Kamis, 26 Juni 2008

Reverse Engineering Code with IDA Pro


More Information

Software Deployment, Updating, and Patching

Presenting valuable information for professionals involved in maintaining and securing Microsoft systems and applications, Software Deployment, Updating, and Patching provides the skills necessary to develop a comprehensive strategy for updating and securing Microsoft systems with the latest packs and patches. It demonstrates how to perform inventories of IT assets, identify old versions as well as new updates and patches, test compatibility, target deployment, and evaluate management technologies. It also shows readers how to create and implement their own deployment plans with recovery and remediation options and illustrates how to recognize potential vulnerabilities.

More Information

Code Leader: Using People, Tools, and Processes to Build Successful Software


"Patrick is a pragmatist with a purist's knowledge. He has a deep understanding of what 'smells' right, and he knows when and how to find the right balance to get the job done. This philosophy of balanced 'pure pragmatism' pervades this book and makes it useful."
—from the foreword by Scott Hanselman, Author of ComputerZen Blog, www.computerzen.com; Senior Program Manager, Developer Division, Microsoft Corporation

Writing code is rewarding, but writing high-quality code, on time and at the lowest possible cost, is what makes a software project successful. As the role of a professional developer has evolved and taken on additional responsibilities, it is now necessary to work in concert with a team in order to improve both the process and final results of a software project. This unique book introduces a set of concrete best practices and construction techniques that can be applied to the development process and to actual code construction, so that you can confidently solve business problems rather than deal solely with pure coding tasks.
Patrick Cauldwell understands that it is no longer sufficient to just write software that solves a problem; it must also be fast, scalable, reliable, and easy to use. In this reference, he explains how to build software that is of high quality at a lower cost and shares with you the practical steps you must take in order to transition from software engineer to technical lead.
What you will learn from this book

Practical steps you can take to combine different developmental philosophies, processes, and construction techniques into a unified approach to software
Methods for deciding which parts of a project you need to write yourself versus what you can buy or reuse
Tools and processes you can employ to improve source code quality and maintainability
How to create, run, organize, and measure tests, and then make them more useful to developers and testers
Ways that programming by contract can make your code easier for developers to understand and use
Recommended techniques for handling errors in your code that will make your application easier to debug and support
Who this book is for
This book is for experienced software developers who are looking to improve their development skill set and bring a higher level of discipline to a project.

More Information

Senin, 23 Juni 2008

Wi-fi set to re-wire social rules

Wi-fi set to re-wire social rules

Games on Symbian OS: A Handbook for Mobile Development


Games on Symbian OS is the only guide to highlight the gaming opportunities presented by the Symbian OS platform, with particular emphasis on the creation of mobile games in C++ using native APIs.
Jo Stichbury leads a field of industry experts to provide the reader with detailed information about the key APIs used to create games. The book includes a broad introduction to games on mobile phones and describes the various ways of creating and playing mobile games. It also provides clear code examples and discussion, with information about how to optimise code for best practice. The authors use standard techniques to relay information (tables, diagrams and code samples) as well as cross-referencing between chapters and, where necessary, to other books in the Symbian Press series and beyond (e.g. to SDK documentation).

More Information

Code Division Multiple Access (CDMA)


This book covers the basic aspects of Code Division Multiple Access or CDMA. It begins with an introduction to the basic ideas behind fixed and random access systems in order to demonstrate the difference between CDMA and the more widely understood TDMA, FDMA or CSMA. Secondly, a review of basic spread spectrum techniques are presented which are used in CDMA systems including direct sequence, frequency-hopping and time-hopping approaches. The basic concept of CDMA is presented, followed by the four basic principles of CDMA systems that impact their performance: interference averaging, universal frequency reuse, soft handoff, and statistical multiplexing.

The focus of the discussion will then shift to applications. The most common application of CDMA currently is cellular systems. A detailed discussion on cellular voice systems based on CDMA, specifically IS-95, is presented. The capacity of such systems will be examined as well as performance enhancement techniques such as coding and spatial filtering. Also discussed are Third Generation CDMA cellular systems and how they differ from Second Generation systems. A second application of CDMA that is covered is spread spectrum packet radio networks. Finally, there is an examination of multi-user detection and interference cancellation and how such techniques impact CDMA networks. This book should be of interest and value to engineers, advanced students, and researchers in communications.

More Information

UMTS: The Fundamentals

UMTS (Universal Mobile Telecommunication System) is the third generation telecommunications system based on WCDMA. WCDMA (Wideband Code Division Multiple Access) is the radio interface for UMTS. WCDMA is characterised by use of a wider band than CDMA. It has additional advantages of high transfer rate, and increased system capacity and communication quality by statistical multiplexing, etc. WCDMA efficiently utilises the radio spectrum to provide a maximum data rate of 2 Mbit/s.

UMTS (Universal Mobile Telecommunication System) will offer a consistent set of services to mobile computer and phone users no matter where they are located in the world. Based on the GSM (Global System for Mobile communication) communication standard, UMTS, endorsed by major standards bodies and manufacturers, is the planned standard for mobile users around the world by 2002.

Today's cellular telephone systems are mainly circuit-switched, with connections always dependent on circuit availability. Packet-switched connection, using the Internet Protocol (IP), means that a virtual connection is always available to any other end point in the network. It will also make it possible to provide new services, such as alternative billing methods (pay-per-bit, pay-per-session, flat rate, asymmetric bandwidth, and others). The higher bandwidth of UMTS also promises new services, such as video conferencing and promises to realise the Virtual Home Environment (VHE) in which a roaming user can have the same services to which the user is accustomed when at home or in the office, through a combination of transparent terrestrial and satellite connections.
* Provides an introduction to cellular networks and digital communications
* Covers the air interface, radio access network and core network
* Explains the Release '99 specifications clearly and effectively
* Discusses UMTS services and future services beyond 3G
* Features numerous problems and solutions in order to aid understanding
Ideal for Academics and students on telecommunications, electronics and computer science courses, research and development engineers working in mobile/wireless communications and Cellular operators and technical consultants.

More Information

CDMA Capacity and Quality Optimization

Now that CDMA has been accepted as a key component of worldwide 3G systems, service providers, capacity planners, engineers and technicians need to understand the best methods and tools for maximizing throughput, capacity, and quality. This book provides that expertise

More Information

Spread Spectrum and CDMA: Principles and Applications

Spread spectrum and CDMA are cutting-edge technologies widely used in operational radar, navigation and telecommunication systems and play a pivotal role in the development of the forthcoming generations of systems and networks.

This comprehensive resource presents the spread spectrum concept as a product of the advancements in wireless IT, shows how and when the classical problems of signal transmission/processing stimulate the application of spread spectrum, and clarifies the advantages of spread spectrum philosophy. Detailed coverage is provided of the tools and instruments for designing spread spectrum and CDMA signals answering why a designer will prefer one solution over another. The approach adopted is wide-ranging, covering issues that apply to both data transmission and data collection systems such as telecommunications, radar, and navigation.
  • Presents a theory-based analysis complemented by practical examples and real world case studies resulting in a self-sufficient treatment of the subject
  • Contains detailed discussions of new trends in spread spectrum technology such as multi-user reception, multicarrier modulation, OFDM, MIMO and space-time coding
  • Provides advice on designing discrete spread spectrum signals and signal sets for time-frequency measuring, synchronization and multi-user communications
  • Features numerous Matlab-based problems and other exercises to encourage the reader to initiate independent investigations and simulations
This valuable text provides timely guidance on the current status and future potential of spread spectrum and CDMA and is an invaluable resource for senior undergraduates and postgraduate students, lecturers and practising engineers and researchers involved in the deployment and development of spread spectrum and CDMA technology.

Supported by a Companion website on which instructors and lecturers can find a solutions manual for the problems and Matlab programming, electronic versions of some of the figures and other useful resources such as a list of abbreviations.

More Information

Third Generation CDMA Systems for Enhanced Data Services (Communications, Networking and Multimedia)


Provides an overview and comparison of the code division multiple access (CDMA) systems presently being deployed for second- and third-generation cellular telephony. The authors, who are researchers for Nokia, explain the basic principles of direct-sequence spread spectrum systems, and describe the IS-95, cdma2000, 1X-EV, and wideband CDMA air interfaces and systems. The voice capacity and data rates of each system are analyzed. An appendix identifies the basic components of a CDMA transceiver.Book News, Inc.®, Portland, OR

More Information

CDMA Systems Engineering Handbook


The purpose of this book is to provide a clear understanding of code-division multiple access (CDMA) technology and build a solid understanding of the technical details and engineering principles behind the robust new IS-95 digital cellular system standard.

More Information

CDMA: Principles of Spread Spectrum Communication


This second edition of Jessica Utts' popular book develops statistical literacy and critical thinking through real-world applications, with an emphasis on ideas, not calculations. Utts focuses on two central concepts--uncertainty and data. Ideas are introduced in interesting applied and real contexts, without using an abundance of technicalities and calculations which only serve to confuse students..

More Information

Mastering Microsoft Visual Basic 2008


The Visual Basic book programmers count on

You can build rich, data-driven Windows applications and Web programs without endless coding if you use the right tools. This expert guide covers what you need to know to program with Visual Basic 2008, employ the latest Visual Studio 2008 tools, and operate efficiently within the .NET Framework.

In a clear, easy-to-follow style, the book moves from in-depth explanations to practicalinstruction to real-world examples. You'll thoroughly explore basic coding in VB 2008and learn to build interfaces without coding by using Visual Studio 2008's drag-and-drop visual tools. You'll get up to speed on Language Integrated Query (LINQ), the new component in .NET Framework 3.5, and you'll handle key tasks such as programming TreeView controls, encrypting data, and much more.

Enhance your skills in Visual Basic 2008 and the Visual Studio 2008 environment with the new edition of this bestselling guide.
Coverage includes:
*Understanding custom classes, controls, and other aspects of object-oriented programming
*Processing strings, characters, events, lists, and dates
*Designing forms with menus, and creating applications with multiple forms
*Printing business reports with headers, footers, and page numbers
*Exploring XML object serialization and XML Web services
*Querying databases and presenting data to users
*Programming basic objects of ADO.NET
*Harnessing ASP.NET 3.5 and developing Web applications
*Master the New Features in Visual Basic 2008, .NET Framework 3.5, and Visual Studio 2008
*Build a Custom, Practical Application from the Techniques in This Book
*Test, Debug, and Deploy a Variety of Applications in Visual Studio 2008
*Explore the New Vista Interface and How It Affects VB Programming
*Reinforce Your Programming Skills with Numerous Real-World Examples

More Information

NOKIA Mobile Phone : Nokia Network Security Solutions Handbook



The Complete Guide to Nokia Firewalls and VPNs. Complete Coverage of Each Nokia Enterprise Security Platform Member: IP120, IP330, IP400 Series, IP530, IP650, and IP700. Hundreds of Configuring & Implementing, Designing & Planning Sidebars, Tips, and Nokia FAQs. Step-by-Step Instructions to Configure and Administer Your Nokia Appliance. As the number two leader in the firewall/VPN appliances market, Nokia has received numerous accolades for the reliability and security of its systems. There are over 50,000 Nokia systems currently installed and, until now, no book for Nokia administrators existed. The Nokia Network Security Solutions Handbook will show network professionals how to configure and administer Nokia's newest, most popular security hardware and software products.

More Information

Sams Teach Yourself Visual Basic 2008 in 24 Hours: Complete Starter Kit


In just 24 sessions of one hour or less, you will be up and running with Visual Basic 2008. Using a straightforward, step-by-step approach, each lesson builds upon a real-world foundation forged in both technology and business matters, allowing you to learn the essentials of Visual Basic 2008 from the ground up. Step-by-step instructions carefully walk you through the most common questions, issues, and tasks. The Q&A section, quizzes, and exercises help you build and test your knowledge.

By the Way notes present interesting pieces of information. Did You Know? tips offer advice or teach an easier way to do something. Watch Out! cautions advise you about potential problems and help you steer clear of disaster.

Learn how to
*Use the powerful design environment of Visual Studio 2008
*Design feature-rich interfaces using components such as tree views and tabs
*Create robust applications using modern error-handling
*Draw fast graphics using GDI+
*Build a database application using ADO.NET
*Distribute a Visual Basic 2008 Application
*Manipulate the Windows Registry
*Create, read, and write text files
*Use event-driven techniques to build responsive applications

More Information

Beginning VB 2008 Databases: From Novice to Professional

Beginning VB 2008 Databases teaches you everything you need to know about relational databases, SQL, and ADO.NET 2.0, giving you a sound start in developing console and Windows database applications. The book also includes chapters on the new SQL Server XML data type and the forthcoming LINQ enhancements to the next version of Visual Basic.

In addition to teaching you database basics like using SQL to communicate with databases, this book provides you with detailed, code-practical techniques to access data in Visual Basic 2008 across a range of coding situations. Code-heavy and full of practical detail, this book has been fully revised and upgraded for .NET 3.5 and offers you the best contemporary practice in this core programming area, so that you¡¯ll find yourself using it in nearly all your .NET projects.

*Provides step-by-step instructions on how to install and configure necessary tools
*Presents all essential SQL query and update concepts and syntax, so you don¡¯t need prior familiarity with relational databases or SQL
*Describes how to use ADO.NET transactions, exceptions, and events
*Covers ADO.NET features for handling XML, text, and binary data within a Visual Basic 2008 context
*Explains all concepts through straightforward code examples
What you¡¯ll learn
*How relational databases work and how to use them
*How Visual Basic uses ADO.NET to access databases
*How to write stored procedures in T-SQL and call them from Visual Basic programs
*How to use XML in database applications
*How to use LINQ to simplify VB database programming
*How to install SQL Server 2005 Express and use it to teach yourself databases by doing databases
More Information

Visual Basic 2008 Recipes: A Problem-Solution Approach

Sometimes you just need to solve a problem and get on with your work. To that end, Visual Basic 2008 Recipes is a compendium of practical solutions for busy VB .NET programmers. Create time for the more interesting aspects of your VB .NET project by solving common problems with the practical solutions and dozens of code examples in this book. Important new .NET 3.5 technologies, such as Windows Presentation Framework (WPF) and Language Integrated Query (LINQ), are covered, and each chapter addresses a specific problem domain, including database access, multimedia, XML manipulation, networking, and security. The code is free to download so you can use the recipes immediately. *Take advantage of quality, ready¨Cmade solutions to common Visual Basic programming problems.

  • Avoid the tedium of having to reinvent the wheel. Focus instead on the more interesting problems specific to your application.
  • Learn from and be inspired by what the authors have done. Use their work as stepping stones to solve even more complex problems.
What you¡¯ll learn
  • Cleanly separate user¨Cinterface logic from business logic through the use of .NET 3.5¡¯s WPF.
  • Store data to and retrieve data from your relational database using LINQ.
  • Manipulate XML data using LINQ.
  • Make your programs dynamically configurable through the judicious application of reflection.
  • Take advantage of multiple CPU cores by writing multithreaded applications.
  • Integrate multimedia into your Visual Basic projects.

More Information

Beginning VB 2008: From Novice to Professional


This book is for anyone who wants to write good Visual Basic 2008 code ¨C even if you have never programmed before.

Writing good code can be a challenge, there are so many options, especially in a language like Visual Basic. If you want to really get the best from a programming language you need to know which features work best in which situations and understand their strengths and weaknesses. It is this understanding that makes the difference between coding and coding well.

Beginning VB 2008 has been written to teach you how to use the Visual Basic programming language to solve problems. From the earliest chapters, and from the first introductory concepts, you'll be looking at real-world programming challenges and learning how Visual Basic can be used to overcome them. As you progress through the book the problems become more involved and interesting while the solutions become correspondingly more complex and powerful as Visual Basic features interact to achieve the results that you want.

By the time you've finished reading this book and worked through the sample exercises, you'll be a confident and very competent Visual Basic programmer. You will still have many explorations of the .NET Framework API to look forward to in your future career, but you will have a firm foundation to build from and you will know exactly where to go to find the things that you need to progress confidently in your projects.

What you¡¯ll learn
*Become skilled in the Visual Basic 2008 programming language.
*Learn everything you need to begin building your own applications in a solid, well¨Cconsidered way: this book will teach you .NET coding from the ground up.
*Use the Visual Studio IDE to create, debug, and deploy your applications.
*Understand the mysteries of database access and the many ways that it can be accomplished from VB.
*Delve deeply into the huge range of supporting technologies that the .NET Framework offers: LINQ, ASP.NET AJAX, ADO.NET 3.0, WPF, WCF, and Windows Workflow are all introduced and explained in a straightforward and easy-to-follow way.

More Information

Pro VB 2008 and the .NET 3.5 Platform, Third Edition

Whether you¡¯re moving to .NET for the first time, or you¡¯re already writing applications on .NET 2.0 or .NET 3.0, Pro VB 2008 and the .NET 3.5 Platform, Third Edition will provide you with a solid grounding in this new technology and serve as a comprehensive reference throughout your coding career: *Explore five new chapters of content¡Âªincluding the grammar of the common intermediate language (CIL), .NET generics, and object serialization services.
  • Discover all the new .NET 3.5 features¡Âªnullable types, delegate covariance, ASP.NET 2.0 master pages, the new Windows Forms ¡°Strip¡± controls, and much more.
  • Get a professional foothold¡Âªtargeted to appeal to experienced software professionals and/or graduate students of computer science (so don¡¯t expect three chapters on iteration or decision constructs!).
  • Gain a rock¨Csolid foundation in programming using Visual Basic.
  • Get comfortable with all the core aspects of the .NET platform¡Âªincluding assemblies, remoting, Windows Forms, Web Forms, ADO.NET, XML web services, and much more.
  • Once you¡¯ve digested the information contained in the 25 chapters of this 1000+ page book, you¡¯ll be ready to apply this knowledge to your specific programming assignments and well equipped to explore the .NET universe on your own.
What you¡¯ll learn
  • Everything you need to put .NET 3.5 and Visual Basic 2008 to use in your professional workbefore anyone else!
  • Insights and techniques from the author¡¯s experience since .NET 1.0
  • Complete coverage of .NET 3.5¡ÂªWPF, WCF and WF
More Information

Visual Basic 2008 Programmer's Reference


Providing programmers and developers of all skill levels with a comprehensive tutorial and reference to Visual Basic (VB) 2008, Microsoft MVP Rod Stephenspresents a broad, solid understanding of essential topics on the latest version of VB. He explains the forms, controls, and other objects that VB furnishes for building applications in a modern windows environment. Plus, he examines the powerful development environment that makes VB such a productive language, and he delves into the VB language itself to show you how to use it to perform an array of important development tasks.

New examples and extensively revised and retested code that complies with the 2008 release help you obtain a firm understanding of VB 2008. Extensive appendixes prove to be particularly useful to help you translate from the languages you already know into the corresponding VB syntax. Ultimately, you'll find coverage of the technologies you need in order to build sophisticated applications with VB 2008.

What you will learn from this book
*Extension methods for adding new features to existing classes
*How to select and use Windows Forms Controls for a specific purpose
*Tips for using subroutines and functions to break a program into manageable pieces
*Techniques for error handling and debugging
*Various important classes and objects to use when building an application
*How to use the graphics device interface routines to draw images in VB
*Ways an application interacts with its environment

More Information

Accelerated VB 2008 (Accelerated)


Visual Basic 2008 offers powerful new features, and Accelerated VB 2008 is the fastest path to mastering them, and the rest of Visual Basic, for both experienced Visual Basic programmers moving to VB 2008 and programmers moving to Visual Basic from another object¨Coriented language. Many books introduce VB, but very few also explain how to use it optimally with the .NET common language runtime (CLR). This book teaches both core Visual Basic language concepts and how to wisely employ VB idioms and object¨Coriented design patterns to exploit the power of VB and the CLR.

Accelerated VB 2008 is both a rapid tutorial and a permanent reference. You¡¯ll quickly master VB syntax while learning how the CLR simplifies many programming tasks. You¡¯ll also learn best practices that ensure your code will be efficient, reusable, and robust. Why spend months or years discovering the best ways to design and code VB when this book will show you how to do things the right way, right from the start?

*Comprehensively and concisely explains both Visual Basic 2005 and Visual Basic 2008 features
*Focuses on the language itself and on how to use Visual Basic 2008 proficiently for all .NET application development
*Concentrates on how VB features work and how to best use them for robust, high¨Cperformance code
What you¡¯ll learn
*How VB works with and exploits the CLR
*How to use arrays and collections
*How to handle events with delegates
*How to design and use generic types and methods
*How to thread efficiently and robustly
*How the new VB 2008 anonymous types, lamba expressions, and extension methods work and how to use them

More Information

UK 'slow' on ultra-fast internet

UK 'slow' on ultra-fast internet

Process Engineering and Design Using Visual Basic


Software tools are a great aid to process engineers, but too much dependence on such tools can often lead to inappropriate and suboptimal designs. Reliance on software is also a hindrance without a firm understanding of the principles underlying its operation, since users are still responsible for devising the design. In Process Engineering and Design Using Visual Basic, Arun K. Datta provides a unique and versatile suite of programs along with simultaneous development of the underlying concepts, principles, and mathematics.

Each chapter details the theory and techniques that provide the basis for design and engineering software and then showcases the development and utility of programs developed using the material outlined in the chapter. This all-inclusive guide works systematically from basic mathematics to fluid mechanics, separators, overpressure protection, and glycol dehydration, providing basic design guidelines based on international codes.

Worked examples demonstrate the utility of each program, while the author also explains problems and limitations associated with the simulations. After reading this book you will be able to immediately put these programs into action and have total confidence in the result, regardless of your level of experience. All nine programs are available on the companion CD-ROM, including a useful unit conversion tool.

More Information

Implementing Cisco Unified Communications Manager, Part 1 (CIPT1)


Implementing Cisco Unified Communications Manager, Part 1 (CIPT1), is a Cisco®-authorized, self-paced learning tool for CCVP® foundation learning. This book provides the knowledge necessary to install, configure, and deploy a Cisco Unified Communications solution based on Cisco Unified Communications Manager, the call routing and signaling component of the Cisco Unified Communications solution. By reading this book, you will gain an understanding of deploying a Cisco Unified Communications Manager to support single site, centralized, distributed, and hybrid call processing models.

This book focuses on Cisco Unified Communications Manager Release 6.x. You will learn how to install and configure Cisco Unified Communications Manager, power over Ethernet switches, and gateways using MGCP. You will also learn how to build a scalable dial plan for on-net and off-net calls. The dial plan chapters of the book cover call routing, call coverage, digit manipulation, class of service, and call coverage components. This book will teach you how to implement media resources, LDAP directory integration, and various endpoints including Skinny Client Control Protocol (SCCP) and Session Initiation Protocol (SIP). Cisco Unified Video Advantag endpoint configuration is covered, in addition to, Cisco Unity® voice mail integration and basic voice mail box creation. Various user features are discussed including Presence.

*Understand Cisco Unified Communications Manager architecture and components
*Evaluate Cisco Unified Communications Manager deployment models
*Install, upgrade, and administer Cisco Unified Communications Manager
*Apply network configuration, NTP, and DHCP configuration options
*Configure and manage user accounts
*Deploy various Cisco Unified IP Phones
*Configure Catalyst® switches for power over Ethernet and voice VLAN requirements
*Harden IP Phones to mitigate security risks
*Configure Media Gateway Control Protocol (MGCP) gateways
*Configure dial plans, call routing, and digit manipulation
*Deploy various media resources and user features
*Integrate Cisco Unity Voicemail with Cisco Unified Communications Manager
*Configure video-enabled IP Phones

More Information

Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way
Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised networks. All device-specific and network-centered security issues are covered alongside real-world examples, in-depth case studies, and detailed countermeasures. It¡¯s all here--from switch, router, firewall, wireless, and VPN vulnerabilities to Layer 2 man-in-the-middle, VLAN jumping, BGP, DoS, and DDoS attacks. You¡¯ll prevent tomorrow¡¯s catastrophe by learning how new flaws in Cisco-centered networks are discovered and abused by cyber-criminals.
  • Use the tried-and-true Hacking Exposed methodology to find, exploit, and plug security holes in Cisco devices and networksLocate vulnerable Cisco networks using Google and BGP queries, wardialing, fuzzing, host fingerprinting, and portscanning
  • Abuse Cisco failover protocols, punch holes in firewalls, and break into VPN tunnels
  • Use blackbox testing to uncover data input validation errors, hidden backdoors, HTTP, and SNMP vulnerabilities
  • Gain network access using password and SNMP community guessing, Telnet session hijacking, and searching for open TFTP servers
  • Find out how IOS exploits are written and if a Cisco router can be used as an attack platform Block determined DoS and DDoS attacks using Cisco proprietary safeguards, CAR, and NBAR
  • Prevent secret keys cracking, sneaky data link attacks, routing protocol exploits, and malicious physical access
More Information

iExec Enterprise Essentials Companion Guide

iExec Enterprise Essentials Companion Guide is the official print companion to the Cisco® Entrepreneur Institute¡¯s new iExec Enterprise Essentials curriculum¡Âªinnovative IT-related business education designed to help you transform organizations through the strategic use of IT and Internet applications. Working through a realistic, start-to-finish case study, you¡¯ll learn exactly how to use technology to help businesses enhance their processes and drive sustainable competitive advantage.

Organized to fully align with the course¡¯s online curriculum, this is the only authorized iExec textbook. You¡¯ll begin by reviewing the global trends, opportunities, and strategic imperatives that now drive IT¡¯s usage. Next, you¡¯ll discover IT-enabled business strategies that increase productivity, efficiency, innovation, and profitability and learn how to trans-form any organization into an agile, high-performance Networked Virtual Organization (NVO). Through hands-on practice, you¡¯ll learn how to assess and improve organizational readiness, enhance governance, Internet-enable internal and external processes, use portfolio management to plan business-driven IT investments, manage change, and more.

*Master every topic and concept in the new Cisco Entrepreneur Institute¡¯s iExec Enterprise Essentials curriculum
*Understand the global trends and business drivers behind today¡¯s investments in IT and Internet technologies
*Build Networked Virtual Organizations that respond more quickly to customers, collaborate better with partners on value-added activities, and reduce cost by standardizing processes, data, and infrastructure
*Perform external and internal situation analysis, create an e-vision for success, and build an effective business case
*Implement strategic planning and portfolio management to create a successful Internet-enabled business roadmap
*Prioritize opportunities for process improvement using the Internet and IT
*Identify change management techniques that can reduce your risks

More Information

CCENT: Cisco Certified Entry Networking Technician Study Guide: ICND1 (Exam 640-822)


Expert exam prep from leading Cisco authority Todd Lammle
Start your preparation here for Cisco's new CCENT entry-level networking certification, your entry point into Cisco's popular CCNA certification track. This comprehensive study guide from leading Cisco authority Todd Lammle thoroughly prepares you for the Interconnecting Cisco Networking Devices, Part 1 exam (640-822) and the start of a career, with pages of exam essentials, real-world scenarios, and hands-on exercises. Topics include the operation of data networks, how to implement both switched and routed networks, and much more.

More Information
Info Mirror

How the web went world wide

news.bbc.co.uk/2/hi/technology

Global web celebrations under way

news.bbc.co.uk/2/hi/technology

Warning sounded on web's future

http://news.bbc.co.uk/2/hi/technology/7613201.stm

Minggu, 22 Juni 2008

Excel 2003 Power Programming with VBA


Feel the power of VBA and Excel

No one can uncover Excel’s hidden capabilities like "Mr. Spreadsheet" himself. John Walkenbach begins this power user’s guide with a conceptual overview, an analysis of Excel application development, and a complete introduction to VBA. Then, he shows you how to customize Excel UserForms, develop new utilities, use VBA with charts and pivot tables, create event-handling applications, and much more. If you’re fairly new to Excel programming, here’s the foundation you need. If you’re already a VBA veteran, you can start mining a rich lode of programming ideas right away.

Everything you need to know about:

* Creating stellar UserForms and custom dialog box alternatives
* Working with VBA subprocedures and function procedures
* Incorporating event-handling and interactions with other applications
* Building user-friendly toolbars, menus, and help systems
* Manipulating files and Visual Basic® components
* Understanding class modules
* Managing compatibility issues

More Information

Professional Refactoring in Visual Basic


Professional Refactoring in Visual Basic
In this one-of-a-kind book, Microsoft MVP Danijel Arsenovski shows you how to utilize the power of refactoring to improve the design of your existing code and become more efficient and productive. He provides you with a hands-on approach so you'll quickly learn how to manage and modify your code with refactoring tools and features. You'll also discover how to perform unit testing, refactoring to patterns, and refactoring to upgrade legacy Visual Basic code.
As you progress through the chapters, you'll build a prototype application from scratch. You'll then utilize refactoring techniques to transform the code into a properly designed, enterprise-level application. Arsenovski walks you step-by-step through each process while offering expert coding tips. You'll then be able to apply this information to real situations that arise as a result of company expansion, policy changes, or similar business decisions.

What you will learn from this book:

The steps involved in assembling a refactoring toolkit
How to activate explicit and strict compiler options
Effective strategies for error handling
How to eliminate dead code, reduce scope, and remove unused references
Method consolidation and extraction techniques
Advanced object-oriented concepts and related refactorings
How to organize code for large-scale projects
Tips for taking advantage of LINQ and other VB 2008 enhancements
Core refactorings and basic code smells
How to use the free Refactor! add-in for Visual Basic
Visual Basic–specific refactorings and smells

Who this book is for
This book is for intermediate to expert programmers, developers, or .NET software architects who are familiar with basic object-oriented concepts, Visual Basic, and the Visual Studio environment.

More Information

Algorithms in Java, Part 5 Graph Algorithms


Once again, Robert Sedgewick provides a current and comprehensive introduction to important algorithms. The focus this time is on graph algorithms, which are increasingly critical for a wide range of applications, such as network connectivity, circuit design, scheduling, transaction processing, and resource allocation. In this book, Sedgewick offers the same successful blend of theory and practice that has made his work popular with programmers for many years. Michael Schidlowsky and Sedgewick have developed concise new Java implementations that both express the methods in a natural and direct manner and also can be used in real applications.

Algorithms in Java, Third Edition, Part 5: Graph Algorithms is the second book in Sedgewick's thoroughly revised and rewritten series. The first book, Parts 1-4, addresses fundamental algorithms, data structures, sorting, and searching. A forthcoming third book will focus on strings, geometry, and a range of advanced algorithms. Each book's expanded coverage features new algorithms and implementations, enhanced descriptions and diagrams, and a wealth of new exercises for polishing skills. The natural match between Java classes and abstract data type (ADT) implementations makes the code more broadly useful and relevant for the modern object-oriented programming environment.

The Web site for this book (www.cs.princeton.edu/~rs/) provides additional source code for programmers along with a variety of academic support materials for educators.

Coverage includes:
# A complete overview of graph properties and types
# Diagraphs and DAGs
# Minimum spanning trees
# Shortest paths
# Network flows
# Diagrams, sample Java code, and detailed algorithm descriptions

A landmark revision, Algorithms in Java, Third Edition, Part 5 provides a complete tool set for programmers to implement, debug, and use graph algorithms across a wide range of computer applications.

More Information

Object Oriented Design in Java


Mitchell Waite Signature Series: Object-Oriented Design in Java takes a tutorial approach and teaches in a new way: by offering the Java code first and the design representations and explanations later. No other programming-level book on the market deals with design of Java software. There's nothing aimed at the in the trenches Java programmer. Nor can the Java programmer turn to general books on software design. These, with few exceptions, are abstract and academic, either incomprehensible or irrelevant from the perspective of the working programmer. This book targets the needs of Java application programmers, using an experience-based, hands-on approach.

More Information

Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management


Core Security Patterns is the hands-on practitioner™s guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. Written by three leading Java security architects, the patterns-driven approach fully reflects today™s best practices for security in large-scale, industrial-strength applications.

The authors explain the fundamentals of Java application security from the ground up, then introduce a powerful, structured security methodology; a vendor-independent security framework; a detailed assessment checklist; and twenty-three proven security architectural patterns. They walk through several realistic scenarios, covering architecture and implementation and presenting detailed sample code. They demonstrate how to apply cryptographic techniques; obfuscate code; establish secure communication; secure J2ME™ applications; authenticate and authorize users; and fortify Web services, enabling single sign-on, effective identity management, and personal identification using Smart Cards and Biometrics.
Core Security Patterns covers all of the following, and more:

  • What works and what doesn™t: J2EE application-security best practices, and common pitfalls to avoid
  • Implementing key Java platform security features in real-world applications
  • Establishing Web Services security using XML Signature, XML Encryption, WS-Security, XKMS, and WS-I Basic security profile
  • Designing identity management and service provisioning systems using SAML, Liberty, XACML, and SPML
  • Designing secure personal identification solutions using Smart Cards and Biometrics
  • Security design methodology, patterns, best practices, reality checks, defensive strategies, and evaluation checklists
  • End-to-end security architecture case study: architecting, designing, and implementing an end-to-end security solution for large-scale applications
More Information

Core Java(TM) 2, Volume II--Advanced Features (7th Edition)


Picking up where the authors' first volume on Java left off, Core Java 2, Volume 2 covers the more advanced features of the Java 2 platform that can add polish and power to your Java programs. The authors' accessible--yet thorough--coverage of essential Java APIs help make this book an attractive choice for any working Java developer.

Several chapters here are especially useful for getting control of new and important Java 2 features. Sections on the new Java 2 collection classes and using advanced Swing classes (like tables and trees) are particularly good. (While many other books just list Swing APIs, this volume provides short examples and effective commentary, which will let you master these complex Swing controls.) When it comes to Java2D graphics, the authors do a nice job of comparing the old AWT to the new Java2D, including drawing basic shapes and doing text output. (These operations are surprisingly tricky in this new API). A section on the new JDBC 2 standard shows off new features like ResultSets and scrollable cursors to good effect.

More advanced topics include multithreading, internationalization, and security. Throughout, this text introduces important concepts illustrated with comprehensible examples. The APIs for individual classes are listed too, making it possible to use this book as a reference, but it is the tutorial sections that stand out here. (The authors also aren't afraid to point out where Java 2 is lacking--for example, in its printing support.)

Readers of the first volume will naturally want the second volume of Core Java 2 too. It's also a great choice for any Java developer with JDK 1.1 experience who wants a tour of new Java 2 features that are essential for serious corporate development.

More Information

A Programmer's Guide to Java Certification: A Comprehesive Primer, Second Edition


What you will find in this book:
* Extensive coverage of all the objectives defined for the Sun Certified Programmer for Java 2 Platform 1.4 exam
* Easy-to-follow structure with chapters organized according to the exam objectives as laid out by Sun Microsystems
* Summaries that clearly state and differentiate the exam objectives and the supplementary objectives to be covered in each chapter
* A list of Sun's objectives for the SCPJ2 1.4 exam, and a guide to taking the exam
* A complete mock exam with new questions (not repeats of review questions)
* A CD that includes several mock exams and a version of the SCJP 1.4 Exam Simulator by Whizlabs Software, which simulates the exam-taking experience
* Numerous exam-relevant review questions to test your understanding of each major topic, with annotated answers
* Programming exercises and solutions at the end of each chapter
* Copious code examples illustrating concepts where the code has been compiled and thoroughly tested on multiple platforms
* Program output demonstrating expected results from running the examples
* Extensive use of UML (Unified Modeling Language) for illustration purposes
* An introduction to basic terminology and concepts in object-oriented programming
* Advice on how to avoid common pitfalls in mastering the language and taking the exam
* Platform-independent coverage--platform-specific details are provided where relevant *
* Information about the SCPJ2 Upgrade exam

More Information

Programing Spider,bots and Aggregators in JAVA

The content and services available on the web continue to be accessed mostly through direct human control. But this is changing. Increasingly, users rely on automated agents that save them time and effort by programmatically retrieving content, performing complex interactions, and aggregating data from diverse sources. Programming Spiders, Bots, and Aggregators in Java teaches you how to build and deploy a wide variety of these agents-from single-purpose bots to exploratory spiders to aggregators that present a unified view of information from multiple user accounts.

You will quickly build on your basic knowledge of Java to quickly master the techniques that are essential to this specialized world of programming, including parsing HTML, interpreting data, working with cookies, reading and writing XML, and managing high-volume workloads. You'll also learn about the ethical issues associated with bot use--and the limitations imposed by some websites.

This book offers two levels of instruction, both of which are focused on the library of routines provided on the companion CD. If your main concern is adding ready-made functionality to an application, you'll achieve your goals quickly thanks to step-by-step instructions and sample programs that illustrate effective implementations. If you're interested in the technologies underlying these routines, you'll find in-depth explanations of how they work and the techniques required for customization.


More Information

Enterprise Java Development on a Budget: Leveraging Java Open Source Technologies

Open source has had a profound effect on the Java community. Many Java open source projects have even become de-facto standards. The principal purpose of Enterprise Java Development on a Budget is to guide you through the development of a real enterprise Java application using nothing but open source Java tools, projects, and frameworks.

This book is organized by activities and by particular open source projects that can help you take on the challenges of building the different tiers of your applications. The authors also present a realistic example application that covers most areas of enterprise application development. You'll find information on how to use and configure JBoss, Ant, XDoclet, Struts, ArgoUML, OJB, Hibernate, JUnit, SWT/JFace, and others. Not only will you learn how to use each individual tool, but you'll also understand how to use them in synergy to create robust enterprise Java applications within your budget.

Enterprise Java Development on a Budget combines coverage of best practices with information on the right open source Java tools and technologies, all of which will help support your Java development budget and goals.

More Information

Java CAPS Basics: Implementing Common EAI Patterns


Use Java CAPS to Streamline IT Services and Leverage Legacy Applications

Design patterns are a useful tool for streamlining enterprise integration and Web development projects: the mission-critical projects that directly impact your competitiveness. Enterprise Integration Patterns by Gregor Hohpe and Bobby Woolf (Addison-Wesley, 2004) described many of the most useful patterns for enterprise developers. Until recently, however, implementing the patterns in that classic reference required the extensive use of raw Java code. Now there¡¯s a better alternative: Using Sun¡¯s Java Composite Application Suite (Java CAPS), architects and developers can implement enterprise integration patterns succinctly, elegantly, and completely.

In Java™ CAPS Basics, Sun¡¯s own Java CAPS experts show how to quickly put these new tools and technologies to work in your real-world enterprise application integration projects. After reviewing the challenges of enterprise integration, they introduce Java CAPS and show how it can simplify the development of today¡¯s state-of-the-art ¡°composite¡± applications. Next, they bridge the gap between abstract pattern languages and practical implementation details. You will learn essential Java CAPS concepts and methods in the context of the patterns you¡¯ll actually use for real-world message and system management.

Coverage includes
  • Comparing approaches to enterprise application integration and finding ways to integrate non-invasively, with fewer changes and lower costs
  • Mastering the core integration tools provided by Java CAPS: eGate, eInsight, eWays and JMS
  • Using enterprise integration patterns to improve application reusability, scalability, resilience, security, and manageability
  • Implementing patterns for message exchange, correlation, infrastructure, routing, construction, transformation, and endpoints
  • Generating and using cryptographic objects such as X.509 Certificates, PKCS#12, and JKS Keystores
  • Using advanced techniques such as solution partitioning and subprocess implementation, many of which are covered nowhere else
  • Constructing two complete example solutions that bring together many of the patterns discussed and illustrated in this book
More Information

Silverlight 2 Visual Essentials


Silverlight is a lightweight browser plug–in that frees your code from the traditional confines of the browser. It is a rules–changing, groundbreaking technology that allows you to run rich client applications right inside the browser. Even more impressively, it is able to host true .NET applications in non–Microsoft browsers (like Firefox) and on non–Microsoft platforms (like Mac OS X).
Silverlight is still new and evolving fast, and you need a reliable guidebook to make sense of it.

More Information

Effective Java (2nd Edition)


“I sure wish I had this book ten years ago. Some might think that I don’t need any Java books, but I need this one.”

–James Gosling, fellow and vice president, Sun Microsystems, Inc.

“An excellent book, crammed with good advice on using the Java programming language and object-oriented programming in general.”

–Gilad Bracha, coauthor of The Java™ Language Specification, Third Edition



“10/10–anyone aspiring to write good Java code that others will appreciate reading and maintaining should be required to own a copy of this book. This is one of those rare books where the information won’t become obsolete with subsequent releases of the JDK library.”
–Peter Tran, bartender, JavaRanch.com

“The best Java book yet written.... Really great; very readable and eminently useful. I can’t say enough good things about this book. At JavaOne 2001, James Gosling said, ‘Go buy this book!’ I’m glad I did, and I couldn’t agree more.”
–Keith Edwards, senior member of research staff, Computer Science Lab at the Palo Alto Research Center (PARC), and author of Core JINI (Prentice Hall, 2000)

“This is a truly excellent book done by the guy who designed several of the better recent Java platform APIs (including the Collections API).”
–James Clark, technical lead of the XML Working Group during the creation of the XML 1.0 Recommendation, editor of the XPath and XSLT Recommendations

“Great content. Analogous to Scott Meyers’ classic Effective C++. If you know the basics of Java, this has to be your next book.”
–Gary K. Evans, OO mentor and consultant, Evanetics, Inc

“Josh Bloch gives great insight into best practices that really can only be discovered after years of study and experience.”
–Mark Mascolino, software engineer

“This is a superb book. It clearly covers many of the language/platform subtleties and trickery you need to learn to become a real Java master.”
–Victor Wiewiorowski, vice president development and code quality manager, ValueCommerce Co., Tokyo, Japan

“I like books that under-promise in their titles and over-deliver in their contents. This book has 57 items of programming advice that are well chosen. Each item reveals a clear, deep grasp of the language. Each one illustrates in simple, practical terms the limits of programming on intuition alone, or taking the most direct path to a solution without fully understanding what the language offers.”

–Michael Ernest, Inkling Research, Inc.

“I don’t find many programming books that make me want to read every page–this is one of them.”
–Matt Tucker, chief technical officer, Jive Software

“Great how-to resource for the experienced developer.”
–John Zukowski, author of numerous Java technology books

“I picked this book up two weeks ago and can safely say I learned more about the Java language in three days of reading than I did in three months of study! An excellent book and a welcome addition to my Java library.”
–Jane Griscti, I/T advisory specialist

Are you looking for a deeper understanding of the Java™ programming language so that you can write code that is clearer, more correct, more robust, and more reusable? Look no further! Effective Java™, Second Edition, brings together seventy-eight indispensable programmer’s rules of thumb: working, best-practice solutions for the programming challenges you encounter every day.

This highly anticipated new edition of the classic, Jolt Award-winning work has been thoroughly updated to cover Java SE 5 and Java SE 6 features introduced since the first edition. Bloch explores new design patterns and language idioms, showing you how to make the most of features ranging from generics to enums, annotations to autoboxing.

Each chapter in the book consists of several “items” presented in the form of a short, standalone essay that provides specific advice, insight into Java platform subtleties, and outstanding code examples. The comprehensive descriptions and explanations for each item illuminate what to do, what not to do, and why.

Highlights include:
New coverage of generics, enums, annotations, autoboxing, the for-each loop, varargs, concurrency utilities, and much more
Updated techniques and best practices on classic topics, including objects, classes, libraries, methods, and serialization
How to avoid the traps and pitfalls of commonly misunderstood subtleties of the language
Focus on the language and its most fundamental libraries: java.lang, java.util, and, to a lesser extent, java.util.concurrent and java.io

Simply put, Effective Java™, Second Edition, presents the most practical, authoritative guidelines available for writing efficient, well-designed programs.

About the Author

Joshua Bloch is chief Java architect at Google and a Jolt Award winner. He was previously a distinguished engineer at Sun Microsystems and a senior systems designer at Transarc. Bloch led the design and implementation of numerous Java platform features, including JDK 5.0 language enhancements and the award-winning Java Collections Framework. He coauthored Java™ Puzzlers (Addison-Wesley, 2005) and Java™ Concurrency in Practice (Addison-Wesley, 2006).

More Information

WiMAX/MobileFi: Advanced Research and Technology

WiMAX is bringing about a worldwide revolution in broadband wireless access, including both fixed and mobile handsets. The IEEE 802.16 working group standardized most aspects of WiMAX signaling messages. However, several algorithms were left unspecified opening the door for innovations in protocol engineering for 802.16/802.20-based broadband wireless systems. Get Connected to the WiMAX Revolution

WiMAX/MobileFi: Advanced Research and Technology brings together the worlds leading WiMAX researchers to present progressive techniques in the design, analysis, and optimization of protocols for WiMAX. This ground-breaking, previously unpublished, collection of papers addresses topics such as connection admission control, integration with WiFi Networks, QoS support, handoff management, scheduling algorithms, and load-balancing just to name a few.

Written under the leadership of editor Yang Xiao, member of the IEEE 802.11 working group, WiMAX/MobileFi: Advanced Research and Technology represents the most cutting-edge survey of WiMAX technologies. It provides a foundation to support currently emerging applications as well as fuel the development of future innovations.

More Information

WiMAX: A Wireless Technology Revolution

The demand for broadband connectivity is growing rapidly, but cannot be met effectively by existing wireline technology. WiMAX has the potential to provide widespread Internet access that can usher in economic growth, better education and healthcare, and improved entertainment services. Examining the technology's global development and deployment activities, WiMAX: A Wireless Technology Revolution presents its unique features and evaluates its revolutionary approach over contemporary technologies.

The book covers the mission, product, and services of WiMAX, as well as specific features such as security and mobility. It discusses the implementation of the IEEE 802.16 standard and also explores how WiMax stacks up to 3G and 4G and the economic and opportunity costs. This reference also analyzes the future prospects of WiMAX and its contribution to the wireless and mobile communication technology field. It is a must-have resource for those who are either intrigued or involved with this standards-based technology that has the ability to provide high-throughput broadband connections over long distances.

More Information

Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks (Wireless Networks and Mobile)

The Wireless Metropolitan Area Network (WirelessMAN) is a promising Broadband Wireless Access (BWA) technology that provides high-speed, high-bandwidth efficiency and high-capacity multimedia services for both residential and enterprise applications. Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks examines the basic concepts, recent advances, and latest standard specifications pertinent to WirelessMANs, placing emphasis on IEEE 802.16-based WiMAX. After introducing the basics of WirelessMAN, the book addresses topics in three accessible parts. The first part focuses on radio frequency (RF), signal processing, multiple in-multiple out (MIMO) technology, and identifying challenges and possible solutions in the physical layer. An examination of protocol issues follows, including those involving medium access control (MAC), quality of service (QoS) in point-to-multi-point (PMP) and mesh networks, cross layer optimization, mobility management, handoff in heterogeneous networks, energy management, and link adaptation mechanisms.

The final part considers issues regarding security, economy, and system capacity in the WiMAX. Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks is an important resource for those interested in understanding all aspects relevant to the technical, practical, economic, and policy issues concerning WirelessMANs. It offers comprehensive practical and technical guidance on the fundamentals and recent advances in general WirelessMAN, as well as the latest standard specifications in IEEE 802.16a/c/d/e families.

More Information

WiMAX: Applications


As the demand for broadband services continues to grow worldwide, traditional solutions, such as digital cable and fiber optics, are often difficult and expensive to implement, especially in rural and remote areas. The emerging WiMAX system satisfies the growing need for high data-rate applications such as voiceover IP, video conferencing, interactive gaming, and multimedia streaming. WiMAX deployments not only serve residential and enterprise users but can also be deployed as a backhaul for Wi-Fi hotspots or 3G cellular towers. By providing affordable wireless broadband access, the technology of WiMAX will revolutionize broadband communications in the developed world and bridge the digital divide in developing countries.

Part of the WiMAX Handbook, this volume focuses on the applications of WiMAX. The book describes the logical architecture of IEEE 802.16, introduces some of the main IEEE 802.16 family standards, compares WiMAX to Wi-Fi, and studies the feasibility of supporting VoIP over WiMAX. It also looks at the residential use of WiMAX as well as the strategies of using WiMAX in remote locales and rural communities. In addition, the book examines the backhaul requirements of a large fixed wireless network and the problem of centralized routing and scheduling for IEEE 802.16 mesh networks. With the revolutionary technology of WiMAX, the lives of many will undoubtedly improve, thereby leading to greater economic empowerment.

More Information

WiMAX: Technologies, Performance Analysis, and QoS

As the demand for broadband services continues to grow worldwide, traditional solutions, such as digital cable and fiber optics, are often difficult and expensive to implement, especially in rural and remote areas. The emerging WiMAX system satisfies the growing need for high data-rate applications such as voiceover IP, video conferencing, interactive gaming, and multimedia streaming. WiMAX deployments not only serve residential and enterprise users but can also be deployed as a backhaul for Wi-Fi hotspots or 3G cellular towers.

By providing affordable wireless broadband access, the technology of WiMAX will revolutionize broadband communications in the developed world and bridge the digital divide in developing countries. Part of the WiMAX Handbook, this volume focuses on the technologies behind WiMAX, its performance capabilities, and its control mechanisms. The book introduces programmable baseband processors suited for WiMAX systems, describes an innovative methodology for the design of multi-band WiMAX antennas, addresses space-time block codes, and reviews space-frequency/space-time-frequency code design criteria.

It also proposes a combined call admission control and scheduling scheme, focuses on the performance analysis of the IEEE 802.16 mesh mode, and analyzes the performance of both single-input-single-output and space-time-block-coded OFDM systems in mobile environments. The final section establishes a framework of an ideal reservation period controller, examines the ecosystem in which scheduling for IEEE 802.16e systems must be performed, and presents a fuzzy logic controller for admission control. With the revolutionary technology of WiMAX, the lives of many will undoubtedly improve, thereby leading to greater economic empowerment.
<
More Information

WiMAX: Standards and Security

As the demand for broadband services continues to grow worldwide, traditional solutions, such as digital cable and fiber optics, are often difficult and expensive to implement, especially in rural and remote areas. The emerging WiMAX system satisfies the growing need for high data-rate applications such as voiceover IP, video conferencing, interactive gaming, and multimedia streaming. WiMAX deployments not only serve residential and enterprise users but can also be deployed as a backhaul for Wi-Fi hotspots or 3G cellular towers. By providing affordable wireless broadband access, the technology of WiMAX will revolutionize broadband communications in the developed world and bridge the digital divide in developing countries.

Part of the WiMAX Handbook, this volume focuses on the standards and security issues of WiMAX. The book examines standardized versus proprietary solutions for wireless broadband access, reviews the core medium access control protocol of WiMAX systems, and presents carriers' perspectives on wireless services. It also discusses the main mobility functions of the IEEE 802.16e standard, describes how to speed up WiMAX handover procedures, presents the 802.16 mesh protocol, and surveys the testing and certification processes used for WiMAX products. In addition, the book reviews the security features of both IEEE 802.16 and WiMAX. With the revolutionary technology of WiMAX, the lives of many will undoubtedly improve, thereby leading to greater economic empowerment.

Digital Beamforming in Wireless Communications


Introduces
important technology of digital beamforming and its upcoming
applications in wireless and satellite communications. DLC: Wireless
communication systems.

More Information

Digital Beamforming in Wireless Communications


Introduces
important technology of digital beamforming and its upcoming
applications in wireless and satellite communications. DLC: Wireless
communication systems.

More Information

WiMAX: Technology for Broadband Wireless Access

WiMAX Broadband Wireless Access Technology, based on the IEEE 802.16 standard, is at the origin of great promises for many different markets covering fixed wireless Internet Access, Backhauling and Mobile cellular networks. WiMAX technology is designed for the transmission of multimedia services (voice, Internet, email, games and others) at high data rates (of the order of Mb/s per user). It is a very powerful but sometimes complicated technique.

The WiMAX System is described in thousands of pages of IEEE 802.16 standard and amendments documents and WiMAX Forum documents. WiMAX: Technology for Broadband Wireless Access provides a global picture of WiMAX and a large number of details that makes access to WiMAX documents much easier. All the aspects of WIMAX are covered. Illustrations and clear explanations for all the main procedures of WiMAX are pedagogically presented in a succession of relatively short chapters

  • Topics covered include WiMAX genesis and framework, WiMAX topologies, protocol layers, MAC layer, MAC frames, WiMAX multiple access, the physical layer, QoS Management, Radio Resource Management, Bandwidth allocation, Network Architecture, Mobility and Security
  • Features a glossary of abbreviations and their definitions, and a wealth of explanatory tables and figures
  • Highlights the most recent changes, including the 802.16e amendment of the standard, needed for Mobile WiMAX
  • Includes technical comparisons of WiMAX vs. 802.11 (WiFi) and cellular 3G technologies

This technical introduction to WiMAX, explaining the rather complex standards (IEEE 802.16-2004 and 802.16e) is a must read for engineers, decision-makers and students interested in WiMAX, as well as other researchers and scientists from this evolving field.

MOre Information

Wireless.Foresight.Scenarios.of.the.Mobile.World.in.2015


Wireless Foresight
deals with the development of the wireless communications industry and
technology during the coming ten to fifteen years. Telecommunications
is a global business of enormous proportions and is one of the largest
industries in the world.

Written in a highly accessible and
simple to read manner, this book is based around four scenarios of the
wireless world in 2015. The focus is on the industry (i.e.
infrastructure and terminal vendors, operators, and service developers
and providers) as well as on new players.
  • Uncovers important
    areas for technological research and discusses the critical challenges
    facing industry, for example; the high cost for infrastructure, the
    slow spectrum release, the stampeding system complexity, radiation,
    battery capacity, and the threat of a disruptive market change facing
    the telecommunications industry.

  • Offers a global approach whereby developments from around the world are described.

  • Employs the method of building full-scale scenarios as opposed to just identifying trends and making predictions.
Wireless Foresight
is an invaluable and provocative read for top and middle management,
strategists, business developers, technology managers, and
entrepreneurs in the telecom, datacom and infocom industries alike. It
is also of great interest to financial analysts and academics.

More Information

Broadband Wireless Communications Business: An Introduction to the Costs and Benefits of New Technologies


With
the emergence of broadband wireless communication systems, new business
opportunities have appeared for operators, content provides, and
manufacturers.

Broadband wireless communications technologies
promise the freedom of constant access to the Internet at high speeds,
without the limitation of connection cables. Broadband Wireless
Communications Business provides comprehensive coverage of the present
status and future evolution of these technologies, giving vital
practical cost and benefit advice on design, construction and
implementation. The author focuses on the costs associated with network
design and operation, examining resources, maintenance and billing
considerations in terms of Quality of Service provisioning. The future
of 4G is explained, with enhancing technologies, cellular design
topologies and ad-hoc technologies all covered in-depth. This book will
enable the reader to make key business decisions: how to evaluate a
technology, which to use, how to combine several technologies to reach
a target market, how to differentiate from competitors and how to take
advantage of future possible enhancements.

Broadband Wireless Communications Business:
*
Defines the unique technical features of the new broadband wireless
communications systems and explains what these mean for operator and
manufacturer businesses.
* Offers a complete guide to all current access technologies, associated standards, and duplex modes.
* Provides advice on key business cost and benefit issues.
*
Addresses wireless technology from the point of view of numerous market
sectors: public mobile systems, hot spot coverage, personal area
networks, and multi-user shared usage of resources, etc.

This
text is essential for decision makers and industry key players
responsible for the design, development, implementation and management
of wireless telecommunications systems. Researchers specializing in the
field of wireless technology and graduate students on
telecommunications courses will also find it an excellent guide to the
topic.

More Information

The Art and Science of Web Design Updated Book


  • Web Design Foundations Good design comes from a deep understanding of the technologies behind the scenes.
  • Consistency Learning from convention will make your site better.
  • Structure Information architecture defined - from the Web's biggest sites to the simplest user experience to an XML-enabled future.
  • Behavior Designing with interactivity and self-aware content.
  • Browsers With so many broken browsers, you'll need a strategy for designing for them all.
  • Speed The performance of your Web site is the most critical factor of its success.
  • Advertising Being commercial is a reality. Is your site as effective as it could be?
  • Object Oriented Publishing Harness the power of dynamic, database-driven Web sites.
More Information

Introducing AutoCAD 2009 and AutoCAD LT 2009


If you're involved in any way with the design and manufacturing industry, you've probably had to work with AutoCAD drawings. But not everyone needs to be an expert at AutoCAD - many users really need to know only a few of its vast array of tools. If you're someone who doesn't need to or want to be an AutoCAD power user but wants to be able to use AutoCAD proficiently, this book is for you. Introducing AutoCAD 2009 and AutoCAD LT 2009 covers the basic drawing and editing tools that most users will need to produce quality AutoCAD drawings.

You won't find information about every last feature. Instead, this book presents AutoCAD's essential features through a combination of tutorials and reference material to give you a concise, easy-to-use companion for your work with AutoCAD. It's designed so that you can quickly learn the tools you need...when you need them.

From the Back Cover
Quickly Master AutoCAD 2009 Essentials
The new edition of this hands-on guide helps users of all skill levels learn the basics of AutoCAD 2009 and AutoCAD LT® 2009 easily and efficiently. Bestselling AutoCAD author and expert George Omura offers clear explanations, a task-based approach, and pages of real-world examples and exercises to make this thorough book more valuable and useful than ever. Whether you're new to AutoCAD or just looking for a quick refresher, you'll find the fast, focused introduction to AutoCAD you need to get quickly up to speed.
*Explore the all-new interface in AutoCAD 2009 and AutoCAD LT 2009
*Navigate the new Ribbon panel to access the tools you need
*Master the basics of drawing and editing with precision
*Add and edit notes and dimensions
*Learn the fundamentals of 2D drawings and 3D models
*Understand layers, blocks, groups, and external references
*Find areas and distances quickly
*Easily extract hidden data

More Information