Sunday, December 6, 2009

Improving Learning Transfer in Organizations or Hacking Gmail

Improving Learning Transfer in Organizations

Author: Elwood F Holton III

Improving Learning Transfer in Organizations features contributions from leading experts in the field learning transfer, and offers the most current information, ideas, and theories on the topic and aptly illustrates how to put transfer systems into action. In this book, the authors move beyond explanation to intervention by contributing their most recent thinking on how best to intervene in organizational contexts to influence the transfer of learning. Written for chief learning officers, training and development practitioners, management development professionals, and human resource management practitioners, this important volume shows how to create systems that ensure employees are getting and retaining the information, skills, and knowledge necessary to accomplish tasks on the job.

Improving Learning Transfer in Organizations addresses learning transfer on both the individual and organizational level. This volume shows how to diagnose learning transfer systems, create a transfer-ready profile, and assess and place employees to maximize transfer. The book includes information on how to determine what process should be followed to design an organization-specific learning transfer system intervention. The authors focus on the actual learning process and show how to use front-end analysis to avoid transfer problems. In addition, they outline the issues associated with such popular work-based learning initiatives as action learning and communities of practice, and they also present applications on learning transfer within e-learning and team training contexts.



Book review: True Professionalism or Introduction to Managerial Accounting

Hacking Gmail

Author: Ben Hammersley



• The first book to unlock the true power behind Gmail, Hacking Gmail will immediately appeal to Google and Gmail fans

• This is serious, down-and-dirty, under-the-hood, code-level hacking that will have readers eliminating the default settings, customizing appearance, disabling advertising, and taking control over their Gmail accounts

• Covers turning Gmail into an online hard drive for backing up files, using it as a blogging tool, and even creating customized Gmail tools and hacks

• Shows readers how to check their Gmail without visiting the site; use Gmail APIs in Perl, Python, PHP, and other languages, or create their own; and maximize Gmail as a host for message boards, photo galleries, even a blog




Table of Contents:
Acknowledgments.

Introduction.

Part I: Starting to Use Gmail.

Chapter 1: Desktop Integration.

Chapter 2: Integrating Your Existing Mail.

Chapter 3: Gmail Power Tips.

Part II: Getting Inside Gmail.

Chapter 4: Skinning Gmail.

Chapter 5: How Gmail Works.

Chapter 6: Gmail and Greasemonkey.

Chapter 7: Gmail Libraries.

Chapter 8: Checking for Mail.

Chapter 9: Reading Mail.

Chapter 10: Sending Mail.

Part III: Conquering Gmail.

Chapter 11: Dealing with Labels.

Chapter 12: Addressing Addresses.

Chapter 13: Building an API from the HTML-Only Version of Gmail.

Chapter 14: Exporting Your Mail.

Chapter 15: Using Gmail to.

Chapter 16: Using GmailFS.

Appendix: Long Code Listings.

Index.

Friday, December 4, 2009

Mobile Telemedicine or Embedded Systems Building Blocks

Mobile Telemedicine: A Computing and Networking Perspecive

Author: Yang Xiao

Technical problems are inherent to telemedicine. Not only does the practical development and application of telemedicine depend on computing and networking techniques, but many ethical, social, and political problems arising in telemedicine need technical solutions as well. Mobile Telemedicine addresses such problems in detail, including video and audio compression and transmission, robotics, networking, security, and privacy. It explores patient and health care provider interactions with network systems, remote consultation challenges, wireless sensors in telemedicine, application protocols, as well as network and system solutions for hospital and emergency room monitoring.



See also: The Big Fix or Cambridge Handbook of Psychology Health and Medicine

Embedded Systems Building Blocks

Author: Jean J Labross

- This second edition features revisions that support the latest version of the author's popular operating system and book, MicroC/OS-II - Complete and ready-to-use modules in C Get a clear explanation of functional code modules and microcontroller theory You get hands-on experience with real-time system modules provided by the author and functional code modules that may be used to create basic embedded system functions. This second edition features a new chapter on PC services and uses the updated MicroC/OS-II.



Table of Contents:

Thursday, December 3, 2009

A Practical Guide to Trusted Computing or HyperText 30

A Practical Guide to Trusted Computing

Author: David Challener

Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what's needed is secure hardware. The Trusted Platform Module (TPM) makes that possible by providing a complete, open industry standard for implementing trusted computing hardware subsystems in PCs. Already available from virtually every leading PC manufacturer, TPM gives software professionals powerful new ways to protect their customers. Now, there's a start-to-finish guide for every software professional and security specialist who wants to utilize this breakthrough security technology.

Authored by innovators who helped create TPM and implement its leading-edge products, this practical book covers all facets of TPM technology: what it can achieve, how it works, and how to write applications for it. The authors offer deep, real-world insights into both TPM and the Trusted Computing Group (TCG) Software Stack. Then, to demonstrate how TPM can solve many of today's most challenging security problems, they present four start-to-finish case studies, each with extensive C-based code examples.

Coverage includes:

  • What services and capabilities are provided by TPMs
  • TPM device drivers: solutions for code running in BIOS, TSS stacks for new operating systems, and memory-constrained environments
  • Using TPM to enhance the security of a PC's boot sequence
  • Key management, in depth: key creation, storage, loading, migration, use, symmetric keys, and much more
  • Linking PKCS#11 and TSS stacks to support applications with middleware services
  • What you need to know about TPM and privacy—including how to avoid privacy problems
  • Moving from TSS 1.1 to the new TSS 1.2 standard
  • TPM and TSS command references and a complete function library



New interesting textbook: Twilight in the Desert or The Fifties

HyperText 3.0: Critical Theory and New Media in an Era of Globalization

Author: George P Landow

George Landow's widely acclaimed Hypertext was the first book to bring together the worlds of literary theory and computer technology. Landow was one of the first scholars to explore the implications of giving readers instant, easy access to a virtual library of sources as well as unprecedented control of what and how they read. In hypermedia, Landow saw a strikingly literal embodiment of many major points of contemporary literary theory, particularly Derrida's idea of "de-centering" and Barthes's conception of the "readerly" versus "writerly" text.

From Intermedia to Microcosm, Storyspace, and the World Wide Web, Landow offers specific information about the kinds of hypertext, different modes of linking, attitudes toward technology, and the proliferation of pornography and gambling on the Internet. For the third edition he includes new material on developing Internet-related technologies, considering in particular their increasingly global reach and the social and political implications of this trend as viewed from a postcolonial perspective. He also discusses blogs, interactive film, and the relation of hypermedia to games. Thoroughly expanded and updated, this pioneering work continues to be the "ur-text" of hypertext studies.



Wednesday, December 2, 2009

HTML Illustrated Complete Third Edition or A Practical Guide to Unix for Mac OS X Users

HTML Illustrated Complete, Third Edition

Author: Elizabeth Eisner Reding

This exciting and much anticipated third edition is updated to bring students the latest in HTML, conforming to XML and XHTML coding standards.



Books about: Pharaohs Feast or Exotic Appetites

A Practical Guide to Unix for Mac OS X Users

Author: Mark G Sobell

The Most Useful UNIX Guide for Mac OS X Users Ever, with Hundreds of High-Quality Examples!

Beneath Mac OS® X’s stunning graphical user interface (GUI) is the most powerful operating system ever created: UNIX®. With unmatched clarity and insight, this book explains UNIX for the Mac OS X user—giving you total control over your system, so you can get more done, faster. Building on Mark Sobell’s highly praised A Practical Guide to the UNIX System, it delivers comprehensive guidance on the UNIX command line tools every user, administrator, and developer needs to master—together with the world’s best day-to-day UNIX reference.

This book is packed with hundreds of high-quality examples. From networking and system utilities to shells and programming, this is UNIX from the ground up—both the “whys” and the “hows”—for every Mac user. You’ll understand the relationships between GUI tools and their command line counterparts. Need instant answers? Don’t bother with confusing online “manual pages”: rely on this book’s example-rich, quick-access, 236-page command reference!

Don’t settle for just any UNIX guidebook. Get one focused on your specific needs as a Mac user!

A Practical Guide to UNIX® for Mac OS® X Users is the most useful, comprehensive UNIX tutorial and reference for Mac OS X and is the only book that delivers

  • Better, more realistic examples covering tasks you’ll actually need to perform
  • Deeper insight, based on the authors’ immense knowledge of every UNIX and OS X nook and cranny
  • Practical guidance for experienced UNIX users moving to Mac OS X
  • Exclusive discussions of Mac-only utilities, including plutil, ditto, nidump, otool, launchctl, diskutil, GetFileInfo, and SetFile
  • Techniques for implementing secure communications with ssh and scp—plus dozens of tips for making your OS X system more secure
  • Expert guidance on basic and advanced shell programming with bash and tcsh
  • Tips and tricks for using the shell interactively from the command line
  • Thorough guides to vi and emacs designed to help you get productive fast, and maximize your editing efficiency
  • In-depth coverage of the Mac OS X filesystem and access permissions, including extended attributes and Access Control Lists (ACLs)
  • A comprehensive UNIX glossary
  • Dozens of exercises to help you practice and gain confidence
  • And much more, including a superior introduction to UNIX programming tools such as awk, sed, otool, make, gcc, gdb, and CVS




About the Author

Mark G. Sobell is president of Sobell Associates Inc., a consulting firm that specializes in UNIX/Linux training, support, and custom software development. He is the author of many best-selling UNIX and Linux books and has more than twenty-five years of experience working with UNIX and Linux.

Peter Seebach, a freelance writer specializing in UNIX development, has published dozens of technical articles for IBM developerWorks.



Table of Contents:

Preface xxvii

Chapter 1: Welcome to Linux 1

The GNU-Linux Connection 2

The Heritage of Linux: UNIX 5

What Is So Good About Linux? 6

Overview of Linux 10

Additional Features of Linux 15

Chapter Summary 16

Exercises 17 PART i: The Linux Operating System 19 Chapter 2: Getting Started 21

Conventions Used in This Book 22

Logging In 24

Working with the Shell 25

Curbing Your Power: Superuser Access 28

Getting the Facts: Where to Find Documentation 29

More About Logging In 35

Chapter Summary 38

Exercises 39

Advanced Exercises 39 Chapter 3: Command Line Utilities 41

Special Characters 42

Basic Utilities 43

Working with Files 45

(Pipe): Communicates Between Processes 52

Four More Utilities 53

Compressing and Archiving Files 56

Locating Commands 61

Obtaining User and System Information 63

Communicating with Other Users 67

Email 69

Chapter Summary 69

Exercises 72

Advanced Exercises 73 Chapter 4: The Linux Filesystem 75

The Hierarchical Filesystem 76

Directory and Ordinary Files 77

Working with Directories 88

Access Permissions 91

Links 96

Chapter Summary 102

Exercises 103

Advanced Exercises 105 Chapter 5: The Shell 107

The Command Line 108

Standard Input and Standard Output 113

Running a Program in the Background 125

Filename Generation/Pathname Expansion 127

Builtins 132

Chapter Summary 133

Exercises 134

Advanced Exercises 136 PART ii: The Editors 137 Chapter 6: The vim Editor 139

History 140

Tutorial: Creating and Editing a File with vim 141

The compatible Parameter 148

Introduction to vim Features 148

Command Mode: Moving the Cursor 154

Input Mode 158

Command Mode: Deletingand Changing Text 160

Searching and Substituting 164

Miscellaneous Commands 170

Yank, Put, and Delete Commands 171

Reading and Writing Files 174

Setting Parameters 175

Advanced Editing Techniques 180

Units of Measure 184

Chapter Summary 188

Exercises 193

Advanced Exercises 194 Chapter 7: The emacs Editor 195

History 196

Tutorial: Getting Started with emacs 198

Basic Editing Commands 204

Online Help 209

Advanced Editing 212

Language-Sensitive Editing 225

Customizing emacs 235

More Information 240

Chapter Summary 241

Exercises 248

Advanced Exercises 250 PART iii: The Shells 253 Chapter 8: The Bourne Again Shell 255

Background 256

Shell Basics 257

Parameters and Variables 277

Processes 292

History 295

Aliases 312

Functions 315

Controlling bash Features and Options 318

Processing the Command Line 322

Chapter Summary 332

Exercises 334

Advanced Exercises 336 Chapter 9: The TC Shell 339

Shell Scripts 340

Entering and Leaving the TC Shell 341

Features Common to the Bourne Again and TC Shells 343

Redirecting Standard Error 349

Working with the Command Line 350

Variables 355

Control Structures 368

Builtins 377

Chapter Summary 381

Exercises 382

Advanced Exercises 384 PART iv: Programming Tools 385 Chapter 10: Programming Tools 387

Programming in C 388

Using Shared Libraries 396

make: Keeps a Set of Programs Current 399

Debugging C Programs 407

Threads 417

System Calls 417

Source Code Management 420

Chapter Summary 430

Exercises 431

Advanced Exercises 432 Chapter 11: Programming the Bourne Again Shell 435

Control Structures 436

File Descriptors 470

Parameters and Variables 474

Builtin Commands 487

Expressions 501

Shell Programs 510

Chapter Summary 520

Exercises 522

Advanced Exercises 524 Chapter 12: The gawk Pattern Processing Language 527

Syntax 528

Arguments 528

Options 529

Notes 529

Language Basics 530

Examples 537

Advanced gawk Programming 554

Error Messages 559

Chapter Summary 560

Exercises 561

Advanced Exercises 561 Chapter 13: The sed Editor 563

Syntax 564

Arguments 564

Options 564

Editor Basics 565

Examples 568

Chapter Summary 578

Exercises 579 PART v: Command Reference 581

Standard Multiplicative Suffixes 586

Common Options 587

The sample Utility 587

sample: Very brief description of what the utility does 588

aspell: Checks a file for spelling errors 589

at: Executes commands at a specified time 593

bzip2: Compresses or decompresses files 596

cal: Displays a calendar 598

cat: Joins and displays files 599

cd: Changes to another working directory 601

chgrp: Changes the group associated with a file 603

chmod: Changes the access mode (permissions) of a file 604

chown: Changes the owner of a file and/or the group the file is associated with 608

cmp: Compares two files 610

comm: Compares sorted files 612

configure: Configures source code automatically 614

cp: Copies files 616

cpio: Creates an archive or restores files from an archive 619

crontab: Maintains crontab files 624

cut: Selects characters or fields from input lines 627

date: Displays or sets the system time and date 630

dd: Converts and copies a file 633

df: Displays disk space usage 636

diff: Displays the differences between two files 638

du: Displays information on disk usage by file 644

echo: Displays a message 647

expr: Evaluates an expression 649

file: Displays the classification of a file 653

find: Finds files based on criteria 655

finger: Displays information about users 661

fmt: Formats text very simply 664

fsck: Checks and repairs a filesystem 666

ftp: Transfers files over a network 671

gcc: Compiles C and C++ programs 678

grep: Searches for a pattern in files 683

gzip: Compresses or decompresses files 688

head: Displays the beginning of a file 691

kill: Terminates a process by PID 693

killall: Terminates a process by name 695

less: Displays text files, one screen at a time 697

ln: Makes a link to a file 702

lpr: Sends files to printers 705

ls: Displays information about one or more files 708

make: Keeps a set of programs current 715

man: Displays documentation for commands 721

mkdir: Creates a directory 724

mkfs: Creates a filesystem on a device 725

Mtools: Uses DOS-style commands on files and directories 728

mv: Renames or moves a file 732

nice: Changes the priority of a command 734

nohup: Runs a command that keeps running after you log out 736

od: Dumps the contents of a file 737

paste: Joins corresponding lines from files 742

pr: Paginates files for printing 744

ps: Displays process status 746

rcp: Copies one or more files to or from a remote system 750

rlogin: Logs in on a remote system 752

rm: Removes a file (deletes a link) 753

rmdir: Removes a directory 755

rsh: Executes commands on a remote system 756

scp: Securely copies one or more files to or from a remote system 758

sleep: Creates a process that sleeps for a specified interval 760

sort: Sorts and/or merges files 762

split: Divides a file in into sections 771

ssh: Securely executes commands on a remote system 773

strings: Displays strings of printable characters 777

stty: Displays or sets terminal parameters 778

tail: Displays the last part (tail) of a file 783

tar: Stores or retrieves files to/from an archive file 786

tee: Copies standard input to standard output and one or more files 791

telnet: Connects to a remote system over a network 792

test: Evaluates an expression 794

top: Dynamically displays process status 798

touch: Changes a file's access and/or modification time 801

tr: Replaces specified characters 804

tty: Displays the terminal pathname 807

tune2fs: Changes parameters on an ext2 or ext3 filesystem 808

umask: Establishes the file-creation permissions mask 810

uniq: Displays unique lines 812

w: Displays information about system users 814

wc: Displays the number of lines, words, and bytes 816

which: Shows where in PATH a command is located 817

who: Displays information about logged-in users 819

xargs: Converts standard input into command lines 821 PART vi: Appendixes 825 Appendix a: Regular Expressions 827

Characters 828

Delimiters 828

Simple Strings 828

Special Characters 828

Rules 831

Bracketing Expressions 832

The Replacement String 833

Extended Regular Expressions 834

Appendix Summary 835 Appendix b: Help 837

Solving a Problem 838

Finding Linux-Related Information 839

Specifying a Terminal 844 Appendix c: Keeping the System Up-to-Date 847

yum: Updates and Installs Packages 848

Apt: An Alternative to yum 850

BitTorrent 855

Glossary 859

Index 913

Tuesday, December 1, 2009

Windows Vista Security for Dummies or Microsoft Visual C

Windows Vista Security for Dummies

Author: Brian Koerner

Windows Vista is beefed up with plenty of new security features to help you deflect spyware, malware, and identity thieves. But unless you know how to use these powerful tools, all you’ll get is frustration. So arm yourself with Vista Security For Dummies and discover your right to Rights Management, what Windows Security Center provides, and how to toughen up your defenses.

This indispensable guide shows you how to slam your Windows shut on vulnerabilities and security threats. You’ll find out how to use the fortress built into Vista to assess your risk, protect your kids, keep pfishers out of your bank account, and much more. You’ll also learn how to get the most out of Vista’s security features using authentication, Windows Defender, parent controls, security enhancements, firewall buttresses, wireless protections, encryption, and much more. Discover how to:



• Save money by using built-in security tools

• Audit your network

• Fine-tune your firewall

• Use all of the enhancements in Explorer 7

• Control what your kids play and where they go online

• Develop a comprehensive security plan

• Dispense security from Windows Security Center

• Reduce exposure by controlling user tasks

• Secure your digital information with RMS

• Manage accounts, groups, and shares

• Plan and implement Encrypting File System

• Avoid data theft with BitLocker

• Establish advanced security practices



Don’t leave your computer and network security to chance. Get Vista SecurityFor Dummies and be ready for anything!



Books about: The Last Days of Europe or The Young Hitler I Knew

Microsoft Visual C#: Build a Program Now!

Author: Patrice Pelland

In this lively, eye-opening, and hands-on book, all you need is a computer and the desire to learn how to program with Visual C# 2005 Express Edition. Featuring a full working edition of the software, this fun and highly visual guide walks you through a complete programming project-a desktop weather-reporting application-from start to finish. You'll get an unintimidating introduction to the Microsoft Visual Studio® development environment and learn how to put the lightweight, easy-to-use tools in Visual C# Express to work right away-creating, compiling, testing, and delivering your first, ready-to-use program. You'll get expert tips, coaching, and visual examples at each step of the way, along with pointers to additional learning resources.



Table of Contents:
Ch. 1Introducing Microsoft Visual C# 2005 express edition1
Ch. 2Installing Visual C# : 2005 express edition15
Ch. 3Creating your first application25
Ch. 4Create your own Web browser in less than five minutes!45
Ch. 5Creating your first full Windows application57
Ch. 6Modify your Web browser now!81
Ch. 7Fixing the broken blocks111
Ch. 8Managing the data127
Ch. 9Build your own weather tracker application now!165