logo paquebote
317 libros encontrados buscando editorial: Addison Wesley

www.paquebote.com > Addison Wesley

Orden: · Ver: · Tipo:
ISBN:

0321205766

Capability Cases: A Solution Envisioning Approach

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 504
Precio: 46,75
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"In this innovative book, Irene Polikoff, Robert Coyne, and Ralph Hodgson have captured deep insights from many years of studying how to get across the 'Business-IT Gap.' Capability Cases are an invaluable tool for bridging from envisioning to design."

—Steve Cook, software architect, Microsoft Corporation

"Capability Cases offers hope that mere mortals can rise above the daunting challenge of blending technology and process. Executives hoping to adopt high-performing business models will want to learn this step-by-step approach to designing and implementing IT-enabled organizational change."

—Dr. Jeanne W. Ross, principal research scientist, MIT Center for Information

BRIDGE THE GAP BETWEEN BUSINESS VISION AND SOFTWARE SOLUTION

Both IT organizations and business leaders recognize the urgent importance of aligning technology solutions with enterprise strategy. But they've struggled to do so... until now. Capability Cases represents a breakthrough: a powerful, systematic way to translate business vision into effective plans and system designs.

The authors' Solution Envisioning methodology addresses the crucial "front end" of software development, where you decide what to build and how you're going to build it. Using realistic examples, they walk you through exploring the capabilities you need, capturing business best practices, identifying optimal solutions, and crafting software systems that deliver them.

Solution Envisioning enables you to specify better solutions in less time, build systems that more fully reflect your true needs, and dramatically reduce risk and cost throughout the entire development process. Understand Solution Envisioning—from vision to plan—in three phases:

  • Use Business Capability Exploration (BCE) to build a shared understanding of what is needed in a solution—model your business situation using business forces, desired results, metrics, and scenarios

  • Run Solution Capability Envisioning (SCE) workshops to facilitate decision-making, collaborative assessment, and consolidation of a solution concept—use Capability Case Galleries to discover alternatives, gain context, promote stakeholder interaction, and stimulate creativity

  • Move from concept to business case to a roadmap for realization with Software Capability Design (SCD)

Includes easy-to-use "best of class" templates for developing a business case, concept of operations, architectural decisions, and other key work products.

Whether you're an executive, architect, project manager, developer, change agent, or consultant, Capability Cases will help you bridge the gap between vision and solution—so you can finally get what you need from information technology.


© Copyright Pearson Education. All rights reserved.


ISBN:

0201853949

Art of Computer Programming, Volume 4, Fascicle 3, The: Generating All Combinations and Partitions

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 160
Precio: 18,67
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

This multivolume work on the analysis of algorithms has long been recognized as the definitive description of classical computer science.The three complete volumes published to date already comprise a unique and invaluable resource in programming theory and practice. Countless readers have spoken about the profound personal influence of Knuth's writings. Scientists have marveled at the beauty and elegance of his analysis, while practicing programmers have successfully applied his “cookbook” solutions to their day-to-day problems. All have admired Knuth for the breadth, clarity, accuracy, and good humor found in his books.

To begin the fourth and later volumes of the set, and to update parts of the existing three, Knuth has created a series of small books called fascicles, which will be published at regular intervals. Each fascicle will encompass a section or more of wholly new or revised material. Ultimately, the content of these fascicles will be rolled up into the comprehensive, final versions of each volume, and the enormous undertaking that began in 1962 will be complete.

Volume 4, Fascicle 3

This fascicle continues Knuth's authoritative chapter on combinatorial algorithms, ultimately to be included in Volume 4 of The Art of Computer Programming. The previous fascicle from Volume 4, which covered the generation of all tuples and permutations, is now complemented by techniques for generating all combinations and partitions. In Knuth's thorough discussion of these two topics, readers will find much that is new, as well as surprisingly rich ties to material in Volumes 1 through 3 and to other aspects of computer science and mathematics. As usual, this fascicle includes a bounty of creative exercises, as well as intriguing challenges posed by yet-unsolved questions.



ISBN:

0201433079

Advanced Programming in the UNIX® Environment

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 960
Precio: 69,63
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations of UNIX and UNIX-like environments. And yet, it does all this while retaining the style and taste of the original classic."

--Mukesh Kacker, cofounder and former CTO of Pronto Networks, Inc.

"One of the essential classics of UNIX programming."

--Eric S. Raymond, author of The Art of UNIX Programming

"This is the definitive reference book for any serious or professional UNIX systems programmer. Rago has updated and extended the classic Stevens text while keeping true to the original. The APIs are illuminated by clear examples of their use. He also mentions many of the pitfalls to look out for when programming across different UNIX system implementations and points out how to avoid these pitfalls using relevant standards such as POSIX 1003.1, 2004 edition and the Single UNIX Specification, Version 3."

--Andrew Josey, Director, Certification, The Open Group, and Chair of the POSIX 1003.1 Working Group

"Advanced Programming in the UNIX® Environment, Second Edition, is an essential reference for anyone writing programs for a UNIX system. It's the first book I turn to when I want to understand or re-learn any of the various system interfaces. Stephen Rago has successfully revised this book to incorporate newer operating systems such as GNU/Linux and Apple's OS X while keeping true to the first edition in terms of both readability and usefulness. It will always have a place right next to my computer."

--Dr. Benjamin Kuperman, Swarthmore College

Praise for the First Edition

"Advanced Programming in the UNIX® Environment is a must-have for any serious C programmer who works under UNIX. Its depth, thoroughness, and clarity of explana-tion are unmatched."

--UniForum Monthly

"Numerous readers recommended Advanced Programming in the UNIX® Environment by W. Richard Stevens (Addison-Wesley), and I'm glad they did; I hadn't even heard of this book, and it's been out since 1992. I just got my hands on a copy, and the first few chapters have been fascinating."

--Open Systems Today

"A much more readable and detailed treatment of UNIX internals can be found in Advanced Programming in the UNIX® Environment by W. Richard Stevens (Addison-Wesley). This book includes lots of realistic examples, and I find it quite helpful when I have systems programming tasks to do."

--RS/Magazine

"This is the definitive reference book for any serious or professional UNIX systems programmer. Rago has updated and extended the original Stevens classic while keeping true to the original."

--Andrew Josey, Director, Certification, The Open Group, and Chair of the POSIX 1003.1 Working Group

For over a decade, serious C programmers have relied on one book for practical, in-depth knowledge of the programming interfaces that drive the UNIX and Linux kernels: W. Richard Stevens' Advanced Programming in the UNIX® Environment. Now, Stevens' colleague Stephen Rago has thoroughly updated this classic to reflect the latest technical advances and add support for today's leading UNIX and Linux platforms.

Rago carefully retains the spirit and approach that made this book a classic. Building on Stevens' work, he begins with basic topics such as files, directories, and processes, carefully laying the groundwork for understanding more advanced techniques, such as signal handling and terminal I/O.

Substantial new material includes chapters on threads and multithreaded programming, using the socket interface to drive interprocess communication (IPC), and extensive coverage of the interfaces added to the latest version of the POSIX.1 standard. Nearly all examples have been tested on four of today's most widely used UNIX/Linux platforms: FreeBSD 5.2.1; the Linux 2.4.22 kernel; Solaris 9; and Darwin 7.4.0, the FreeBSD/Mach hybrid underlying Apple's Mac OS X 10.3.

As in the first edition, you'll learn through example, including more than 10,000 lines of downloadable, ANSI C source code. More than 400 system calls and functions are demonstrated with concise, complete programs that clearly illustrate their usage, arguments, and return values. To tie together what you've learned, the book presents several chapter-length case studies, each fully updated for contemporary environments.

Advanced Programming in the UNIX® Environment has helped a generation of programmers write code with exceptional power, performance, and reliability. Now updated for today's UNIX/Linux systems, this second edition will be even more indispensable.



ISBN:

0321349628

TSP(SM)-Leading a Development Team

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 336
Precio: 47,79
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Leaders of software-development projects face many challenges. First, you must produce a quality product on schedule and on budget. Second, you must foster and encourage a cohesive, motivated, and smoothly operating team. And third, you must maintain a clear and consistent focus on short- and long-term goals, while exemplifying quality standards and showing confidence and enthusiasm for your team and its efforts. Most importantly, as a leader, you need to feel and act responsible for your team and everything that it does.

Accomplishing all these goals in a way that is rewarding for the leader and the team--while producing the results that management wants--is the motivation behind the Team Software Process (TSP). Developed by renowned quality expert Watts S. Humphrey, TSP is a set of new practices and team concepts that helps developers take the CMM and CMMI Capability Maturity Models to the next level. Not only does TSP help make software more secure, it results in an average production gain of 68 percent per project. Because of their quality, timeliness, and security, TSP-produced products can be ten to hundreds of times better than other hardware or software.

In this essential guide to TSP, Humphrey uses his vast industry experience to show leaders precisely how to lead teams of software engineers trained in the Personal Software Process (PSP). He explores all aspects of effective leadership and teamwork, including building the right team for the job, the TSP launch process, following the process to produce a quality product, project reviews, and capitalizing on both the leader's and team's capabilities. Humphrey also illuminates the differences between an ineffective leader and a superb one with the objective of helping you understand, anticipate, and correct the most common leadership failings before they undermine the team.

An extensive set of appendices provides additional detail on TSP team roles and shows you how to use an organization's communication and command networks to achieve team objectives.

Whether you are a new or an experienced team leader, TSPSM: Leading a Development Team provides invaluable examples, guidelines, and suggestions on how to handle the many issues you and your team face together.



ISBN:

0321335724

Secure Coding in C and C++

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 368
Precio: 39,47
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append it as an afterthought. That's the point of Secure Coding in C and C++. In careful detail, this book shows software developers how to build high-quality systems that are less vulnerable to costly and even catastrophic attack. It's a book that every developer should read before the start of any serious project."
--Frank Abagnale, author, lecturer, and leading consultant on fraud prevention and secure documents

Learn the Root Causes of Software Vulnerabilities and How to Avoid Them

Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed nearly 18,000 vulnerability reports over the past ten years, the CERT/Coordination Center (CERT/CC) has determined that a relatively small number of root causes account for most of them. This book identifies and explains these causes and shows the steps that can be taken to prevent exploitation. Moreover, this book encourages programmers to adopt security best practices and develop a security mindset that can help protect software from tomorrow's attacks, not just today's.

Drawing on the CERT/CC's reports and conclusions, Robert Seacord systematically identifies the program errors most likely to lead to security breaches, shows how they can be exploited, reviews the potential consequences, and presents secure alternatives.

Coverage includes technical detail on how to

  • Improve the overall security of any C/C++ application
  • Thwart buffer overflows and stack-smashing attacks that exploit insecure string manipulation logic
  • Avoid vulnerabilities and security flaws resulting from the incorrect use of dynamic memory management functions
  • Eliminate integer-related problems: integer overflows, sign errors, and truncation errors
  • Correctly use formatted output functions without introducing format-string vulnerabilities
  • Avoid I/O vulnerabilities, including race conditions

Secure Coding in C and C++ presents hundreds of examples of secure code, insecure code, and exploits, implemented for Windows and Linux. If you're responsible for creating secure C or C++ software--or for keeping it safe--no other book offers you this much detailed, expert assistance.



ISBN:

0321133544

Beyond the C++ Standard Library: An Introduction to Boost

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 432
Precio: 47,79
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Introducing the Boost libraries: the next breakthrough in C++ programming

Boost takes you far beyond the C++ Standard Library, making C++ programming more elegant, robust, and productive. Now, for the first time, a leading Boost expert systematically introduces the broad set of Boost libraries and teaches best practices for their use.

Writing for intermediate-to-advanced C++ developers, Björn Karlsson briefly outlines all 58 Boost libraries, and then presents comprehensive coverage of 12 libraries you're likely to find especially useful. Karlsson's topics range from smart pointers and conversions to containers and data structures, explaining exactly how using each library can improve your code. He offers detailed coverage of higher-order function objects that enable you to write code that is more concise, expressive, and readable. He even takes you "behind the scenes" with Boost, revealing tools and techniques for creating your own generic libraries.

Coverage includes

  • Smart pointers that provide automatic lifetime management of objects and simplify resource sharing

  • Consistent, best-practice solutions for performing type conversions and lexical conversions

  • Utility classes that make programming simpler and clearer

  • Flexible container libraries that solve common problems not covered by the C++ Standard Library

  • Powerful support for regular expressions with Boost.Regex

  • Function objects defined at the call site with Boost.Bind and Boost.Lambda

  • More flexible callbacks with Boost.Function

  • Managed signals and slots (a.k.a. the Observer pattern) with Boost.Signals

The Boost libraries are proving so useful that many of them are planned for inclusion in the next version of the C++ Standard Library. Get your head start now, with Beyond the C++ Standard Library.


© Copyright Pearson Education. All rights reserved.


ISBN:

0321245458

Hands-On Microsoft Access: A Practical Guide to Improving Your Access Skills

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 528
Precio: 37,39
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Praise for Hands-On Microsoft Access

“Bob has distilled the essence of database design and Access development into a highly valuable and easily understandable resource that I wish was available when I first started out.”

—Graham R. Seach, Microsoft Access MVP

“If you’ve been using Access with that typical uncertainty, asking yourself ÔJust how could I do that?Õ or ÔWhy isn’t this working?Õ, if you’d like to know what you’re doing before you hit the wall, this book is probably perfect for you.”

—Olaf Rabbachin, CEO, IntuiDev IT-solutions

“Life at the cutting edge of Access development is exciting and very challenging. The knowledge and experience gained over many years of research and trial-and-error has been hard won. But BobÕs new book encapsulates the knowledge we now take for granted, and for the first time the beginner is afforded the opportunity to bypass all that hard work. In this his latest work, Bob has distilled the essence of database design and Access development into a highly valuable and easily understandable resource that I wish was available when I first started out.”

—Graham R Seach, MCP, MCAD, MCSD, Microsoft Access MVP, author

“This is an excellent book for beginners, with an easy reading style. It is now on my recommended list of books that I hand out in every Access class that I teach.”

—M.L. “Sco” Scofield, Microsoft Access MVP, MCSD, Senior Instructor, Scofield Business Services

“If youÕve been using Access with that typical uncertainty, asking yourself ÔJust how could I do that?Õ or ÔWhy isnÕt this working?Õ, or if youÕd like to know what youÕre doing before you hit the wall, this book is perfect for you. Access is a tremendous product and a database is created using a few clicks; but without at least some theoretical background youÕre bound to encounter problems soon. I wish a book like this one wouldÕve been available when I started getting deeper into working with Access some ten years ago.”

—Olaf Rabbachin, CEO, IntuiDev IT-solutions

“This book is for any level DB developer/user. It is packed full of real-world examples and solutions that are not the normal Northwind database that most Access books use. The examples and the technical content surrounding them are the real strength of the book. Schneider uses real-world scenarios that make for excellent reading. It made me want to go and redo a lot of my older Access DBs that were not written as well as they could have been. This book taught me different approaches to doing some routine tasks.”

—Ron Crumbaker, Microsoft MVP – SMS

“While a very powerful application (or perhaps because of its power), Microsoft Access does have a steep learning curve and can be intimidating to new users. Bob Schneider has managed to write a book thatÕs both understandable and enjoyable to read. His examples should be understandable to all readers, and he extends them in a logical manner. This book should leave the reader well equipped to make use of what many consider to be the best desktop database product available.”

—Doug Steele, Microsoft Access MVP

“The author takes what is potentially a very dry subject and adds fantastic color through entertaining analogies and metaphors. For instance, his examples using the NBA, the Beatles, and Donald Rumsfeld help us Ôget itÕ without realizing we have just traversed what could be very stale database theory. Brilliant!”

—Kel Good, MCT, MCSD for Microsoft.NET, Custom Software Development Inc. (www.customsoftware.ca)
Go from Access “beginner” to Access “master”!

Millions of people use Microsoft Access, but only a small fraction of them are really comfortable with it. If youÕre ready to go “beyond the wizards”—and become a confident, highly effective Access user—Hands-On Microsoft Access was written for you.

In plain English, Bob Schneider helps you master crucial principles for building flexible, powerful databases. Discover how to enter data more easily, retrieve it more freely, manipulate it more successfully, analyze it with greater sophistication, and share it more effectively. SchneiderÕs dozens of hands-on examples thoroughly demystify Access, and his friendly, conversational style makes it more approachable than ever before.

Hands-On Microsoft Access presents solutions for the challenges youÕre most likely to encounter, including

  • How do Access objects and interfaces fit together, and when should I use each one?

  • WhatÕs the best way for me to organize my fields into tables?

  • How can I modify the tables, forms, and reports an Access wizard created for me?

  • How can I design forms and reports for people to use more effectively?

  • How do primary keys and relationships work, and why are they so important?

  • How do I make sure my data stays consistent and accurate?

  • How do I build queries that give me the right information—quickly, efficiently, and reliably?

  • How do I use data from other sources, or deliver Access data to other people or programs?

  • What are PivotTables and PivotCharts, what can I do with them, and how do I use them?
  • Written for Access 2003, this book also contains special instructions for Access 2002 users and extensive coverage of issues relevant to Access 95, 97, and 2000.


    ISBN:

    0321240693

    Real Digital Forensics: Computer Security and Incident Response

    Editorial: Addison Wesley   Fecha de publicación:    Páginas: 688
    Precio: 47,79
    Añadir a la cesta
    Disponible. Normalmente se envía en 4 días.

    You can't succeed in the field of computer forensics without hands-on practice—and you can't get hands-on practice without real forensic data. The solution: Real Digital Forensics. In this book, a team of world-class computer forensics experts walks you through six detailed, highly realistic investigations and provides a DVD with all the data you need to follow along and practice.

    From binary memory dumps to log files, this DVD's intrusion data was generated by attacking live systems using the same tools and methods real-world attackers use. The evidence was then captured and analyzed using the same tools the authors employ in their own investigations. This book relies heavily on open source tools, so you can perform virtually every task without investing in any commercial software.

    You'll investigate environments ranging from financial institutions to software companies and crimes ranging from intellectual property theft to SEC violations. As you move step by step through each investigation, you'll discover practical techniques for overcoming the challenges forensics professionals face most often.

    Inside, you will find in-depth information on the following areas:

    • Responding to live incidents in both Windows and Unix environments

    • Determining whether an attack has actually occurred

    • Assembling a toolkit you can take to the scene of a computer-related crime

    • Analyzing volatile data, nonvolatile data, and files of unknown origin

    • Safely performing and documenting forensic duplications

    • Collecting and analyzing network-based evidence in Windows and Unix environments

    • Reconstructing Web browsing, e-mail activity, and Windows Registry changes

    • Tracing domain name ownership and the source of e-mails

    • Duplicating and analyzing the contents of PDAs and flash memory devices

    The accompanying DVD contains several gigabytes of compressed data generated from actual intrusions. This data mirrors what analysts might find in real investigations and allows the reader to learn about forensic investigations in a realisticsetting.


    © Copyright Pearson Education. All rights reserved.


    ISBN:

    0131853538

    Spring Into Digital Photography

    Editorial: Addison Wesley   Fecha de publicación:    Páginas: 336
    Precio: 32,19
    Añadir a la cesta
    Disponible. Normalmente se envía en 4 días.

    The Fastest Route to Mastering Digital Photography!

    Want to create truly great digital images? Maybe you're moving to a digital camera for the first time. Maybe you've used one for years. Either way, this book's for you!

    You'll learn through dozens of outstanding full-color examples, crafted for simplicity and easy to adapt to your own images. Need specific solutions? This book's modular, visual, high-efficiency format delivers them instantly. Renowned digital imaging expert Joseph T. Jaynes and long-time professional photographer Rip Noel draw on their remarkable experience to cover the entire process and offer tips you won't find anywhere else. You'll learn how to plan perfect lighting and composition, capture the best possible image, improve it with Adobe Photoshop or Elements, reproduce it superbly--electronically and in print--and manage your workflow and content more efficiently than ever before.

    • Exploit professional-quality design and composition techniques
    • Use your camera's controls to capture more creative, expressive images
    • Use light and shadow to capture the most powerful images you've ever shot
    • Understand color and control it from start to finish
    • Profile your monitor, scanner, and printer, step-by-step
    • Fix red-eye, blemishes, keystoning, noise, artifacts, banding, and more
    • Optimize any image for Web, e-mail, printing--you name it!
    • Organize, manage, and protect all your digital assets

    No other digital photography guide covers this much, this well, this quickly. Dig in, get started, and get results!

    BONUS: Includes an exclusive dynamic white balance card--a $65 value...your best tool for getting the right color in any light! This single card replaces a whole set of old-style white balance cards.

    Spring Into... is a new series of fast-paced tutorials from Addison-Wesley. Each book in the series is designed to bring you up to speed quickly. Complex topics and technologies are reduced to their core components, and each component is treated with remarkable efficiency in short, easy-to-follow segments. Just the information you need to begin working...now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics.



    ISBN:

    0321321278

    UML 2 and the Unified Process: Practical Object-Oriented Analysis and Design

    Editorial: Addison Wesley   Fecha de publicación:    Páginas: 624
    Precio: 47,79
    Añadir a la cesta
    Disponible. Normalmente se envía en 4 días.

    "This book manages to convey the practical use of UML 2 in clear and understandable terms with many examples and guidelines. Even for people not working with the Unified Process, the book is still of great use. UML 2 and the Unified Process, Second Edition is a must-read for every UML 2 beginner and a helpful guide and reference for the experienced practitioner."

    --Roland Leibundgut, Technical Director, Zuehlke Engineering Ltd.

    "This book is a good starting point for organizations and individuals who are adopting UP and need to understand how to provide visualization of the different aspects needed to satisfy it. "

    --Eric Naiburg, Market Manager, Desktop Products, IBM Rational Software

    This thoroughly revised edition provides an indispensable and practical guide to the complex process of object-oriented analysis and design using UML 2. It describes how the process of OO analysis and design fits into the software development lifecycle as defined by the Unified Process (UP).

    UML 2 and the Unified Process contains a wealth of practical, powerful, and useful techniques that you can apply immediately. As you progress through the text, you will learn OO analysis and design techniques, UML syntax and semantics, and the relevant aspects of the UP. The book provides you with an accurate and succinct summary of both UML and UP from the point of view of the OO analyst and designer.

    This book provides

    • Chapter roadmaps, detailed diagrams, and margin notes allowing you to focus on your needs
    • Outline summaries for each chapter, making it ideal for revision, and a comprehensive index that can be used as a reference

    New to this edition:

    • Completely revised and updated for UML 2 syntax
    • Easy to understand explanations of the new UML 2 semantics
    • More real-world examples
    • A new section on the Object Constraint Language (OCL)
    • Introductory material on the OMG's Model Driven Architecture (MDA)

    The accompanying website provides

    • A complete example of a simple e-commerce system
    • Open source tools for requirements engineering and use case modeling
    • Industrial-strength UML course materials based on the book




    Si no ha encontrado el libro que busca, pinche en nuestro servicio de Pedido Directo y pídanoslo.

    Volver a Página Principal

    Otras novedades


    © Paquebote 1998-2022 Todas las secciones | Ayuda | Aviso Legal