode (permissions) of a file 604

chown: Changes the owner of a file and/or the group the file is associated with 608

cmp: Compares two files 610

comm: Compares sorted files 612

configure: Configures source code automatically 614

cp: Copies files 616

cpio: Creates an archive or restores files from an archive 619

crontab: Maintains crontab files 624

cut: Selects characters or fields from input lines 627

date: Displays or sets the system time and date 630

dd: Converts and copies a file 633

df: Displays disk space usage 636

diff: Displays the differences between two files 638

du: Displays information on disk usage by file 644

echo: Displays a message 647

expr: Evaluates an expression 649

file: Displays the classification of a file 653

find: Finds files based on criteria 655

finger: Displays information about users 661

fmt: Formats text very simply 664

fsck: Checks and repairs a filesystem 666

ftp: Transfers files over a network 671

gcc: Compiles C and C++ programs 678

grep: Searches for a pattern in files 683

gzip: Compresses or decompresses files 688

head: Displays the beginning of a file 691

kill: Terminates a process by PID 693

killall: Terminates a process by name 695

less: Displays text files, one screen at a time 697

ln: Makes a link to a file 702

lpr: Sends files to printers 705

ls: Displays information about one or more files 708

make: Keeps a set of programs current 715

man: Displays documentation for commands 721

mkdir: Creates a directory 724

mkfs: Creates a filesystem on a device 725

Mtools: Uses DOS-style commands on files and directories 728

mv: Renames or moves a file 732

nice: Changes the priority of a command 734

nohup: Runs a command that keeps running after you log out 736

od: Dumps the contents of a file 737

paste: Joins corresponding lines from files 742

pr: Paginates files for printing 744

ps: Displays process status 746

rcp: Copies one or more files to or from a remote system 750

rlogin: Logs in on a remote system 752

rm: Removes a file (deletes a link) 753

rmdir: Removes a directory 755

rsh: Executes commands on a remote system 756

scp: Securely copies one or more files to or from a remote system 758

sleep: Creates a process that sleeps for a specified interval 760

sort: Sorts and/or merges files 762

split: Divides a file in into sections 771

ssh: Securely executes commands on a remote system 773

strings: Displays strings of printable characters 777

stty: Displays or sets terminal parameters 778

tail: Displays the last part (tail) of a file 783

tar: Stores or retrieves files to/from an archive file 786

tee: Copies standard input to standard output and one or more files 791

telnet: Connects to a remote system over a network 792

test: Evaluates an expression 794

top: Dynamically displays process status 798

touch: Changes a file's access and/or modification time 801

tr: Replaces specified characters 804

tty: Displays the terminal pathname 807

tune2fs: Changes parameters on an ext2 or ext3 filesystem 808

umask: Establishes the file-creation permissions mask 810

uniq: Displays unique lines 812

w: Displays information about system users 814

wc: Displays the number of lines, words, and bytes 816

which: Shows where in PATH a command is located 817

who: Displays information about logged-in users 819

xargs: Converts standard input into command lines 821 PART vi: Appendixes 825 Appendix a: Regular Expressions 827

Characters 828

Delimiters 828

Simple Strings 828

Special Characters 828

Rules 831

Bracketing Expressions 832

The Replacement String 833

Extended Regular Expressions 834

Appendix Summary 835 Appendix b: Help 837

Solving a Problem 838

Finding Linux-Related Information 839

Specifying a Terminal 844 Appendix c: Keeping the System Up-to-Date 847

yum: Updates and Installs Packages 848

Apt: An Alternative to yum 850

BitTorrent 855

Glossary 859

Index 913

Tuesday, December 1, 2009

Windows Vista Security for Dummies or Microsoft Visual C

Windows Vista Security for Dummies

Author: Brian Koerner

Windows Vista is beefed up with plenty of new security features to help you deflect spyware, malware, and identity thieves. But unless you know how to use these powerful tools, all you’ll get is frustration. So arm yourself with Vista Security For Dummies and discover your right to Rights Management, what Windows Security Center provides, and how to toughen up your defenses.

This indispensable guide shows you how to slam your Windows shut on vulnerabilities and security threats. You’ll find out how to use the fortress built into Vista to assess your risk, protect your kids, keep pfishers out of your bank account, and much more. You’ll also learn how to get the most out of Vista’s security features using authentication, Windows Defender, parent controls, security enhancements, firewall buttresses, wireless protections, encryption, and much more. Discover how to:



• Save money by using built-in security tools

• Audit your network

• Fine-tune your firewall

• Use all of the enhancements in Explorer 7

• Control what your kids play and where they go online

• Develop a comprehensive security plan

• Dispense security from Windows Security Center

• Reduce exposure by controlling user tasks

• Secure your digital information with RMS

• Manage accounts, groups, and shares

• Plan and implement Encrypting File System

• Avoid data theft with BitLocker

• Establish advanced security practices



Don’t leave your computer and network security to chance. Get Vista SecurityFor Dummies and be ready for anything!



Books about: The Last Days of Europe or The Young Hitler I Knew

Microsoft Visual C#: Build a Program Now!

Author: Patrice Pelland

In this lively, eye-opening, and hands-on book, all you need is a computer and the desire to learn how to program with Visual C# 2005 Express Edition. Featuring a full working edition of the software, this fun and highly visual guide walks you through a complete programming project-a desktop weather-reporting application-from start to finish. You'll get an unintimidating introduction to the Microsoft Visual Studio® development environment and learn how to put the lightweight, easy-to-use tools in Visual C# Express to work right away-creating, compiling, testing, and delivering your first, ready-to-use program. You'll get expert tips, coaching, and visual examples at each step of the way, along with pointers to additional learning resources.



Table of Contents:
Ch. 1Introducing Microsoft Visual C# 2005 express edition1
Ch. 2Installing Visual C# : 2005 express edition15
Ch. 3Creating your first application25
Ch. 4Create your own Web browser in less than five minutes!45
Ch. 5Creating your first full Windows application57
Ch. 6Modify your Web browser now!81
Ch. 7Fixing the broken blocks111
Ch. 8Managing the data127
Ch. 9Build your own weather tracker application now!165

Monday, November 30, 2009

Hands On Ethical Hacking and Network Defense or Photoshop for Video

Hands-On Ethical Hacking and Network Defense

Author: Michael T Simpson

With cyber-terrorism and corporate espionage threatening the fiber of our world, the need for trained network security professionals continues to grow. This book describes the tools and penetration testing methodologies used by ethical hackers to better understand how to protect computer networks. A thorough discussion is first established outlining what and who an ethical hacker is, and how important they are in protecting corporate and government data from cyber attacks. This title provides a structured knowledge base for preparing security professionals to understand how to protect a network using some of the skills and tools of a penetration or ethical hacker.



Go to: Ensaladas y Alinos or Claytons Quaker Cook Book

Photoshop for Video

Author: Richard Harrington

Master the graphic design and production skills required of today's video editors and motion graphic professionals with this comprehensive guide to the video tools in Adobe Photoshop CS3. Every page is filled with techniques to help the video professional make graphics for use in television, video, the Internet, and DVD. Lively discourse, full-color presentations, and hands-on tutorials demonstrate everything you need to know about how to combine still and moving images. Fundamental concepts such as transparency, pixel aspect ratio, and alpha channels are made precisely clear, and advanced techniques show how to use Photoshop as a character generator, color corrector, and animation tool.

This edition features expanded coverage of DVD and motion graphics design, as well as addressing recent developments in High Definition video and 32-bit imaging. This indispensable reference includes:
* real-world solutions for making graphics for video
* introduction to third party plug-ins
* automation and shortcut methods that cut production time
* profiles of notable editors and motion graphic artists that include their favorite tips and tricks

The DVD offers a hands-on multimedia experience with hundreds of images to work on, tutorials to complete and 2 Ѕ hours of video training to watch.



Table of Contents:

Make It Happen; Pixels: Time for Tech; Why Layers?; What About Transparency?; Some Words on Words; Layer Styles: Bevels, Shadows, Glows, and More!; A Sense of History; Filters; Color Correction: How to Get It Right; Repairing Damaged Photos; Creating Backgrounds for Video; Automation; The Road to the NLE

Sunday, November 29, 2009

SQL in a Nutshell or Cinema 4D 10 Workshop

SQL in a Nutshell

Author: Kevin E Klin

SQL (Structured Query Language) is a standardized query language for requesting information from a database. Historically, SQL has been the choice for database management systems running on minicomputers and mainframes. Increasingly, however, SQL is being adapted to PC database systems because it supports distributed databases—databases that are spread out over several computer systems, so that several users on a local-area network can access the same database simultaneously. Although there are different dialects of SQL, it is the closest thing to a standard query language that currently exists.

SQL in a Nutshell is a practical and useful command reference to the latest release of the Structured Query Language (SQL99), helping readers learn how their favorite database product supports any standard SQL command. This book presents each of the SQL commands and describes its use in both commercial (Microsoft SQL Server 2000 and Oracle 8i) and open source (MySQL, PostgreSQL 7.0) implementations. Each command reference includes the command syntax (by vendor, if the syntax differs across implementations), a description, and informative examples that illustrate important concepts and uses.

SQL in a Nutshell is more than a convenient reference guide for experienced SQL programmers, analysts, and database administrators. It's also a great learning resource for novice and auxiliary SQL users such as system administrators, users of packaged client/server products, and consultants who need to be familiar with the various SQL dialects across many platforms.

About the Authors:
Kevin Kline serves as the lead information architect for shared information services at Deloitte & Touche LLP. When he's not pulling out his hair over work issues, he likes to spend time with his wife and kids, garden, restore his '66 Chevy truck, and play classical guitar. After finishing SQL in a Nutshell, Kevin doesn't want to look at a computer outside of work hours for months! Kevin is the author of Transact-SQL Programming for O'Reilly & Associates. He is also the co-author of Professional SQL Server 6.5 Admin (WROX Press) and author of Oracle CDE: Reference and User's Guide (Butterworth-Heinemann).

Other than being Kevin's brother, Daniel Kline is an assistant professor of English at the University of Alaska, Anchorage, where he specializes in medieval literature, literary and cultural theory, and computer assisted pedagogy. Dan's technical specialty is in HTML and web applications for higher education.



Books about: Myths Lies and Downright Stupidity or Tribes

Cinema 4D 10 Workshop

Author: Arndt von Koenigsmarck

Model, animate and render with a practical command of all the essential functions and tools in CINEMA 4D 10. Detailed tutorials, suitable for novices and experienced users alike, demonstrate how to navigate the redesigned UI and orient you to the workflow. Next, the author guides you through the creation of a more complex project in which you model, create, apply textures, light, and render a final showcase image of a sports car. Finally, you will model, texture and prepare a comic character for animation using the new powerslider, timeline and the revised MOCCA module.

Build on your command of the essentials with an introduction to the new layer system as well as these advanced skills:
* Light, texture, and shade with CINEMA's material system, BodyPaint 3D, and the integrated shaders
* Build complex mechanical and organic models using NURBS and polygon tools
* Compose 3D content into photos
* Render with advanced techniques such as Multi Pass rendering, HDRI lighting and radiosity
* Simplify animation setups using XPresso constrains
* Work with specialized tools such as HAIR, Clothilde or SKY for special effects

The companion CD includes all of the required tutorial media, a bonus chapter on character modeling, Macintosh and PC demo versions of CINEMA 4D 10, and a limited edition of the PhotoMatch plug-in that permits you to easily insert 3D objects into photos.



* Covers all of the features of version 10 release including BODYPAINT 3D and the MOCCA module
* Tutorial-based approach demonstrates the workflow processes for modelling, texturing and animation
* Advanced features including HyperNURBS modelling, XPresso programming andthe Advanced Renderer.
* Companion CD includes tutorial files, a demo version of CINEMA 4D and plug-in samples



Table of Contents:
Introduction     vii
Getting Started     1
What Is "3D"?     1
Light and Shadows     3
Setting up Cinema 4D     4
The Interface Construction Kit     4
Creating and Manipulating Objects     13
Object Display in the Viewports     13
Operating Modes     17
Tools and Functions     17
Handler     19
Object Manager and Attribute Manager     19
Configuration of Editor Viewports     24
Display Options     25
Filter Options     25
Making HUD Elements Visible     25
Additional Viewport Options     27
Polygon Tools: A Work Example     29
Creating the Basic Form     30
HyperNURBS Modeling     78
The HyperNURBS Display in the Editor     79
Using Weighting     80
HyperNURBS Work Examples     83
The Sweep NURBS Object     88
The Lathe NURBS Object     93
The Loft NURBS Object     98
Working with Online Help     101
Continuative Information about the Managers     102
Surfaces, Light, and Rendering     115
Creating Materials     115
Edit Materials     115
The Material Editor     116
Basic Channel Settings     116
The Diffuse Channel     120
The Luminance Channel     121
The Transparency Channel     121
The Reflection Channel     124
The Environment Channel     125
The Fog Channel     125
The Bump Channel     126
The Normal Channel     127
The Alpha Channel     127
The Specular Channel     128
The Specular Color Channel     129
The Glow Channel     130
The Displacement Channel     130
Texture Settings     133
Illumination Settings     136
Applying Materials     137
What Are UV Coordinates?     137
The Quality of Textured Objects in Editor Viewports     138
Overview of Textured Objects     138
Organizing and Editing Textures     139
Painting with BodyPaint 3D     140
The Projection of Materials     147
Editing UV Coordinates     152
Defining Surfaces with Shaders     160
Texturing of a CD      161
Simulate Spectral Refraction and Scattering     171
Rendering and Saving Images     181
Output Settings     184
Save Settings     184
Antialiasing Settings     188
Options Settings     189
Multi-Pass Settings     191
Preparing the Scene     192
Starting the Render Process     192
The Virtual Photo Studio     194
Deformers     194
Using a Camera     196
Working with Area Lights     199
Ambient Occlusion     204
Applying the Material     206
Creating Metallic Shininess     218
Modeling and Texturing a Palm Tree     220
Creating Symmetrical Splines     220
Duplicating along a Spline     222
Finishing the Trunk     224
The Palm Branch     225
Materials of the Palm Tree     229
Working with Image Templates     239
Modeling the Fender     241
The Front of the Fender     245
Headlights and Bumper     250
The Bumper     252
Turn Signal and Fog Light     254
The Grille     255
The Front Trunk Lid      256
A Pillar and Roll Bar     257
The Door     259
Optimizing Edges and Points Manually     260
The Rear Bar     261
The Rear     263
The Rear Side Window     266
Ironing out Irregularities     268
The Tailgate     270
The Tail Cover     274
The Rear Bracket at the Tail     277
The Grid Areas     279
Tail Lights     281
The Gap Size     284
Front Air Vents and the Windshield     285
The Windshield Wiper     292
The Door Handle and Exterior Mirror     296
The Roof and Side Window     298
The Tailgate Hinge     300
Adding Various Small Parts     301
Tires     304
The Rim     307
Materials for the Car     312
Nonreflective Surfaces     313
Using Individually Shaped Faces in Materials     314
Headlights     316
The Lighting of the Car     317
Creating Virtual Surroundings     320
Creating Clouds     322
Baking Textures     324
Lighting with Images      326
Global Illumination     329
The Stochastic Mode     330
The Standard Mode     331
Preparation for Global Illumination Calculation     332
Animation     337
The Basics     337
The Powerslider     337
Manipulating Keyframes     338
Creating New Keyframes     339
The Navigation within an Animation     340
The Keyframe Interpolation     340
Modeling a Soccer Ball     341
Animating the Ball     344
Changing the Timing     346
Animating Parameters     347
The Timeline     349
Optimizing Keyframes and Working with F Curves     350
Rendering and Saving the Animation     352
Motion Blur     352
Connecting Parameters with XPresso     354
XPresso Nodes     356
Character Animation with MOCCA     359
Bones and Joints     360
Creating a Joint Skeleton     360
Assigning Weightings     363
Dynamic Cloth Simulation     365
Inverse Kinematics     369
Morphing     371
Group Target Objects     374
The Skin Deformer     377
Morph Poses with PoseMixer     378
Controlling XPresso Expressions with User Data     378
Index     383

Friday, November 27, 2009

The Creative Digital Darkroom or Go Google

The Creative Digital Darkroom

Author: Katrin Eismann

This tutorial takes photographers beyond the quick tips and gimmicky effects of many digital photography books. Author Katrin Eismann -- an internationally acclaimed artist, bestselling author, and gifted educator -- offers high-profile work, including her own, as examples for teaching photographers how to use the digital medium to create, edit, and output images that reflect their true vision. Co-authored by photographer and teacher Sean Duggan, The Creative Digital Darkroom translates skills, concepts, and nomenclature of the traditional darkroom into digital solutions for photographers who sense that, despite the newness of the technologies at hand, there remains a timeless method for learning and practicing photography the right way. This is not a Photoshop book per se, but it does focus on the photographic aspects of Photoshop, something other books claim to do but rarely have the discipline to accomplish. The Creative Digital Darkroom includes: Four sections that cover the black & white darkroom, the color darkroom, creative techniques, and production essentials Chapters that begin with a thorough foundation followed by numerous tutorial examples that apply the theory to real-world examples Examples and a layout that enables readers to find, understand, and apply the featured techniques quickly and easily The authors are both renowned photographers and Photoshop experts Clearly, The Creative Digital Darkroom is not your typical digital photography "how to" book. It's ideal for intermediate and advanced photographers, artists, and educators looking for clear, concise, insightful, and inspiring information and techniques on how to make their photographs shine. The language,andtechniques will immediately appeal to serious students and professionals, and the original tutorial images and high-profile work will make the book an important visual resource for educators and art appreciators.



Table of Contents:
Ch. 1Silver to Silicon1
Ch. 2Digital Nuts and Bolts15
Ch. 3Scan, Develop, and Organize41
Ch. 4File Preparation91
Ch. 5Tone and Contrast129
Ch. 6Dodging, Burning, and Exposure Control173
Ch. 7Color Correction227
Ch. 8Creative Color287
Ch. 9Creative Enhancements321
Ch. 10Enhancing Focus359
Index401

Interesting textbook: Irans Military Forces and Warfighting Capabilities or Land Mosaics

Go Google: 20 Ways to Reach More Customers and Build Revenue with Google Business Tools

Author: Greg Holden

Google is not only the search engine of choice for millions of users, it is an immensely powerful tool for savvy businesspeople who know how to use its advanced features. Go Google is a comprehensive guide to everything readers need to know about Google's myriad applications, including Google Apps, Google Docs and Spreadsheets, Google SMS, Google Base, and other services that will help businesses get organized—and get noticed. Companies will learn how to get their message heard and take their marketing to a new level by:

• Creating and strengthening their business websites with Google Page Creator, Google Analytics, and Google Checkout.

• Improving communication with clients and co-workers using Google Talk, Google SMS, and Google Groups.

• Marketing themselves to prospective customers using Google AdWords, AdSense, and Google directory placement.

• Improving their visibility by creating business blogs with Blogger.

Complete with information on research tools like Google Local, Google News, and Google Alerts, this is the ultimate guide for businesses of every size.



Thursday, November 26, 2009

Real World Adobe Photoshop CS4 for Photographers or ASPNET in a Nutshell

Real World Adobe Photoshop CS4 for Photographers

Author: Conrad Chavez

This edition of Real World Photoshop is more tightly focused for the needs and demands of the professional digital photographers. From acquiring images to using an efficient processing workflow to maintaining image quality and final output quality all within the powerful feature set of Adobe Photoshop CS4 and Photoshop Extended CS4. Coverage of new features includes: live, non-destructive corrections in the Adjustments panel, re-editable, feathered, density controlled masks, enhanced auto-align, auto blend, 360 degree panoramas, and more.

The book's new focus helps readers understand the core workflow tasks, main print and web output options as well as the commercial printing information necessary to hand off images for prepress. Essentials information on file formats, color settings, image adjustment fundamentals, sharpness, detail, noise reduction, and image storage and output is also included. Photoshop Extended is covered where it relates specifically to photographers.



New interesting textbook: One Hundred and One Mexican Dishes or El Poder Curativo de Los Pimientos

ASP.NET in a Nutshell

Author: G Andrew Duthi

ASP.NET in a Nutshell is a supercharged introduction to ASP.NET that goes beyond the published documentation to highlight little-known details, stress practical uses for particular features, and provide real-world examples of their use in working applications. Here in one jam-packed volume is the definitive guide and reference for developers of both ASP.NET web applications and services. Newly updated for Visual Studio .NET 2003 and .NET 1.1, this second edition of ASP.NET in a Nutshell includes fresh information on application and web service development, custom controls, data access, security, deployment, and error handing, plus an overview of the System.Web class libraries at the heart of ASP.NET applications. For developers using Microsoft's older ASP technology, this book also provides information on migrating to ASP.NET. ASP.NET in a Nutshell offers the facts, including critical background information, in a no-nonsense manner. With its wealth of up-to-date information, web developers will refer to this book again and again.



Wednesday, November 25, 2009

Cisco CallManager Express or Tom Clancys Splinter Cell

Cisco CallManager Express

Author: Christina Hattingh

Telephony solutions for the small and medium business, enterprise branch office, and small office

  • Detailed information not available in any other resource enables you to deploy IP telephony solutions with maximum efficiency
  • Building blocks of the product features provide solutions that enhance the operations and productivity of your organization
  • Numerous examples show you how to configure the comprehensive suite of features available with Cisco IPC Express
  • Insights from the experts demonstrate how you can enhance your IP telephony system with applications such as automated attendant and voice mail
  • Management and troubleshooting tips will help you keep your network up and running smoothly

Enterprise branches and small and medium businesses require IP telephony solutions particular to their size. Cisco® IP Communications (IPC) Express is the answer: a one-box solution that provides turnkey operation with an easy-to-use web-based interface for combined voice and data needs. Cisco IPC Express delivers a comprehensive suite of telephony features, security, and applications–but how will you use them to your best advantage?

 

This book, Cisco IP Communications Express, provides the detailed information you need to maximize the use of this powerful product suite. By reading this book, you will learn how Cisco IPC Express and its applications can become a business solution for your office or enterprise. The experts from CiscoSystems® give you in-depth design guidance, full configurations, and valuable examples to serve as blueprints for your network. The feature operation and deployment discussions demonstrate how to configure and customize the system and how to use different product features to achieve your specific business goals. Once you deploy your solutions, you will be able to maintain your network through the troubleshooting guidance and examples of resolutions to common problems provided in this book.

 

Cisco IP Communications Express is a must-have for any organization using Cisco CallManager Express or Cisco Unity® Express. Technology decision makers and network administrators will be armed with relevant information on how to deploy IP communications for their particular business needs. IT managers in larger enterprises will benefit from the plans for distributed call processing design for their networks. Service providers and resellers will be prepared to sell, install, configure, and troubleshoot Cisco IPC Express based on customer needs.  Beyond its application in the workspace, Cisco IP Communications Express will also prove helpful to those studying for Cisco voice-related certifications.

 

This IP communications book is part of the Cisco Press® Networking Technology Series. IP communications titles from Cisco Press help networking professionals understand voice and IP telephony technologies, plan and design converged networks, and implement network solutions for increased productivity.

 

 



Interesting textbook: Una storia economica concisa del mondo: A partire dai periodi paleolitici al presente

Tom Clancy's Splinter Cell: Pandora Tomorrow

Author: Prima Temp Authors

Freedom Isn't Free
·Updated tech info on all the latest gadgets
·Tips on shadow movement and assassination
·Multiple run-throughs for each mission
·The lowdown on stealth multiplayer experience
·Every area covered in the single player campaign
·Training section readies you for action
·Arena combat strategies



Sunday, February 22, 2009

Adobe InDesign CS Classroom in a Book or Operating Systems

Adobe InDesign CS Classroom in a Book

Author: Adobe Press Staff

With its ever tightening integration with Adobe's full suite of creative products and its own increasingly sophisticated feature set, InDesign is winning legions of Quark converts. If you're among them--or if you've decided to sidestep those programs altogether--you need this book! In these pages, the Adobe Creative Team uses a series of project-based lessons, tested in the company's own classrooms and labs, to provide a thorough grounding in the InDesign school of page design. You'll find step-by-step lessons in InDesign CS fundamentals plus plenty of the advanced tips and techniques you need to take your page designs to the next level. The workbook-style format includes self-paced lessons followed by review questions to reinforce the knowledge and a CD with all of the files required to complete the book's projects. Throughout, special focus is given to the features new to InDesign CS: an updated Story Editor, nested styles, separation previews, the Package for GoLive command, and more.



Table of Contents:
Getting Started1
A Quick Tour of Adobe InDesign5
Lesson 1Getting to Know the Work Area39
Lesson 2Setting Up Your Document73
Lesson 3Working with Frames117
Lesson 4Importing and Editing Text147
Lesson 5Working with Typography189
Lesson 6Working with Color225
Lesson 7Importing and Linking Graphics255
Lesson 8Creating Tables289
Lesson 9Drawing Vector Graphics317
Lesson 10Working with Transparency369
Lesson 11Creating Interactive Documents390
Lesson 12Combining Files into Books409
Lesson 13Printing & Print Preparation438
Lesson 14Exporting to PDF459
Lesson 15Ensuring Consistent Color479
Working with Version Cue509
Index517

New interesting book: Sports Medicine Essentials or My Personal Path to Wellness

Operating Systems: Design and Implementation

Author: Andrew S Tanenbaum

“The presentation is excellent. The book should be on the desk of any serious student of operating systems.”--Dr. Samuel Kohn, Thomas Edison State College


 


“I would give the authors very high grades for their writing style. Topics are explained in a clear and understandable manner. Presentations are well organized and they flow in logical fashion. The book provides the right depth and breadth of explanations with the appropriate amount of rigor and abstraction.” --Gojko Babic, Department of Computer Science and Engineering, Ohio State University


 


The definitive, up-to-date introduction to operating systems:


Core principles plus hands-on examples with the new MINIX 3 operating system


 


The world’s best-selling introductory operating systems text has been thoroughly updated to reflect the latest advances in OS design and implementation. Offering an optimal balance of theory and practice, Operating Systems: Design and Implementation, Third Edition remains the best resource for anyone seeking a deep understanding of how operating systems work.


 


This edition includes MINIX 3, more compact, more reliable, better suited for embedded applications – and, above all, even easier to teach and learn from. Using MINIX, the authors introduce virtually every core concept needed to construct a working OS: system calls, processes, IPC, scheduling, I/O, deadlocks, memory management, threads, file systems, security, and more. 


 


NEW TO THIS EDITION


 


·   Newly-released,significantly-improved MINIX 3 operating system on CD-ROM: giving students  hands-on experience in  modifying and rebuilding a contemporary operating system


·   Expanded and reorganized coverage of processes and communication


·   Revised and enhanced coverage of CPU scheduling, deadlocks, file system reliability, and security


·   Includes more than 150 end of chapter problems


 


·   ABOUT THE AUTHORS


 


Andrew S. Tanenbaum has an S.B. degree from M.I.T. and a Ph. D. from the University of California at Berkeley.  He is currently a Professor of Computer Science and Vrije Universiteit in Amsterdam, the Netherlands, where, for more than 30 years, he has taught operating systems, computer organization, and networking to thousands of students. Professor Tanenbaum is the winner of the ACM Karl V. Karlstrom Outstanding Educator Award and the ACM/SIGCSE Award for Outstanding Contributions to Computer Science Education. 


 


Albert S. Woodhull is Adjunct Associate Professor of Computer Science and Biology at the School of Natural Science, Hampshire College, Amherst, MA. He also served until recently as computer system administrator for the Department of Biology in the School of Natural Science and Mathematics at the University of Massachusetts, Amherst, MA. He holds an S.B. degree from M.I.T. and a Ph.D. the University of Washington. Supported by a Fulbright grant, he has taught at the Universidad Nacional de Ingenieria and the Universidad Nacional Autonoma de Nicaragua. 

Booknews

The authors attempt to remove the magic from operating system design and to consolidate the material into a systematic discipline. The text begins with the hardware as supplied by a vendor and proceeds step-by- step through the design and implementation of a small system called Xinu, which serves as an illustration of and a pattern for system design. A college level textbook on theory and practice. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Saturday, February 21, 2009

Identity Theft Inc or Feedback Systems

Identity Theft, Inc.: A Wild Ride with the World's#1 Identity Thief

Author: Gary Hastings


Identity theft is the crime of this century. Just ask Frank Abagnale of Catch Me If You Can fame. He states so in the Q&A of the latest edition of that book. So here, then, is the true-crime book of this century. This is the first book on the subject from the inside, told by someone who's assumed hundreds of identities and become rich off it. Not only does the author reveal how ID theft is done, he tells loads of wildly unbelievable but true stories about his impersonations as they led to riches. Some of them are as funny and outrageous as they are amazing.


At the same time he tells people how to protect themselves from the gangs of ID thieves thriving in the real and virtual worlds of today, and as he explains in his foreword, Glenn Hastings is writing this book to repent for his crimes. While committing them, he failed to take into account the damage they caused his victims. He states that had he continued on his massive trail of ID and credit fraud, he could have conceivably made a billion dollars. But enough was enough; ultimately he had to do the right thing.



Go to: Kalifornien: Amerikas Experiment der Hohen Anteile

Feedback Systems: An Introduction for Scientists and Engineers

Author: Karl J Astrom

This book provides an introduction to the mathematics needed to model, analyze, and design feedback systems. It is an ideal textbook for undergraduate and graduate students, and is indispensable for researchers seeking a self-contained reference on control theory. Unlike most books on the subject, Feedback Systems develops transfer functions through the exponential response of a system, and is accessible across a range of disciplines that utilize feedback in physical, biological, information, and economic systems.

Karl Åström and Richard Murray use techniques from physics, computer science, and operations research to introduce control-oriented modeling. They begin with state space tools for analysis and design, including stability of solutions, Lyapunov functions, reachability, state feedback observability, and estimators. The matrix exponential plays a central role in the analysis of linear control systems, allowing a concise development of many of the key concepts for this class of models. Åström and Murray then develop and explain tools in the frequency domain, including transfer functions, Nyquist analysis, PID control, frequency domain design, and robustness. They provide exercises at the end of every chapter, and an accompanying electronic solutions manual is available. Feedback Systems is a complete one-volume resource for students and researchers in mathematics, engineering, and the sciences.

  • Covers the mathematics needed to model, analyze, and design feedback systems
  • Serves as an introductory textbook for students and a self-contained resource for researchers
  • Includes exercises at the end of every chapter
  • Features an electronic solutions manual
  • Offers techniques applicable across a range of disciplines



Friday, February 20, 2009

Understanding Linux Network Internals or Too Human

Understanding Linux Network Internals

Author: Christian Benyen

If you've ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols -- or if you just want to learn about modern networking through real-life examples -- Understanding Linux Network Internals is for you.

Like the popular O'Reilly book, Understanding the Linux Kernel, this book clearly explains the underlying concepts and teaches you how to follow the actual C code that implements it. Although some background in the TCP/IP protocols is helpful, you can learn a great deal from this text about the protocols themselves and their uses. And if you already have a base knowledge of C, you can use the book's code walkthroughs to figure out exactly what this sophisticated part of the Linux kernel is doing.

Part of the difficulty in understanding networks -- and implementing them -- is that the tasks are broken up and performed at many different times by different pieces of code. One of the strengths of this book is to integrate the pieces and reveal the relationships between far-flung functions and data structures. Understanding Linux Network Internals is both a big-picture discussion and a no-nonsense guide to the details of Linux networking. Topics include:

Key problems with networking

Network interface card (NIC) device drivers

System initialization

Layer 2 (link-layer) tasks and implementation

Layer 3 (IPv4) tasks and implementation

Neighbor infrastructure and protocols (ARP)

Bridging

Routing

ICMP

Author Christian Benvenuti, an operating system designer specializing in networking, explains much more than how Linux code works. He shows the purposes of major networking features and the trade-offs involved in choosingone solution over another. A large number of flowcharts and other diagrams enhance the book's understandability.



Go to: Energía, Ambiente, y Cambio climático

Too Human: Prima Official Game Guide

Author: David Knight

•Lead Baldur into battle with a complete step-by-step campaign walkthrough.
•Maximize your loot using detailed maps to find every container, obelisk, battle arena, and secret area.
•Dominate the battlefield with class-based anti-monster tactics from the developers.
•Customize your character with detailed breakdowns of the skill and alignment trees for all five classes.
•Breathe in the deep story with complete bios for every character, including their mythological inspirations.



Table of Contents:
Aesir Primer
Friends & Foes
Baldur’s Path
Prologue
Hall of Heroes
Ice Forest
World Serpent
Helheim
Appendices

Thursday, February 19, 2009

CCNA or 3D Game Programming All in One

CCNA: Cisco Certified Network Associate Fast Pass

Author: Todd Lamml

Organized by exam objectives, this is a focused, concise review guide that works hand-in-hand with any learning tool, including the Sybex CCNA: Cisco Certified Network Associate Study Guide, 6th and Deluxe editions.

The book will consist of four high-level chapters, each mapping to the four main Domains of the exam skill-set. The book will drill down into the specifics of the exam, covering the following:



• Designing Cisco internetworks

• Developing an access list

• Evaluating TCP/IP communication

• Configuring routers and switches

• Configuring IP addresses, subnet masks, and gateway addresses

• Performing LAN, VLAN, and WAN troubleshooting

• Understanding rules for packet control



The interactive CD contains two bonus exams, handy flashcard questions, and a searchable PDF of a Glossary of Terms.



Table of Contents:
Introduction.

Chapter 1: Describe how a network works.

Chapter 2: Configure, verify, and troubleshoot a switch with VLANs and interswitch communications.

Chapter 3: Implement an IP addressing scheme and IP Services to meet network requirements in a medium-size Enterprise branch office network.

Chapter 4: Configure, verify, and troubleshoot basic router operation and routing on Cisco devices.

Chapter 5: Explain and select the appropriate administrative tasks required for a WLAN.

Chapter 6: Identify security threats to a network and describe general methods to mitigate those threats.

Chapter 7: Implement, verify, and troubleshoot NAT and ACLs in a medium-sized Enterprise branch office network.

Chapter 8: Implement and verify WAN links.

Appendix A: About the Companion CD.

Glossary.

Index.

Book review: Knusprig: Projektmanagement, die Dritte Ausgabe: Praktische Werkzeuge für den Erfolg

3D Game Programming All in One

Author: Kenneth C Finney

Are you an aspiring game developer with a great idea, but no practical knowledge for turning that idea into reality? 3D Game Programming All in One is the comprehensive guide you need! This new edition updates the original coverage with the latest version of Torque from GarageGames, and provides the very best tools available to the Indie game maker. This hands-on book not only teaches the technical skills behind 3D game programming, but also provides you with the practical experience you need to create your own games. As you create a first-person shooter, you'll cover the techniques behind the programming, textures, and models that go into successful game creation. You'll also cover the Torque Engine and will learn how to integrate sound and music into your game. 3D Game Programming All in One provides you with the training, experience, and tools you need to turn your dreams of game creation into reality!



Tuesday, February 17, 2009

Real World FPGA Design with Verilog or MIPS Assembly Language Programming

Real World FPGA Design with Verilog

Author: Ken Coffman


9985A-8

The practical guide for every circuit designer creating FPGA designs with Verilog!

Walk through design step-by-step-from coding through silicon. Partitioning, synthesis, simulation, test benches, combinatorial and sequential designs, and more.

Real World FPGA Design with Verilog guides you through every key challenge associated with designing FPGAs and ASICs using Verilog, one of the world's leading hardware design languages. You'll find irreverent, yet rigorous coverage of what it really takes to translate HDL code into hardware-and how to avoid the pitfalls that can occur along the way. Ken Coffman presents no-frills, real-world design techniques that can improve the stability and reliability of virtually any design. Start by walking a typical Verilog design all the way through to silicon; then, review basic Verilog syntax, design; simulation and testing, advanced simulation, and more. Coverage includes:

  • Essential digital design strategies: recognizing the underlying analog building blocks used to create digital primitives; implementing logic with LUTs; clocking strategies, logic minimization, and more
  • Key engineering tradeoffs, including operating speed vs. latency
  • Combinatorial and sequential designs
  • Verilog test fixtures: compiler directives and automated testing
  • A detailed comparison of alternative architectures and software-including a never-before-published FPGA technology selection checklist

Real World FPGA Design with Verilog introduces libraries and reusable modules, points out opportunities to reuse your own code, and helps you decide when to purchaseexisting IP designs instead of building from scratch. Essential rules for designing with ASIC conversion in mind are presented.

If you're involved with digital hardware design with Verilog, Ken Coffman is a welcome voice of experience-showing you the shortcuts, helping you over the rough spots, and helping you achieve competence faster than you ever expected!

The accompanying CD-ROM contains working demo and student versions of these popular design capture and simulation tools: David Murray's Prism Editor and Simucad's Silos III™ simulator. You also get EMATH (a collection of more than 300 key electrical engineering formulas) and electronic copies of all the Verilog code from this book.



Interesting book: Real Cooking with Bob Izumi or Awesome Parties

MIPS Assembly Language Programming

Author: Robert Britton

First impressions are important.

To introduce your Assembly Language programming students to the fundamental concepts of contemporary computer architecture, start with a Reduced Instruction Set Computer (RISC).

When students first encounter computer architecture, they need to begin with the basics of modern computer organization. The MIPS architecture embodies the fundamental design principles of all contemporary RISC architectures:

  • All instructions are directly executed in hardware
  • The rate at which instructions are issued is maximized
  • Instructions are easy to decode
  • Only load and store instructions reference memory
  • Plenty of general purpose registers are provided (32 for MIPS)

MIPS Assembly Language Programming offers students an understanding of how the functional components of modern computers are put together and how a computer works at the machine-language level. The book begins with a datapath diagram that shows a simple implementation of the MIPS architecture, consisting of a register file, an ALU, a memory. a program counter, and an instruction register. As students progress through the text, they will elaborate on this established datapath diagram model, allowing them to visualize how the instructions are fetched and executed as they write their programs.

The Spim simulator for the MIPS architecture runs on PC's and Unix® systems. All the programming exercises are done using this simulator, which can be downloaded for free from the Internet. Using the MIPS simulator allows students to observe the contents of the registers and memorychange as their programs execute. The students are not isolated by a particular operating system from experiencing and writing code dealing with:

  • Memory-mapped I/0
  • Interrupts and exception processing
  • Delayed loads and delayed branches for a pipelined implementation

It is assumed that students using this text already have some experience in developing algorithms, and running programs in a high-level language. The skills they will learn with MIPS Assembly Language Programming offer a sound basis for advanced work in computer architectures and complex assembly languages.



Table of Contents:
Ch. 1The MIPS Architecture1
Ch. 2Algorithm Development in Pseudocode11
Ch. 3Number Systems24
Ch. 4PCSpim, The MIPS Simulator35
Ch. 5Efficient Algorithm Development44
Ch. 6Function Calls Using the Stack57
Ch. 7Reentrant Functions67
Ch. 8Memory-Mapped I/O73
Ch. 9Exceptions and Interrupts79
Ch. 10A Pipelined Implementation89
Ch. 11Floating-Point Instructions98
App. A: Quick Reference110
App. BASCII Codes114
App. CInteger Instruction Set115
App. DMacro Instructions130
App. EA Modified Trap Handler135
App. FFloating-Point Instruction Set138

Monday, February 16, 2009

Digital Sensations or Business Intelligence

Digital Sensations: Space, Identity, and Embodiment in Virtual Reality

Author: Ken Hillis

Ken Hillis is assistant professor of communication studies at the University of North Carolina at Chapel Hill.



Table of Contents:
Acknowledgments
List of Abbreviations
Introduction: Digital Relations
1A Critical History of Virtual Reality1
2Precursive Cultural and Material Technologies Informing Contemporary Virtual Reality30
3The Sensation of Ritual Space60
4Sight and Space90
5Space, Language, and Metaphor133
6Identity, Embodiment, and Place - VR as Postmodern Technology164
Epilogue: Digital Sensations200
Notes213
References239
Index257

Interesting textbook: The Ruby Way or Mmixware

Business Intelligence

Author: Elizabeth Vitt

This book illustrates how organizations can make better, faster decisions about their customers, partners, and operations by turning mountains of data into valuable business information that's at the fingertips of decision makers. It describes what's involved in using business intelligence to bring together information, people, and technology to create successful business strategies-and how to execute those strategies with confidence. Real-life case studies show how world leaders in finance, manufacturing, and retail have successfully implemented business intelligence solutions and detail the benefits they have reaped.

Booknews

This book illustrates how organizations can make better, faster decisions about their customers, partners, and operations using business intelligence, the process of turning large amounts of data into valuable information and making it easily available to decision makers. The book describes the components and general architecture that most business intelligence solutions share, offers stories of how real companies have implemented business intelligence solutions, and describes steps for implementing a business intelligence solution in an organization. Vitt has six years of business development and project management experience in business intelligence. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Sunday, February 15, 2009

Faster Smarter Beginning Programming or Operations Management

Faster Smarter Beginning Programming

Author: Jim Buyens

Create your first application for Microsoft(r) Windows(r) or the Web with Faster Smarter Beginning Programming. This guide uses a practical, learn-by-doing approach that makes learning to write code with Microsoft Visual Basic(r) .NET quick, easy, concrete, and fun. The exercises feature concise explanations, step-by-step instructions, and visual examples that help you create real functionality right away. Topics include learning basic language elements, designing Windows Forms and Web Forms, running and debugging applications, accessing data, and other essentials.



Table of Contents:
Acknowledgments
Introduction
Ch. 1Introducing Basic Concepts1
Ch. 2Introducing Microsoft Visual Basic .NET23
Ch. 3Using Elementary Statements51
Ch. 4Using Operators and Expressions77
Ch. 5Using Functions and Subroutines101
Ch. 6Using Built-in Functions119
Ch. 7Creating Classes and Objects143
Ch. 8Using Classes, Modules, and Forms167
Ch. 9Designing and Using Windows Forms201
Ch. 10Interacting with Windows Form Controls231
Ch. 11Accessing Databases275
Ch. 12Programming Web Forms301
Index325

Interesting book: Wines of the World or The After Work Thai Cookbook

Operations Management: An Integrated Approach

Author: Prakash Singh

Operations Management: An Integrated Approach provides a state-of-the-art account of the systems, processes, people and technology that determine an organisation's strategy and success. With contributions from leading experts internationally, the text takes a comprehensive, comparative, and best-practice approach and applies this specifically to the Asia-Pacific region. Rigorous in scholarship yet eminently accessible in style, Operations Management is replete with pedagogical features - figures and tables, discussion exercises, 'Learnings from the Internet', and a diversity of long and short case studies from around the world. Students are taken on a seamless journey from the fundamentals of operations management, through to the multiple approaches, the various innovations, challenges and risks, and ultimately to models of sustainability and evaluative tools and techniques. The text effectively prepares future managers across every sector of the economy - whether in services, manufacturing, profit or non-profit environments - to lead, organise, plan and control a set of resources, in pursuit of identified goals.



Thursday, February 12, 2009

Adventures in Social Research or Crystal Reports 85

Adventures in Social Research: Data Analysis Using SPSS 14.0 and 15.0 for Windows

Author: Earl Babbi

*This edition comes already bundled with the student version of SPSS software. For the version without SPSS student software, please order ISBN: 9781412940832.*

Adventures in Social Research with SPSS Student Version: Data Analysis Using SPSS 14.0 and 15.0 for Windows, Sixth Edition
guides readers step-by-step through the process of data analysis using the latest version of SPSS and the most up to date version of the General Social Survey. In this thoroughly revised edition, authors Earl Babbie, Fred Halley, and Jeanne Zaino stress active and collaborative learning as students engage in a series of practical investigative exercises.

New to the Sixth Edition:

  • Presents the latest version of SPSS for Windows: Readers are introduced to computerized data analysis using the latest version of SPSS for Windows (14.0 & 15.0).
  • Gives access to the latest version of the GSS: In the text and lab exercises, readers are given a chance to work with data from the most recent General Social Survey (GSS 2004).
  • Provides a shorter, more condensed version than the Fifth Edition: The latest edition has been restructured to make the material more user-friendly for students, including a separate chapter on recoding and a more straightforward discussion of composite measures.

Accompanied by High Quality Ancillaries!
An accompanying CD-ROM contains data sets, Designing Your Own Survey, and comprehensive appendices that include questionnaires, research reports, proposals, survey tips, commands, readings, and much more.

IntendedAudience:
Designed for both introductory and advanced research methods or statistics courses in Sociology, Political Science, Social Work, Criminal Justice, and Public Health departments, this is an ideal computer skills and data analysis textbook for any discipline that uses survey methods.



Table of Contents:
Part I Preparing for Data Analysis
Chapter 1 Introduction: The Theory and Practice of Social Research
Chapter 2 The Logic of Measurement
Chapter 3 Description of Data Sets: The General Social Survey
Part II Univariate Analysis
Chapter 4 Using SPSS: Some Basics
Chapter 5 Describing Your Data: Religiosity
Chapter 6 Presenting Your Data in Graphic Form: Political Orientations
Chapter 7 Recoding Your Data: Religiosity and Political Orientations
Chapter 8 Creating Composite Measures: Exploring Attitudes Toward Abortion in More Depth
Chapter 9 Suggestions for Further Analysis
Part III Bivariate Analysis
Chapter 10 Using Crosstabs to Examine the Sources of Religiosity
Chapter 11 Political Orientations as Cause and Effect
Chapter 12 What Causes Different Attitudes Toward Abortion?
Chapter 13 Measures of Association
Chapter 14 Tests of Significance
Chapter 15 Suggestions for Further Bivariate Analyses
Part IV Multivariate Analysis
Chapter 16 Multiple Causation: Examining Religiosity in Greater Depth
Chapter 17 Dissecting the Political Factor
Chapter 18 A Powerful Prediction of Attitudes Toward Abortion
Chapter 19 Suggestions for Further Multivariate Analyses
Part V The Adventure Continues
Chapter 20 Designing and Executing Your Own Survey
Chapter 21 Further Opportunities for Social Research

Read also Volkswirtschaft: Kurs-Begleiter

Crystal Reports 8.5: The Complete Reference

Author: George Peck

The most definitive resource on Crystal Reports available! Create presentation-quality reports using the most powerful data analysis tool and this comprehensive guide. Crystal Reports 8.5: The Complete Reference explains in detail how to use the software to analyze and format data, generate reports, and perform advanced interactive reporting from the Web. Also, learn to develop custom applications and incorporate any Crystal Report into your Windows applications.



Wednesday, February 11, 2009

Visual Modeling with Rational Rose 2002 and UML or How to Do Everything with Microsoft Office Access 2007

Visual Modeling with Rational Rose 2002 and UML

Author: Terry Quatrani

In a matter of only a few years, the Unified Modeling Language (UML) has emerged as the design medium of choice for developing large-scale distributed object applications. The UML's standard semantics and notation for describing object structure and behavior make it particularly well suited to this function. Augmented by the Rational Unified Process, an extensive set of software development guidelines, and the Rational Rose visual modeling tool, the UML greatly facilitates the development of quality object-oriented applications that meet both deadlines and requirements.

Fully updated and revised, Visual Modeling with Rational Rose 2002 and UML is a comprehensive introduction and tutorial providing guidance on how to use a tool (Rational Rose 2002), a process (the Rational Unified Process), and a language (the UML) to successfully visualize, specify, document, and construct a software system. This timely third edition, written by the UML Evangelist at Rational Software Corporation, breaks the technology down to its essentials and provides clear explanations of each element. The book follows a simplified version of the Rational Unified Process from project inception through system analysis and design. The popular sample case study from the previous editions (a registration system for a fictional university) has been retained and updated, better illustrating the iterative development process in practice, the UML in action, and the proper application of Rational Rose 2002. Newly updated appendices demonstrate code generation and reverse engineering using Rational Rose 2002 with the C++, Visual C++, and Visual Basic programming languages. In addition, a handyglossary defines key object technology and software modeling terms.

Topics covered include:

  • Creating use cases
  • Finding objects and classes
  • UML stereotypes and packages
  • Scenarios, sequence diagrams, and collaboration diagrams
  • Discovering object interaction
  • Specifying relationships, association, and aggregation
  • Adding behavior and structure
  • Superclass/subclass relationships and inheritance
  • Object behavior and Harel state transition diagrams
  • Checking for model consistency
  • Specifying, visualizing, and documenting system architecture
  • The iteration planning process




Table of Contents:
Foreword
Preface
Ch. 1Introduction1
Ch. 2Beginning a Project13
Ch. 3Creating Use Cases19
Ch. 4Finding Classes51
Ch. 5Discovering Object Interaction71
Ch. 6Specifying Relationships87
Ch. 7Adding Behavior and Structure103
Ch. 8Discovering Inheritance117
Ch. 9Analyzing Object Behavior129
Ch. 10Checking the Model143
Ch. 11Designing the System Architecture151
Ch. 12Building the Iterations169
App. ACode Generation and Reverse Engineering with C++187
App. BCode Generation and Reverse Engineering with Visual C++ and Visual Basic209
App. C: A Visual Basic Example221
Glossary239
Index249

Interesting book: Ricerca di prospetto: Un iniettore per la coltura del Nonprofits

How to Do Everything with Microsoft Office Access 2007

Author: Virginia Andersen

Maximize the powerful features of the latest release of today's most popular desktop database program. How to Do Everything with Microsoft Office Access 2007 shows you how to create and customize an efficient, multi-user database, retrieve, interpret, and share your data, secure your information, and much more. Designed to help you get things done quickly and easily, this user-friendly guide is your all-access pass to Access 2007.

  • Navigate the new user interface with ease
  • Design a well-organized database using pre-designed templates
  • Enter and edit data and ensure data validity
  • Sort, filter, and print records
  • Extract specific information using queries
  • Master form and report design basics
  • Add charts and graphs to forms and reports easily
  • Optimize database performance and speed
  • Exchange database objects and text files between Access databases

Virginia Andersen has written or contributed to nearly 25 books about PC-based applications.



Monday, February 9, 2009

Effective Methods for Software Testing or Programming Portlets

Effective Methods for Software Testing

Author: William E Perry



• Written by the founder and executive director of the Quality Assurance Institute, which sponsors the most widely accepted certification program for software testing

• Software testing is a weak spot for most developers, and many have no system in place to find and correct defects quickly and efficiently

• This comprehensive resource provides step-by-step guidelines, checklists, and templates for each testing activity, as well as a self-assessment that helps readers identify the sections of the book that respond to their individual needs

• Covers the latest regulatory developments affecting software testing, including Sarbanes-Oxley Section 404, and provides guidelines for agile testing and testing for security, internal controls, and data warehouses

• CD-ROM with all checklists and templates saves testers countless hours of developing their own test documentation



Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.



Table of Contents:
Acknowledgments
How to Use This Book
Pt. 1Assessing Testing Capabilities and Competencies1
Ch. 1Assessing Software Testing Capabilities and Staff Competencies3
Pt. 2Building a Software Testing Environment33
Ch. 2Building a Software Testing Strategy35
Ch. 3Establishing a Software Testing Methodology61
Ch. 4Determining Your Software Testing Techniques99
Ch. 5Selecting and Installing Software Testing Tools135
Pt. 3The Eleven-Step Testing Process159
Ch. 6Eleven-Step Software Testing Process Overview161
Ch. 7Step 1: Assess Project Management Development Estimate and Status177
Ch. 8Step 2: Develop Test Plan211
Ch. 9Step 3: Requirements Phase Testing275
Ch. 10Step 4: Design Phase Testing313
Ch. 11Step 5: Program Phase Testing369
Ch. 12Step 6: Execute Test and Record Results403
Ch. 13Step 7: Acceptance Test461
Ch. 14Step 8: Report Test Results489
Ch. 15Step 9: Testing Software Installation525
Ch. 16Step 10: Test Software Changes557
Ch. 17Step 11: Evaluate Test Effectiveness599
Pt. 4Testing Specialized Systems and Applications613
Ch. 18Testing Client/Server Systems615
Ch. 19Testing Rapid Application Development635
Ch. 20Testing the Adequacy of System Documentation655
Ch. 21Testing Web-based Systems675
Ch. 22Testing Off-the-Shelf Software695
Ch. 23Testing in a Multiplatform Environment721
Ch. 24Testing Security735
Ch. 25Testing a Data Warehouse753
Pt. 5Building Test Documentation787
Ch. 26Creating Test Documentation789
Bibliography803
Index805

New interesting book: Understanding Africa or Accounting Information Systems

Programming Portlets: From JSR 168 to WebSphere Portal Extensions

Author: Ron Lynn

Portals have evolved from simple Web applications with multiple links to an enterprise application delivery platform that serves composite applications. In a world where organizations are gearing up with service-oriented architecture (SOA) strategies and re-working existing apps to fit the Web 2.0 programming model, portals are strategic infrastructure components on every CIO's radar. As companies move toward SOA, portlets become an even hotter topic. Portlets provide the user interface for these services. IBM's unwavering commitment to open standards such as Java Specification Request (JSR 168) and strong presence in the application server market (IBM WebSphere Application Server) have helped establish WebSphere Portal as a leader among available portal solutions in the market.

Programming Portlets, Second Edition takes developers down a path of understanding all the latest concepts, including SOA, AJAX, and best practices to consider when building a J2EEbased portal. The book offers the reader the tools and information necessary to develop portlets and portal applications in two ways. Part 1 focuses on building portlets that will adhere to the JSR 168 API standard. This allows developers who want to use any JSR 168–compliant portlet container to quickly build quality portlets. Part 2 extends the focus to building JSR 168–compliant portlets for the IBM WebSphere Portal Server and includes information on portlet extensions and WebSphere Portal capabilities that can be leveraged in a portal development effort.

Among the many things you will find inside Programming Portlets, Second Edition:

  • Addition of extensive JSR 168 material
  • Updates for WebSphere Portal (V6)
  • Coverage of new technologies such as IBM WebSphere Portlet Factory and Lotus Workplace Forms Ways to use AJAX in portlets
  • Explanation of how portals and portlets fit into SOA
  • Method for creating JSR 168–compliant portlets using IBM WebSphere
  • IBM WebSphere Portlet Factory, Workplace Forms, and creation of portal services
  • Instructions for building complex portlets quickly using Rational Application Developer or WebSphere Portlet Factory
  • Use of JavaServerTM Faces in portlets
  • Proper use of JSTL with regard to portlets
  • Effective integration of Struts in the portal framework
  • Ways of inter-portlet communication
  • Method to build a portlet from the ground up quickly and effectively
  • The best practices of portlet development
  • Valuable information resources, including examples of various types of portlets
.