logo paquebote
318 libros encontrados buscando editorial: Addison Wesley

www.paquebote.com > Addison Wesley

Orden: · Ver: · Tipo:


Executive Guide to Information Security, The: Threats, Challenges, and Solutions

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 288
Precio: 32,19
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Praise for The Executive Guide to Information Security

"In today's world, no business can operate without securing its computers. This book conveys that message in clear, concise terms and acts as a tremendous primer to CEOs."

from the Foreword by Richard A. Clarke

"Every CEO is responsible for protecting the assets of their corporation–the people, intellectual property, corporate and customer information, infrastructure, network, and computing resources. This is becoming both more important and more difficult with the rise in the number and sophistication of cyber threats. This book helps the CEO understand the issues and ask the right questions to implement a more effective strategy for their business."

Steve Bennett, president and CEO, Intuit

"Mark Egan and Tim Mather help nontechnical executives gain a comprehensive perspective over the security challenges that all companies face today. This book is well structured and practical. Yet, it also stresses that a strategic approach to cyber security is essential, and that "tone at the top" will determine the effectiveness of any corporate cyber security policy."

Eric Benhamou, chairman of the board of directors, 3Com Corporation, palmOne, and PalmSource, Inc

"This book is not about cyber security; it's about managing one's company and the role that cyber security plays in that scenario. It's chilling to think of how vulnerable the assets of a business are on a computer network; this book is a fire alarm in the night for business executives to realize computer security is not a tech issue–it's a business issue worthy of the same attention and priority that business executives might place on any other mission-critical element of their company."

George Reyes, CFO, Google

"This is a must read for any executive of any size company. The Internet makes all businesses equal in that they are subject to the same types of threats regardless of their product. In this book, the CIO and security director of one of the top security companies makes the business case for security and tells you what to do to successfully mitigate threats."

Howard A. Schmidt, former cyber security advisor to the White House, CSO Microsoft, and VP CISO eBay

"This book gives an excellent overview of the issues around securing information at a time in our history when information is extremely vulnerable to outside attack, retrieval, or manipulation. Steps taken now can make a huge difference to a company's ability to survive and thrive in a heterogeneous attack culture."

Bob Concannon, Global Practice Leader, Boyden Global Executive Search

"Few if any books expose the business executive to the serious and critical nature of existing and evolving security issues using nontechnical terms. Executives can no longer afford to delegate the responsibility and accountability for security without understanding the issues and without assuming the ultimate responsibility for security in the firm. This book should become required reading for every business executive, regardless of product or company size."

John Moreno, chair, MS in Information Technology, Golden Gate University

"This book details the what, why, and how to solve issues of information security in business today. It gives examples many people will recognize from the press, discusses the basics of information security in a very understandable way, and reviews approaches for addressing these risks and threats."

David Schwartz, managing director, Derivative Products Risk Advisors, Inc.

"This book fills a void by addressing the key criteria executives need to consider when implementing an effective information security plan within their organization."

Shobana Gubbi, former project manager of IOS Technologies, Cisco

A Business-Focused Information Security Action Plan for Every Executive

Today, every executive must understand information security from a business perspective. Now, this concise book tells business leaders exactly what they need to know to make intelligent decisions about security–without ever getting lost in the technical complexities.

The Executive Guide to Information Security offers realistic, step-by-step recommendations for evaluating and improving information security in any enterprise. From start to finish, the focus is on action: what works and how to get it done. Here are just a few of the things you will be learning:

  • Understanding your security challenges and obligations

  • Trends in security attacks

  • Systematically identifying your risks and vulnerabilities

  • Implementing best-practice processes for access, acceptable use, training, strategy, and emergency response

  • Effective executive leadership, governance, and metrics

  • Staffing security–coping with a shortage of expertise

Whether you're a CxO, a line-of-business executive, or an IT executive who needs to get colleagues up to speed, this is the nontechnical, business-driven security briefing you've been searching for.

Mark Egan is chief information officer and vice president of the Information Technology Division of Symantec. In this role, he is responsible for all internal systems and security at Symantec. Egan is the co-chair of TechNet's Cyber Security Best Practices Campaign and a frequent speaker on best practices for information security and information technology.

TIM MATHER, Symantec's vice president and chief information security officer, is responsible for Symantec's information security program. Mather is a Certified Information Systems Security Professional and a Certified Information Systems Manager.

The authors' profits from this book will support a scholarship program for underprivileged students planning IT careers.

© Copyright Pearson Education. All rights reserved.



UML for Mere Mortals®

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 288
Precio: 37,39
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"There are many books that shine light on the darkest corners of the UML, but Eric and Bob present just the essentials needed to make you effective in modeling all the important aspects of a software-intensive system."

—Grady Booch

"Bob and Eric have managed to capture key system and software design techniques in a style that is refreshingly straightforward to understand and apply, and to distill their ideas and insight from more than a decade of practical use of UML into a book that will increase your appreciation for UML and make you more effective."

—Dr. Alan W. Brown, Distinguished Engineer, IBM Rational

"A practical introduction to designing real-world business systems using UML, explained from first principles. A great book for anyone who wants to start learning the industry's standard modeling language."

—Andrew Watson, Vice President and Technical Director, Object Management Group

Need to get results with UML...without unnecessary complexity or mind-numbing jargon? You need UML for Mere Mortals®. This easy-to-read introduction is perfect for technical professionals and business stakeholders alike: anyone who needs to create, understand, or review UML models, without becoming a hard-core modeler.

There's nothing theoretical about this book. It explains UML in the context of your real-world challenges. It's organized around the activities you'll need to perform. It focuses on the UML elements you'll find most useful. And it offers specific answers for the problems you're most likely to face.

Drawing on extensive experience, the authors offer pragmatic explanations and guidance on core techniques ranging from use cases to component diagrams, architectural patterns to application and database modeling. You'll find practical coverage for using UML to support testing, as well as discussion of UML 2.0 and its implications.

Whether you're a manager, programmer, architect, database designer, or documentation specialist, UML for Mere Mortals is the handy resource you need to help you achieve your goals with UML...simply, quickly, painlessly.

© Copyright Pearson Education. All rights reserved.



Extreme Programming Explained: Embrace Change

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 224
Precio: 33,22
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

“In this second edition of Extreme Programming Explained, Kent Beck organizes and presents five years’ worth of experiences, growth, and change revolving around XP. If you are seriously interested in understanding how you and your team can start down the path of improvement with XP, you must read this book.”
Francesco Cirillo, Chief Executive Officer, XPLabs S.R.L.
“The first edition of this book told us what XP was—it changed the way many of us think about software development. This second edition takes it farther and gives us a lot more of the ‘why’ of XP, the motivations and the principles behind the practices. This is great stuff. Armed with the ‘what’ and the ‘why,’ we can now all set out to confidently work on the ‘how’: how to run our projects better, and how to get agile techniques adopted in our organizations.”
Dave Thomas, The Pragmatic Programmers LLC
“This book is dynamite! It was revolutionary when it first appeared a few years ago, and this new edition is equally profound. For those who insist on cookbook checklists, there’s an excellent chapter on ‘primary practices,’ but I urge you to begin by truly contemplating the meaning of the opening sentence in the first chapter of Kent Beck’s book: ‘XP is about social change.’ You should do whatever it takes to ensure that every IT professional and every IT manager—all the way up to the CIO—has a copy of Extreme Programming Explained on his or her desk.”
Ed Yourdon, author and consultant
“XP is a powerful set of concepts for simplifying the process of software design, development, and testing. It is about minimalism and incrementalism, which are especially useful principles when tackling complex problems that require a balance of creativity and discipline.”
Michael A. Cusumano, Professor, MIT Sloan School of Management, and author of The Business of Software
Extreme Programming Explained is the work of a talented and passionate craftsman. Kent Beck has brought together a compelling collection of ideas about programming and management that deserves your full attention. My only beef is that our profession has gotten to a point where such common-sense ideas are labeled ‘extreme.’...”
Lou Mazzucchelli, Fellow, Cutter Business Technology Council
“If your organization is ready for a change in the way it develops software, there’s the slow incremental approach, fixing things one by one, or the fast track, jumping feet first into Extreme Programming. Do not be frightened by the name, it is not that extreme at all. It is mostly good old recipes and common sense, nicely integrated together, getting rid of all the fat that has accumulated over the years.”
Philippe Kruchten, UBC, Vancouver, British Columbia
“Sometimes revolutionaries get left behind as the movement they started takes on a life of its own. In this book, Kent Beck shows that he remains ahead of the curve, leading XP to its next level. Incorporating five years of feedback, this book takes a fresh look at what it takes to develop better software in less time and for less money. There are no silver bullets here, just a set of practical principles that, when used wisely, can lead to dramatic improvements in software development productivity.”
Mary Poppendieck, author of Lean Software Development: An Agile Toolkit
“Kent Beck has revised his classic book based on five more years of applying and teaching XP. He shows how the path to XP is both easy and hard: It can be started with fewer practices, and yet it challenges teams to go farther than ever.”
William Wake, independent consultant
“With new insights, wisdom from experience, and clearer explanations of the art of Extreme Programming, this edition of Beck’s classic will help many realize the dream of outstanding software development.”
Joshua Kerievsky, author of Refactoring to Patterns and Founder, Industrial Logic, Inc.
“XP has changed the way our industry thinks about software development. Its brilliant simplicity, focused execution, and insistence on fact-based planning over speculation have set a new standard for software delivery.”
David Trowbridge, Architect, Microsoft Corporation

Accountability. Transparency. Responsibility. These are not words that are often applied to software development.

In this completely revised introduction to Extreme Programming (XP), Kent Beck describes how to improve your software development by integrating these highly desirable concepts into your daily development process.

The first edition of Extreme Programming Explained is a classic. It won awards for its then-radical ideas for improving small-team development, such as having developers write automated tests for their own code and having the whole team plan weekly. Much has changed in five years. This completely rewritten second edition expands the scope of XP to teams of any size by suggesting a program of continuous improvement based on:

  • Five core values consistent with excellence in software development
  • Eleven principles for putting those values into action
  • Thirteen primary and eleven corollary practices to help you push development past its current business and technical limitations

Whether you have a small team that is already closely aligned with your customers or a large team in a gigantic or multinational organization, you will find in these pages a wealth of ideas to challenge, inspire, and encourage you and your team members to substantially improve your software development.

You will discover how to:

  • Involve the whole team—XP style
  • Increase technical collaboration through pair programming and continuous integration
  • Reduce defects through developer testing
  • Align business and technical decisions through weekly and quarterly planning
  • Improve teamwork by setting up an informative, shared workspace

You will also find many other concrete ideas for improvement, all based on a philosophy that emphasizes simultaneously increasing the humanity and effectiveness of software development.

Every team can improve. Every team can begin improving today. Improvement is possible—beyond what we can currently imagine. Extreme Programming Explained, Second Edition, offers ideas to fuel your improvement for years to come.



Succeeding with Open Source

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 272
Precio: 43,63
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

“Open source requires a fundamentally different operating model in order for IT organizations to succeed. Succeeding with Open Source is the first how-to book about selecting open source software based on a product’s characteristics such as quality, support, and longevity. Open source software is here to stay. Golden provides an essential tool for evaluating its usefulness/readiness for the corporation.”
Martin Fink, Vice-President—Linux, Hewlett-Packard, and author of The Business and Economics of Linux and Open Source
“Open source software is transforming the way companies acquire and manage software at every level, from operating systems to applications. Today, IT managers who don’t evaluate open source alternatives to proprietary software are doing their companies a profound disservice. If you are involved in any aspect of software acquisition and you aren’t intimately familiar with how open source systems are created, documented, and supported, you need this book. It provides you with a new framework for assessing the maturity of open source solutions, walks you through every step of the evaluation process, and provides vital insights into the risks and benefits of making the open source decision.”
David A. Taylor, Ph.D., author of Object Technology: A Manager’s Guide and Supply Chains: A Manager’s Guide
“Novell, its customers, and its partners have been waiting for something like this: a quantitative and qualitative way to assess the strength of open source projects we hope to support or build into our products. Golden provides a clear, concise methodology for determining whether an open source project is enterprise-ready and what it would take to make it so.”
Chris Stone, Vice Chairman, Novell
“Open source software addresses many of the needs of IT organizations. While more and more organizations are using open source software, few understand how to evaluate it in the absence of a parent organization. Golden provides an effective mechanism to quickly evaluate open source software based on standard software measures—such as quality, support, and documentation—and to share those evaluations with other organizations. Using Golden’s model, IT organizations can efficiently compare proprietary solutions to open source software solutions.”
Stormy Peters, Open Source Program Office, Hewlett-Packard Company
“This book contains some of the most valuable, practical advice I have seen on how to transform the use of open source software from an accidental process into a powerful strategy for gaining an edge on the competition. By providing measurable engineering and process criteria for selecting open source products and processes, it brings open source software and methods squarely within the fold of traditional software engineering and business practices. I believe this book will be looked back on as an important transition point for recognizing how open source software can be used to promote business innovation and control costs.”
Terry Bollinger, IT Analyst, The MITRE Corporation, author of “Use of Free and Open Source Software in the U.S. Department of Defense,” and former editor of IEEE Software magazine
“An outstanding look at how open source software can provide both a competitive edge and significant cost savings for any company. Required reading for any technical professional or manager.”
Kevin Bedell, Editor in Chief, LinuxWorld Magazine
“This book describes a thorough and pragmatic process to determine if/when an organization should employ open source software in mission-critical systems. Golden’s Open Source Maturity Model is a vital tool for planning open source successes.”
Craig Murphy, Chief Technology Officer, Sabre

Much like Odysseus—who had to negotiate perils between Scylla and Charybdis—IT managers face daunting challenges. On one side, there is relentless pressure to cut costs. On the other lies an unending demand for innovative solutions. However, unlike Odysseus, IT managers must not simply avoid either fate: Instead, they must fulfill both quests.

To meet these seemingly disparate goals, IT organizations are increasingly investigating the use of open source software for its cost-effectiveness and flexibility. However, myths about open source software persist—for example, that it runs only on Linux or that it is not stable enough for demanding production environments. Dispelling those myths, leading companies such as Amazon.com and Google rely on open source software, and many more companies will make the switch in the years ahead.

Succeeding with Open Source is the first book written specifically for IT managers who need to evaluate, select, and use open source software. The author begins with the fundamentals of open source solutions and how they differ greatly from commercial software. He then introduces the Open Source Maturity Model (OSMM), an invaluable resource for assessing open source products for their production readiness.

Highlights include:

  • Assessing open source business models
  • Managing risk, including licensing issues
  • Evaluating and selecting open source software
  • Locating and assessing technical support, training, and documentation resources

With the book’s fast-track summary format, readers can quickly and easily navigate the text and its real-world examples. Open source OSMM evaluation templates, as well as additional case studies, are available at www.navicasoft.com.

Whether you are an IT manager or a consultant responsible for advising clients, this book will help you steer a clear course through the open source sea.



Imperfect C++: Practical Solutions for Real-Life Programming

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 624
Precio: 43,63
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Imperfect C++

Imperfect C++

C++, although a marvelous language, isn't perfect. Matthew Wilson has been working with it for over a decade, and during that time he has found inherent limitations that require skillful workarounds. In this book, he doesn't just tell you what's wrong with C++, but offers practical techniques and tools for writing code that's more robust, flexible, efficient, and maintainable. He shows you how to tame C++'s complexity, cut through its vast array of paradigms, take back control over your code—and get far better results.

If you're a long-time C++ developer, this book will help you see your programming challenges in new ways—and illuminate powerful techniques you may never have tried. If you're newer to C++, you'll learn principles that will make you more effective in all of your projects. Along the way, you'll learn how to:

  • Overcome deficiencies in C++'s type system

  • Enforce software design through constraints, contracts, and assertions

  • Handle behavior ignored by the standard— including issues related to dynamic libraries, static objects, and threading

  • Achieve binary compatibility between dynamically loading components

  • Understand the costs and disadvantages of implicit conversions—and the alternatives

  • Increase compatibility with diverse compilers, libraries, and operating environments

  • Help your compiler detect more errors and work more effectively

  • Understand the aspects of style that impact reliability

  • Apply the Resource Acquisition Is Initialization mechanism to a wide variety of problem domains

  • Manage the sometimes arcane relationship between arrays and pointers

  • Use template programming to improve flexibility and robustness

  • Extend C++: including fast string concatenation, a true NULL-pointer, flexible memory buffers, Properties, multidimensional arrays, and Ranges

The CD-ROM contains a valuable variety of C++ compilers, libraries, test programs, tools, and utilities, as well as the author's related journal articles. New and updated imperfections, along with software libraries and example code are available online at http://imperfectcplusplus.com.



.NET Developer's Guide to Windows Security, The

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 408
Precio: 48,83
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"As usual, Keith masterfully explains complex security issues in down-to-earth and easy-to-understand language. I bet you'll reach for this book often when building your next software application."
--Michael Howard, coauthor, Writing Secure Code

"When it comes to teaching Windows security, Keith Brown is 'The Man.' In The .NET Developer's Guide to Windows Security, Keith has written a book that explains the key security concepts of Windows NT, Windows 2000, Windows XP, and Windows Server 2003, and teaches you both how to apply them and how to implement them in C# code. By organizing his material into short, clear snippets, Brown has made a complicated subject highly accessible."
--Martin Heller, senior contributing editor at Byte.com and owner of Martin Heller & Co.

"Keith Brown has a unique ability to describe complex technical topics, such as security, in a way that can be understood by mere mortals (such as myself). Keith's book is a must read for anyone attempting to keep up with Microsoft's enhancements to its security features and the next major version of .NET."
--Peter Partch, principal software engineer, PM Consulting

"Keith's book is a collection of practical, concise, and carefully thought out nuggets of security insight. Every .NET developer would be wise to keep a copy of this book close at hand and to consult it first when questions of security arise during application development."
--Fritz Onion, author of Essential ASP.NET with Examples in C#

The .NET Developer's Guide to Windows Security is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems that run on Windows Server 2003, Windows XP, and Windows 2000.

Author Keith Brown crystallizes his application security expertise into 75 short, specific guidelines. Each item is clearly explained, cross-referenced, and illustrated with detailed examples. The items build on one another until they produce a comprehensive picture of what tools are available and how developers should use them.

The book highlights new features in Windows Server 2003 and previews features of the upcoming version 2.0 of the .NET Framework. A companion Web site includes the source code and examples used throughout the book.

Topics covered include:

  • Kerberos authentication
  • Access control
  • Impersonation
  • Network security
  • Constrained delegation
  • Protocol transition
  • Securing enterprise services
  • Securing remoting
  • How to run as a normal user and live a happy life
  • Programming the Security Support Provider Interface (SSPI) in Visual Studio.NET 2005

Battle-scarred and emerging developers alike will find in The .NET Developer's Guide to Windows Security bona-fide solutions to the everyday problems of securing Windows applications.



Open Source .NET Development: Programming with NAnt, NUnit, NDoc, and More

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 504
Precio: 43,63
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Perhaps the most revolutionary aspect of the arrival of Microsoft's

Perhaps the most revolutionary aspect of the arrival of Microsoft's .NET platform is the standardization of C# and the Common Language Runtime. Now, for the first time, programmers can develop and use open-source projects that are based on a language that is an international standard as well as compatible with both Microsoft and Linux platforms.

Open Source .NET Development is the definitive guide on .NET development in an open-source environment

Inside, readers will find in-depth information on using NAnt, NDoc, NUnit, Draco.NET, log4net, and Aspell.Net with both Visual Studio .NET and the Mono Project. Brian Nantz not only shares the best open-source and "free" tools, frameworks, components, and products for .NET, he also provides usable, practical examples and projects. The result is a highly accessible reference for finding the tools that best fit your needs.

Highlights include

An introduction to open source and its implementations of the .NET standards

.NET development with open-source tools, including build automation, XML documentation, unit testing, continuous integration, and application logging

A simple example of Integrating .NET open-source projects that integrates an Open Source SVG component with a System.Drawing graphical editor

An Aspell.Net case study that shows the use of Draco.NET Continuous Integration in conjunction with NAnt, NUnit, NDoc, and the SharpDevelop IDE

An exclusive look at ADO.NET database and ASP.NET Web development using PostgreSQL that runs on both Windows and Linux

Appendixes on NAnt and NAntContrib tasks, log4netAppender configurations, and open-source security observations

Whether you are a .NET developer interested in learning more about open-source tools or an open-source developer curious about .NET, this book will bridge the divide between these formerly distinct camps.

The accompanying CD-ROM includes the book's .NET open-source coding examples, as well as many of the featured tools.



Find the Bug: A Book of Incorrect Programs

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 336
Precio: 38,43
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

50 exercises to help you find bugs faster -- with less aggravation!

Bug hunting is an art, and you need to be a master. Get Find the Bug, and you'll become one. Long-time Microsoft programmer Adam Barr presents 50 programs, each with exactly one bug. Your assignment: find it. As you do, Barr will teach you how to "think like your processor"... anticipating exactly how code will behave, even without running it. You'll learn better ways to read code, understand it -- and above all, improve it. Whether you're building new systems or maintaining someone else's, you'll find bugs earlier, faster, with less frustration... and write cleaner code to begin with.

  • Presents "bugged" programs in C, Java, Python, Perl, and x86 assembly language, with carefully explained solutions
  • Includes language overviews to help you debug all 50 examples, even if you don't know the language
  • Shows how to look past the "surface" of code to uncover its hidden internal logic
  • Offers practical guidance on analyzing programs, including specific inputs to test
  • Presents a wide range of realistic bugs, with no phony "gotchas"
  • Draws on the types of coding and debugging challenges Microsoft uses to interview new programmers
  • An indispensable resource for working programmers, maintainers, testers, quality specialists, and everyone involved in code reviews



Enterprise Application Integration Using .NET

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 504
Precio: 55,07
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Enterprise Application Integration Using .NET is the software designer’s and developer’s guide to building an effective Enterprise Application Integration (EAI) solution using the Microsoft .NET Framework. This book delivers a software solution that leverages the .NET Framework’s superior tools and processes to fulfill the system integration and process streamlining goals of your organization.

The book begins by identifying the hazards you are most likely to encounter in analyzing specific integration problems. The focus of the book is the EAI Framework. This framework is a learning tool that is also a flexible and extensible EAI solution. It is written in C# and shown in Visual Studio .NET; detailed instructions on writing the code are included. The companion Web site, www.EAIFramework.com, provides all source code and examples from the book, as well as utilities and articles that will help you extend and modify the EAI Framework.

Readers learn how to

·      Recognize integration problems and opportunities

·      Gather all requirements

·      Use the EAI Framework

·      Customize the EAI Framework


Organizations of all sizes looking to reduce costs and increase productivity need to do a better job of sharing information and applications among computer systems. Achieving EAI is faster and easier with .NET. Enterprise Application Integration Using .NET shows you exactly why and how.




Mastering Internet Video: A Guide to Streaming and On-Demand Video

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 504
Precio: 48,83
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

All you need to know to prepare, capture, compress, and deliver Internet video!

Finally, there's a start-to-finish guide to Internet video for everyone who needs to understand it: Web professionals, managers, software developers, marketers, hobbyists, even investors. Mastering Internet Video brings together clear, coherent coverage of every key issue: compression, formats, standards, servers, software, hardware, networking, multicasting, digital rights management, video editing -- even troubleshooting. Damien Stolarz and Richard Koman offer both conceptual and practical information, as well as coverage of all leading formats and platforms. Best of all, they present easy-to-use, step-by-step solutions for each of today's most common Internet video usage scenarios.

Coverage includes:

  • Step-by-step coverage of capturing, preparing, and deploying video on the Internet
  • A practical guide to video compression -- including expert help with performance and quality tradeoffs
  • Objective information for evaluating streaming servers, software, and hardware -- including solutions from Microsoft, Real, Apple, Adobe, and others
  • How networks and the Internet handle video data -- including the challenges of real-time data delivery
  • Internet video standards -- including a detailed look at MPEG-4 and the tools and applications it enables
  • Implementing enterprise multicasting for corporate and other applications
  • Using Digital Rights Management (DRM) to control how viewers use your video
  • Scaling systems to meet demand for your most popular content
  • When to choose P2P distribution instead of traditional broadcast techniques
  • Working code examples to help developers integrate Internet video into their applications

Si no ha encontrado el libro que busca, pinche en nuestro servicio de Pedido Directo y pídanoslo.

Volver a Página Principal

Otras novedades

© Paquebote 1998-2022 Todas las secciones | Ayuda | Aviso Legal