|
|
楼主 |
发表于 2004-12-20 07:30:02
|
显示全部楼层
2004年12月19日之前ebooks介绍和下载
1202
Title: Grid Computing For Electromagnetics (Artech House Electromagnetic Analysis)
URL: http://www.amazon.com/exec/obidos/tg/detail/-/1580537774
Cover:
Product Details
ISBN: 1580537774
Author: Luciano Tarricone / Alessandra Esposito
Publisher: Artech House Publishers
Release Date: (August 30, 2004)
Pages: 266 pages
Average Customer Review: N/A
Format:
Size:
Supplier:
Summary: About the Author
Luciano Tarricone is a professor of electromagnetic fields and antenna and propagation at the University of Lecce, Italy. The author of more than 40 journal papers and 100 conference papers, he holds a Laurea degree and a Ph.D. in electrical engineering from the University of Rome, Italy.
Alessandra Esposito is a consultant at the University of Lecce, Italy. She holds a Laurea degree in electronic engineering from the University of Naples, Italy
Product Description:
Today, more and more practitioners, researchers, and students are utilizing the power and efficiency of grid computing for their increasingly complex electromagnetics applications. This cutting-edge book offers you the practical and comprehensive guidance you need to use this new approach to supercomputing for your challenging projects. Supported with over 110 illustrations, the book clearly describes a high-performance, low-cost method to solving huge numerical electromagnetics problems.
Title: Privacy Protection and Computer Forensics, Second Edition
URL: http://www.amazon.com/exec/obidos/tg/detail/-/1580538304
Cover:
Product Details
ISBN: 1580538304
Author: Michael A. Caloyannides
Publisher: Artech House Publishers
Release Date: 2nd edition (October 30, 2004)
Pages: 364 pages
Average Customer Review: Based on N/A review(s).
Format:
Size:
Supplier:
Summary: About the Author
Michael A. Caloyannides is a senior fellow at Mitretek Systems in McLean, VA. He received his Ph.D. in electrical engineering, applied mathematics and philosophy from California Institute of Technology. He is an adjunct professor at two renown universities and a regular columnist and associate editor for IEEE Computer Society[$#146]s "Security and Privacy" magazine
Product Description:
This thoroughly revised edition of an Artech House bestseller goes far beyond the typical computer forensics books on the market, emphasizing how to protect one[$#146]s privacy from data theft and hostile computer forensics. The second edition has been updated to offer more detailed how-to guidance on protecting the confidentiality of data stored on computers, and specific information on the vulnerabilities of commonly used ancillary computing devices, such as PDAs, cellular telephones, smart cards, GPS devices, telephone calling cards, fax machines, and photocopiers. This cutting-edge book helps you identify the specific areas where sensitive and potentially incriminating data is hiding in personal computers and consumer electronics, and explains how to go about truly removing this data because mere "deletion" or even "overwriting" does not accomplish this. You get a systematic process for installing operating systems and application software that will help to minimize the possibility of security compromises, and numerous specific steps that need to be taken to prevent the hostile exploitation of one[$#146]s computer.
This unique resource provides a method for ensuring that computers that are connected to the Internet are protected from malicious mobile code (code that can allow a remote hacker to read, remove, damage, or even add data to one[$#146]s computer) the new fashion of "adware/spyware", and "Web bugs." Moreover, you learn how to detect whether advanced investigative tools, such as keystroke storing and relaying hardware and software, are in use in a computer; you also learn of commercially available capabilities for intercepting radio signals unintentionally radiated by a computer. Other critical topics include the pitfalls of encryption and how to use it effectively, the practical aspects of online anonymity, and the current legal issues that pertain to the use of computers.
Title: Manage IT as a Business : How to Achieve Alignment and Add Value to the Company
URL: http://www.amazon.com/exec/obidos/tg/detail/-/0750678259
Cover:
Product Details
ISBN: 0750678259
Author: Bennet P. Lientz / Lee Larssen
Publisher: Butterworth-Heinemann
Release Date: (August 27, 2004)
Pages: 304 pages
Average Customer Review: N/A
Format:
Size:
Supplier:
Summary: From the Back Cover
Business/Management
Manage IT as a Business
How to Achieve Alignment and Add Value to the Company
Bennet P. Lientz and Lee Larssen
Many IT projects fail to deliver the benefits to the business that they promised. This is despite the fact that IT managers and staff work hard to meet the needs of the business by putting systems into place and ensuring that network operations are reliable and stable. The cause of this problem is almost always a misalignment of IT within the business.
In this book, Bennet Lientz and Lee Larssen present over 200 specific, practical guidelines and steps that demonstrate how to:
" Align IT and the business
" Develop methods that make IT more proactive in helping the business
" More effectively manage vendors
" Avoid negative surprises
" Ensure that more projects are completed on time and within budget
The techniques in this book have been implemented in over 60 organizations around the world and in over 20 different industries, and the authors include several examples in each chapter to illustrate their points.
Bennet P. Lientz is a consultant, teacher, and researcher. He is Professor of Information Systems at the Anderson Graduate School of Management, University of California, Los Angeles (UCLA). Dr. Lientz was one of the project leaders involved in the development of ARPANET, the precursor of the Internet. He is the author of more than 20 books and 60 articles on information systems, planning, project management, and E-Business.
Lee Larssen has served as a business and IT manager and consultant for the past 25 years in over 40 firms in various locations such as Asia, Latin American, Australia and Europe. She was also the Manager of Operations for Toyota Automotive Group from 1979-1999.
Product Description:
Many IT projects fail to deliver the benefits to the business that were promised. Yet IT managers and staff work hard to meet the needs of the business: Systems are put in place; network operations are reliable and stable. The cause is usually a misalignment of IT with the business. In this book, Bennet Lientz and Lee Larssen present over 200 specific, practical guidelines and steps that show how to: align IT and the business, develop methods that make IT more proactive in helping the business, more effectively manage vendors, avoid negative surprises, ensure that more projects are completed on time and within budget, among other things. The techniques in this book have been implemented in over 60 organizations around the world and in over 20 different industries, and the authors include several examples in each chapter to illustrate their points. Follow these proven recommendations to manage IT as a business that adds value to the company.
* Techniques in the book have been implemented in over 60 organizations in over 20 countries
* Guidelines show how to align IT and the business and make IT more proactive in helping the business
* The authors present concrete method to manage IT as a business that adds value to the company
Title: Speech And Human-machine Dialog (Kluwer International Series in Engineering and Computer Science)
URL: http://www.amazon.com/exec/obidos/tg/detail/-/1402080360
Cover:
Product Details
ISBN: 1402080360
Author: Wolfgang Minker / SAMIR BENNACEF
Publisher: Kluwer Academic Publishers
Release Date: (May 31, 2004)
Pages: 93 pages
Average Customer Review: N/A
Format:
Size:
Supplier:
Summary:
Title: The JR Programming Language: Concurrent Programming in an Extended Java
URL: http://www.amazon.com/exec/obidos/tg/detail/-/1402080859
Cover:
Product Details
ISBN: 1402080859
Author: Ronald A. Olsson / Aaron W. Keen
Publisher: Kluwer Academic Publishers
Release Date: (July 30, 2004)
Pages: 364 pages
Average Customer Review: N/A
Format:
Size:
Supplier:
Summary: JR is a language for concurrent programming. It is an imperative language that provides explicit mechanisms for concurrency, communication, and synchronization. JR is an extension of the Java programming language with additional concurrency mechanisms based on those in the SR (Synchronizing Resources) programming language. It is suitable for writing programs for both shared- and distributed-memory applications and machines. The JR implementation executes on UNIX-based systems (Linux, Mac OS X, and Solaris) and Windows-based systems. It is available free from the JR webpage. The JR Programming Language: Concurrent Programming in an Extended Java, an advanced-level text book, describes the JR programming language and illustrates how it can be used to write concurrent programs for a variety of applications. This text presents numerous small and large example programs. The source code for all programming examples and the given parts of all programming exercises are available on the JR webpage. Dr. Ronald A. Olsson and Dr. Aaron W. Keen, the authors of this text, are the designers and implementors of JR. The JR Programming Language: Concurrent Programming in an Extended Java is designed for upper-level undergraduate and graduate-level students in computer science. This book is also suitable for a professional audience, composed of researchers and practitioners in industry.
Title: Java Cryptography Extensions : Practical Guide for Programmers
URL: http://www.amazon.com/exec/obidos/tg/detail/-/0127427511
Cover:
Product Details
ISBN: 0127427511
Author: Jason Weiss
Publisher: Morgan Kaufmann
Release Date: (February 27, 2004)
Pages: 176 pages
Average Customer Review: N/A
Format:
Size:
Supplier:
Summary: Review
I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM
Product Description:
For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of securing Java applications and deployments for e-business. --Anthony Nadalin, Java Security Lead Architect, IBM
For many Java developers and software engineers, cryptography is an "on-demand" programming exercise, where cryptographic concepts are shelved until the next project requires renewed focus. But considerations for cryptography must be made early on in the design process and it's imperative that developers know what kinds of solutions exist.
One of Java's solutions to help bridge the gap between academic research and real-world problem solving comes in the form of a well-defined architecture for implementing cryptographic solutions. However, to use the architecture and its extensions, it is important to recognize the pros and cons of different cryptographic algorithms and to know how to implement various devices like key agreements, digital signatures, and message digests, to name a few.
In Java Cryptography Extensions (JCE), cryptography is discussed at the level that developers need to know to work with the JCE and with their own applications but that doesn't overwhelm by packing in details unimportant to the busy professional. The JCE is explored using numerous code examples and instructional detail, with clearly presented sections on each aspect of the Java library. An online open-source cryptography toolkit and the code for all of the examples further reinforces the concepts covered within the book. No other resource presents so concisely or effectively the exact material needed to begin utilizing the JCE.
* Written by a seasoned veteran of both cryptography and server-side programming
* Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests, message authentication codes, digital signatures, and managing keys and certificates
* Includes a companion web site that contains the code for the examples in the book, open-source cryptographic toolkits, and further resources
Title: Effective GUI Test Automation: Developing an Automated GUI Testing Tool
URL: http://www.amazon.com/exec/obidos/tg/detail/-/0782143512
Cover:
Product Details
ISBN: 0782143512
Author: Kanglin Li / Mengqi Wu
Publisher: Sybex Inc
Release Date: (October 21, 2004)
Pages: 445 pages
Average Customer Review: N/A
Format:
Size:
Supplier:
Summary: From the Back Cover
Have you tried using an "automated" GUI testing tool, only to find that you spent most of your time configuring, adjusting, and directing it?
This book presents a sensible and highly effective alternative: it teaches you to build and use your own truly automated tool. The procedure you'll learn is suitable for virtually any development environment, and the tool allows you to store your test data and verification standard separately, so you can build it once and use it for other GUIs. Most, if not all, of your work can be done without test scripts, because the tool itself can easily be made to conduct an automatic GUI survey, collect test data, and generate test cases. You[$#146]ll spend virtually none of your time playing with the tool or application under test.
Code-intensive examples support all of the book's instruction, which includes these key topics:
Building a C# API text viewer
Building a test monkey
Developing an XML viewer using xPath and other XML-related classes
Building complex, serializable classes for GUI test verification
Automatically testing executable GUI applications and user-defined GUI controls
Testing managed (.NET) and unmanaged GUI applications
Automatically testing different GUI controls, including Label, TextBox, Button, CheckBox, RadioButton, Menu
Verifying test results
Effective GUI Test Automation is the perfect complement to Li and Wu's previous book, Effective Software Test Automation: Developing an Automated Software Testing Tool. Together, they provide programmers, testers, designers, and managers with a complete and cohesive way to create a smoother, swifter development process - and, as a result, software that is as bug-free as possible.
Product Description:
Software test engineers: here is the first book to teach you how to build and use a fully automated GUI testing tool. Simply feed the GUI component under test, get the results, and fix the bugs. While the book's examples are written in C#, you can use your preferred language for developing the testing tool and download the complete tool from Sybex.com. The sole book that covers GUI test automation using CodeDom, Reflection, and data stores, here is a perfect complement to Kanglin Lee's previous book from Sybex--Effective Software Test Automation. This is a unique product--and it works!
Title: Microsoft Exchange Server 2003 24seven
URL: http://www.amazon.com/exec/obidos/tg/detail/-/0782142508
Cover:
Product Details
ISBN: 0782142508
Author: Jim McBee / Barry Gerber / Sybex
Publisher: Sybex Inc
Release Date: 1 edition (May 14, 2004)
Pages: 944 pages
Average Customer Review: Based on N/A review(s).
Format:
Size:
Supplier:
Summary: From the Back Cover
Advanced Coverage for Experienced Exchange Administrators
Microsoft Exchange Server 2003 24seven doesn't try to take you back to square one. Instead, it builds on the knowledge you've already earned. Expert Jim McBee with assistance from Barry Gerber delivers targeted instruction and inside tips that will help you follow the best practices established by successful Exchange organizations across a wide range of industries. This is also a great way to make a smooth transition to the latest release of Exchange Server. Coverage includes:
Getting your Exchange installation right the first time
Managing interactions with Active Directory
Understanding Exchange data storage
Preventing and recovering from disasters
Administering daily operations
Customizing Exchange
Optimizing performance
Achieving higher availability
Isolating and solving common Exchange problems
Troubleshooting SMTP and DNS problems
Improving security against viruses and worms
Securing clients
Deploying and customizing Outlook web access
Supporting mobile clients
Product Description:
Focused exclusively on real world topics, this how-to book offers practical advice from an expert with experience deploying Exchange Server 2003. If you already know the basics, you'll appreciate the comprehensive troubleshooting sidebars and expansive coverage of security, anti-spam protection, disaster recovery, installation checklists, wireless, and Outlook Web Access. Readers rave that author Jim McBee has a real knack for making highly technical material easy to understand. Based on Microsoft's final product, this accurate and reliable guide to the Standard and Enterprise Editions of Exchange Server 2003 gives you the knowledge and skills you need to achieve pain-free, day-to-day operations.
Title: Mining Google Web Services: Building Applications with the Google API
URL: http://www.amazon.com/exec/obidos/tg/detail/-/0782143334
Cover:
Product Details
ISBN: 0782143334
Author: John Paul Mueller / John Mueller / Sybex
Publisher: Sybex Inc
Release Date: 1 edition (April 23, 2004)
Pages: 384 pages
Average Customer Review: N/A
Format:
Size:
Supplier:
Summary: From the Back Cover
Google Brings Data Mining to the People!
Virtually everyone sees Google as, hands down, the best online search tool. Now you can use and improve on Google technology in your own applications.
Mining Google Web Services teaches you dozens of techniques for tapping the power of the Google API. Google already gives you fine-grained control over your search criteria, and this book shows you how to exert the same control in your own focused search and analysis applications. With just a little knowledge of JavaScript, VBA, Visual Studio 6, Visual Studio .NET, PHP, or Java, you will get better (and more relevant) search results - faster and more easily. Here's a little of what you'll find covered inside:
Improving the speed and accuracy of searches; Performing data mining across the Internet; Using Google Web Services to search a single website; Building search applications for mobile devices; Using caching techniques to improve application performance and reliability; Analyzing Google data; Creating searches for users with special needs; Discovering new uses for Google; Obtaining historical data using cached pages; Performing spelling checks on any text; Reducing the number of false search hits;
Whether your goal is to improve your own searches or share specialized search capabilities with others, this is the one resource that will see you through the job from start to finish.
Product Description:
Google's Web Services provide all kinds of powerful capabilities that you can leverage in your Internet programs. Here's a book that teaches you how to develop practical Google Web Services applications. Learn how to embed the popular search engine in a web site, create applications for optimizing complex searches, automatically monitor the web for specified information, develop custom applications to avoid objectionable material, and much more. Even find out how to use Google Web Services and Amazon Web Services together. In "Mining Google Web Services", you will discover how to develop these real-world applications using VBA, Visual Studio, PHP, Java, and Mobile Devices.
Title: Leveraging the New Human Capital : Adaptive Strategies, Results Achieved, and Stories of Transformation
URL: http://www.amazon.com/exec/obidos/tg/detail/-/089106205X
Cover:
Product Details
ISBN: 089106205X
Author: Sandra Burud / Marie Tumolo
Publisher: Davies-Black Publishing
Release Date: (November 25, 2004)
Pages: 416 pages
Average Customer Review: N/A
Format:
Size:
Supplier:
Summary: From the Publisher
Praise has come from a variety of sectors:
"This forward-thinking book grounded in today's actions will help managers direct their organization and enable employees to know what to expect." Dave Ulrich, professor, University of Michigan, Business School; author, "Why the Bottom Line Isn't"
"Offers powerful ideas that will simply make your company better." Paul Orfalea, Founder & Chairperson Emeritus, Kinko's, Inc.
"Infuses much-needed breakthrough thinking into the discussion of human capital. The authors refuse to let anyone who manages people ignore the most basic truth about leveraging humans as capital: You can't manage people as assets without respecting them as the whole beings they are." Anne C. Ruddy, Executive Director, WorldatWork (The Professional Association for Compensation, Benefits and Total Rewards)
Product Description:
Leveraging the New Human Capital forever changes the way managers see today's highly complex employees. Through interviews with corporate executives, overviews of available research and four stories of major corporations, the book sets out five specific strategies organizations can use to adapt to this new workforce.
Title: Service-Oriented Architecture : A Field Guide to Integrating XML and Web Services
URL: http://www.amazon.com/exec/obidos/tg/detail/-/0131428985
Cover:
Product Details
ISBN: 0131428985
Author: Thomas Erl
Publisher: Prentice Hall PTR
Release Date: (April 16, 2004)
Pages: 560 pages
Average Customer Review: Based on 12 review(s).
Format:
Size:
Supplier:
Summary: From Book News, Inc.
Drawing from the XML & web services integration framework (XWIF) he developed, Erl describes strategies for integrating XML and web services technology into single application environments, and introduces service-oriented architectures, based on encapsulating application logic within services that interact via a common communications protocol, for legacy and enterprise cross-application integration.Copyright (C) 2004 Book News, Inc., Portland, OR
From the Back Cover
<q>Web services is the integration technology preferred by organizations implementing service-oriented architectures. I would recommend that anybody involved in application development obtain a working knowledge of these technologies, and I'm pleased to recommend Erl's book as a great place to begin.</q>[$#8212]Tom Glover, Senior Program Manager, Web Services Standards, IBM Software Group, and Chairman of the Web Services Interoperability Organization (WS-I).
<q>An excellent guide to building and integrating XML and Web services, providing pragmatic recommendations for applying these technologies effectively. The author tackles numerous integration challenges, identifying common mistakes and providing guidance needed to get it right the first time. A valuable resource for understanding and realizing the benefits of service-oriented architecture in the enterprise.</q>[$#8212]David Keogh, Program Manager, Visual Studio Enterprise Tools, Microsoft.
<q>Leading-edge IT organizations are currently exploring second generation web service technologies, but introductory material beyond technical specifications is sparse. Erl explains many of these emerging technologies in simple terms, elucidating the difficult concepts with appropriate examples, and demonstrates how they contribute to service-oriented architectures. I highly recommend this book to enterprise architects for their shelves.</q>[$#8212]Kevin P. Davis, Ph. D., Software Architect.
Building service-oriented architecture[$#8230]with less risk, cost, and complexity
The emergence of key second-generation Web services standards has positioned service-oriented architecture (SOA) as the foremost platform for contemporary business automation solutions. The integration of SOA principles and technology is empowering organizations to build applications with unprecedented levels of flexibility, agility, and sophistication (while also allowing them to leverage existing legacy environments).
This guide will help you dramatically reduce the risk, complexity, and cost of integrating the many new concepts and technologies introduced by the SOA platform. It brings together the first comprehensive collection of field-proven strategies, guidelines, and best practices for making the transition toward the service-oriented enterprise.
Writing for architects, analysts, managers, and developers, Thomas Erl offers expert advice for making strategic decisions about both immediate and long-term integration issues. Erl addresses a broad spectrum of integration challenges, covering technical and design issues, as well as strategic planning.
- Covers crucial second-generation (WS-*) Web services standards: BPEL4WS, WS-Security, WS-Coordination, WS-Transaction, WS-Policy, WS-ReliableMessaging, and WS-Attachments
- Includes hundreds of individual integration strategies and more than 60 best practices for both XML and Web services technologies
- Includes a complete tutorial on service-oriented design principles for business and technical modeling
- Explores design issues related to a wide variety of service-oriented integration architectures that integrate XML and Web services into legacy and EAI environments
- Provides a clear roadmap for planning a long-term migration toward a standardized service-oriented enterprise
Service-oriented architecture is no longer an exclusive discipline practiced only by expensive consultants. With this book's help, you can plan, architect, and implement your own service-oriented environments-efficiently and cost-effectively.
About the Web Site
<a HREF="http://www.serviceoriented.ws">www.serviceoriented.ws</a> supplements this book with a variety of resources, including a complete glossary, examples, articles, and current industry information. |
|