Saturday, January 31, 2009

Essential C 30 or Windows Administration at the Command Line for Windows 2003 WindowsVista WindowsXP and Windows2000

Essential C# 3.0: For .NET Framework 3.5

Author: Mark Michaelis

Essential C# 3.0 is an extremely well-written and well-organized “no-fluff” guide to C# 3.0, which will appeal to programmers at all levels of experience with C#. Unlike other books on the topic, this fully updated edition dives deep into the new features that are revolutionizing programming with brand new chapters covering LINQ, Query Expressions, Lambda Expressions, Delegates, Collection Interfaces, and Standard Query Operators.


 


Author Mark Michaelis covers the C# language in depth, and each important construct is illustrated with succinct, relevant code examples. (Complete code examples are available online.) Graphical “mind maps” at the beginning of each chapter show what material is covered and how each topic relates to the whole. Topics intended for beginners and advanced readers are clearly marked.


 


Following an introduction to C#, readers learn about


  • C# primitive data types, value types, reference types, type conversions, and arrays

  • Operators and control flow, loops, conditional logic, and sequential programming

  • Methods, parameters, exception handling, and structured programming

  • Classes, inheritance, structures, interfaces, and object-oriented programming

  • Well-formed types, operator overloading, namespaces, and garbage collection

  • Generics, collections, custom collections, and iterators

  • Delegates and lambda expressions

  • LINQ query operators and query expressions

  • Reflection, attributes, and declarative programming

  • Threading,synchronization, and multithreaded patterns

  • Interoperability and unsafe code

  • The Common Language Infrastructure that underlies C#
Whether you are just starting out as a programmer, are an experienced developer looking to learn C#, or are a seasoned C# programmer interested in learning the new features of C# 3.0, Essential C# 3.0 gives you just what you need to quickly get up and running writing C# applications.



Table of Contents:

Figures

Tables

1 Introducing C# 1

2 Data Types 31

3 Operators and Control Flow 83

4 Methods and Parameters 147

5 Classes 195

6 Inheritance 261

7 Interfaces 295

8 Value Types 321

9 Well-Formed Types 347

10 Exception Handling 389

11 Generics 405

12 Delegates and Lambda Expressions 445

13 Events 479

14 Collection Interfaces with Standard Query Operators 507

15 Query Expressions 555

16 Building Custom Collections 577

17 Reflection and Attributes 617

18 Multithreading 657

19 Multithreading Patterns 699

20 Platform Interoperability and Unsafe Code 723

21 The Common Language Infrastructure 749

A Downloading and Installing the C# Compiler and the CLI Platform 771

B Full Source Code Listings 775

C C# 3.0 Topics 801

Index 807

Look this: Économie Écologique :Principes et Applications

Windows Administration at the Command Line for Windows 2003, WindowsVista, WindowsXP, and Windows2000

Author: John Paul Mueller

As the only complete reference for Windows command line utilities, this book take an in-depth look at the often-overlooked utilities accessible through the command line in Windows Vista, 2003, XP, and 2000.  You’ll learn to locate files, check status, monitor systems, and save time by using scripts to automate time-consuming tasks. Plus, this is the only book on the market with the complete set of Windows command line utilities—including the latest for Vista—and offers solutions that will help increase your productivity.



Friday, January 30, 2009

Professional Excel Services or Professional BlackBerry

Professional Excel Services

Author: Shahar Prish

Professional Excel Services

With this unique resource, you'll discover how to unlock the power behind Excel Services in order to effectively utilize server-side spreadsheet calculation and rendering. It walks you through all programming aspects of Excel Services, covering everything from APIs to UDFs (User Defined Functions). You'll quickly gain a strong understanding of what Excel Services is, how to work with it, and how to develop applications using its robust features.

Written by the senior software development engineer for Excel Services, this book first provides you with detailed explanations about the various programmability options Excel Services offers. You'll then gain an inside look into the problematic areas that you must avoid. And you'll find ideas for solutions that you can create using this server technology. This information will help you extend and work against Excel Services as you develop business-critical applications.

What you will learn from this book



• Steps for streamlining work with the Excel Web Services API

• In-depth explanations about Excel Services UDFs, including various ways to make them work in Excel 2007

• How to use Excel Models to extend your applications

• Various techniques used to employ both Excel and Excel Services in end-to-end solutions.

• How to streamline processes that rely on Excel spreadsheets, such as modeling, handling, and storing data

• Tools used for generating Excel Workbook-based custom Web services, RSS feeds, and more

• Hints for building your own mashups using Excel Services



Who this book is for

This book is for developers who have built applications on Excel or have used a spreadsheet as a starting point for code. You should be comfortable working in the .NET environment.

"More solutions are built on Microsoft Excel than any other Office tool. Excel Services extends Excel to the server and opens up a whole new world of applications. This book is a must read for developers looking to take advantage of this new server functionality."
—PJ Hough, Director of Program Managment, Microsoft Office, Microsoft Corporation

"Excel is probably the most used end-user tool among our Microsoft customers, and Excel 2007 is emphasizing this trend even more. By adding Excel Services to the Microsoft Business Intelligence stack, our customers have the ground to create better and more manageable enterprise-oriented solutions while using Excel! This book helps you understand what Excel Services is, how it works, and how to develop solutions using the web services API it provides. It is a great resource for any serious developer looking to leverage the power of Excel in enterprise applications."
—Stig Torngaard Hammeken, VP of Consulting, Platon A/S

Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.



Book review: Chocolate Indulgences or Smokehouse Ham Spoon Bread Scuppernong Wine

Professional BlackBerry 

Author: Craig J Johnston



• BlackBerrys enable users to stay connected with wireless access to e-mail, calendars, and corporate data; they have a phone and a Web browser in addition to other wireless features

• Written by a BlackBerry insider with assistance from Research in Motion, this book covers support topics ranging from setting up BlackBerry pilot programs to developing applications that let BlackBerry users access corporate data and systems remotely

• Key topics include how to deploy BlackBerrys within the organization, how to create push applications to extend the functionality of BlackBerrys, and how to implement new features of the latest BlackBerry Enterprise Server (BES) 4.0

• Details rolling out BlackBerrys to users in an easy and controlled manner, planning for disaster recovery, and developing Web-based applications using mobile Web technology




Table of Contents:
Ch. 1System architecture3
Ch. 2Planning your first BlackBerry installation19
Ch. 3Deploying the desktop software27
Ch. 4Upgrading your BlackBerry environment43
Ch. 5Installing or upgrading the handheld software55
Ch. 6Monitoring and enhancing your BlackBerry environment67
Ch. 7Managing your BlackBerry users81
Ch. 8Disaster-recovery planning97
Ch. 9Introduction to mobile data service and simulators109
Ch. 10BlackBerry Web portal121
Ch. 11The BlackBerry channel143
Ch. 12The BlackBerry Web message and cache content157
Ch. 13Developing BlackBerry Java applications163
Ch. 14The Plazmic media engine191
App. AWireless markup language reference217
App. BWMLScript compendium229
App. CJava low memory manager : a development guide263
App. DWriting efficient J2ME software267
App. EUser interface coding tips273
App. FStoring data persistently277

Thursday, January 29, 2009

Signaling System 7 or AutoCAD 2009 Instructor

Signaling System #7

Author: Travis Russell

"If one book were to be used as a reference source and learning tool for the SS7 protocol in today's switching networks, this should be the choice."
Now updated for packet telephony!
The #1 Working Reference on SS7--
Revised & Expanded
Signaling System #7
Travis Russell
A leading-edge, sought-after source in telecommunications, Travis Russell's Signaling System #7 provides a bedrock understanding of the signaling network, its architecture, and the protocols used to communicate through it. Accessible even to novices, Russell's guide also provides the technical details, protocol messages, and application examples so fundamentally helpful to developers, engineers, and network planners.
In this Internet-intensive edition, network-switching expert Russell brings his succinct, logical style to:
New coverage on VoIP and SS7-TCP/IP interactions.
Solutions to protocol issues in migrating telecom to the Internet.
Details on SS7 in broadband and cellular networking.
Lucid explanations of protocols and network entities, with hands-on examples and applications.
Clarifications of ANSI standards and Bellcore publications, with model solutions.
New information on local number portability.
Needed technical data for design and specifications.
Travis Russell's guide is a model of clarity and content, designed to help anyone understand the "why's" and "how's" of SS7, and to help technical professionals make the most of it. Bypassing heavy-handed engineering theory and mathematical derivations, each chapter presents a readable discussion, followed by technical details such as parameters, message structures, and bit values. Isn't it time to see for yourself why Signaling System #7 is the hands-down choice for engineers and network managers everywhere?
* On the second edition.

Booknews

A technical reference on the signaling network that supports cellular communications, broadband networking, ISDN, and virtually all international networks. Using a tutorial approach supported by numerous real-world examples, it shows how Signaling System #7 permits seamless switching from carrier to carrier, network to network, or office to office within a network, explaining protocol functionality, applications, and key components. Annotation c. Book News, Inc., Portland, OR (booknews.com)



See also: Strategisches Management: Wettbewerbsfähigkeit und Globalisierung, Fälle

AutoCad 2009 Instructor

Author: James A Leach

AutoCAD 2009 Instructor covers all features and capabilities of AutoCAD. The text is command-oriented so chapters are centered around groups of related commands.

The full range of AutoCAD commands, concepts, and features is explained in the text. The author's simple writing style enables students to grasp concepts easily. Fundamental concepts are discussed first, then more advanced and specialized features.



Table of Contents:
1 Getting Started
2 Working with Files
3 Draw Command Concepts
4 Selection Sets
5 Helpful Commands
6 Basic Drawing Setup
7 Object Snap and Object Snap Tracking
8 Draw Commands I
9 Modify Commands I
10 Viewing Commands
11 Layers and Object Properties
12 Advanced Drawing Setup 13 Layouts and Viewports
14 Printing and Plotting 15 Draw Commands II
16 Modify Commands II
17 Inquiry Commands
18 Creating and Editing Text
19 Internet Tools
20 Advanced Selection Sets
21 Blocks, DesignCenter, and Tool Palettes
22 Block Attributes 23 Grip Editing
24 Multiview Drawing
25 Pictorial Drawings
26 Section Views
27 Auxiliary Views
28 Dimensioning
29 Dimension Styles and Dimension Variables 30 Xreferences
31 Object Linking and Embedding (OLE)
32 Raster Images And Vector Files 33 Advanced Layouts and Plotting 34 3D Modeling Basics
35 3D Display and Viewing 36 User Coordinate Systems 37 Wireframe Modeling 38 Solid Modeling Construction 39 Advanced Solids Features 40 Surface Modeling 41 Rendering [Web-only chapter]
42 Creating 2D Drawings From 3D Models [Web-only chapter]
43 Miscellaneous Commands and Features [Web-only chapter]
44 Basic Customization [Web-only chapter] 45 Menu Customization [Web-only chapter] 46 CAD Management [Web-only chapter] 47 Express Tools and Batch Plotting [Web-only chapter]


Appendix A System Variables Appendix B Command Alias List Sorted by Command Appendix C Command Alias List Sorted by Alias Appendix D Buttons and Special Keys Appendix E Command Table Index

Tuesday, January 27, 2009

The Business of Software or VBA and Macros for Microsoft Excel

The Business of Software: What Every Manager, Programmer, and Entrepreneur Must Know to Thrive and Survive in Good Times and Bad

Author: Michael A Cusumano

The world's leading expert on the global software industry and coauthor of the bestseller Microsoft Secrets reveals the inner workings of software giants like IBM, Microsoft, and Netscape and shows what it takes to create, develop, and manage a successful company -- in good times and bad -- in the most fiercely competitive business in the world.

In the $600 billion software industry it is the business, not the technology, that determines success or failure. This fact -- one that thousands of once glamorous start-ups have unhappily discovered for themselves -- is the well-documented conclusion of this enormously readable and revealing new book by Michael Cusumano, based on nearly twenty years of research and consulting with software producers around the world.

Cusumano builds on dozens of personal experiences and case studies to show how issues of strategy and organization are irrevocably linked with those of managing the technology and demonstrates that a thorough understanding of these issues is vital to success. At the heart of the book Cusumano poses seven questions that underpin a three-pronged management framework. He argues that companies must adopt one of three basic business models: become a products company at one end of the strategic spectrum, a services company at the other end, or a hybrid solutions company in between. The author describes the characteristics of the different models, evaluates their strengths and weaknesses, and shows how each is more or less appropriate for different stages in the evolution of a business as well as in good versus bad economic times. Readers will also find invaluable Cusumano's treatment of software development issues rangingfrom architecture and teams to project management and testing, as well as two chapters devoted to what it takes to create a successful software start-up. Highlights include eight fundamental guidelines for evaluating potential software winners and Cusumano's probing analysis, based on firsthand knowledge, of ten start-ups that have met with varying degrees of success.

The Business of Software is timely essential reading for managers, programmers, entrepreneurs, and others who follow the global software industry.

Publishers Weekly

Cusumano, a professor at MIT's Sloan School of Management and coauthor of Microsoft Secrets, offers a comprehensive overview of the software business and how the right approach is key to the success of technology companies. Cusumano first identifies the key distinction between software and other businesses. In fact, he believes it is unlike every other business because software doesn't have one purpose but becomes whatever function it is handling for a particular customer or company. As a result, software companies must sell both products and services, according to the author. The two typical ways software companies operate is by getting the lion's share of revenues from new product sales or via IT consulting. The third way is what the author calls "hybrid solutions companies-software firms that have some new product sales, but derive as much as 80% of their revenues from services and "maintenance." However, what's essential for company success in today's rapidly changing technological marketplace is having sufficient flexibility to change to meet customer needs. Citing both real companies including IBM, Netscape, etc., along with academic studies, Cusumano describes the changing face of the software industry over the past two decades. The writing is coherent and, given the somewhat technical subject matter, surprisingly graspable even for technophobes. Still, this is a niche book, apt to appeal to people involved in the world of software, rather than a general business audience. (Mar.) Copyright 2004 Reed Business Information.



Interesting textbook: Theme Birthday Parties for Children or If I Can Cook You Know God Can

VBA and Macros for Microsoft Excel

Author: Bill Jelen

Microsoft Visual Basic for Applications (VBA) is a powerful development technology for customizing desktop applications and integrating them with existing data and systems, enabling customers to buy off-the-shelf software and customize it to meet their specific needs. This is a big cost-saving solution for most business who cannot afford to build programs from scratch. There are an estimated 65 million Excel users. Many are Excel power users, but few have figured out how to effectively use Excel VBA. This book teaches the skills necessary to use Microsoft VBA to customize the Excel spreadsheet. No prior programming knowledge is assumed. It takes a reader who has, perhaps, built a couple of macros from a standing start to a complete knowledge of the VBA language. Topics covered include: event programming, user forms, charts, pivot tables, Web queries, multi-dimensional arrays, classes, records, and collections, and more!



Table of Contents:
IFirst steps up the VBA learning curve
1Unleash the power of excel with VBA!11
2This sounds like BASIC, so why doesn't it look familiar?29
3Referring to ranges61
4User-defined functions75
5Looping103
6R1C1 style formulas117
7Names131
8Event programming141
9Userforms - an introduction161
IIAutomating excel power in VBA
10Charts175
11Data mining with advanced filter207
12Pivot tables235
13Excel power291
14Reading from and writing to the web331
15XML in excel 2003 professional349
16Automating word359
IIITechie stuff you will need to produce applications for the administrator to run
17Arrays379
18Text file processing387
19Using access as a back end to enhance multi-user access to data401
20Creating classes, records, and collections415
21Advanced userform techniques433
22Windows application programming interface (API)453
23Handling errors467
24Using custom menus to run macros481
25Add-ins497
26Case study - designing an excel application505

Monday, January 26, 2009

Windows Server 2008 PKI and Certificate Security or Adobe Lightroom Photoshop Workflow Bible

Windows Server 2008 PKI and Certificate Security

Author: Brian Komar

Get in-depth guidance for designing and implementing certificate-based security solutions-straight from PKI expert Brian Komar. No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Windows Server 2008! This in-depth reference teaches you how to design and implement even the most demanding certificate-based security solutions for wireless networking, smart card authentication, VPNs, secure email, Web SSL, EFS, and code-signing applications using Windows Server PKI and certificate services. A principal PKI consultant to Microsoft, Brian shows you how to incorporate best practices, avoid common design and implementation mistakes, help minimize risk, and optimize security administration. This definitive reference features a CD loaded with tools, scripts, and a fully searchable eBook.

Key Book Benefits:
• Guides system engineers and administrators how to design and implement PKI-based solutions
• Explains how to exploit the tight integration of Windows Server 2008 PKI services with Active Directory® directory service
• Features best practices based on real-world implementations
• Includes a CD with tools, scripts, and a fully-searchable eBook



Table of Contents:

Pt. I Foundations of PKI

1 Cryptography basics 3

2 Primer to PKI 21

3 Policies and PKI 39

Pt. II Establishing a PKI

4 Preparing an active director environment 59

5 Designing a certification authority hierarchy 73

6 Implementing a CA hierarchy 99

7 Upgrading your existing Microsoft PKI 151

8 Verifying and monitoring your Microsoft PKI 165

9 Securing a CA hierarchy 189

10 Certificate revocation 207

11 Certificate validation 235

12 Designing certificate templates 259

13 Role separation 285

14 Planning and implementing disaster recovery 307

15 Issuing certificates 351

16 Creating trust between organizations 383

Pt. III Deploying application-specific solutions

17 Identity Lifecycle Manager 2007 certificate management 413

18 Archiving encryption keys 453

19 Implementing SSL encryption for Web servers 475

20 Encrypting file system 509

21 Deploying smart cards 535

22 Secure e-mail 571

23 Virtual private networking 595

24 Wireless networking 619

25 Document and code signing 647

26 Deploying certificates to domain controllers 667

27 Network device enrollment service 683

A Case study questions and answers 699

Index 741

New interesting book: Contabilidade das Melhores Práticas

Adobe Lightroom & Photoshop Workflow Bible

Author: Mark Fitzgerald

The digital photographer's workflow is divided into two styles of workflow. The first portion of the workflow is used to import and organize images, and prepare them for presentation via proof printing, Web, or slideshow. Increasingly, photographers are turning to Adobe's acclaimed new Lightroom software to manage these needs. After the best images have been identified in the first portion of workflow, photographers move to improve upon the chosen images using a variety of digital tools. An overwhelming majority of digital photographers choose Photoshop as their image editor. Many photographers are confused by one or both parts of this workflow. Written by an Adobe Certified Expert and Adobe Certified Instructor in Photoshop CS & CS2, Mark Fitzgerald, the Adobe Lightroom & Photoshop Workflow Bible will guide digital photographers through the image editing process from uploading large quantities of Raw files into the computer, to printing that special image from a single file. The Adobe Lightroom and Photoshop Workflow Bible will be an invaluable reference on optimizing the management of images through Photoshop and Lightroom to create an efficient, effective, and logical workflow. The book's website will include full-color images from throughout the book.



Sunday, January 25, 2009

Sams Teach Yourself Adobe Creative Suite 4 All in One or Java 2 Weekend Crash Course with Cdrom

Sams Teach Yourself Adobe Creative Suite 4 All in One

Author: Mordy Golding

In one big, easy-to-use book, Sams Teach Yourself Adobe Creative Suite 4 All in One brings together all the answers beginning users need to succeed with Adobe's flagship Web development and graphic design products. Unlike some competitive books, this one recognizes that you don't want to learn only one product: you want to draw on tools from the entire suite to handle real projects and solve real problems. Thoroughly updated for the new Adobe Creative Suite 4, this book offers thorough, step-by-step coverage of the new versions of Photoshop, Illustrator, Acrobat, InDesign, Flash, and Dreamweaver. It also shows you how to take full advantage of the rich integration features Adobe has built into each Creative Suite application. You will gain real-world mastery through a series of professionally developed projects that illustrate each lesson: projects covering both print and Web assignments. This edition's fresh, full-color, wide-trim design makes it even more visually appealing, and its new layout and organization makes its content even easier to understand and use.



Table of Contents:
PART I: THE CREATIVE SUITE
1. Adobe Creative Suite: The Right Tool for the Job
2. Working Together: Application Integration


PART II: THE APPLICATIONS
3. Using Adobe Bridge
4. Using Adobe Photoshop
5. Using Adobe Illustrator
6. Using Adobe InDesign
7. Using Adobe Fireworks
8. Using Adobe Flash
9. Using Adobe Dreamweaver
10. Using Adobe Acrobat 9 Professional


PART III: STEP-BY-STEP PROJECTS
11. Creating a Corporate Identity
12. Creating a Brochure
13. Creating an Ad Campaign
14. Creating an Interactive Web Banner
15. Creating a Web Page
16. Creating a Business Presentation


APPENDIX
A. Using Adobe Services

Interesting book: Direction de Processus d'affaires :Directives Pratiques aux Implémentations Réussies

Java 2 Weekend Crash Course with Cdrom

Author: Julio Sanchez

The Weekend Crash Course series consists of 30 sessions over a period of three days. Each session is designed to take 30 minutes to complete, so the Crash Course is an intense 15-hour learning period beginning on Friday evening and ending on Sunday afternoon. Naturally, you can adapt their learning to whatever schedule best suits your needs.

Java 2 Weekend Crash Course is written to meet the needs of the reader who is new to Java. However, through the use of carefully constructed roadmaps at the beginning of each session as well as pre- and post-assessment software on the CD-ROM, the book is also quite accessible to the reader who already has some knowledge of Java.



Saturday, January 24, 2009

CCNA Portable Command Guide or The Digital Person

Cancer Prevention and Management through Exercise and Weight Control

Author: Scott D Empson

"..it is increasingly clear that cancer is also a disease of inertia. In this book, a broadly multidisciplinary group presents the evidence and provides the recommendations. - The antidote to diseases of inertia is movement - let's move!"

John Potter, M.D.,Ph.D., from the Foreword

The American Cancer Society estimates that a third of all cancer deaths could be prevented through avoidance of obesity and the rejection of sedentary lifestyles. The World Health Organization also supports this claim. Additionally, these and other organizations now recognize the role that activity can play in improving the quality of life for cancer patients.

Cancer Prevention and Management through Exercise and Weight Control provides us with the support necessary to make a call to action. Itbrings together the contributions of world-class researchers to lay out the evidence and a plan of attack for coping with this crisis. The text begins by focusing on the research methods used in assessing the complex associations between activity, energy balance, and risk and prognosis. In comprehensive literature reviews, the authors consider the role of physical activity in the incidence of individual cancers, then explore the mechanisms that might explain this connection. They continue with a look at the relation between weight and cancer incidence, including a consideration of genetics.

Research is also provided linking physical activity and weight control to a cancer patient's quality of life and prognosis. The work concludes with ideas on how a plan of action might be implemented at the individual, clinical, and public health levels. It also provides guidance on incorporatingexercise and diet recommendations into clinical oncology practice.



See also: Good Housekeeping Smart Carb Suppers or Quick Low Carb

The Digital Person: Technology and Privacy in the Information Age

Author: Daniel Solov

Seven days a week, twenty-four hours a day, electronic databases are compiling information about you. As you surf the Internet, an unprecedented amount of your personal information is being recorded and preserved forever in the digital minds of computers. For each individual, these databases create a profile of activities, interests, and preferences used to investigate backgrounds, check credit, market products, and make a wide variety of decisions affecting our lives. The creation and use of these databases—which Daniel J. Solove calls "digital dossiers"—has thus far gone largely unchecked.  In this startling account of new technologies for gathering and using personal data, Solove explains why digital dossiers pose a grave threat to our privacy.

Digital dossiers impact many aspects of our lives. For example, they increase our vulnerability to identity theft, a serious crime that has been escalating at an alarming rate. Moreover, since September 11th, the government has been tapping into vast stores of information collected by businesses and using it to profile people for criminal or terrorist activity. 

THE DIGITAL PERSON not only explores these problems, but provides a compelling account of how we can respond to them.  Using a wide variety of sources, including history, philosophy, and literature, Solove sets forth a new understanding of what privacy is, one that is appropriate for the new challenges of the Information Age. Solove recommends how the law can be reformed to simultaneously protect our privacy and allow us to enjoy the benefits of our increasingly digital world.

Daniel J. Solove is associate professor of law at the George Washington University Law School.  He is the author (with Marc Rotenberg) of INFORMATION PRIVACY LAW. 

What People Are Saying

Paul Schwartz
A must-read. The Digital Person is a far-reaching examination of how 'digital dossiers' are shaping our lives. Solove has persuasively reconceptualized privacy for the digital age.
Professor of Law, Brooklyn Law School


Pamela Samuelson
Solove's book is the best exposition thus far about the threat that computer databases containing personal data about millions of Americans poses for information privacy. Solove documents not only how ongoing advances in information technology is increasing this threat significantly, but also how governmental uses of private sector databases and private sector uses of governmental databases are further eroding the privacy-by-obscurity protection of yesteryear. Most importantly, Solove offers a conception of privacy that, if adopted, provides guidance about policies that would preserve information privacy as a social value.
Chancellor's Professor of Law and Information Management at the University of California, Berkeley


Jeffrey Rosen
Daniel Solove is one of the most energetic and creative scholars writing about privacy today. The Digital Person is an important contribution to the privacy debate, and Solove's discussion of the harms of what he calls 'digital dossiers' is invaluable.
author of The Unwanted Gaze and The Naked Crowd




Table of Contents:
1Introduction1
2The rise of the digital dossier13
3Kafka and Orwell : reconceptualizing information privacy27
4The problems of information privacy law56
5The limits of market-based solutions76
6Architecture and the protection of privacy93
7The problem of public records127
8Access and aggregation : rethinking privacy and transparency140
9Government information gathering165
10The fourth amendment, records, and privacy188
11Reconstructing the architecture210
12Conclusion223

Friday, January 23, 2009

Microsoft Office 2007 Business Intelligence or Observing the User Experience

Microsoft Office 2007 Business Intelligence

Author: Doug Harts

Extract and analyze mission-critical enterprise data using Microsoft Office 2007

This authoritative volume is a practical guide to the powerful new collaborative Business Intelligence tools available in Office 2007. Using real-world examples and clear explanations, Microsoft Office 2007 Business Intelligence: Reporting, Analysis, and Measurement from the Desktop shows you how to use Excel, Excel Services, SharePoint, and PerformancePoint with a wide range of stand-alone and external data in today's networked office. You will learn how to analyze data and generate reports, scorecards, and dashboards with the Office tools you're already using to help you in your everyday work.

  • Create Excel PivotTables and PivotCharts and apply Conditional Formatting
  • Convert Excel spreadsheets into Excel Tables with Conditional Formatting and Charting

    Table of Contents:
    Foreword

    Preface

    Acknowledgments

    Chapter 1. Introduction to Microsoft Office BI Concepts

    Chapter 2. PivotTables, PivotCharts, and Conditional Formatting

    Chapter 3. Excel Tables: Conditional Formatting, What-If and Statistics, and Charts

    Chapter 4. Excel and External Data: Files, Databases, Cubes, and Data from the Internet

    Chapter 5. Excel and SharePoint: Reports, Key Performance Indicators, and Dashboards

    Chapter 6. Excel and Data Mining: Key Influencers, Categories, and Forecasting

    Chapter 7. PerformancePoint: Dashboards, Scorecards, and Key Performance Indicators

    Chapter 8. Office BI: Office, Visio, Windows Mobile, Office Online, SQL Server, and Virtual Earth

    Index

    New interesting book: Savvy Patient or Bach Flowers

    Observing the User Experience: A Practioner's Guide for User Research

    Author: Mike Kuniavsky

    Wow! So many of the user experience research methods we have refined and used over the years are now organized and described in detail in one book.
    --Christian Rohrer, Manager, User Experience Research, Yahoo!

    I love Observing the User Experience! This comprehensive guide approaches user experience research like never before, and is well-written, easy-to-read, and quite user friendly. It provides a real-world example of how research is done in just enough detail that it can both inform a CEO of the role of usability research as well as introduce methodology to someone starting out in the field. Bravo!
    --Kelly Braun, Usability Manager, Ebay

    The gap between who designers and developers imagine their users are, and who those users really are can be the biggest problem with product development. Observing the User Experience will help you bridge that gap to understand what your users want and need from your product, and whether they'll be able to use what you've created.

    Filled with real-world experience and a wealth of practical information, this book presents a complete toolbox of techniques to help designers and developers see through the eyes of their users. It provides in-depth coverage of 13 user experience research techniques that will provide a basis for developing better products, whether they're Web, software or mobile based. In addition, it's written with an understanding of how software is developed in the real world, taking tight budgets, short schedules, and existing processes into account.

    Features and benefits:

    •Explains how to create usable products that are still original, creative, and unique

    •A valuableresource for designers, developers, project managers—anyone in a position where their work comes in direct contact with the end user.

    •Provides a real-world perspective on research and provides advice about how user research can be done cheaply, quickly and how results can be presented persuasively

    •Gives readers the tools and confidence to perform user research on their own designs and tune their software user experience to the unique needs of their product and its users



Thursday, January 22, 2009

ProTools For Musicians and Songwriters or Adobe InDesign CS4 One on One

ProTools For Musicians and Songwriters

Author: Gina Fant Saez

Digidesign's Pro Tools sets the standard for digital audio software, yet you haven't been able to use it because you can't translate the engineering-speak that dominates most of the references to it. Now, finally, there's help: a guide that speaks a language you, as a musician, can understand. In Pro Tools for Musicians and Songwriters, author and musician Gina Fant-Saez encourages you to think of Pro Tools as not just a piece of software but as another musical instrument—thus ensuring you'll not be overwhelmed by too much technology nor get too little of the musical vernacular you understand so well. From creating that first track to working with loops; recording, editing, and mixing audio; working with MIDI; managing files; working with other musicians; and more, you'll find everything you need here to start making music in your own home studio with Pro Tools. Throughout, the emphasis is on the music—with simple step-by-step instructions to get going, tons of visual aids and sidebars to illuminate the text, and a companion Web site with downloadable QuickTime video tutorials, loops, and source files.



Table of Contents:
1Getting started2
2Loops & recording20
3The edit window50
4Playlists & markers96
5Using plug-ins124
6Inserts & busses146
7MIDI tracks180
8More on MIDI216
9Arranging a song256
10Tips & tools286
11Automate & mix346
12Export your song420

Book about: Gelehrsamkeit im Digitalen Zeitalter: Information, Infrastruktur, und das Internet

Adobe InDesign CS4 One-on-One

Author: Deke McClelland

Master the fundamentals of Adobe InDesign with One-on-One, Deke McClelland's unique and effective learning system. Abode InDesign CS4 One-on-One includes step-by-step tutorials, more than four hours of DVD-video demonstrations, and hands-on projects to help you improve your knowledge and hone your skills. Once you read about a particular technique, you can see how it's done first-hand in the video. The combination is uniquely effective. Whether you're new to InDesign or a creative professional interested in the groundbreaking features of CS4, Deke's conversational style and carefully structured lessons guide you easily through the program's fundamental and advanced concepts and techniques. More than 900 full-color photos, diagrams, and screen shots illustrate every key step. With this book, you will: Learn at your own speed with 12 self-paced tutorials Create professional-looking documents with InDesign's powerful text and graphic tools Discover how to create, import, and modify artwork Apply a sequence of style sheets to format an entire document in one operation Compose a fully interactive document with bookmarks, hyperlinks, buttons, sounds, and movies Test your knowledge with multiple-choice quizzes in each chapter

And more. Written and produced by a Photoshop expert with well over 20 years of experience, Adobe InDesign CS4 One-on-One simulates a classroom environment that provides one-on-one attention as you proceed from lesson to lesson. You'll learn to use InDesign faster, more creatively, and more efficiently than you thought possible.



Tuesday, January 20, 2009

Adobe Photoshop Elements 7 On Demand or Corporate E Learning

Adobe Photoshop Elements 7 on Demand

Author: Perspection Inc

Adobe Photoshop Elements 7 on Demand teaches this newest version through real-world, step-by-step examples presented in full color. Designed for everyone who would rather be shown than told, this task-based guide relies on the proven On Demand format that has proven immensely successful with other graphics and design tutorials. This comprehensive book offers more content for less money! It walks readers through virtually every task they'll want to perform : importing, viewing, and finding photos; using Elements' powerful editing toolset; adjusting and correcting color; retouching; using layer styles, photo effects, and filters; getting creative with type; sharing images in scrapbooks, web galleries, and photo email, and much more. An exclusive end-of-book workshop shows readers how to use multiple features together on a major start-to-finish project. This book is organized for super-fast access to any task, and supported by an extensive collection of downloadable practice files and resources.



New interesting textbook: Breathing for a Living or Lose That Baby Fat

Corporate E-Learning: An Inside View of IBM's Solutions

Author: Luther Tai

Corporate e-learning has become increasingly important in the contemporary universal-access business world, and can provide strategic and competitive advantages to corporations as a way to accelerate training and reduce the high costs of face-to-face learning programs. However, most of the books that are written about e-learning do not describe in detail how corporate e-learning is actually implemented within a specific company. Corporate E-Learning fills that gap by describing in depth how e-learning programs are developed and instituted, and how their effectiveness is measured, from the perspective of practicing e-learning professionals at IBM, an early and liberal user of e-learning technologies to train their global workforce. Drawing on a wealth of in-person interviews of numerous e-learning professionals at IBM, as well as recent e-learning literature, Tai discusses how IBM has significantly contributed to the evolution of corporate e-learning. In the course of doing so, he makes useful comparisons with other companies and industries, and draws conclusions that are applicable to any company considering utilizing e-learning. Companies should be careful, concludes Tai, to use e-learning only when it makes strategic and economic sense, not simply because the technology is available. In addition, e-learning should always be used along with other more traditional means of learning, and carefully monitored by feedback mechanisms to measure whether its objectives have been accomplished, and how e-learning programs might improve in the future. Corporate E-Learning is designed for classroom use in technology management courses, and will also appeal to corporate professionals who areinvolved in training, human resources development, and performance improvement.



Monday, January 19, 2009

Mac OS X System Administration Reference Volume 1 or Future of Business

Mac OS X System Administration Reference, Volume 1 (Apple Training Series)

Author: Schoun Regan

This comprehensive, technical reference guide provides in-depth information on Apple technical architecture. It will teach the reader how to install and configure machines; architect and maintain networks; enable, customize, tune and troubleshoot a wide range of services; and integrate Mac OS X, Mac OS X Server, and other Apple technologies within a networked environment. The book covers myriad system administration topics from Directory Services integration to Tiger Server deployment, Xsan administration, account management best practices, security best practices, and more. Following the learning objectives of the Apple Certified System Administrator exam, this book is a perfect supplement to Apple's own training class and a in-depth technical reference for existing system administrators and engineers.



New interesting book: Community Policing and Problem Solving or Andrew Johnson

Future of Business

Author: Lawrence J Gitman

THE FUTURE OF BUSINESS prepares students for a successful career in business by equipping them with the knowledge, skills, and competencies they need to prepare for tomorrow's competitive workplace. Each chapter offers a thorough presentation of business principles and also highlights emerging business trends in fields such as management, leadership, production, marketing and finance. Trends include shifts in economic policies in Europe, the global marketplace, the boom in the service sector, managing workforce diversity, new technology, and more. The text also helps students envision themselves in a business career, revealing possibilities that exist when they select business as a major through new "Exploring Business Careers" opening vignettes and videos. Advanced learning tools such as online learning resources (ThomsonNOW) and the Integrated Learning System help build business competencies. To help students develop high-performance workplace skills, the Secretary's Commission on Achieving Necessary Skills (SCANS) recommends students develop five workplace competencies: using and allocating resources, working with others, acquiring and using information, understanding systems, and working with technology. The "Preparing for Tomorrow's Workplace" activities are designed to develop these workplace skills in students. SCANS competencies and workplace skill-building are key features included in the homework section of each chapter.

Booknews

Packaged for the MTV crowd with companion Web site, CD-ROM, and video lectures, the interactive edition of this introductory text is also loaded up with e-commerce case studies, color photos, and quick-hit sidebars. It explains what a business does and how it's created, identifies trends that will affect all businesses in the coming century, and provides information on careers. The authors are teachers of finance (Gitman, San Diego State U.) and marketing (McDaniel, U. of Texas-Arlington). Annotation c. Book News, Inc., Portland, OR (booknews.com)



Table of Contents:
Pt. 1The Business Environment
1Your Future in Business Begins Now1
AppGetting Your Career Off on the Right Track26
2Understanding Evolving Economic Systems and Competition34
3Competing in the Global Marketplace64
4Making Ethical Decisions and Managing a Socially Responsible Business98
AppUnderstanding the Legal and Tax Environment125
Pt. 2Business Ownership
5Forms of Business Ownership136
6Entrepreneurship: Starting and Managing Your Own Business168
Careers in Small Business200
Pt. 3Business Management
7Management and Leadership in Today's Organization202
8Designing Organizational Structures228
9Managing Human Resources259
10Motivating Employees and Creating Self-managed Teams286
11Understanding Labor-Management Relations314
12Achieving World-class Operations Management344
Careers in Management376
Pt. 4Marketing Management
13Understanding the Customer and Creating Goods and Services that Satisfy380
14Developing Quality Products at the Right Price410
15Distributing Products in a Timely and Efficient Manner442
16Using Integrated Marketing Communications to Promote Products470
Careers in Marketing497
Pt. 5Technology and Information
17Using Technology to Manage Information500
18Using the Internet for Business Success532
19Using Financial Information and Accounting566
Careers in Technology and Managing Information595
Pt. 6Finance
20Understanding Money and Financial Institutions600
21Financial Management620
22Understanding Securities and Securities Markets646
23Managing Your Personal Finances678
AppManaging Risk and Insurance708
Careers in Finance714

MCDST or FISMA Certification and Accreditation Handbook

MCDST: Microsoft Certified Desktop Support Technician Study Guide (70-271 and 70-272)

Author: Bill Ferguson

Here's the book you need to prepare for Microsoft's new MCDST exams—70-271: Supporting Users and Troubleshooting a Microsoft XP Operating System; and 70-272: Supporting Users and Troubleshooting Desktop Applications on a Microsoft Windows XP Operating System.

This two-in-one Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and accessible instructional approach that earned Sybex the "Best Study Guide" designation in the 2003 CertCities Readers Choice Awards, this book provides:



• In-depth coverage of all exam topics

• Practical information on supporting users and troubleshooting applications

• Hundreds of challenging review questions

• Leading-edge exam preparation software, including a test engine and electronic flashcards



Authoritative coverage of all exam objectives, including:

Exam 70-271:



• Installing a Windows Desktop Operating System

• Managing and Troubleshooting Access to Resources

• Configuring and Troubleshooting Hardware Devices and Drivers

• Configuring and Troubleshooting the Desktop and User Environments

• Troubleshooting Network Protocols and Services



Exam 70-272:



• Configuring and Troubleshooting Applications

• Resolving Issues Related to Usability

• Resolving Issues Related to Application Customization

• Configuring and Troubleshooting Connectivity for Applications

• Configuring ApplicationSecurity






New interesting textbook: Thanksgiving or Game Bird Classic Recipes

FISMA Certification and Accreditation Handbook

Author: L Taylor

The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements.

This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three leading types of C&A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a C&A project. The next section to the book illustrates addressing security awareness, end-user rules of behavior, and incident response requirements. Once this phase of the C&A project is complete, the reader will learn to perform the security tests and evaluations, business impact assessments system risk assessments, business risk assessments, contingency plans, business impact assessments, and system security plans. Finally the reader will learn to audit their entire C&A project and correct any failures.

* Focuses on federally mandated certification and accreditation requirements
* Author Laura Taylor's research on Certification and Accreditation has been used by the FDIC, the FBI, and the Whitehouse
* Full of vital information on compliance for both corporate and government IT Managers



Table of Contents:
Foreword     xxiii
Preface     xxv
What Is Certification and Accreditation?     1
Introduction     2
Terminology     3
Audit and Report Cards     6
A Standardized Process     7
Templates, Documents, and Paperwork     8
Certification and Accreditation Laws Summarized     9
Summary     10
Notes     11
Types of Certification and Accreditation     13
Introduction     14
The NIACAP Process     15
The NIST Process     16
NIACAP and NIST Phases, Differences, and Similarities     16
NIACAP and NIST Compared     17
DITSCAP     18
DCID 6/3     19
The Common Denominator of All C&A Methodologies     20
C&A for Private Enterprises     21
Summary     23
Notes     23
Understanding the Certification and Accreditation Process     25
Introduction     26
Recognizing the Need for C&A     26
Roles and Responsibilities     27
Chief Information Officer     27
Authorizing Official     29
Senior Agency InformationSecurity Officer     30
Senior Agency Privacy Official     31
Certification Agent/Evaluation Team     31
Business Owner     33
System Owner     33
Information Owner     33
Information System Security Officer     34
C&A Preparers     35
Agency Inspectors     35
GAO Inspectors     36
Levels of Audit     36
Stepping through the Process     37
The Initiation Phase     37
The Certification Phase     40
The Accreditation Phase     41
The Continuous Monitoring Phase     42
Summary     44
Establishing a C&A Program     45
Introduction     46
C&A Handbook Development     46
What to Include in Your Handbook     47
Who Should Write the Handbook?     48
Template Development     48
Provide Package Delivery Instructions     50
Create an Evaluation Process     51
Authority and Endorsement     51
Improve Your C&A Program Each Year     52
Problems of Not Having a C&A Program     52
Missing Information     52
Lack of Organization     53
Inconsistencies in the Evaluation Process     53
Unknown Security Architecture and Configuration     53
Unknown Risks     54
Laws and Report Cards     54
Summary     55
Developing a Certification Package     57
Introduction     58
Initiating Your C&A Project     58
Put Together a Contact List     58
Hold a Kick-Off Meeting     59
Obtain Any Existing Agency Guidelines     60
Analyze Your Research     61
Preparing the Documents     61
It's Okay to Be Redundant     62
Different Agencies Have Different Requirements     62
Including Multiple Applications and Systems in One Package     63
Verify Your Information     64
Retain Your Ethics     64
Summary     66
Preparing the Hardware and Software Inventory     67
Introduction     68
Determining the Accreditation Boundaries     68
Collecting the Inventory Information     70
Structure of Inventory Information     71
Delivery of Inventory Document     72
Summary     74
Determining the Certification Level     75
Introduction     76
What Are the C&A Levels?     76=970 03$lLevel 1     76=970 03$lLevel 2     77=970 03$lLevel 3     77=970 03$lLevel 4     78
Importance of Determining the C&A Level     79
Don't Make This Mistake     79
Criteria to Use for Determining the Levels     81
Confidentiality, Integrity, and Availability     81
Confidentiality     82
Determining the Confidentiality Level     83
Integrity     84
Determining the Integrity Level     84
Availability     85
Determining the Availability Level     86
How to Categorize Multiple Data Sets     86
Impact Levels and System Criticality     87
System Attribute Characteristics     89
Interconnection State (Interfacing Mode)     89
Access State (Processing Mode)     90
Accountability State (Attribution Mode)     91
Mission Criticality     92
Determining Level of Certification     93
Template for Levels of Determination     94
Rationale for the Security Level Recommendation     97
Process and Rationale for the C&A Level Recommendation     99
The Explanatory Memo     102
Template for Explanatory Memo     103
Summary     105
Performing and Preparing the Self-Assessment     107
Introduction     108
Objectives     108
Designing the Survey     109
Levels of Compliance     109
Management Controls     111
Operational Controls     112
Technical Controls     113
Correlation with Security Policies and Laws     113
Answering the Questions     114
Questions for Self-Assessment Survey     116
Summary     137
Notes     138
Addressing Security Awareness and Training Requirements     139
Introduction     140
Purpose of Security Awareness and Training     140
Security Training     141
Security Awareness     142
The Awareness and Training Message     142
Online Training Makes It Easy     144
Document Your Plan     144
Security Awareness and Training Checklist     145
Security Awareness Material Evaluation     145
Security Awareness Class Evaluation      147
Summary     148
Notes     148
Addressing End-User Rules of Behavior     149
Introduction     150
Implementing Rules of Behavior     150
What Rules to Include     151
Rules for Applications, Servers, and Databases     151
Additional Rules for Handhelds     152
Additional Rules for Laptops and Desktop Systems     153
Additional Rules for Privileged Users     154
Consequences of Noncompliance     155
Rules of Behavior Checklist     155
Summary     156
Addressing Incident Response     157
Introduction     158
Purpose and Applicability     158
Policies and Guidelines     159
Reporting Framework     160
Roles and Responsibilities     162
Agency CSIRC     162
Information System Owner and ISSO     163
Incident Response Manager     164
Definitions     165
Incident     165
Impact, Notification, and Escalation     166
Incident Handling     168
Detecting an Incident     169
Containment and Eradication     171
Recovery and Closure      172
Forensic Investigations     173
Incident Types     176
Incident Response Plan Checklist     180
Security Incident Reporting Form     181
Summary     183
Additional Resources     183
Incident Response Organizations     183
Additional Resources     184
Articles and Papers on Incident Response     185
Notes     186
Performing the Security Tests and Evaluation     187
Introduction     188
Types of Security Tests     188
Confidentiality Tests     189
Integrity Tests     191
Availability Tests     192
Types of Security Controls     193
Management Controls     193
Operational Controls     194
Technical Controls     194
Testing Methodology and Tools     194
Algorithm Testing     197
Code and Memory Analyzers     198
Network and Application Scanners     199
Port Scanners     200
Port Listeners     201
Modem Scanners     201
Wireless Network Scanner     202
Wireless Intrusion Detection Systems      202
Wireless Key Recovery     203
Password Auditing Tools     203
Database Vulnerability Testing Tools     204
Test Management Packages     204
Who Should Perform the Tests?     205
Documenting the Tests     205
Analyzing the Tests and Their Results     205
Summary     207
Additional Resources     207
Books Related to Security Testing     207
Articles and Papers Related to Security Testing     208
Notes     209
Conducting a Privacy Impact Assessment     211
Introduction     212
Privacy Laws, Regulations, and Rights     212
OMB Memoranda     213
Laws and Regulations     213
PIA Answers Questions     214
Personally Identifiable Information (PII)     215
Persistent Tracking Technologies     217
Determine Privacy Threats and Safeguards     218
Decommissioning of PII     219
System of Record Notice (SORN)     220
Posting the Privacy Policy     220
PIA Checklist     220
Summary     222
Books on Privacy     222
Notes      222
Performing the Business Risk Assessment     225
Introduction     226
Determine the Mission     227
Create a Mission Map     229
Construct Risk Statements     230
Describe the Sensitivity Model     232
Impact Scale     233
Likelihood Scale     234
Calculating Risk Exposure     234
Lead the Team to Obtain the Metrics     235
Analyze the Risks     235
Make an Informed Decision     237
Accept the Risk     237
Transfer the Risk     238
Mitigate the Risk     238
Summary     241
Books and Articles on Risk Assessment     241
Notes     242
Preparing the Business Impact Assessment     243
Introduction     244
Document Recovery Times     244
Establish Relative Recovery Priorities     245
Telecommunications     246
Infrastructure Systems     247
Secondary Systems     247
Define Escalation Thresholds     248
Record License Keys     249
BIA Organization     250
Summary     252
Additional Resources      252
Developing the Contingency Plan     253
Introduction     254
List Assumptions     255
Concept of Operations     255
System Description     255
Network Diagrams and Maps     256
Data Sources and Destinations     256
Roles and Responsibilities     257
Contingency Planning Coordinator     258
Damage Assessment Coordinator     259
Emergency Relocation Site Adviser and Coordinator     260
Information Systems Operations Coordinator     260
Logistics Coordinator     260
Security Coordinator     261
Telecommunications Coordinator     261
Levels of Disruption     262
Procedures     263
Backup and Restoration Procedures     263
Procedures to Access Off-site Storage     264
Operating System Recovery Procedures     264
Application Recovery Procedures     265
Connectivity Recovery Procedures     265
Key Recovery Procedures     266
Power Recovery Procedures     266
Recovering and Assisting Personnel     267
Notification and Activation     267
Line of Succession      269
Service Level Agreements     269
Contact Lists     270
Testing the Contingency Plan     270
Appendices     271
Contingency Plan Checklist     271
Additional Resources     272
Performing a System Risk Assessment     275
Introduction     276
Risk Assessment Creates Focus     276
Determine Vulnerabilities     278
Threats     280
Threats Initiated by People     280
Threats Initiated by Computers or Devices     280
Threats from Natural Disasters     281
Qualitative Risk Assessment     282
Quantitative Risk Assessment     283
Qualitative versus Quantitative Risk Assessment     287
Present the Risks     288
Make Decisions     291
Checklist     291
Summary     293
Additional Resources     293
Notes     294
Developing a Configuration Management Plan     295
Introduction     296
Establish Definitions     296
Describe Assets Controlled by the Plan     297
Describe the Configuration Management System      298
Define Roles and Responsibilities     299
Establish Baselines     301
Change Control Process     302
Change Request Procedures     303
Emergency Change Request Procedures     303
Change Request Parameters     304
Configuration Control Board     304
Configuration Management Audit     306
Configuration and Change Management Tools     307
Configuration Management Plan Checklist     308
Summary     309
Additional Resources     309
Preparing the System Security Plan     311
Introduction     312
Laws, Regulations, and Policies     312
The System Description     313
System Boundaries     315
System Mission     316
Data Flows     318
Security Requirements and Controls     318
Management Controls     325
Risk Mitigation     325
Reporting and Review by Management     326
System Lifecycle Requirements     328
Security Planning     329
Documentation for Managers     329
Operational Controls     330
Personnel Security     330
Physical and Environmental Controls and Safeguards     331
Administration and Implementation     332
Preventative Maintenance     333
Contingency and Disaster Recovery Planning     334
Training and Security Awareness     334
Incident Response Procedures     335
Preservation of Data Integrity     335
Network and System Security Operations     336
Technical Controls     338
Authentication and Identity Verification     338
Logical Access Controls     341
Secure Configurations     341
Interconnectivity Security     344
Audit Mechanisms     346
ISSO Appointment Letter     349
System Security Plan Checklist     351
Summary     353
Additional Resources     353
Notes     354
Submitting the C&A Package     355
Introduction     356
Structure of Documents     356
Who Puts the Package Together?     357
Markings and Format     357
Signature Pages     358
A Word About "Not Applicable" Information     359
Submission and Revision     360
Defending the Certification Package      360
Checklist     362
Summary     363
Additional Resources     363
Evaluating the
Certification Package for Accreditation     365
Introduction     366
The Security Assessment Report     366
Checklists for Compliance     366
Compliance Checklist for Management Controls     368
Compliance Checklist for Operational Controls     380
Compliance Checklist for Technical Controls     392
Recommendation to Accredit or Not     404
Accreditation and Authority to Operate     405
Interim Authority to Operate     405
Evaluations by an OIG     407
Evaluations by the GAO     408
Checklist     409
Summary     410
Addressing C&A Findings     411
Introduction     412
POA&Ms     412
Development and Approval     412
POA&M Elements     413
A Word to the Wise     416
Checklist     416
Summary     417
Improving Your Federal Computer Security Report Card Scores     419
Introduction     420
Elements of the Report Card      420
Actions for Improvement     421
Trends     422
Summary     423
Resources     425
Acronyms     428
FISMA     431
OMB Circular A-130: Appendix III     453
FIPS 199     473
Index     485

Maran Illustrated Windows Vista Guided Tour or Digital Photographers Handbook

Maran Illustrated Windows Vista Guided Tour

Author: Ruth Maran

Maran Illustrated? Windows Vista Guided Tour is an excellent guide for Windows users of all skill levels. Our Guided Tour books feature our famous disk character that walks you through each task step by step. Using clear, concise instructions accompanied by hundreds of full-color screen shots, Maran Illustrated? Windows Vista Guided Tour is perfect for any visual learner who prefers seeing what to do rather than reading lengthy explanations. Maran Illustrated? Windows Vista Guided Tour is the fastest and easiest way to get started and get up to speed with Windows Vista. New and improved Windows Vista features covered in this book include: Live Taskbar Thumbnails, Windows Flip and Flip 3D Vista Firewall and Windows Defender Internet Explorer 7, including Tabbed Browsing Windows Sidebar and Gadgets Maran Illustrated? Windows Vista Guided Tour is an information-packed resource. The easy-to-follow information is communicated through clear, step-by-step instructions and accompanied by hundreds of full-color screen shots - perfect for any visual learner. Learning Windows has never been this easy.



Interesting textbook: Saddam or LBJ

Digital Photographer's Handbook

Author: Tom Ang

Encompassing both digital and conventional photography and revised to include the most up-to-date cameras, computers, peripherals, and software, the Digital Photographer's Handbook encourages traditional photographers to experiment with new technology while inspiring experienced users to reach new heights. Expert photographer Tom Ang shows how to get the most out of this new technology - from improving casual snapshots to learning the secrets of lighting, composition, and digital image manipulation. The accessible yet in-depth text, stunning photography, and quick-fix features provide a practical approach to producing better photographs in a snap.

Publishers Weekly

The revolution will surely be streamed as well as televised, and the slide show for the new century will projected from the desktop. This guide will have you clogging inboxes in no time; Ang (Tao of Photography), senior lecturer in photographic practice at London's University of Westminster, starts out with the very basic: he explains what the World Wide Web is and compares computers, cameras, software, and printers-before moving on to how to take better pictures. Ang then walks readers through manipulating and perfecting images (including cropping, rotation, sharpening, "split toning" and host of other possibilities), and incorporating old-style slides and photos into a digital portfolio. There are tip sheets in all the right places, and after every section, a "Quick Fix" list of common problems to help with troubleshooting. There's also a glossary and more than 1,000 color illustrations. Perhaps most useful are the screen shots of the many puzzling dialogue boxes computers offer, and careful explanations for dealing with them. In all, this is an excellent guide to a confusing realm. (Sept.) Copyright 2003 Cahners Business Information.

Library Journal

Generously illustrated with over 1000 photographs, this fine book covers virtually every aspect of digital photography. Photo editor and author Ang knowledgeably discusses digital technology, including cameras, lenses, scanners, and printers, along with computers, accessories, and software. He then goes on to explore the unique challenges and advantages of composition and exposure with digital cameras. Separate chapters deal with scanning, including troubleshooting and file management. Ang thoroughly addresses image manipulation and image output, including details on printing, developing a portfolio, and mounting an exhibit. He offers practical advice about selecting equipment and establishing a profitable business. This is certainly one of the best and most comprehensive books available about digital photography. Despite the depth and detail of the subject, the book is written in a clear, straightforward style. Both amateur photographers and seasoned professionals will find this handbook to be a very useful guide as they explore new photographic technology. Highly recommended for both general and subject collections in public and academic libraries.-Raymond Bial, Parkland Coll. Lib., Champaign, IL Copyright 2002 Cahners Business Information.



Sunday, January 18, 2009

Writing Better Requirements or Principles of Digital Audio

Writing Better Requirements

Author: Ian F Alexander

Experience has shown us that investment in the requirements process saves time, money, and effort. Yet, development efforts consistently charge ahead without investing sufficiently in the requirements process. We are so intent to develop the technical solutions that we are unwilling to take the time and effort to understand and meet the real customer needs.
--From the Foreword by Ralph R. Young, author of Effective Requirements Practices

Who is it for?

If you are involved in the systems engineering process, in any company -- from transport and telecommunications, to aerospace and software -- you will learn how to write down requirements to guarantee you get the systems YOU need.

What skills will I learn?


  • How to write simple, clear requirements -- so you get what you want
  • How to organize requirements as scenarios -- so everyone understands what you want
  • How to review requirements -- so you ask for the right things



0321131630B05282002



Book review: Das Entwickeln des Potenzials Über eine Volle Reihe von Führungen: Fälle auf Transactional und Transformationsführung

Principles of Digital Audio

Author: Ken C Pohlmann

THE #1 BEST-SELLING BOOK ON DIGITAL AUDIO ENGINEERING
This definitive text provides comprehensive coverage of today’s leading digital audio technologies as well as a thorough survey of fundamentals and theory. Written by well-known audio engineering expert and best-selling author Ken Pohlmann, four previous editions have been valued for their clear explanations and have been widely used as college texts and professional references. The fifth edition of Principles of Digital Audio has been extensively updated and revised to reflect ongoing widespread changes in the audio industry.
Beginning with an in-depth discussion of digital audio recording and reproduction, the text then details perceptual low bit-rate coding, CD and DVD disc formats, digital audio broadcasting, internet and network audio, and DSP. From the basic theory to the latest technological advancements, Principles of Digital Audio completely covers this multifaceted field, including topics such as:

  • MP3, AAC, and Dolby Digital audio coding
  • DVD playback and recording formats
  • PC-based desktop audio systems
  • 5.1-channel surround-sound coding
  • HD Radio and satellite radio
  • Music downloading and streaming
  • Digital signal processing

ALL THE ESSENTIALS OF DIGITAL AUDIO
* Sound and Numbers * Fundamental Theory * Digital Audio Recording * Digital Audio Reproduction * Error Correction * Digital Audio Tape * Optical Disc Storage * Compact Disc and SACD * Recordable CD * Interconnection * Perceptual Coding: Theory and Applications * MPEG-1 and MPEG-2 * MP3 Codec * MPEG-4 and AAC * Psychoacoustic Models * Surround Sound Coding * Lossless Coding *DVD-Video and DVD-Audio * Recordable DVD * HD-DVD and Blu-ray * Minidisc * Desktop Audio * Network Audio * Downloadable and Streaming Internet Audio * File Formats * Digital Rights Management * Watermarking and Encryption * MPEG-7 * Digital Radio and TV Broadcasting * HD Radio * Satellite Radio * Digital Audio Workstations * Digital Signal Processing: Theory and Applications * Sigma Delta Conversion and Noise Shaping



Table of Contents:
Preface to the third edition
Introduction
1Sound and Numbers1
2Fundamentals of Digital Audio22
3Digital Audio Recording50
4Digital Audio Reproduction82
5Error Correction133
6Magnetic Tape Storage174
7Digital Audio Tape (DAT)203
8Optical Storage and Transmission227
9The Compact Disc264
10Interconnection317
11Perceptual Coding354
12The MiniDisc416
13Digital Audio Broadcasting439
14Digital Audio Workstations461
15Digital Signal Processing484
16Low-Bit Conversion and Noise Shaping532
Appendix The Sampling Theorem572
Bibliography577
Index604
About the Author623

Saturday, January 17, 2009

Computer Programming for Teens or Final Cut Pro HD for Dummies

Computer Programming for Teens

Author: Mary E Farrell

Ready to learn computer programming but aren't sure where to start? Look no further, Computer Programming for Teens is the book for you. Other books on programming tend to be language specific and often get bogged down in the syntax of the language. That is fine if you already have a strong background in programming, but if you're a novice, the language-specific approach can make things unnecessarily difficult. Computer Programming for Teens stresses concepts over language, but still includes examples in the most popular languages—specifically HTML, C++, and Java. It begins by explaining the fundamental topics, like data storage, and progresses through to more complex topics, such as decisions, loops, design, and complex data structures. Written by a high school teacher, the book includes helpful tips and analogies to guide readers through the maze of programming techniques, concepts, and common pitfalls. It introduces the most relevant topics for beginners and pinpoints the essential skills needed for programming success.



Read also The Polish Kitchen or Oldest Cuisine in the World

Final Cut Pro HD for Dummies

Author: Helmut Kobler

“Save it in the edit” is a common saying among film professionals. Editing makes the difference between boring vacation movies and exciting travelogues…between the whole dull news conference and the highlights on the evening news. Whether you’re a budding Spielberg, a proud parent who wants two-year-old Junior’s every feat documented for posterity, or a band that wants your music video to rock, Final Cut Pro HD For Dummies tells you what you need to know to edit regular digital or high definition video like a pro. It covers the basics of capturing, importing, and editing digital videos, with detailed how-to for:



• Organizing your media

• Navigating the audio and video Timeline tracks and selecting clips and frames on the Timelines

• Getting fancier with split, roll, ripple, slip, and slide edits

• Working with audio, including mixing, editing out scratches and pops, and using filters to create effects

• Using Soundtrack to compose a musical score, even if you don’t know the difference between horns and strings

• Apply transitions such as 3D simulation, dissolve, iris, stretch and squeeze, and more

• Adding text for captions, opening titles, and closing credits

• Color-correcting video

• Compositing, rendering, and outputting your final product to tape, CD, DVD, or the Web



Three bonus chapters online go into more depth about rendering, customizing the interface, and managing media so you can refine your skills even further.

Final Cut Pro HD For Dummies was written by Helmut Kobler, a LosAngeles-based filmmaker, owner of K2Films, and a frequent contributor to Macaddict Magazine. Having this book next to your editing equipment is the next best thing to having him sit next to you and guide you through the editing process.



Table of Contents:
Pt. IFirst things first9
Ch. 1Introducing Final Cut Pro11
Ch. 2Getting started23
Ch. 3All about HD (high definition)47
Pt. IIImporting and organizing your media57
Ch. 4Capturing media from tape59
Ch. 5Importing media that's already on your Mac77
Ch. 6Organizing your media91
Pt. IIIEditing your media109
Ch. 7Editing basics111
Ch. 8Getting to know the timeline137
Ch. 9Editing wizardry161
Pt. IVAdding pizzazz197
Ch. 10Audio excellence199
Ch. 11Composing a soundtrack231
Ch. 12Creating transitions255
Ch. 13Adding text to your videos271
Ch. 14Special effects with filters and color correction295
Ch. 15Motion effects319
Ch. 16Compositing337
Pt. VOutputting your masterpiece353
Ch. 17Recording to tape355
Ch. 18Exporting your movie to a digital file371
Pt. VIThe part of tens389
Ch. 19Ten tips for becoming a better editor391
Ch. 20Almost ten tips for managing big projects397