logo paquebote
318 libros encontrados buscando editorial: Addison Wesley

www.paquebote.com > Addison Wesley

Orden: · Ver: · Tipo:
ISBN:

0321268385

Official Eclipse 3.0 FAQs

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 432
Precio: 38,43
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"I had a question about how to use a new Eclipse 3.0 feature, job scheduling, so I thought I would try out this book. I immediately found the answer with a concise explanation. Cool!"

--Erich Gamma

Official Eclipse 3.0 FAQs is the convenient source for answers to your most crucial questions about writing Eclipse plug-ins. Whether you're creating simple extensions for personal use or commercial Eclipse-based applications, you'll find hundreds of concise solutions here--including many that aren't answered anywhere else.

John Arthorne and Chris Laffra have worked with Eclipse technology since the very beginning; both are active members of the Eclipse development community and frequently answer questions on Eclipse newsgroups and mailing lists. Here, they cover an extraordinary range of topics, from workspace management to documentation, SWT to JFace, JDT to natural language support. Many FAQs include code samples and references to other information, making the book an invaluable desk reference for anyone working with Eclipse.

Just a few of the 350+ questions answered here...

  • How do I upgrade Eclipse? Page 29
  • What is new in Eclipse 3.0? Page 34
  • How can I add my views and actions to an existing perspective? Page 187
  • How do I set up a Java project to share in a repository? Page 58
  • How do I declare my own extension point? Page 74
  • How do I display a Web page in SWT? Page 141
  • How do I support multiple natural languages in my plug-in messages? Page 253
  • How do I save settings for a dialog or wizard? Page 166
  • How do I provide syntax coloring in an editor? Page 269
  • How do I hook into global actions, such as Copy and Delete? Page 225
  • How do I create a Rich Client application? Page 241
  • What is the purpose of activities? Page 229
  • How do I create and examine an AST? Page 369

The accompanying CD-ROM includes a hyperlinked, searchable version of the book in the form of an Eclipse plug-in; PDF versions of online Help and special Eclipse articles; examples from the book; and Eclipse 3.0.



ISBN:

0131411543

Advanced UNIX Programming

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 736
Precio: 48,83
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

The classic guide to UNIX® programming-completely updated!

UNIX application programming requires a mastery of system-level services. Making sense of the many functions-more than 1,100 functions in the current UNIX specification-is a daunting task, so for years programmers have turned to Advanced UNIX Programming for its clear, expert advice on how to use the key functions reliably.

An enormous number of changes have taken place in the UNIX environment since the landmark first edition. In Advanced UNIX Programming, Second Edition, UNIX pioneer Marc J. Rochkind brings the book fully up to date, with all-new, comprehensive coverage including:

  • POSIX
  • Solaris™
  • Linux®
  • FreeBSD
  • Darwin, the Mac™ OS X kernel
  • And more than 200 new system calls

Rochkind's fully updated classic explains all the UNIX system calls you're likely to need, all in a single volume!

  • Interprocess communication, networking (sockets), pseudo terminals, asynchronous I/O, advanced signals, realtime, and threads
  • Covers the system calls you'll actually use-no need to plow through hundreds of improperly implemented, obsolete, and otherwise unnecessary system calls!
  • Thousands of lines of example code include a Web browser and server, a keystroke recorder/player, and a shell complete with pipelines, redirection, and background processes
  • Emphasis on the practical-ensuring portability, avoiding pitfalls, and much more!

Since 1985, the one book to have for mastering UNIX application programming has been Rochkind's Advanced UNIX Programming. Now completely updated, the second edition remains the choice for up-to-the-minute, in-depth coverage of the essential system-level services of the UNIX family of operating systems.


ISBN:

0201760428

Exceptional C++ Style: 40 New Engineering Puzzles, Programming Problems, and Solutions

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 352
Precio: 43,63
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Software "style" is about finding the perfect balance between overhead and functionality... elegance and maintainability... flexibility and excess. In Exceptional C++ Style, legendary C++ guru Herb Sutter presents 40 new programming scenarios designed to analyze not only the what but the why and help you find just the right balance in your software.

Organized around practical problems and solutions, this book offers new insight into crucial C++ details and interrelationships, and new strategies for today's key C++ programming techniques--including generic programming, STL, exception safety, and more. You'll find answers to questions like:

  • What can you learn about library design from the STL itself?
  • How do you avoid making templated code needlessly non-generic?
  • Why shouldn't you specialize function templates? What should you do instead?
  • How does exception safety go beyond try and catch statements?
  • Should you use exception specifications, or not?
  • When and how should you "leak" the private parts of a class?
  • How do you make classes safer for versioning?
  • What's the real memory cost of using standard containers?
  • How can using const really optimize your code?
  • How does writing inline affect performance?
  • When does code that looks wrong actually compile and run perfectly, and why should you care?
  • What's wrong with the design of std::string?

Exceptional C++ Style will help you design, architect, and code with style--and achieve greater robustness and performance in all your C++ software.



ISBN:

0321227220

Developing Series 60 Applications: A Guide for Symbian OS C++ Developers

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 800
Precio: 55,07
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"The robust, advanced technologies of Symbian OS are accessible to developers today in millions of phones worldwide through the Series 60 Platform. Inside Developing Series 60 Applications there are sixty example applications, focused entirely on native Symbian OS C++ programming, which will help developers take advantage of the rapidly growing opportunities in Symbian OS smartphone software development."

—David Levin, CEO, Symbian Ltd.

The first official book on Series 60 Platform development—from design to deployment

Series 60 smartphone developers are deploying the next wave of mobile services. With more than 60% of all mobile phone manufacturers licensing Series 60 Platform, Series 60 represents the smartphone market with the largest user base for mobile application developers.

To help nurture this growing market, Nokia has worked directly with EMCC Software, a leading Symbian and Series 60 Competence Center, to create Developing Series 60 Applications, the definitive guide to Series 60 development for C++ programmers and software designers. Fully reviewed by Nokia's subject matter experts, the authors cover the entire development process—from design, programming, and testing to debugging and deployment—while providing sixty complete projects, each with full C++ source code and installation scripts.

Developing Series 60 Applications includes coverage of:

  • Series 60 development tools, IDEs, and C++ SDKs
  • The underlying Symbian OS
  • Application design with the Series 60 framework architecture
  • User interface controls, menus, dialogs, lists, and editors
  • Basic and advanced Series 60 communications APIs
  • Multimedia development: drawings, fonts, bitmaps, animation, and audio
  • Invoking standard application views and using application engines
  • Building more powerful applications with C++ APIs
  • Series 60 Developer Platforms 1 and 2


ISBN:

0321180615

Essential Check Point? FireWall-1® NG: An Installation, Configuration, and Troubleshooting Guide

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 656
Precio: 60,27
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"When it comes to security products and technologies, experience is far and away the best teacher. PhoneBoy has been installing, running, and supporting Check Point FireWall-1 for years, and his experience shows in this book. Save yourself the pain of learning from your own mistakes--let PhoneBoy show you the right way to manage your FireWall-1 NG infrastructure."
--Tina Bird, Computer Security Officer, Stanford University

"Dameon has taken his original definitive guide and updated it thoroughly for NG. No other book is informed by his depth of experience with Check Point. Accept no substitutes!"
--Matthew Gast, author of 802.11 Wireless Networks: The Definitive Guide

"PhoneBoy is the de facto expert on this product, and people have been clamoring for an NG book from him since he published the first one. No one can compete with him."
--Valerie M. Leveille, Professional Educator

"Dameon is the foremost authority on FireWall-1. He has the knowledge to give details of FireWall-1 functionality that no other reference on this topic can."
--Paul Keser, Senior Network Security Engineer, Raytheon ITSS/NASA Ames Research Center

"This book is the Swiss army knife solution for Check Point FireWall-1 NG."
--Thomas Warfield, TNT-OK.com

Now there's a definitive insider's guide to planning, installing, configuring, and maintaining the newest version of the world's #1 firewall: Check Point™ FireWall-1® Next Generation™. Leading Check Point support authority Dameon Welch-Abernathy (a.k.a. PhoneBoy) offers exclusive hands-on tips, techniques, checklists, and detailed sample configurations you can use right now to improve reliability, efficiency, and manageability in your Check Point environment.

The author's previous Check Point FireWall-1 guide became an instant bestseller, earning the praise of security professionals worldwide. This new book has been thoroughly revamped to reflect Check Point FireWall-1 NG's powerful new features, and it includes even more expert solutions from PhoneBoy's FireWall-1 FAQ, the Web's #1 independent Check Point support site. Whether you're a security/network architect, administrator, or manager, you'll find it indispensable.

Whether you're running FireWall-1 NG on UNIX or Windows platforms, this book brings together expert guidance for virtually every challenge you'll face: building your rulebase, logging and alerting, remote management, user authentication, inbound/outbound content restriction, managing NAT environments, building site-to-site VPNs with SecuRemote, even INSPECT programming. Welch-Abernathy also covers high availability in detail, identifying proven solutions for the challenges of implementing multiple firewalls in parallel.


0321180615B12192003


ISBN:

0321218736

High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 448
Precio: 33,22
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes.

High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run.

Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice.

Inside, you'll find extensive information on

  • Actual hacker investigations, including the harm caused and how the criminals were tracked and caught
  • The ins and outs of identity theft, a rapidly growing crime with potential for serious damage
  • Using the criminology and psychology of hackers to detect and deter attacks
  • The risks associated with various technologies
  • Do's and don'ts for high-tech criminal investigations

This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen—and what can be done to protect yourself.

"Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well."

—Mike Tarrani, Independent Consultant

"Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security."

—Michael Nickle, Lead Consultant, VeriSign

"Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy."

—David Kensiski, Director of Operations, InfiniRoute Networks

"The modern high-tech industry brought new things to our lives. Buying a book, selling a car, or robbing a bank has never been so easy. Why is that? You've got to read this book to find out!"

—Denis Scherbakov, Systems Administrator, MCSA: Security, MCSA, MCP, Security+Atlant Telecom, ISP

"Steven Branigan has been deeply involved with many real incidents of high-tech crimes—some of them I know of are too sensitive to disclose by name. Yet, High-Tech Crimes Revealed gives outsiders an opportunity to find out what actually takes place in this often-misunderstood field. By combining his powerful knowledge of computers and technology with the legal and behavioral considerations that are overlooked by those less experienced, Branigan demonstrates just how much private industry and government need to cooperate in order to find the facts and identify criminals. While his topic is deadly-serious, he conveys his riveting stories with humor and distills observations into clearly understood rules that we all should know as we go about our lives."

—Ed Stroz, Former Supervisory Special Agent of the Federal Bureau of Investigation's Computer Crime Squad in New York and President of Stroz Friedberg LLC

"Steven brings us behind the scenes of some very exciting hacker investigations and interviews, and tells the stories like few others. This book is an exciting read because he describes the people and their actions, showing us how these new-age crimes can affect all of us."

—Steve Jurvetson, Managing Director of Draper Fisher Jurvetson

"Finally, real-life credible stories that deliver first-hand accounts of tactical and strategic high-tech operations. This book is a rare look into what goes on behind the scenes. Take a front row seat with the author as he brings you into a world few have seen."

—Bob Weaver, Retired Deputy Special Agent in Charge, Criminal Investigative Division, U.S. Secret Service, Washington, D.C.

"Steve's intellect and real-world experience in criminal investigations, forensic analysis, and security principles is evident on every page. Sprinkle in some sound advice and a bit of humor and you have a book that is interesting, informative, and most of all, useful. I highly recommend it."

—Fred Staples, Retired Director of Computer and Network Security Consulting for Telcordia Technologies

"This book details story after story of computer crimes and identity theft. The best way to prevent yourself from being a victim is to take these narratives to heart."

—Ben Rothke, Senior Security Consultant, ThruPoint Inc.



ISBN:

0321245660

Effective C#: 50 Specific Ways to Improve Your C#

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 336
Precio: 37,39
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"This book really demonstrates Bill's strengths as a writer and programmer. In a very short amount of time, he is able to present an issue, fix it and conclude it; each chapter is tight, succinct, and to the point."

—Josh Holmes, Independent Contractor

"The book provides a good introduction to the C# language elements from a pragmatic point of view, identifying best practices along the way, and following a clear and logical progression from the basic syntax to creating components to improving your code writing skills. Since each topic is covered in short entries, it is very easy to read and you'll quickly realize the benefits of the book."

—Tomas Restrepo, Microsoft MVP

"The book covers the basics well, especially with respect to the decisions needed when deriving classes from System.Object. It is easy to read with examples that are clear, concise and solid. I think it will bring good value to most readers."

—Rob Steel, Central Region Integration COE & Lead Architect, Microsoft

"Effective C# provides the C# developer with the tools they need to rapidly grow their experience in Visual C# 2003 while also providing insight into the many improvements to the language that will be hitting a desktop near you in the form of Visual C# 2005."

—Doug Holland, Precision Objects

"Part of the point of the .NET Framework—and the C# Language, in particular—is to let the developer focus solving customer problems and deliver product, rather than spending hours (or even weeks) writing plumbing code. Bill Wagner's Effective C#, not only shows you what's going on behind the scenes, but shows you how to take advantage of particular C# code constructs. Written in a dispassionate style that focuses on the facts—and just the facts—of writing effective C# code, Wagner's book drills down into practices that will let you write C# applications and components that are easier to maintain as well as faster to run. I'm recommending Effective C# to all students of my .NET BootCamp and other C#-related courses."

—Richard Hale Shaw, www.RichardHaleShawGroup.com

C#'s resemblances to C++, Java, and C make it easier to learn, but there's a downside: C# programmers often continue to use older techniques when far better alternatives are available. In Effective C#, respected .NET expert Bill Wagner identifies fifty ways you can start leveraging the full power of C# in order to write faster, more efficient, and more reliable software.

Effective C# follows the format that made Effective C++ (Addison-Wesley, 1998) and Effective Java (Addison-Wesley, 2001) indispensable to hundreds of thousands of developers: clear, practical explanations, expert tips, and plenty of realistic code examples. Drawing on his unsurpassed C# experience, Wagner addresses everything from value types to assemblies, exceptions to reflection. Along the way, he shows exactly how to avoid dozens of common C# performance and reliability pitfalls. You'll learn how to:

  • Use both types of C# constants for efficiency and maintainability, see item 2

  • Use immutable data types to eliminate unnecessary error checking, see item 7

  • Avoid the C# function that'll practically always get you in trouble, see item 10

  • Minimize garbage collection, boxing, and unboxing, see items 16 and 17

  • Take full advantage of interfaces and delegates, see items 19 though 22

  • Create CLS compliant assemblies that use noncompliant C# language features, see item 30

  • Improve reliability and maintainability by creating small, cohesive assemblies, see item 32

  • Leverage the full power of .NET's runtime diagnostics, see item 36

  • Know when—and when not—to use reflection, see items 42 and 43

  • Preview the major enhancements in C# 2.0, see item 49

  • You're already a successful C# programmer—this book can help you become an outstanding one.

Bill Wagner is co-founder of and .NET consultant for SRT Solutions. A nationally recognized independent expert on .NET, he has been a regular contributor to ASP.NET Pro Magazine, Visual Studio Magazine, and the .NET Insight newsletter. In addition to being a Microsoft Regional Director, he is also active in the Southeast Michigan .NET User Group and the Ann Arbor Computing Society. He is author of The C# Core Language Little Black Book (The Coriolis Group, 2002).


© Copyright Pearson Education. All rights reserved.


ISBN:

0321228324

GPU Gems: Programming Techniques, Tips and Tricks for Real-Time Graphics

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 816
Precio: 65,47
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

GPU Gems has won a prestigious Front Line Award from Game Developer Magazine. The Front Line Awards recognize products that enable faster and more efficient game development, advancing the state of the art.

FULL COLOR THROUGHOUT!

“This collection of articles is particularly impressive for its depth and breadth. The book includes product-oriented case studies, previously unpublished state-of-the-art research, comprehensive tutorials, and extensive code samples and demos throughout.”
—Eric Haines, Author of Real-Time Rendering
GPU Gems is a cool toolbox of advanced graphics techniques. Novice programmers and graphics gurus alike will find the Gems practical, intriguing and useful.”
—Tim Sweeney, Lead Programmer of Unreal at Epic Games

GPU Gems is a compilation of articles covering practical real-time graphics techniques arising from the research and practice of cutting-edge developers. It focuses on the programmable graphics pipeline available in today’s graphics processing units (GPUs) and highlights quick and dirty tricks used by leading developers, as well as fundamental, performance-conscious techniques for creating advanced visual effects. The contributors and editors, collectively, bring countless years of experience to enlighten and propel the reader into the fascinating world of programmable real-time graphics.

Major topics covered include:

  • Natural effects
  • Lighting and shadows
  • Materials
  • Image processing
  • Performance and practicalities
  • Beyond triangles
  • Contributors are from the following universities and corporations:

  • Alias Systems
  • Brown University
  • Croteam
  • Cyan Worlds
  • Hochschule Bremen
  • Industrial Light & Magic
  • iXBT.com
  • Monolith Productions
  • New York University
  • Novarama
  • NVIDIA
  • Paralelo Computacao
  • Piranha Bytes
  • Pixar Animation Studios
  • Siemens Medical Solutions
  • Softimage Co.
  • Softlab-NSK
  • Sony Pictures Imageworks
  • Stanford University
  • UC Davis
  • UNC-Chapel Hill
  • Universitat Pompeu Fabra
  • University of Utah
  • University of Waterloo
  • The accompanying CD-ROM includes complementary examples and sample programs.



    ISBN:

    0321193660

    Secure Architectures with OpenBSD

    Editorial: Addison Wesley   Fecha de publicación:    Páginas: 544
    Precio: 38,43
    Añadir a la cesta
    Disponible. Normalmente se envía en 4 días.

    "This book works in tandem with the OpenBSD's manual pages. As a result, it will help many users grow and get the most from the system."—Theo de Raadt, OpenBSD project leader.

    "The OpenBSD system intimidates many administrators who would benefit from using it. This book lets people start much higher up on the curve. Secure Architectures with OpenBSD not only presents the hows, but also shows some of the whys that only insiders know."Mike Frantzen, NFR Security

    "Secure Architectures with OpenBSD explains all of the tasks an administrator has to know about to successfully maintain an OpenBSD server. It helps the reader save time by condensing the vast amount of information available in man pages into a compact form, reducing unneeded information, and explaining other things in much more detail and prose than a man page can afford."Daniel Hartmeier, the OpenBSD Project

    "This book will become the de facto text for OpenBSD administration. Unix and BSD books abound, but none cover OpenBSD with the clarity and expertise of Palmer and Nazario. They explain the optimal way to configure and administer your OpenBSD machines, with a keen eye to security at all stages."Brian Hatch, coauthor of Hacking Exposed Linux and Building Linux Virtual Private Networks

    Descended from BSD, OpenBSD is a popular choice for those who demand stability and security from their operating system. No code goes into OpenBSD without first undergoing a rigorous security check, making it a terrific choice for Web servers, VPNs, and firewalls.

    Secure Architectures with OpenBSD is the insider's guide to building secure systems using OpenBSD. Written by Brandon Palmer and Jose Nazario, this book is a how-to for system and network administrators who need to move to a more secure operating system and a reference for seasoned OpenBSD users who want to fully exploit every feature of the system.

    After getting readers started with OpenBSD, the authors explain system configuration and administration, then explore more exotic hardware and advanced topics. Every chapter of the book addresses the issue of security because security is integrated into almost every facet of OpenBSD. Examples appear throughout the book, and the authors provide source code and system details unavailable anywhere else. This goes well beyond the basics and gives readers information they will need long after they have installed the system.

    Key topic coverage includes:
    • Installation and upgrade details
    • Basic system usage in OpenBSD versus other Unix systems
    • Third-party software via packages and the ports tree
    • SMTP services in OpenBSD
    • Web services with Apache
    • Using OpenBSD as a firewall
    • OpenBSD as a Kerberos V client and server
    • Use of Ipsec
    • Configuration and use of IPv6
    • Network intrusion detection

    Secure Architectures with OpenBSD takes you inside OpenBSD, giving you the insights and expertise no system manual can provide. The companion Web site tracks advances and changes made to the operating system, and it contains updates to the book and working code samples.



    ISBN:

    0321159632

    Building Portals, Intranets, and Corporate Web Sites Using Microsoft Servers

    Editorial: Addison Wesley   Fecha de publicación:    Páginas: 544
    Precio: 55,07
    Añadir a la cesta
    Disponible. Normalmente se envía en 4 días.

    Building Portals, Intranets, and Corporate Web Sites Using Microsoft Servers is the practical guide to designing, developing, and implementing Web portals using Microsoft servers and the .NET Framework. James J. Townsend provides portal development teams with a working developer's overview of the concepts, technologies, and products used in building successful corporate portals. Readers learn how to create a portal architecture based on Microsoft .NET and integrate multiple server technologies and components to create a powerful portal solution.

    After introducing basic concepts in portal development, Townsend describes the Microsoft portal strategy and the importance of Web services to .NET. Readers become familiar with the .NET portal framework and the roles of Microsoft's SQL Server, Commerce Server (MCS), SharePoint Portal Server, BizTalk Server, Internet Security and Acceleration (ISA) Server, Content Management Server (MCMS), and related technologies. Key topic coverage includes security feature integration, personalization, content management, enterprise application integration (EAI), collaboration features, providing full search capability, and achieving scalability. A companion Web site features all the source code used in examples throughout the book.

    This book provides practical development advice in answer to questions commonly faced by portal developers, such as:

  • When does it make sense to develop or deploy a Web service? Page 87
  • Is there a straightforward way to mitigate almost all potential security risks? Page 197
  • How do you get the most out of personalization? Page 266
  • How can you measure the return on investment for content management? Page 269
  • Which is the best online conferencing solution for your organization? Page 403
  • When and how should you scale up and/or out? Page 446
  • Building Portals, Intranets, and Corporate Web Sites Using Microsoft Servers shows you how to choose and integrate the right products and build the best portal for your organization.





    Si no ha encontrado el libro que busca, pinche en nuestro servicio de Pedido Directo y pídanoslo.

    Volver a Página Principal

    Otras novedades


    © Paquebote 1998-2022 Todas las secciones | Ayuda | Aviso Legal