Sunday, February 22, 2009

Adobe InDesign CS Classroom in a Book or Operating Systems

Adobe InDesign CS Classroom in a Book

Author: Adobe Press Staff

With its ever tightening integration with Adobe's full suite of creative products and its own increasingly sophisticated feature set, InDesign is winning legions of Quark converts. If you're among them--or if you've decided to sidestep those programs altogether--you need this book! In these pages, the Adobe Creative Team uses a series of project-based lessons, tested in the company's own classrooms and labs, to provide a thorough grounding in the InDesign school of page design. You'll find step-by-step lessons in InDesign CS fundamentals plus plenty of the advanced tips and techniques you need to take your page designs to the next level. The workbook-style format includes self-paced lessons followed by review questions to reinforce the knowledge and a CD with all of the files required to complete the book's projects. Throughout, special focus is given to the features new to InDesign CS: an updated Story Editor, nested styles, separation previews, the Package for GoLive command, and more.



Table of Contents:
Getting Started1
A Quick Tour of Adobe InDesign5
Lesson 1Getting to Know the Work Area39
Lesson 2Setting Up Your Document73
Lesson 3Working with Frames117
Lesson 4Importing and Editing Text147
Lesson 5Working with Typography189
Lesson 6Working with Color225
Lesson 7Importing and Linking Graphics255
Lesson 8Creating Tables289
Lesson 9Drawing Vector Graphics317
Lesson 10Working with Transparency369
Lesson 11Creating Interactive Documents390
Lesson 12Combining Files into Books409
Lesson 13Printing & Print Preparation438
Lesson 14Exporting to PDF459
Lesson 15Ensuring Consistent Color479
Working with Version Cue509
Index517

New interesting book: Sports Medicine Essentials or My Personal Path to Wellness

Operating Systems: Design and Implementation

Author: Andrew S Tanenbaum

“The presentation is excellent. The book should be on the desk of any serious student of operating systems.”--Dr. Samuel Kohn, Thomas Edison State College


 


“I would give the authors very high grades for their writing style. Topics are explained in a clear and understandable manner. Presentations are well organized and they flow in logical fashion. The book provides the right depth and breadth of explanations with the appropriate amount of rigor and abstraction.” --Gojko Babic, Department of Computer Science and Engineering, Ohio State University


 


The definitive, up-to-date introduction to operating systems:


Core principles plus hands-on examples with the new MINIX 3 operating system


 


The world’s best-selling introductory operating systems text has been thoroughly updated to reflect the latest advances in OS design and implementation. Offering an optimal balance of theory and practice, Operating Systems: Design and Implementation, Third Edition remains the best resource for anyone seeking a deep understanding of how operating systems work.


 


This edition includes MINIX 3, more compact, more reliable, better suited for embedded applications – and, above all, even easier to teach and learn from. Using MINIX, the authors introduce virtually every core concept needed to construct a working OS: system calls, processes, IPC, scheduling, I/O, deadlocks, memory management, threads, file systems, security, and more. 


 


NEW TO THIS EDITION


 


·   Newly-released,significantly-improved MINIX 3 operating system on CD-ROM: giving students  hands-on experience in  modifying and rebuilding a contemporary operating system


·   Expanded and reorganized coverage of processes and communication


·   Revised and enhanced coverage of CPU scheduling, deadlocks, file system reliability, and security


·   Includes more than 150 end of chapter problems


 


·   ABOUT THE AUTHORS


 


Andrew S. Tanenbaum has an S.B. degree from M.I.T. and a Ph. D. from the University of California at Berkeley.  He is currently a Professor of Computer Science and Vrije Universiteit in Amsterdam, the Netherlands, where, for more than 30 years, he has taught operating systems, computer organization, and networking to thousands of students. Professor Tanenbaum is the winner of the ACM Karl V. Karlstrom Outstanding Educator Award and the ACM/SIGCSE Award for Outstanding Contributions to Computer Science Education. 


 


Albert S. Woodhull is Adjunct Associate Professor of Computer Science and Biology at the School of Natural Science, Hampshire College, Amherst, MA. He also served until recently as computer system administrator for the Department of Biology in the School of Natural Science and Mathematics at the University of Massachusetts, Amherst, MA. He holds an S.B. degree from M.I.T. and a Ph.D. the University of Washington. Supported by a Fulbright grant, he has taught at the Universidad Nacional de Ingenieria and the Universidad Nacional Autonoma de Nicaragua. 

Booknews

The authors attempt to remove the magic from operating system design and to consolidate the material into a systematic discipline. The text begins with the hardware as supplied by a vendor and proceeds step-by- step through the design and implementation of a small system called Xinu, which serves as an illustration of and a pattern for system design. A college level textbook on theory and practice. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Saturday, February 21, 2009

Identity Theft Inc or Feedback Systems

Identity Theft, Inc.: A Wild Ride with the World's#1 Identity Thief

Author: Gary Hastings


Identity theft is the crime of this century. Just ask Frank Abagnale of Catch Me If You Can fame. He states so in the Q&A of the latest edition of that book. So here, then, is the true-crime book of this century. This is the first book on the subject from the inside, told by someone who's assumed hundreds of identities and become rich off it. Not only does the author reveal how ID theft is done, he tells loads of wildly unbelievable but true stories about his impersonations as they led to riches. Some of them are as funny and outrageous as they are amazing.


At the same time he tells people how to protect themselves from the gangs of ID thieves thriving in the real and virtual worlds of today, and as he explains in his foreword, Glenn Hastings is writing this book to repent for his crimes. While committing them, he failed to take into account the damage they caused his victims. He states that had he continued on his massive trail of ID and credit fraud, he could have conceivably made a billion dollars. But enough was enough; ultimately he had to do the right thing.



Go to: Kalifornien: Amerikas Experiment der Hohen Anteile

Feedback Systems: An Introduction for Scientists and Engineers

Author: Karl J Astrom

This book provides an introduction to the mathematics needed to model, analyze, and design feedback systems. It is an ideal textbook for undergraduate and graduate students, and is indispensable for researchers seeking a self-contained reference on control theory. Unlike most books on the subject, Feedback Systems develops transfer functions through the exponential response of a system, and is accessible across a range of disciplines that utilize feedback in physical, biological, information, and economic systems.

Karl Åström and Richard Murray use techniques from physics, computer science, and operations research to introduce control-oriented modeling. They begin with state space tools for analysis and design, including stability of solutions, Lyapunov functions, reachability, state feedback observability, and estimators. The matrix exponential plays a central role in the analysis of linear control systems, allowing a concise development of many of the key concepts for this class of models. Åström and Murray then develop and explain tools in the frequency domain, including transfer functions, Nyquist analysis, PID control, frequency domain design, and robustness. They provide exercises at the end of every chapter, and an accompanying electronic solutions manual is available. Feedback Systems is a complete one-volume resource for students and researchers in mathematics, engineering, and the sciences.

  • Covers the mathematics needed to model, analyze, and design feedback systems
  • Serves as an introductory textbook for students and a self-contained resource for researchers
  • Includes exercises at the end of every chapter
  • Features an electronic solutions manual
  • Offers techniques applicable across a range of disciplines



Friday, February 20, 2009

Understanding Linux Network Internals or Too Human

Understanding Linux Network Internals

Author: Christian Benyen

If you've ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols -- or if you just want to learn about modern networking through real-life examples -- Understanding Linux Network Internals is for you.

Like the popular O'Reilly book, Understanding the Linux Kernel, this book clearly explains the underlying concepts and teaches you how to follow the actual C code that implements it. Although some background in the TCP/IP protocols is helpful, you can learn a great deal from this text about the protocols themselves and their uses. And if you already have a base knowledge of C, you can use the book's code walkthroughs to figure out exactly what this sophisticated part of the Linux kernel is doing.

Part of the difficulty in understanding networks -- and implementing them -- is that the tasks are broken up and performed at many different times by different pieces of code. One of the strengths of this book is to integrate the pieces and reveal the relationships between far-flung functions and data structures. Understanding Linux Network Internals is both a big-picture discussion and a no-nonsense guide to the details of Linux networking. Topics include:

Key problems with networking

Network interface card (NIC) device drivers

System initialization

Layer 2 (link-layer) tasks and implementation

Layer 3 (IPv4) tasks and implementation

Neighbor infrastructure and protocols (ARP)

Bridging

Routing

ICMP

Author Christian Benvenuti, an operating system designer specializing in networking, explains much more than how Linux code works. He shows the purposes of major networking features and the trade-offs involved in choosingone solution over another. A large number of flowcharts and other diagrams enhance the book's understandability.



Go to: Energía, Ambiente, y Cambio climático

Too Human: Prima Official Game Guide

Author: David Knight

•Lead Baldur into battle with a complete step-by-step campaign walkthrough.
•Maximize your loot using detailed maps to find every container, obelisk, battle arena, and secret area.
•Dominate the battlefield with class-based anti-monster tactics from the developers.
•Customize your character with detailed breakdowns of the skill and alignment trees for all five classes.
•Breathe in the deep story with complete bios for every character, including their mythological inspirations.



Table of Contents:
Aesir Primer
Friends & Foes
Baldur’s Path
Prologue
Hall of Heroes
Ice Forest
World Serpent
Helheim
Appendices

Thursday, February 19, 2009

CCNA or 3D Game Programming All in One

CCNA: Cisco Certified Network Associate Fast Pass

Author: Todd Lamml

Organized by exam objectives, this is a focused, concise review guide that works hand-in-hand with any learning tool, including the Sybex CCNA: Cisco Certified Network Associate Study Guide, 6th and Deluxe editions.

The book will consist of four high-level chapters, each mapping to the four main Domains of the exam skill-set. The book will drill down into the specifics of the exam, covering the following:



• Designing Cisco internetworks

• Developing an access list

• Evaluating TCP/IP communication

• Configuring routers and switches

• Configuring IP addresses, subnet masks, and gateway addresses

• Performing LAN, VLAN, and WAN troubleshooting

• Understanding rules for packet control



The interactive CD contains two bonus exams, handy flashcard questions, and a searchable PDF of a Glossary of Terms.



Table of Contents:
Introduction.

Chapter 1: Describe how a network works.

Chapter 2: Configure, verify, and troubleshoot a switch with VLANs and interswitch communications.

Chapter 3: Implement an IP addressing scheme and IP Services to meet network requirements in a medium-size Enterprise branch office network.

Chapter 4: Configure, verify, and troubleshoot basic router operation and routing on Cisco devices.

Chapter 5: Explain and select the appropriate administrative tasks required for a WLAN.

Chapter 6: Identify security threats to a network and describe general methods to mitigate those threats.

Chapter 7: Implement, verify, and troubleshoot NAT and ACLs in a medium-sized Enterprise branch office network.

Chapter 8: Implement and verify WAN links.

Appendix A: About the Companion CD.

Glossary.

Index.

Book review: Knusprig: Projektmanagement, die Dritte Ausgabe: Praktische Werkzeuge für den Erfolg

3D Game Programming All in One

Author: Kenneth C Finney

Are you an aspiring game developer with a great idea, but no practical knowledge for turning that idea into reality? 3D Game Programming All in One is the comprehensive guide you need! This new edition updates the original coverage with the latest version of Torque from GarageGames, and provides the very best tools available to the Indie game maker. This hands-on book not only teaches the technical skills behind 3D game programming, but also provides you with the practical experience you need to create your own games. As you create a first-person shooter, you'll cover the techniques behind the programming, textures, and models that go into successful game creation. You'll also cover the Torque Engine and will learn how to integrate sound and music into your game. 3D Game Programming All in One provides you with the training, experience, and tools you need to turn your dreams of game creation into reality!



Tuesday, February 17, 2009

Real World FPGA Design with Verilog or MIPS Assembly Language Programming

Real World FPGA Design with Verilog

Author: Ken Coffman


9985A-8

The practical guide for every circuit designer creating FPGA designs with Verilog!

Walk through design step-by-step-from coding through silicon. Partitioning, synthesis, simulation, test benches, combinatorial and sequential designs, and more.

Real World FPGA Design with Verilog guides you through every key challenge associated with designing FPGAs and ASICs using Verilog, one of the world's leading hardware design languages. You'll find irreverent, yet rigorous coverage of what it really takes to translate HDL code into hardware-and how to avoid the pitfalls that can occur along the way. Ken Coffman presents no-frills, real-world design techniques that can improve the stability and reliability of virtually any design. Start by walking a typical Verilog design all the way through to silicon; then, review basic Verilog syntax, design; simulation and testing, advanced simulation, and more. Coverage includes:

  • Essential digital design strategies: recognizing the underlying analog building blocks used to create digital primitives; implementing logic with LUTs; clocking strategies, logic minimization, and more
  • Key engineering tradeoffs, including operating speed vs. latency
  • Combinatorial and sequential designs
  • Verilog test fixtures: compiler directives and automated testing
  • A detailed comparison of alternative architectures and software-including a never-before-published FPGA technology selection checklist

Real World FPGA Design with Verilog introduces libraries and reusable modules, points out opportunities to reuse your own code, and helps you decide when to purchaseexisting IP designs instead of building from scratch. Essential rules for designing with ASIC conversion in mind are presented.

If you're involved with digital hardware design with Verilog, Ken Coffman is a welcome voice of experience-showing you the shortcuts, helping you over the rough spots, and helping you achieve competence faster than you ever expected!

The accompanying CD-ROM contains working demo and student versions of these popular design capture and simulation tools: David Murray's Prism Editor and Simucad's Silos III™ simulator. You also get EMATH (a collection of more than 300 key electrical engineering formulas) and electronic copies of all the Verilog code from this book.



Interesting book: Real Cooking with Bob Izumi or Awesome Parties

MIPS Assembly Language Programming

Author: Robert Britton

First impressions are important.

To introduce your Assembly Language programming students to the fundamental concepts of contemporary computer architecture, start with a Reduced Instruction Set Computer (RISC).

When students first encounter computer architecture, they need to begin with the basics of modern computer organization. The MIPS architecture embodies the fundamental design principles of all contemporary RISC architectures:

  • All instructions are directly executed in hardware
  • The rate at which instructions are issued is maximized
  • Instructions are easy to decode
  • Only load and store instructions reference memory
  • Plenty of general purpose registers are provided (32 for MIPS)

MIPS Assembly Language Programming offers students an understanding of how the functional components of modern computers are put together and how a computer works at the machine-language level. The book begins with a datapath diagram that shows a simple implementation of the MIPS architecture, consisting of a register file, an ALU, a memory. a program counter, and an instruction register. As students progress through the text, they will elaborate on this established datapath diagram model, allowing them to visualize how the instructions are fetched and executed as they write their programs.

The Spim simulator for the MIPS architecture runs on PC's and Unix® systems. All the programming exercises are done using this simulator, which can be downloaded for free from the Internet. Using the MIPS simulator allows students to observe the contents of the registers and memorychange as their programs execute. The students are not isolated by a particular operating system from experiencing and writing code dealing with:

  • Memory-mapped I/0
  • Interrupts and exception processing
  • Delayed loads and delayed branches for a pipelined implementation

It is assumed that students using this text already have some experience in developing algorithms, and running programs in a high-level language. The skills they will learn with MIPS Assembly Language Programming offer a sound basis for advanced work in computer architectures and complex assembly languages.



Table of Contents:
Ch. 1The MIPS Architecture1
Ch. 2Algorithm Development in Pseudocode11
Ch. 3Number Systems24
Ch. 4PCSpim, The MIPS Simulator35
Ch. 5Efficient Algorithm Development44
Ch. 6Function Calls Using the Stack57
Ch. 7Reentrant Functions67
Ch. 8Memory-Mapped I/O73
Ch. 9Exceptions and Interrupts79
Ch. 10A Pipelined Implementation89
Ch. 11Floating-Point Instructions98
App. A: Quick Reference110
App. BASCII Codes114
App. CInteger Instruction Set115
App. DMacro Instructions130
App. EA Modified Trap Handler135
App. FFloating-Point Instruction Set138

Monday, February 16, 2009

Digital Sensations or Business Intelligence

Digital Sensations: Space, Identity, and Embodiment in Virtual Reality

Author: Ken Hillis

Ken Hillis is assistant professor of communication studies at the University of North Carolina at Chapel Hill.



Table of Contents:
Acknowledgments
List of Abbreviations
Introduction: Digital Relations
1A Critical History of Virtual Reality1
2Precursive Cultural and Material Technologies Informing Contemporary Virtual Reality30
3The Sensation of Ritual Space60
4Sight and Space90
5Space, Language, and Metaphor133
6Identity, Embodiment, and Place - VR as Postmodern Technology164
Epilogue: Digital Sensations200
Notes213
References239
Index257

Interesting textbook: The Ruby Way or Mmixware

Business Intelligence

Author: Elizabeth Vitt

This book illustrates how organizations can make better, faster decisions about their customers, partners, and operations by turning mountains of data into valuable business information that's at the fingertips of decision makers. It describes what's involved in using business intelligence to bring together information, people, and technology to create successful business strategies-and how to execute those strategies with confidence. Real-life case studies show how world leaders in finance, manufacturing, and retail have successfully implemented business intelligence solutions and detail the benefits they have reaped.

Booknews

This book illustrates how organizations can make better, faster decisions about their customers, partners, and operations using business intelligence, the process of turning large amounts of data into valuable information and making it easily available to decision makers. The book describes the components and general architecture that most business intelligence solutions share, offers stories of how real companies have implemented business intelligence solutions, and describes steps for implementing a business intelligence solution in an organization. Vitt has six years of business development and project management experience in business intelligence. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Sunday, February 15, 2009

Faster Smarter Beginning Programming or Operations Management

Faster Smarter Beginning Programming

Author: Jim Buyens

Create your first application for Microsoft(r) Windows(r) or the Web with Faster Smarter Beginning Programming. This guide uses a practical, learn-by-doing approach that makes learning to write code with Microsoft Visual Basic(r) .NET quick, easy, concrete, and fun. The exercises feature concise explanations, step-by-step instructions, and visual examples that help you create real functionality right away. Topics include learning basic language elements, designing Windows Forms and Web Forms, running and debugging applications, accessing data, and other essentials.



Table of Contents:
Acknowledgments
Introduction
Ch. 1Introducing Basic Concepts1
Ch. 2Introducing Microsoft Visual Basic .NET23
Ch. 3Using Elementary Statements51
Ch. 4Using Operators and Expressions77
Ch. 5Using Functions and Subroutines101
Ch. 6Using Built-in Functions119
Ch. 7Creating Classes and Objects143
Ch. 8Using Classes, Modules, and Forms167
Ch. 9Designing and Using Windows Forms201
Ch. 10Interacting with Windows Form Controls231
Ch. 11Accessing Databases275
Ch. 12Programming Web Forms301
Index325

Interesting book: Wines of the World or The After Work Thai Cookbook

Operations Management: An Integrated Approach

Author: Prakash Singh

Operations Management: An Integrated Approach provides a state-of-the-art account of the systems, processes, people and technology that determine an organisation's strategy and success. With contributions from leading experts internationally, the text takes a comprehensive, comparative, and best-practice approach and applies this specifically to the Asia-Pacific region. Rigorous in scholarship yet eminently accessible in style, Operations Management is replete with pedagogical features - figures and tables, discussion exercises, 'Learnings from the Internet', and a diversity of long and short case studies from around the world. Students are taken on a seamless journey from the fundamentals of operations management, through to the multiple approaches, the various innovations, challenges and risks, and ultimately to models of sustainability and evaluative tools and techniques. The text effectively prepares future managers across every sector of the economy - whether in services, manufacturing, profit or non-profit environments - to lead, organise, plan and control a set of resources, in pursuit of identified goals.



Thursday, February 12, 2009

Adventures in Social Research or Crystal Reports 85

Adventures in Social Research: Data Analysis Using SPSS 14.0 and 15.0 for Windows

Author: Earl Babbi

*This edition comes already bundled with the student version of SPSS software. For the version without SPSS student software, please order ISBN: 9781412940832.*

Adventures in Social Research with SPSS Student Version: Data Analysis Using SPSS 14.0 and 15.0 for Windows, Sixth Edition
guides readers step-by-step through the process of data analysis using the latest version of SPSS and the most up to date version of the General Social Survey. In this thoroughly revised edition, authors Earl Babbie, Fred Halley, and Jeanne Zaino stress active and collaborative learning as students engage in a series of practical investigative exercises.

New to the Sixth Edition:

  • Presents the latest version of SPSS for Windows: Readers are introduced to computerized data analysis using the latest version of SPSS for Windows (14.0 & 15.0).
  • Gives access to the latest version of the GSS: In the text and lab exercises, readers are given a chance to work with data from the most recent General Social Survey (GSS 2004).
  • Provides a shorter, more condensed version than the Fifth Edition: The latest edition has been restructured to make the material more user-friendly for students, including a separate chapter on recoding and a more straightforward discussion of composite measures.

Accompanied by High Quality Ancillaries!
An accompanying CD-ROM contains data sets, Designing Your Own Survey, and comprehensive appendices that include questionnaires, research reports, proposals, survey tips, commands, readings, and much more.

IntendedAudience:
Designed for both introductory and advanced research methods or statistics courses in Sociology, Political Science, Social Work, Criminal Justice, and Public Health departments, this is an ideal computer skills and data analysis textbook for any discipline that uses survey methods.



Table of Contents:
Part I Preparing for Data Analysis
Chapter 1 Introduction: The Theory and Practice of Social Research
Chapter 2 The Logic of Measurement
Chapter 3 Description of Data Sets: The General Social Survey
Part II Univariate Analysis
Chapter 4 Using SPSS: Some Basics
Chapter 5 Describing Your Data: Religiosity
Chapter 6 Presenting Your Data in Graphic Form: Political Orientations
Chapter 7 Recoding Your Data: Religiosity and Political Orientations
Chapter 8 Creating Composite Measures: Exploring Attitudes Toward Abortion in More Depth
Chapter 9 Suggestions for Further Analysis
Part III Bivariate Analysis
Chapter 10 Using Crosstabs to Examine the Sources of Religiosity
Chapter 11 Political Orientations as Cause and Effect
Chapter 12 What Causes Different Attitudes Toward Abortion?
Chapter 13 Measures of Association
Chapter 14 Tests of Significance
Chapter 15 Suggestions for Further Bivariate Analyses
Part IV Multivariate Analysis
Chapter 16 Multiple Causation: Examining Religiosity in Greater Depth
Chapter 17 Dissecting the Political Factor
Chapter 18 A Powerful Prediction of Attitudes Toward Abortion
Chapter 19 Suggestions for Further Multivariate Analyses
Part V The Adventure Continues
Chapter 20 Designing and Executing Your Own Survey
Chapter 21 Further Opportunities for Social Research

Read also Volkswirtschaft: Kurs-Begleiter

Crystal Reports 8.5: The Complete Reference

Author: George Peck

The most definitive resource on Crystal Reports available! Create presentation-quality reports using the most powerful data analysis tool and this comprehensive guide. Crystal Reports 8.5: The Complete Reference explains in detail how to use the software to analyze and format data, generate reports, and perform advanced interactive reporting from the Web. Also, learn to develop custom applications and incorporate any Crystal Report into your Windows applications.



Wednesday, February 11, 2009

Visual Modeling with Rational Rose 2002 and UML or How to Do Everything with Microsoft Office Access 2007

Visual Modeling with Rational Rose 2002 and UML

Author: Terry Quatrani

In a matter of only a few years, the Unified Modeling Language (UML) has emerged as the design medium of choice for developing large-scale distributed object applications. The UML's standard semantics and notation for describing object structure and behavior make it particularly well suited to this function. Augmented by the Rational Unified Process, an extensive set of software development guidelines, and the Rational Rose visual modeling tool, the UML greatly facilitates the development of quality object-oriented applications that meet both deadlines and requirements.

Fully updated and revised, Visual Modeling with Rational Rose 2002 and UML is a comprehensive introduction and tutorial providing guidance on how to use a tool (Rational Rose 2002), a process (the Rational Unified Process), and a language (the UML) to successfully visualize, specify, document, and construct a software system. This timely third edition, written by the UML Evangelist at Rational Software Corporation, breaks the technology down to its essentials and provides clear explanations of each element. The book follows a simplified version of the Rational Unified Process from project inception through system analysis and design. The popular sample case study from the previous editions (a registration system for a fictional university) has been retained and updated, better illustrating the iterative development process in practice, the UML in action, and the proper application of Rational Rose 2002. Newly updated appendices demonstrate code generation and reverse engineering using Rational Rose 2002 with the C++, Visual C++, and Visual Basic programming languages. In addition, a handyglossary defines key object technology and software modeling terms.

Topics covered include:

  • Creating use cases
  • Finding objects and classes
  • UML stereotypes and packages
  • Scenarios, sequence diagrams, and collaboration diagrams
  • Discovering object interaction
  • Specifying relationships, association, and aggregation
  • Adding behavior and structure
  • Superclass/subclass relationships and inheritance
  • Object behavior and Harel state transition diagrams
  • Checking for model consistency
  • Specifying, visualizing, and documenting system architecture
  • The iteration planning process




Table of Contents:
Foreword
Preface
Ch. 1Introduction1
Ch. 2Beginning a Project13
Ch. 3Creating Use Cases19
Ch. 4Finding Classes51
Ch. 5Discovering Object Interaction71
Ch. 6Specifying Relationships87
Ch. 7Adding Behavior and Structure103
Ch. 8Discovering Inheritance117
Ch. 9Analyzing Object Behavior129
Ch. 10Checking the Model143
Ch. 11Designing the System Architecture151
Ch. 12Building the Iterations169
App. ACode Generation and Reverse Engineering with C++187
App. BCode Generation and Reverse Engineering with Visual C++ and Visual Basic209
App. C: A Visual Basic Example221
Glossary239
Index249

Interesting book: Ricerca di prospetto: Un iniettore per la coltura del Nonprofits

How to Do Everything with Microsoft Office Access 2007

Author: Virginia Andersen

Maximize the powerful features of the latest release of today's most popular desktop database program. How to Do Everything with Microsoft Office Access 2007 shows you how to create and customize an efficient, multi-user database, retrieve, interpret, and share your data, secure your information, and much more. Designed to help you get things done quickly and easily, this user-friendly guide is your all-access pass to Access 2007.

  • Navigate the new user interface with ease
  • Design a well-organized database using pre-designed templates
  • Enter and edit data and ensure data validity
  • Sort, filter, and print records
  • Extract specific information using queries
  • Master form and report design basics
  • Add charts and graphs to forms and reports easily
  • Optimize database performance and speed
  • Exchange database objects and text files between Access databases

Virginia Andersen has written or contributed to nearly 25 books about PC-based applications.



Monday, February 9, 2009

Effective Methods for Software Testing or Programming Portlets

Effective Methods for Software Testing

Author: William E Perry



• Written by the founder and executive director of the Quality Assurance Institute, which sponsors the most widely accepted certification program for software testing

• Software testing is a weak spot for most developers, and many have no system in place to find and correct defects quickly and efficiently

• This comprehensive resource provides step-by-step guidelines, checklists, and templates for each testing activity, as well as a self-assessment that helps readers identify the sections of the book that respond to their individual needs

• Covers the latest regulatory developments affecting software testing, including Sarbanes-Oxley Section 404, and provides guidelines for agile testing and testing for security, internal controls, and data warehouses

• CD-ROM with all checklists and templates saves testers countless hours of developing their own test documentation



Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.



Table of Contents:
Acknowledgments
How to Use This Book
Pt. 1Assessing Testing Capabilities and Competencies1
Ch. 1Assessing Software Testing Capabilities and Staff Competencies3
Pt. 2Building a Software Testing Environment33
Ch. 2Building a Software Testing Strategy35
Ch. 3Establishing a Software Testing Methodology61
Ch. 4Determining Your Software Testing Techniques99
Ch. 5Selecting and Installing Software Testing Tools135
Pt. 3The Eleven-Step Testing Process159
Ch. 6Eleven-Step Software Testing Process Overview161
Ch. 7Step 1: Assess Project Management Development Estimate and Status177
Ch. 8Step 2: Develop Test Plan211
Ch. 9Step 3: Requirements Phase Testing275
Ch. 10Step 4: Design Phase Testing313
Ch. 11Step 5: Program Phase Testing369
Ch. 12Step 6: Execute Test and Record Results403
Ch. 13Step 7: Acceptance Test461
Ch. 14Step 8: Report Test Results489
Ch. 15Step 9: Testing Software Installation525
Ch. 16Step 10: Test Software Changes557
Ch. 17Step 11: Evaluate Test Effectiveness599
Pt. 4Testing Specialized Systems and Applications613
Ch. 18Testing Client/Server Systems615
Ch. 19Testing Rapid Application Development635
Ch. 20Testing the Adequacy of System Documentation655
Ch. 21Testing Web-based Systems675
Ch. 22Testing Off-the-Shelf Software695
Ch. 23Testing in a Multiplatform Environment721
Ch. 24Testing Security735
Ch. 25Testing a Data Warehouse753
Pt. 5Building Test Documentation787
Ch. 26Creating Test Documentation789
Bibliography803
Index805

New interesting book: Understanding Africa or Accounting Information Systems

Programming Portlets: From JSR 168 to WebSphere Portal Extensions

Author: Ron Lynn

Portals have evolved from simple Web applications with multiple links to an enterprise application delivery platform that serves composite applications. In a world where organizations are gearing up with service-oriented architecture (SOA) strategies and re-working existing apps to fit the Web 2.0 programming model, portals are strategic infrastructure components on every CIO's radar. As companies move toward SOA, portlets become an even hotter topic. Portlets provide the user interface for these services. IBM's unwavering commitment to open standards such as Java Specification Request (JSR 168) and strong presence in the application server market (IBM WebSphere Application Server) have helped establish WebSphere Portal as a leader among available portal solutions in the market.

Programming Portlets, Second Edition takes developers down a path of understanding all the latest concepts, including SOA, AJAX, and best practices to consider when building a J2EEbased portal. The book offers the reader the tools and information necessary to develop portlets and portal applications in two ways. Part 1 focuses on building portlets that will adhere to the JSR 168 API standard. This allows developers who want to use any JSR 168–compliant portlet container to quickly build quality portlets. Part 2 extends the focus to building JSR 168–compliant portlets for the IBM WebSphere Portal Server and includes information on portlet extensions and WebSphere Portal capabilities that can be leveraged in a portal development effort.

Among the many things you will find inside Programming Portlets, Second Edition:

  • Addition of extensive JSR 168 material
  • Updates for WebSphere Portal (V6)
  • Coverage of new technologies such as IBM WebSphere Portlet Factory and Lotus Workplace Forms Ways to use AJAX in portlets
  • Explanation of how portals and portlets fit into SOA
  • Method for creating JSR 168–compliant portlets using IBM WebSphere
  • IBM WebSphere Portlet Factory, Workplace Forms, and creation of portal services
  • Instructions for building complex portlets quickly using Rational Application Developer or WebSphere Portlet Factory
  • Use of JavaServerTM Faces in portlets
  • Proper use of JSTL with regard to portlets
  • Effective integration of Struts in the portal framework
  • Ways of inter-portlet communication
  • Method to build a portlet from the ground up quickly and effectively
  • The best practices of portlet development
  • Valuable information resources, including examples of various types of portlets
.



Sunday, February 8, 2009

Programming Microsoft Ado Net 2 0 Core Reference or Microsoft Expression Web for Windows

Programming Microsoft ADO. NET 2. 0 Core Reference

Author: David Sceppa

This Core Reference demonstrates how to use ADO.NET 2.0, a technology within Microsoft Visual Studio® 2005, to access, sort, and manipulate data in standalone, enterprise, and Web-enabled applications. Discover best practices for writing, testing, and debugging database application code using the new tools and wizards in Visual Studio 2005, and put them to work with extensive code samples, tutorials, and insider tips. The book describes the ADO.NET object model, its XML features for Web extensibility, integration with Microsoft SQL Server 2000 and SQL Server 2005, and other core topics.



Interesting book: Mixing Audio or Final Cut Express HD for Mac OS X

Microsoft Expression Web for Windows: Visual QuickStart

Author: Nolan Hester

Microsoft Expression Web offers a powerful array of visual tools for creating great looking sites while fully supporting Web-based standards. Expression Web makes it easy for designers to quickly design cool sites with tools that feel familiar. Thanks to Expression Web's underlying standards, the files can then be passed to developers who can code the site in the development tools they prefer. This back and forth without designers having to touch the code unless they want to makes this a powerful program. In Expression Web 2, Microsoft has added support for PHP backed sites and made it easy to work with PHP. Other new features include: Silverlight support and new editing capabilities for Flash SWF and Windows Media files . In addition Expression Web 2 now provides ASP.NET AJAX server controls that enable users to quickly create web pages that include a rich user experience with responsive and familiar user interface (UI) elements. All these new features are coved in this latest version of Microsoft Expression Web: Visual Quickstart Guide.










Table of Contents:

Ch. 1 Exploring Expression Web 1

Ch. 2 Creating Sites 17

Ch. 3 Working with Pages 35

Ch. 4 Working with Text 51

Ch. 5 Working with Images 79

Ch. 6 Creating Links 105

Ch. 7 Creating Styles with CSS 123

Ch. 8 Creating Layouts with CSS 147

Ch. 9 Adding Behaviors & Media 163

Ch. 10 Adding Tables 189

Ch. 11 Adding Forms 217

Ch. 12 Publishing the Site 231

Index 239

Saturday, February 7, 2009

Ivor Hortons Beginning Visual C 2005 or Exam Cram 2 Windows XP Professional Second Edition

Ivor Horton's Beginning Visual C++ 2005

Author: Ivor Horton



• Popular author Ivor Horton uses his trademark approachable writing style to provide novice programmers with the basic tools as they learn Visual C++ 2005

• Readers will learn how to program in C++ using Visual C++ 2005-without any previous knowledge of C++

• More than 35 percent new and updated material covers the new release of Visual C++, and exercises and solutions help readers along the way

• Demonstrates the significant new features of Visual C++ 2005, providing improved flexibility in developing Microsoft applications in C++




Table of Contents:
Acknowledgments.

Chapter 1: Programming with Visual C++ 2005.

Chapter 2: Data, Variables, and Calculations.

Chapter 3: Decisions and Loops.

Chapter 4: Arrays, Strings, and Pointers.

Chapter 5: Introducing Structure into Your Programs.

Chapter 6: More about Program Structure.

Chapter 7: Defining Your Own Data Types.

Chapter 8: More on Classes.

Chapter 9: Class Inheritance and Virtual Functions.

Chapter 10: Debugging Techniques.

Chapter 11: Windows Programming Concepts.

Chapter 12: Windows Programming with the Microsoft Foundation Classes.

Chapter 13: Working with Menus and Toolbars.

Chapter 14: Drawing in a Window.

Chapter 15: Creating the Document and Improving the View.

Chapter 16: Working with Dialogs and Controls.

Chapter 17: Storing and Printing Documents.

Chapter 18: Writing Your Own DLLs.

Chapter 19: Connecting to Data Sources.

Chapter 20: Updating Data Sources.

Chapter 21: Applications Using Windows Forms.

Chapter 22: Accessing Data Sources in a Windows Forms Application.

Appendix A: C++ Keywords.

Appendix B: ASCII Codes.

Index.

Look this: Python For Dummies or Photoshop Elements 5 for Windows

Exam Cram 2 Windows XP Professional, Second Edition: Exam 70-270

Author: Dan Balter

The MCSE 70-270 Exam Cram 2: Windows XP Professional, Second Edition is an efficient, effective and concise guide that gives you exactly what you need to know to pass one of the most popular exams in the MCSE program. Organized according to the exam objectives, you will be able to quickly and easily assess your understanding of the key exam topics. You will find test-taking strategies and timesaving tips that will help you score better on the test, and the popular Cram Sheet tearcard is include for last-minute review on exam day. Also included are over 200 practice questions with detailed answers and an innovative test-engine on CD from MeasureUp. With all of these great features and proven study methods, MCSE 70-270 Exam Cram 2: Windows XP Professional, Second Edition is your smartest way to get certified.



Friday, February 6, 2009

Neuro Fuzzy and Soft Computing or COM Programming with Microsoft Net

Neuro-Fuzzy and Soft Computing: A Computational Approach to Learning and Machine Intelligence

Author: Jyh Shing Roger Jang

Neuro-Fuzzy Modeling and Soft Computing places particular emphasis on the theoretical aspects of covered methodologies, as well as empirical observations and verifications of various applications in practice. Neuro-Fuzzy Modeling and Soft Computing is oriented toward methodologies that are likely to be of practical use. It includes exercises, some of which involve MATLAB programming tasks to provide readers with hands-on programming experiences for practical problem-solving. Each chapter also includes a reference list to the research literature so that readers may pursue topics in greater depth. This book is suitable as a self-study guide by researchers who want to learn basic and advanced neuro-fuzzy and soft computing within the framework of computational intelligence.

Booknews

Unlike traditional, hard computing, this field aims to accommodate the pervasive imprecision of the real world, using the human mind as its role model. Intended for use as a graduate level text, or a self- study guide for students and researchers, this book presents an introduction to the field, and then covers fuzzy set theory, regression and optimization, neutral networks, neuro-fuzzy modeling and controls, and advanced applications. It also includes hints to selected exercises, and lists of Internet resources, MATLAB programs, and acronyms. Contains an offer for free companion software. Annotation c. Book News, Inc., Portland, OR (booknews.com)



New interesting book: Essentials of American Education or Entering Cultural Communities

COM Programming with Microsoft .Net

Author: John Mueller

Microsfot .NET is here, but COM and COM+ will be a valuable part of every Microsoft Windows programmer's toolbox for years. This in-depth programming guide explains how and where COM and COM+ fit into the new .NET world, demonstrates the new technologies that are available in .NET, and shows how to interoperate between COM/COM+ and .NET. It explains how to use Microsoft Visual Studio .NET to write traditional COM objects, how to use COM objects in .NET code, and how to use .NET objects as COM objects. It also discusses COM+ topics such as disconnected applications and subscriptions. The authors show you both theoretical and practical approaches -- explaining how the mechanisms work and also providing practical advice with sample code to show how to handle interoperability.



Table of Contents:
Acknowledgments
Introduction
Pt. IThe .NET View of COM and COM+
1COM and .NET3
2COM+ and .NET27
3Using COM Components in .NET Code53
4Using .NET Components in COM Applications103
5An Overview of COM+ Coding for .NET155
Pt. IIWriting COM Code
6Attributed Programming189
7ATL and ATL Server233
Pt. IIIWriting COM+ Code
8A Simple COM+ Example289
9Working with Disconnected Applications315
10Creating Subscriptions345
11Web Application Scenarios373
Pt. IVInteroperability
12Interacting with Unmanaged Code401
13Advanced Interaction435
14Working with Predefined Interfaces471
Index491

Thursday, February 5, 2009

How to Open and Operate a Financially Successful Web Based Business or Excel 2007 PivotTables Recipes

How to Open and Operate a Financially Successful Web-Based Business

Author: Beth Williams

With e-commerce expected to reach {dollar}40 billion and online businesses anticipated to increase by 500 percent through the year 2010, you need to be a part of this exploding area of Internet sales. If you want to learn about starting a Web business, how to transform your brick, and mortar business to a Web business, or even if you arc simply interested in making money online, this is the book for you.

This manual delivers literally hundreds of innovative ways demonstrated to streamline your business. Learn new ways to make your operation run smoother and increase performance, shut down waste, reduce costs, and increase profits. In addition, you will appreciate this valuable book as a resource and reference it in your daily activities as a source of ready-to-use forms, Web sites, and operating and cost-cutting ideas that can be easily applied to your operation.



Table of Contents:
Foreword     9
Should You Start Your Own Web-Based Business?     13
A Hot Commodity: Shopping Online     13
Web-based Businesses - A Brief History     14
The Benefits of Starting a Web-based Business     17
Do You Have What It Takes to Run Your Own Web-based Business?     19
Keys to Success     22
Types of Web-based Businesses     23
A Word of Caution: Scams     35
Finding Your Niche     37
What Is a Niche?     37
What Interests You?     39
Research     40
Writing Your Business Plan     43
Legal Business Entities     57
Legal Considerations     63
Choosing a Name for Your Web-based Business     63
Registering Your Business Name     64
Business Licenses Required by Your City/State     67
Employer Identification Number (EIN)     70
FTC Regulations That Will Impact How You Do Business Online     72
Before You Open     79
Equipment You Will Need     79
Accounting Considerations     84
How and When Do You Pay Federal and State Taxes?     94
Finding Products     99
Co-branding     102
Pricing Your Products     104
Pricing Your Services     105
Establishing a Return Policy     106
Determining Shipping Rates     107
What Not to Do     108
Your Web Site     111
How to Choose a Domain Name     111
How to Choose a Web Host     115
Designing Your Web Site     123
Using a Template     138
Hiring a Professional Web Designer     139
Securing Your Web-Based Business     143
Business Insurance     143
Invest in Anti-Virus Protection     146
The Fear of Internet Fraud     151
Encryption     152
Show Your Visitors Your Site Is Secure     152
Firewalls: Protecting Your Computer     156
Popular Firewalls     157
The Importance of Search Engines     159
Submit Your Web Site to Search Engines     163
Keep Track of Your Web Visitors     164
Pay-per-click Advertising     165
Creating Powerful Content For Your Web Site     169
Should You Hire Someone Else to Write Your Web Content?     172
Marketing Your Web-Based Business      175
Create a Logo     175
Write Articles and Submit to Article Directories     178
Purchase or Create Business Cards     179
Join Your Local Chamber of Commerce     180
Network     181
Join the Better Business Bureau (Online)     185
Press Releases     186
Online Forums and Message Boards     189
Your Signature Line     191
Banner Advertising     193
Online Directories     195
Blog     196
Podcast     200
Offer Referral Incentives     201
Radio Ads     202
TV Commercials     203
Newspaper Ads     204
Keeping Your Customers Coming Back Again and Again     207
Set Up Your Own Affiliate Program     207
Add a Message Board to Your Web Site     211
Build an Online Community     211
Offer E-coupons     216
Offer Discounts     217
Hold Contests     218
E-mail/Online Newsletters     218
Blog     223
Give Free Samples     224
Offer a Bonus     225
Become a Sponsor     226
Provide Superior Customer Service     226
Merchant Accounts and Customer Payment Options     231
Shopping Carts     234
Payment Options     235
Adding a Storefront     241
Hiring Employees     245
Resources     271
Bibliography     279
Author Dedication and Biography     282
Index     283

Go to: Healthy Family Cookbook or Breast Cancer Prevention Cookbook

Excel 2007 PivotTables Recipes: A Problem-Solution Approach

Author: Debra Dalgleish

Debra Dalgleish, Microsoft Office Excel MVP since 2001, and an expert and trainer in Excel, brings together a one-stop resource for anyone curious about representing, analyzing, and using their data with PivotTables and PivotCharts. You’ll find this book inimitable when facing any new or difficult problem in PivotTables, covering the entire breadth of situations you could ever encounter, from planning and creating, to formatting and extracting data, to maximizing performance and troubleshooting.

The author presents tips and techniques in this collection of recipes that can’t be found in Excel’s Help section, while carefully explaining the most confusing features of PivotTables to help you realize their powerful potential.

The chapters in this book have been organized into a collection of recipes to take you step by step from the problem you are experiencing to the solution you are aiming for. Without fuss, you’ll find clear and precise information to help you assess your situation, whether common or unique, and solve your problem. Working examples of complex PivotTables and numerous PivotTable programming examples will help you solve problems quickly, without the need to digest heavy content.
What you’ll learn

  • How to create and format PivotTables to be as attractive as they are useful
  • How to reuse prepackaged “recipe” code to put PivotTables to work in a variety of data-driven scenarios
  • How to determine why results of your computations and charting might not match what you expect and how to understand and fix those problems
  • Related programming techniques using working examples of advancedPivotTables

Who is this book for?

This book is a must-have resource for anyone who uses Excel frequently.
Related Titles

  • Beginning PivotTables in Excel 2007: From Novice to Professional
  • Excel 2007: Beyond the Manual



Wednesday, February 4, 2009

Database Design Application Development and Administration or CCDA

Database Design, Application Development, and Administration

Author: Michael V Mannino

Mannino’s Database Design, Application Development, and Administration provides the information you need to learn relational databases. The book teaches students how to apply relational databases in solving basic and advanced database problems and cases. The fundamental database technologies of each processing environment are presented; as well as relating these technologies to the advances of e-commerce and enterprise computing. This book provides the foundation for the advanced study of individual database management systems, electronic commerce applications, and enterprise computing.



Table of Contents:
Pt. 1Introduction to database environments1
Ch. 1Introduction to database management3
Ch. 2Introduction to database development23
Pt. 2Understanding relational databases43
Ch. 3The relational data model45
Ch. 4Query formulation with SQL79
Pt. 3Data modeling133
Ch. 5Understanding entity relationship diagrams135
Ch. 6Developing data models for business databases167
Pt. 4Relational database design217
Ch. 7Normalization of relational tables219
Ch. 8Physical database design249
Pt. 5Application development with relational databases295
Ch. 9Advanced query formulation with SQL297
Ch. 10Application development with views339
Ch. 11Stored procedures and triggers375
Pt. 6Advanced database development425
Ch. 12View design and integration427
Ch. 13Database development for student loan limited449
Pt. 7Managing database environments479
Ch. 14Data and database administration481
Ch. 15Transaction management515
Ch. 16Data warehouse technology and management553
Ch. 17Client-server processing, parallel database processing, and distributed databases605
Ch. 18Object database management systems641

New interesting textbook: Rivers of Empire or Development Geography and Economic Theory

CCDA: Cisco Certified Design Associate Study Guide

Author: Andy Barkl

Here's the book you need to prepare for Cisco's revised CCDA exam, 640-861. This Study Guide provides:



• In-depth coverage of every CCDA exam objective

• Practical information on Cisco design solutions

• Hundreds of challenging practice questions, in the book and on the CD

• Leading-edge exam preparation software, including a test engine, electronic flashcards, and simulation software



Authoritative coverage of all exam objectives, including:



• Gathering and evaluating information regarding current and future network requirements

• Identifying possible opportunities for network performance improvement

• Evaluating solutions for meeting IP addressing, routing protocol, and network management needs

• Incorporating equipment and technology within a campus design

• Applying the Enterprise Composite Network Model

• Addressing the issues of delivering voice traffic over a data network

• Evaluating solutions for compliance with SAFE architecture

• Developing implementation, prototype testing, and verification plans



Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.



Monday, February 2, 2009

First Week With My New PC or Digital Portfolios

First Week With My New PC: A Very Basic Guide for Mature Adults and Everyone Who Wants to "Get Connected"

Author: Pamela R Lessing

This book was specifically written for the author's 85-year-old mother who is now a master, but it was also "field-tested" by adults of all ages. Within one moth everyone was an "expert" - sending and receiving e-mail, using the Internet, writing and correspondence, and playing music and games. You'll "be connected" without the fuss and frustration - just simple step-by-step instructions, no jargon, no complications.

Internet Book Watch

While The First Week With My New PC was written for the author's 85-year-old mother who is now a PC master, it can be enjoyed by any - including business managers who have resisted the lure of the computer screen. From how to watch the stock market and produce a document to emailing and formatting work, this is packed with fine basics in simple language any can readily understand.



Table of Contents:
Acknowledgmentsvii
Introduction: Read This to Find Hidden Special Offer!1
Chapter 1Out of the Box: What You Should Do Whether Help Is or Is Not on the Way5
Chapter 2Everything Is Connected--So Now What Do I Do?11
Chapter 3The First Time: All Alone with the Computer (Will My Family Still Respect Me in the Morning?)17
Chapter 4What Is the Internet? What Is a "User Name"? Just Tell Me How to Find Out What the Weather Will Be HERE!29
Chapter 5The Time Has Come: I Am Really Ready to DO SOMETHING35
Chapter 6More to the Internet than Just E-Mail: The World Wide Web Is Waiting!49
Chapter 7Some Simple Basic Fun??? This Is Like the Piano! Do I Really Have to Practice One Hour a Day?59
Chapter 8Writing Documents and Correspondence: I Am Already in the Middle of the Book and I Still Don't Know How to Write a Letter!63
Chapter 9Other Ways to Get Information and Have Fun, or, What Do I Do with All These CDs and Did I Have to Pay Extra for All This Stuff?81
Chapter 10The Start Menu and All the Other Things That Have Not Yet Been Discussed85
Chapter 11A Step-By-Step Guide for Each Task91
Appendices133
Appendix ATrouble Shooting and the Usual Questions, or, Why Won't This Stupid Thing Work?134
Appendix BSome Important Key Commands145
Appendix CSome "World Wide Web" Addresses of Interest146
Appendix DE-Mail Etiquette: "Smileys," Abbreviations, and Other Tips152
Appendix ETech Support: Phone Numbers and Web Site Addresses154
Appendix FHealthy Computer Habits: Taking Care of Yourself Physically and Mentally155
Glossary159
Index183

Interesting book: Taoist Astral Healing or Depression Is a Choice

Digital Portfolios: Powerful Tools for Promoting Professional Growth and Reflection

Author: Elizabeth Hartnell Young

Digital technology offers powerful tools for educators who wish to develop electronic portfolios to foster and enrich their professional learning. Written by experts in the field, Digital Portfolios, Second Edition, explores the latest methods and techniques for creating electronic portfolios.

In this revised edition, Elizabeth Hartnell-Young and Maureen Morriss demonstrate how teachers, principals, and professors of education can develop high-quality portfolios that reflect personal vision, record professional growth, and celebrate accomplishments.

The authors present a comprehensive framework for portfolio development, from determining the audience and selecting material from a personal archive, to defining, producing, and sharing digital portfolios. This timely resource offers ten easy-to-follow steps and

  • Provides the "why" for creating digital portfolios
  • Emphasizes the importance of reflection as part of the process
  • Presents tips and strategies for using digital technology
  • Includes guidelines for evaluating portfolios.

Whether you are a novice teacher or a veteran educator, this practical handbook is your comprehensive guide to digital portfolio development.



Sunday, February 1, 2009

Authorized Self Study Guide Cisco IP Telephony or SAP R 3 Handbook

Authorized Self-Study Guide Cisco IP Telephony (CIPT): Second Edition

Author: Jeremy Cioara

Foundation Learning for CCVP IP Telephony

 

Jeremy Cioara, CCIE® No. 11,727

 

Cisco IP Telephony (CIPT), Second Edition, is a Cisco®-authorized, self-paced learning tool for CCVP IP telephony foundation learning. This book provides you with the knowledge needed to install, configure, and maintain a Cisco IP telephony solution. By reading this book, you will gain a thorough understanding of Cisco Unified CallManager version 4.1, the call routing and signaling component for the Cisco IP telephony solution.

 

Cisco IP Telephony (CIPT) expands your knowledge of voice over IP (VoIP) and public switched telephone network (PSTN) components and technologies. This book teaches you how to describe, install, configure, and support Cisco Unified CallManager 4.1 in a Cisco network including such features as security and video; how to configure gateways, gatekeepers, and switches; and how to build route plans to place intra- and intercluster Cisco IP phone calls. Chapter review questions, detailed configuration examples, network diagrams, and thorough explanations help reinforce learning.

 

Whether you are preparing for CCVP certification or simply want to gain a better understanding of IP telephony and Cisco Unified CallManager, you will benefit from the foundation information presented in this book.

 

CiscoIP Telephony (CIPT), Second Edition, is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit cisco.com/go/authorizedtraining.

 

Jeremy D. Cioara, CCIE® No. 11,727, is the owner of AdTEC Networks and works as a network consultant, instructor, and author. He has been working in network technologies for more than a decade and has deployed networks worldwide. His current consulting work focuses on network and VoIP implementations.

 

  • Examine design strategies behind a Cisco Unified CallManager cluster, cluster replication, and Cisco Unified CallManager deployment models
  • Perform Cisco Unified CallManager server installations and upgrades
  • Learn the features of all Cisco IP Phones, the IP phone startup process, and audio codec communication
  • Add IP phone users and apply bulk moves, adds, and changes
  • Configure Cisco gateways and trunks
  • Design and configure Cisco Unified CallManager route plans
  • Implement telephony call restrictions and control
  • Effectively coordinate multisite deploymentsConfigure user features, Cisco Unified CallManager Attendant, and Cisco IP Manager Assistant
  • Secure the Windows operating system and Cisco Unified CallManager administration
  • Prevent toll fraud and harden the IP phone against attack
  • Configure Cisco Unified CallManager to support video
  • Monitor performance and configure alarms, traces, and CAR

 

This volume is in the Certification Self-Study Series offered by Cisco Press®. Books in this series provide officially developed self-study solutions to help networking professionals understand technology implementations and prepare for the Cisco Career Certifications examinations.

 

Category: IP Communications

Covers: Cisco Unified CallManager v4.1

 

$65.00 USA / $81.00 CAN

 



Table of Contents:

    Foreword

    Introduction

Part I:    Cisco CallManager Fundamentals

Chapter 1    Introduction to Cisco Unified Communications and Cisco Unified CallManager

        Cisco Unified Communications

        Understanding Cisco Unified CallManager

            Cisco Unified CallManager and IP Phone Interaction

            The Components of Cisco Unified CallManager

            Cisco Unified CallManager Servers

        Summary

        Review Questions

Chapter 2    Cisco Unified CallManager Clustering and Deployment Options

        The Two Sides of the Cisco Unified CallManager Cluster

            The SQL Database Cluster

            Intracluster Run-Time Data

        Cluster Redundancy Designs

            1:1 Redundancy Design

            2:1 Redundancy Design

        Call-Processing Deployment Models

            Single-Site Deployment

            Multisite Deployment with Centralized Call Processing

            Multisite Deployment with Distributed Call Processing

            Clustering over the IP WAN

        Summary

        Review Questions

Chapter 3    Cisco Unified CallManager Installation and Upgrades

        Cisco Unified CallManager 4.x Clean Installation Process

            Installation Disks

            Installation Configuration Data

             Sample Configuration Data Worksheet

            Postinstallation Procedures

            Activating Cisco Unified CallManager Services

        Upgrading Prior Cisco Unified CallManager Versions

        Summary

        Review Questions

Part II:    IPT Devices and Users

Chapter 4    Cisco IP Phones and Other User Devices

        Cisco IP Phones

            Entry-Level Cisco IP Phones

            Midrange and Upper-End Cisco IP Phones

            Additional Cisco IP Telephony Endpoints

        IP Phone Startup Process

        Cisco IP Phone Codec Support

        Summary

        Review Questions

Chapter 5     Configuring Cisco Unified CallManager to Support IP Phones

        Configuring Intracluster IP Phone Communication

            Removing DNS Reliance

            Configuring Device Pools

                Cisco Unified CallManager Group Configuration

                Date/Time Group Configuration

                Region Configuration

                Softkey Template Configuration

                IP Phone Button Templates

                Putting It All Together

        IP Phone Configuration

            Manual IP Phone and Directory Number Configuration

            Automatic IP Phone Registration

        Case Study: Device Pool Design

        Summary

        Review Questions

Chapter 6    Cisco IP Telephony Users

        Cisco CallManager User Database

        Cisco CallManager User Configuration

            Adding a User

            Configuring Device Pools

        User Logon and Device Configuration

            CallManager User Options: Log On

            CallManager User Options: Welcome

            CallManager User Options: Call Forwarding

            CallManager User Options: Speed Dials

            CallManager User Options: IP Phone Services

             CallManager User Options: Personal Address Book and Fast Dial

            CallManager User Options: Message Waiting Lamp Policy

            CallManager User Options: Locale Settings

        Summary

        Review Questions

Chapter 7    Cisco Bulk Administration Tool

        The Cisco Bulk Administration Tool

            BAT Components

            BAT Installation

            Adding Cisco IP Phones Using BAT

                Using BAT Wizard Step 1: Choosing Devices

                Using BAT Wizard Step 2: Device Specifics

                Using BAT Wizard Step 3: Proceed with Task

                 Adding Phones Step 1: Configuring BAT Templates

                Adding Phones Step 2: Creating CSV Files

                Adding Phones Step 3: Validating Phones

                Adding Phones Step 4: Inserting Phones

            Updating IP Phones Using BAT

        Using the Tool for Auto-Registered Phone Support

        Summary

        Review Questions

Part III:    IPT Network Integration and Route Plan

Chapter 8    Cisco Catalyst Switches

        Catalyst Switch Role in IP Telephony

        Powering the Cisco IP Phone

            Two Types of PoE Delivery

            PoE Device Detection

             Catalyst Family of PoE Switches

            Configuring PoE

            Verifying PoE

        Data and Voice VLANs

            Configuring and Verifying Dual VLANs Using the CatOS

            Configuring and Verifying Dual VLANs Using the NativeOS

        Configuring Class of Service

        Summary

        Review Questions

Chapter 9    Configuring Cisco Gateways and Trunks

        Cisco Gateway Concepts

            Analog and Digital Gateways

            Core Gateway Requirements

            Gateway Communication Overview

        Configuring Access Gateways

             H.323 Gateway Configuration

                Call Classification

            MGCP Gateway Configuration

            Non-IOS MGCP Gateway Configuration

        Cisco Trunk Concepts

        Configuring Intercluster Trunks

        SIP and Cisco CallManager

            SIP Components

            CallManager SIP Integration and Configuration

        Summary

        Review Questions

Chapter 10    Cisco Unified CallManager Route Plan Basics

        External Call Routing

        Route Plan Configuration Process

            Route Group Overview and Configuration

             Route List Overview and Configuration

            Route Pattern Concepts and Configuration

                Route Pattern: Commonly Used Wildcards

                Route Pattern Examples

            Digit Analysis

                Digit Collection

                Closest Match Routing

                Interdigit Timeout

            Simple Route Plan Example

        Summary

        Review Questions

Chapter 11    Cisco Unified CallManager Advanced Route Plans

        Route Filters

            Route Filter Tags

             Configuring Route Filters

            Applying Route Filters

            Practical Route Filter Example

        Discard Digit Instructions

        Transformation Masks

            Calling-Party Transformations

            Called-Party Transformations

            Configuring Calling- and Called-Party Transformation Masks

            Transformation Example

        Translation Patterns

            Translation Pattern Configuration

            Practical Use of a Translation Pattern

        Route Plan Report

        Summary

        Review Questions

Chapter 12    Configuring Hunt Groups and Call Coverage

        Call Distribution Components

            Line Groups

                Call-Distribution Algorithms

                Hunt Options

                Call Distribution Scenarios: Top-Down Example

            Hunting and Forwarding

        Configuring Line Groups, Hunt Lists, and Hunt Pilots

            Configuring Line Groups

            Configuring Hunt Lists

            Configuring Hunt Pilots

        Summary

        Review Questions

Chapter 13    Implementing Telephony Call Restrictions and Control

         Class of Service Overview

        Partitions and Calling Search Spaces Overview

            Calling Search Spaces Applied to Gateways and Intercluster Trunks

            Partition Configuration

            Calling Search Space Configuration

        Time-of-Day Routing Overview

            Time Periods

            Time Schedule

            Time-of-Day Routing Effect on Users

        Configuring Time-of-Day Routing

            Configuring Time Periods

            Configuring Time Schedules

            Applying Time Schedules

        Time-of-Day Routing Usage Scenario

        Summary

        Review Questions

Chapter 14    Implementing Multiple-Site Deployments

        Call Admission Control

            Locations-Based Call Admission Control

                Configuring Location-Based Call Admission Control

                AAR Overview

                Configuring AAR

            Gatekeeper-Based Call Admission Control

                Gatekeeper Communication

                Gatekeeper-Based Call Admission Control Configuration

        Survivable Remote Site Telephony

            SRST Router Configuration

            SRST Reference Configuration

        Summary

        Review Questions

Part IV:    VoIP Features

Chapter 15    Media Resources

        Introduction to Media Resources

        Conference Bridge Resources

            Conference Bridge Hardware

            Conference Bridge Hardware CallManager Configuration

        Media Termination Point Resources

            MTP Configuration

        Annunciator Resources

            Annunciator Configuration

        Transcoder Resources

            Transcoder Configuration

        Music on Hold Resources

            Creating Audio Source Files

             Configuring MoH

                Step 1: Configure the Audio Translator

                Step 2: Configure the MoH Server

                Step 3: Add and Configure Audio Source Files

                Step 4: Set MoH Servicewide Settings

                Step 5: Find and Configure the Fixed Audio Source

                Step 6: Assigning Audio Source IDs

        Media Resource Management

            Media Resource Design

            Media Resource Groups

            Media Resource Group Configuration

            Media Resource Group List Configuration

             Assigning Media Resource Group Lists

            MRGL Design Strategy: Grouping Resources by Type

            MRGL Design Strategy: Grouping Resources by Location

        Summary

        Review Questions

Chapter 16    Configuring User Features, Part 1

        Basic IP Phone Features

            Speed Dial and Abbreviated Dial Configuration

            Auto Answer Configuration

            Call Forward and Configurable Call Forward Display Configuration

        Softkey Templates

            Adding Softkey Templates

            Modifying Softkey Availability and Positioning

            Assigning Softkey Templates to Devices

            Deleting Softkey Templates

        Enhanced IP Phone Features

            Multiple Calls per Line Appearance

            Direct Transfer

            Call Join

            Immediate Divert to Voice Mail

            Call Park

            Call Pickup and Group Call Pickup

                Other Group Call Pickup

                Call Pickup Configuration

                AutoCall Pickup

            Cisco Call Back

        Barge and Privacy

            Configuring Barge

            Configuring Privacy

        IP Phone Services

            Configuring IP Phone Services

            Services Phone Display Examples

        Summary

        Review Questions

Chapter 17    Configuring User Features, Part 2

        Cisco CallManager Extension Mobility

            Extension Mobility Example

            Configuring Extension Mobility

                Cisco CallManager Extension Mobility Service Parameters

                Configuring a Default Device Profile

                Configuring User Device Profiles

                Associating Users with Device Profiles

                Creating the Extension Mobility Service

                Updating Cisco IP Phones to Add Extension Mobility Support

        Client Matter Codes and Forced Authentication Codes

            FAC Concepts

            CMC Concepts

            FAC and CMC Configuration

                Creating CMC Codes

                Creating FAC Codes

                Enabling Route Patterns for FAC and CMC

        Call Display Restrictions

            Understanding Calling Line ID Presentation

            Understanding Connected Line ID Presentation

            Understanding Ignore Presentation Indicators

            Configuring Caller ID Restrictions

        Malicious Call Identification

            Configuring MCID

                Configuring CallManager to Support CDRs

                Configuring MCID Alarms

                Adding the MCID Softkey

        Multilevel Precedence and Preemption

        Summary

        Review Questions

Chapter 18    Configuring Cisco Unified CallManager Attendant Console

        Introduction to Cisco CallManager Attendant Console

        Terms and Definitions

            The Telephony Call Dispatcher and Attendant Console Directory

                Cisco Telephony Call Dispatcher

                Cisco CallManager Attendant Console Directory

            Pilot Points and Hunt Groups

        Call Routing and Call Queuing

            Call Routing

            Call Queuing

        Server and Administration Configuration

            Adding Attendant Console Users

            Adding the “ac” User

            Pilot Point Configuration

            Hunt Group Configuration

            Activating Cisco TCD and CTIManager Services

            Using the Attendant Console Configuration Tool

             Installing and Configuring the Attendant Console Client

        Cisco Attendant Console Features

            Attendant Console GUI: Call Control

            Attendant Console GUI: Custom Speed Dials

            Attendant Console GUI: Directory Lookup

            Attendant Console GUI: Parked Calls

            Attendant Console GUI: Broadcast Calls

        Summary

        Review Questions

Chapter 19    Configuring Cisco IP Manager Assistant

        Cisco IP Manager Assistant Overview

            Cisco IPMA with Proxy-Line Support

            Cisco IPMA with Shared-Line Support

        Cisco IP Manager Assistant Architecture

        Configuring Cisco IPMA for Shared-Line Support

            IPMA Step 1: Activating the Cisco IPMA Service

            IPMA Step 2: Configuring Service Parameters

            IPMA Step 3: Restarting the Cisco IPMA Service

            IPMA Step 4: Configuring Managers and Assistants

            IPMA Step 5: Configuring Call Divert Target

            IPMA Step 6: Installing the IPMA Assistant Console

        Summary

        Review Questions

Part V:    IPT Security

Chapter 20    Securing the Windows Operating System

        Threats Targeting the Operating System

            Lowering the Threats in Windows Operating System

        Security and Hot Fix Policy

        Operating System Hardening

            IP Telephony Operating System Security Scripts

            File-Sharing Considerations

        Antivirus Protection

        Cisco Security Agent

            Cisco Security Headless Agent

            Cisco Security Managed Agent

            CSA Supported Applications

            CSA Protection

            CSA Guidelines

        Administrator Password Policy

            Account and Password Considerations

        Common Windows Exploits

        Security Taboos

        Summary

        Review Questions

Chapter 21    Securing Cisco Unified CallManager Administration

        Threats Targeting Remote Administration

        Securing CallManager Communications Using HTTPS

            HTTPS Certificates

            Accessing CallManager When Using Self-Signed Certificates

        Multilevel Administration

            Enabling MLA

            MLA Functional Groups

            MLA User Groups

            Assigning MLA Access Privileges

            Creating New MLA Functional and User Groups

        Summary

        Review Questions

Chapter 22    Preventing Toll Fraud

         Toll Fraud Exploits

        Preventing Call Forward and Voice-Mail Toll Fraud Using Calling Search Spaces

        Blocking Commonly Exploited Area Codes

        Using Time-of-Day Routing

        Using FAC and CMC

        Restricting External Transfers

            Defining OnNet and OffNet

            Configuring Call Transfer Restrictions

            Call Transfer Restriction Example

        Dropping Conference Calls

        Summary

        Review Questions

Chapter 23    Hardening the IP Phone

        Threats Targeting Endpoints

        Blocking Endpoint Attacks

            Stopping Rogue Images from Entering IP Phones

            Disabling Phone Settings in Cisco CallManager Administration

                Disabling PC Port and Settings Access

                Disabling IP Phone Web Access

                Ignoring Gratuitous ARP

                Disabling Voice VLAN Access

                Enabling IP Phone Encryption and Authentication

        Summary

        Review Questions

Chapter 24    Understanding Cryptographic Fundamentals

        What Is Cryptography?

            Authentication and Encryption

        Symmetric Encryption

            Symmetric Encryption Example: AES

         Asymmetric Encryption

            Symmetric Encryption Example: RSA

        Hash Functions

        Digital Signatures

            Digital Signatures and RSA

        Summary

        Review Questions

Chapter 25    Understanding the Public Key Infrastructure

        The Need for a PKI

            Key Exchange in Symmetric Cryptography

            Key Exchange Protected by Asymmetric Encryption

            The Pitfall of Asymmetric Key Exchange

        PKI as a Trusted Third-Party Protocol

        PKI Entities

            X.509v3 Certificates

            Self-Signed Certificates

        PKI Enrollment

            Man-in-the-Middle PKI Enrollment Attack

            Secure PKI Enrollment

        PKI Revocation and Key Storage

            PKI Revocation Methods

            Key Storage

            Smart Cards and Smart Tokens

        PKI Example

            PKI and SSL/TLS

            Web Server Certificate Exchange

        Summary

        Review Questions

Chapter 26    Understanding Cisco IP Telephony Authentication and Encryption Fundamentals

        Threats Targeting the IP Telephony System

        How CallManager Protects Against Threats

            Secure Signaling and Media Transfer

            Authentication of Phone Images

            Authentication of Phone Configuration Files

        PKI Topologies in Cisco IP Telephony

            Self-Signed Certificates PKI Topology

            Manufacturing Installed Certificates PKI Topology

            Locally Significant Certificates PKI Topology

            Independent, Separated PKI Topology

            CTL Client

                CTL Client Application

                CTL Verification on the IP Phone

                Initial Deployment Issue

        PKI Enrollment in Cisco IP Telephony

            CAPF Acting as a CA

            CAPF Acting as a Proxy to an External CA

        Keys and Certificate Storage in Cisco IP Telephony

        Authentication and Integrity

            Certificate Exchange in TLS

            Server-to-Phone Authentication

            Phone-to-Server Authentication

            TLS SHA-1 Session Key Exchange

        Encryption

            TLS AES Encryption

            SRTP Media Encryption

            SRTP Packet Format

            Secure Call Flow Summary

        Summary

         Review Questions

Chapter 27    Configuring Cisco IP Telephony Authentication and Encryption

        Authentication and Encryption Configuration Overview

        Enabling Services Required for Security

        Using the CTL Client

            Installing the CTL Client

        Working with Locally Significant Certificates

            Issuing a Phone Certificate Using an Authentication String

        Issuing a Phone Certificate Using the CAPF

        Configuring the Device Security Mode

        Negotiating Device Security Mode

        Generating a CAPF Report

        Summary

        Review Questions

Part VI:    IP Video

Chapter 28    Introducing IP Video Telephony

         IP Video Telephony Solution Components

        Video Call Concepts

            Cisco CallManager Involvement in Video Calls

            Video Call Flow

            Video Codecs Supported by Cisco CallManager

        Video Protocols Supported in Cisco CallManager

            SCCP Video Call Characteristics

            H.323 Video Call Characteristics

            SCCP and H.323 in Cisco CallManager

        Bandwidth Management

            Video Call Bandwidth Requirement

            Calculating the Total Bandwidth

                Actual Bandwidth Used Per Video Call

            Call Admission Control in Cisco CallManager

        Call Admission Control Within a Cluster

            Region Configuration

            Location Configuration

            Call Admission Control Example

            Retry Video Call as Audio

        Call Admission Control Between Clusters

            Gatekeeper Call Admission Control Options

            Gatekeeper Call Admission Control Example

        Summary

        Review Questions

Chapter 29    Configuring Cisco VT Advantage

        Cisco VT Advantage Overview

            Cisco VT Advantage Components

            Cisco VT Advantage Supported Standards

             Protocols Used by Cisco VT Advantage

        How Calls Work with Cisco VT Advantage

            Cisco VT Advantage Video Modes

        Configuring Cisco CallManager for Video

            Call-Routing Considerations

            VT Advantage Deployment Tool

        Configuring Cisco IP Phones for Cisco VT Advantage

            Verifying Phone Loads

            Configuring IP Phones to Support Video

            Verification of Phone Configuration

        Installing Cisco VT Advantage on a Client

            Cisco VT Advantage Hardware and Software Requirements

            Cisco VT Advantage Installation Preparation Checklist

        Installing Cisco VT Advantage

            Cisco VT Advantage Installation Verification

        Summary

        Review Questions

Part VII:    IPT Management

Chapter 30    Introducing Database Tools and Cisco Unified CallManager Serviceability

        Database Management Tools

            Database Management Tools Overview

            Microsoft SQL Server 2000 Enterprise Manager

So What Can I Eat or Beyond Aspirin

SAP R/3 Handbook

Author: Jose Antonio Hernandez

Implement a comprehensive, integrated application platform

Take full advantage of the power, flexibility, and adaptability of SAP -- the premier solution for service-based, enterprise-scale business processes. SAP R/3 Handbook, Third Edition offers complete coverage of installation, implementation, operation, and support. You'll get full details on all the components, including SAP Web Application Server, SAP NetWeaver, the ABAP workbench, and more. Administration, security, and integration with other systems is also covered.

ESSENTIAL SKILLS FOR SAP TECHNICAL CONSULTANTS

  • Get an overview of SAP business, integration, and collaboration solutions
  • Understand SAP Web Application Server architecture
  • Get details on the SAP NetWeaver platform
  • Access SAP systems through the SAP presentation interface
  • Use the ABAP workbench development environment
  • Handle system administration and implement security
  • Manage system-wide changes with the Transport Management System (TMS)
  • Analyze performance and troubleshoot SAP solutions