Mastering Dojo  



The last couple of years have seen big changes in server-side web programming. Now it’s the client’s turn; Dojo is the toolkit to make it happen and Mastering Dojo shows you how.

Dojo is a set of client-side JavaScript tools that help you build better web applications. Dojo blurs the line between local, native applications and browser based applications; the browser becomes the user interface platform. “Modern” browsers provide an incomplete, inconvenient, and incompatible programming environment, but Dojo eliminates these problems. While there are many JavaScript libraries available, most focus on just one thing (for example, effects libraries, perceived JavaScript omissions, or HTML widgets). Dojo addresses all of these functional areas-and many others-extensively.

In Mastering Dojo, you’ll get the whole story, from basic usage to advanced idioms. Mastering Dojo starts out with a fast moving
tutorial that will give you techniques that you can start using right away. You’ll learn all about Dojo Core–the foundation on which all things Dojo stand. See how you can modularize your project for development and automatically package your release for optimal download performance. You’ll also learn how Dojo:
augments the core JavaScript library fixes the event system simplifies DOM programming provides a complete classtreeInternet Application. and grid controls. Finally, you’ll get an in-depth look at how to design and build a single-page, rich definition facility includes a powerful remote scripting (XHR) framework … and much more. You’ll love using Dojo’s HTML user interface control widget system, Dijit. See how to use over 40 widgets, including the rich yet easy-to-use

[Detail]

Read More...

Excel 2007 for Dummies  




Product Description
One look at Excel 2007, with its new Office Button, Quick Access toolbar, and Ribbon, and you realize you’re not in Kansas anymore. Well, have no fear— Excel 2007 for Dummies is here!

If you’ve never worked with a computer spreadsheet, or if you’ve had some experience with earlier versions of Excel but need help transitioning, here you’ll find everything you need to create, edit, format, and print your own worksheets (without sacrificing your sanity!). Excel 2007 for Dummies covers all the fundamental techniques, concentrating on only the easiest, most user-friendly ways to get things done.

You’ll discover how to:

* Rearrange, delete and insert new information
* Keep track of and organize data in a single worksheet
* Transfer data between the sheets of different workbooks
* Create a chart using the data in a worksheet
* Add hyperlinks and graphics to worksheets
* And more!

Plus, in keeping with Excel 2007’s more graphical and colorful look, Excel 2007 for Dummies has taken on some color of its own, with full-color plates in the mid-section of the book illustrating exactly what you’ll see on your screen. Whether you read it from cover to cover or skip to the sections that answer your specific questions, the simple guidance in this book will have you excelling at home or in the office no time.

From the Back Cover
Navigate Excel with the Ribbon and Office Button

Find out how to create and edit charts, add hyperlinks to worksheets, and more

Here's an excellent way to get the scoop on the cool features of Excel 2007, including the user-friendly interface, Live Preview, and easier collaboration options. You'll soon excel at organizing and maintaining your worksheets, doing "what-if" data analysis, dressing up your charts and graphs, playing with pivot tables, and sharing your stuff. The included four-color insert highlights the Ribbon, new graphics features, and more!

Discover how to

* Create and edit worksheets
* Design database forms
* Save your worksheet as a Web page
* Apply style galleries to spreadsheets
* Work with formulas
* Include graphics in your charts

[Details]

Read More...

Access 2007 for dummies  




Description

* Updated to cover all the latest features and capabilities of Access 2007, this resource provides new and inexperienced Access users with nine task-oriented minibooks that cover beginning to advanced-level material
* Each minibook covers a specific aspect of Access, such as database design, tables, queries, forms, reports, and macros
* Shows how to accomplish specific tasks such as database housekeeping, security data, and using Access with the Web
* Access is the world's leading desktop database solution and is used by millions of people to store, organize, view, analyze, and share data, as well as to build powerful, custom database solutions that integrate with the Web and enterprise data sources

From the Back Cover
Give your Access confidence a boost by mastering the new interface!

Your one-stop guide to the revised, mode user-friendly release of Access.

Access 2007 got a total makeover, and this all-in-one guide helps you work with confidence even if you're all new to Access. The individual work with confidence even if you're all new to Access. The individual minibooks show you how to create and work with tables, queries, forms, reports, and macros; manage databases; and program Access with VBA.

Discover how to:

* Create a database quickly and easily from templates
* Sort, find, and filter data
* Use queries to gather data
* Perform calculations in forms
* Automate actions with macros
* Secure your Access database

[details]

Read More...

Hack Proofing Linux A Guide to Open Source Security  




From the authors of the bestselling E-Mail Virus Protection Handbook!The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks. Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need CD-Rom contains Red HatMandrake Linux RPMs as well as tarballs for other Linux distributions and the BSD community Uses forensics-based analysis to give the reader an insight to the mind of a hacker

[Details]

Read More...

Sams Teach Yourself C in 24 Hours (2nd Edition)  




Sams Teach Yourself C in 24 Hours, Second Edition, shows you how to program in C in an easy-to-understand format. C is a powerful and flexible language used for a wide range of projects. You begin with learning the basics to write a first program and then move on to arrays, pointers, disk input/output, and functions. This book will allow you to understanding data types, loops, and strings to make your programs work for you. You’ll also work with arrays, structures, and unions to expand your programming skills, use pointers to access and retrieve data elements, develop programs that process mathematical equations, functions, and variables, and explore memory management techniques.

[Details]

Read More...

Managing and Mining Multimedia Databases  




There is now so much data on the Web that managing it with conventional tools is becoming almost impossible. To manage this data, provide interoperability and warehousing between multiple data sources and systemsdatabase managementmanagementMiningelectronic commercedatabase management systemdata managementdatabase systemsprivacydata mining within a single book. issues, and emerging standards, prototypes, and products. Designed for technical managers, executives, and technologists, it offers your only opportunity to learn about both multimedia data management and multimedia to the technologies that support multimedia data management on the Web, and mining technologies, from the underlying concepts, architectures, and data models for multimedia techniques for text, image, audio, and video databases. It addresses the issues and challenges of mining multimedia databases to extract information, and discusses the directions and challenges related to integrating multimedia databases for the Web, particularly for e-business. This book provides a comprehensive overview of multimedia and business, it explores Multimedia Databases fills that gap. Focusing on managing and mining multimedia databases for , mining, and integration on the Web for electronic enterprises. Managing and have exploded during the past decade. To date, however, there has been little information available on providing a complete set of services for multimedia databases, including their , and extract information from the databases and warehouses, various tools are being developed. In fact, developments in multimedia

[Details]

Read More...

Type-2 Fuzzy Logic: Theory and Applications  




This ebook discovers new techniques for making intelligent systems applying type-2 fuzzy logic and soft computing methods. Soft Computing (SC) consists by many computing paradigms, including type-1 fuzzy logic, neural networks, and genetic algorithms, which could be applied to make powerful hybrid intelligent systems. The writers extends the use of fuzzy logic to a higher order, which is called type-2 fuzzy logic. Blending type-2 fuzzy logic with conventional SC methods, we could make powerful hybrid intelligent systems that can use the advantages that from each one method offers. We believe in this ebook the use of type-2 fuzzy logic and conventional SC methods to solve pattern identification problems in real life applications.

This ebook is intended to be a great reference book for scientists and engineers interested in implementing type-2 fuzzy logic for solving troubles in pattern identification, intelligent control, intelligent constructing, robotics and automation. This ebook can as well be applied as a textbook or great reference book for postgraduate courses like the following: soft computing, intelligent pattern identification, computer vision, applied AI, and similar ones.

[Details]

Read More...

The Cold Fusion Web Database Construction Kit  




Que’s Cold Fusion Web Database Construction Kit is your one-stop resource for creating applications on the Web! Using step-by-step instructions and examples, you’ll walk through the entire process–from initial design to final roll-out–of creating a complete, Web-based application. With this powerful kit, you’ll explore Web application design considerations and learn about some of the hottest topics, including dynamic Webs, personalized online services and active content. This kit includes a SQL and ODBC tutorial, as well as an HTML reference, and contains comprehensive coverage of Cold Fusion’s database integration capabilities. In addition, this all-in-one kit features special sections on the new features in Cold Fusion–its integration with BackOffice and intranets, as well as its transaction dynamic email, Java graphlets, and new features in CFML.

[Details]

Read More...

Actionable Web Analytics: Using Data to Make Smart Business Decisions  




Knowing everything you can about each click to your Web site can help you make strategic decisions regarding your business. This book is about the why, not just the how, of web analytics and the rules for developing a “culture of analysis” inside your organization. Why you should collect various types of data. Why you need a strategy. Why it must remain flexible. Why your data must generate meaningful action. The authors answer these critical questions—and many more—using their decade of experience in Web analytics.

[Details]

Read More...

Special Edition Using Oracle 11i - Boss Corporation  




The first part of Special Edition Using Oracle 11i introduces the Oracle ERP applications and R11i concepts. The reader is then educated on proven techniques for implementing these complex and integrated systems. Configuration and usage of each of the financial, distribution, manufacturing, HRMS, and projects applications are covered, followed by a discussion of working with Oracle Support, consulting firms, and compatible software vendors. The appendixes review the employment market, consulting opportunities, and provide the reader with an implementation checklist. All of R11i's new features are covered in-depth and in practical terms. Not only will readers understand Oracle's new capabilities, they will be able to apply them right away.

[Details]

Read More...

Cybersecurity Operations Handbook  




Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies security products.
Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements.

· First book written for daily operations teams
· Guidance on almost all aspects of daily operational security, asset protection, integrity management
· Critical information for compliance with Homeland Security and services in a live environment. to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run

[details]

Read More...

Electromagnetics for High-Speed Analog and Digital Communication Circuits  




Modern communications technology demands smaller, faster and more efficient circuits. This book reviews the fundamentals of electromagnetism in passive and active circuit elements, highlighting various effects and potential problems in designing a new circuit. The author begins with a review of the basics - the origin of resistance, capacitance, and inductance - then progresses to more advanced topics such as passive device design and layout, resonant circuits, impedance matching, high-speed switching circuits, and parasitic coupling and isolation techniques. Using examples and applications in RF and microwave systems, the author describes transmission lines, transformers, and distributed circuits. State-of-the-art developments in Si based broadband analog, RF, microwave, and mm-wave circuits are reviewed. With up-to-date results, techniques, practical examples, illustrations and worked examples, this book will be valuable to advanced undergraduate and graduate students of electrical engineering, and practitioners in the IC design industry. Further resources for this title are available at www.cambridge.org/9780521853507.

Book Description
Reviews the fundamental electromagnetics of passive and active circuit elements, highlighting various effects and potential problems in circuit design. Contains up-to-date results, techniques, practical examples, illustrations and worked examples. Suitable for advanced undergraduate and graduate students of electrical engineering, and practitioners in the IC design indsutry. Further resources: www.cambridge.org/9780521853507.

[review]

Read More...

Adapting to Web Standards CSS and Ajax for Big Sites  




After learning the language of design, how does one effectively use standards-based technologies to create visually strong Web sites? The full-color Professional Web Standards Design and Development gives developers a peek into the process of the best designers in the world through the work of high profile, real-world Web sites that made them famous. The book focuses on deconstructing these top-tier large-scale sites with particular attention given to deconstructing CSS.

[review]

Read More...

Web Services and Service-Oriented Architectures: The Savvy Manager’s Guide  




“The discussion on the common beliefs about enterprise architectures and how they relate to Web services is a gem and worth the price of the book. Similarly insightful chapters cover the impact of Web services on the enterprise, adoption steps and change management issues in implementing Web services projects. This a great book that every manager contemplating a Web services project should read.” - Toufic Boubez, Ph.D., Author of “Building Web Services with Java: Making Sense of XML, SOAP, WSDL and UDDI”


[Review]

Read More...

Programming Microsoft ASP.NET 2  




Delve into the core topics for ASP.NET 2.0 programming mastering the essential skills and capabilities needed to build high-performance Web applications successfully. Well-known ASP.NET author Dino Esposito deftly builds your expertise with Web forms Microsoft Visual Studio- core controls master pages data access data binding state management security services and other must-know topics#151;combining definitive reference with practical hands-on programming instruction. Packed with expert guidance and pragmatic examples this CORE REFERENCE delivers the key resources you need to develop professional-level Web programming skills.

[Review]

Read More...

Refactoring HTML: Improving the Design of Existing Web Applications  




This book will be an indispensable resource for Web designers, developers, project managers, and anyone who maintains or updates existing sites. It will be especially helpful to Web professionals who learned HTML years ago, and want to refresh their knowledge with today's standards-compliant best practices.
This book will be an indispensable resource for Web designers, developers, project managers, and anyone who maintains or updates existing sites. It will be especially helpful to Web professionals who learned HTML years ago, and want to refresh their knowledge with today's standards-compliant best practices.

[Review]

Read More...

Deploying Cisco Wide Area Application Services  




Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets with far more robust security. And they must do it all while gaining far greater control over cost. Distributing IT resources increases management, hardware, and software overhead, but centralizing IT can worsen application performance. There is a solution to this quandary: Cisco application acceleration and WAN optimization technologies that permit IT to safely centralize distributed IT resources, meeting user performance expectations without replacing existing network infrastructure.
Deploying Cisco Wide Area Application Services is the first comprehensive guide to designing and deploying solutions with these Cisco technologies. Zach Seils and Joel Christner show how to deploy Cisco WAAS in a scalable, transparent, and seamless fashion that responds to both your business and technical challenges. Writing for network design and implementation engineers and other networking professionals, they cover the entire planning and configuration process. Drawing on their extensive experience implementing WAAS in the enterprise, they also offer real-world implementation examples and case studies–including full chapters on network, branch office, and data center integration.

[review]

Read More...

Java Software Solutions (Java 5.0 version): Foundations of Program Design (4th Edition)”  




This book takes an early object oriented approach to Java Embracing Java 5.0 topics, including the new standard Scanner class for simplified keyboard input and parsing, enumerated types, autoboxing, variable length parameter lists, the enhanced for loop, and generic types.

This new edition has an earlier evolution of object concepts, developed in a way that capitalizes on the power of objects without overwhelming beginning programmers. It includes all new Java 5 topics, including Scanner class, enumerated types, autoboxing, variable length parameter lists, the enhanced for loop, and generic types. This is in depth coverage on GUI applications. This book is appropriate for beginning programmers who want to learn to program with Java as well as experienced programmers who want to add Java to their skill-set.

[Review]

Read More...

Enterprise Java Security: Building Secure and Robust J2EE Applications  




For a long time, there has been a need for a J2EE(TM) security book. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of the J2EE platform and e-business.\”
-From the Foreword by Steven A. Mills, Senior Vice President and Group Executive, Software Group, IBM Corporation

Enterprise Java(TM) Security: Building Secure J2EE(TM) Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehensive guide covers the current status of the Java(TM) 2 Platform, Enterprise Edition (J2EE), and Java(TM) 2 Platform, Standard Edition (J2SE(TM)), security architectures and offers practical solutions and usage patterns to address the challenges of Java security.To aid developers who need to build secure J2EE applications, Enterprise Java(TM) Security covers at length the J2EE security technologies, including the security aspects of servlets, JavaServer Pages(TM) (JSP(TM)), and Enterprise JavaBeans(TM) (EJB(TM))—technologies that are at the core of the J2EE architecture. In addition, the book covers Web Services security.

Examples and sample code are provided throughout the book to give readers a solid understanding of the underlying technology.

The relationship between Java and cryptographic technologies is covered in great detail, including:
- Java Cryptography Architecture (JCA)
- Java Cryptography Extension (JCE)
- Public-Key Cryptography Standards (PKCS)
- Secure/Multipurpose Internet Mail Extensions (S/MIME)
- Java Secure Socket Extension (JSSE)

[Review]

Read More...

Creating Mashups with Adobe Flex and AIR  




Web applications no longer need be powered by any one individual’s data, and they don’t need to be confined to the desktop. Developers can draw on a wealth of publicly available content, from providers such as Flickr, Amazon, Google, Twitter, and Last.fm, and combine it for use in their own applications. Adobe Integrated Runtime (AIR) makes it simple to bring previously web-only applications to the desktop, allowing them to run alongside traditional applications on an end user’s computer.

In this book, you’ll learn how to create mashup applications from the vast array of web services, feeds, and APIs using Adobe Flash and Flex together with HTML and JavaScript (Ajax). You’ll be introduced to the various sources of information and the tools necessary to gather and reuse that information, and then you’ll learn how to combine that content in a variety of ways.

You’ll learn how to have desktop applications interact with online services such as Flickr, you’ll learn how to use Amazon S3 for enterprise-level data storage, and you’ll embrace technologies such as OpenID. In addition, you’ll create abstract visualizations based on music sourced from Last.fm and consume Twitter content via RSS. You will also see how to use the Flash-native data format SWX along with PHP to create a Yahoo! weather widget.

You’ll discover just why you may want to build a widget or a desktop application rather leaving things web-based; then you’ll create an application using Flex Builder and AIR and learn how best to distribute it. With so many tools and so much data available, the possibilities for mashup creation are endless. Creating Mashups with Adobe Flex and AIR provides all you need to get you up and running quickly, while also giving you a solid understanding of the technologies involved so you can take things further—to a place limited only by your imagination.
In this book you’ll learn

* how to use Flex 3 in conjunction with ActionScript 3.0 to build powerful applications;
* how you can use Adobe AIR to take your application from the Web and onto the
desktop;
* the differences between developing for the Web and for the desktop;
* how you can use the APIs of popular web services such as Flickr, Amazon, Google, Twitter, and Last.fm as data sources for your application; and
* how to optimize your applications for fast and efficient performance.

[Review]

Read More...