Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
The Office 2004 for Mac: The Missing Manual delivers everything needed to master all four Office 2004 programs for Mac - Word, Excel, PowerPoint and Entourage.
An architectural overview of the Enterprise Service Bus, this guide shows how it can bring the task of integration of enterprise application and services built on J2EE, .NET, C/C++ and other legacy environments into the reach of everyday IT professionals.
This work offers a rich environment for building professional Web sites, with drag-and-drop simplicity, clean HTML code, and dynamic database-driven Web site creation tools.
XSLT is a powerful language for transforming XML documents into something else. That something else can be an HTML document, another XML document, a Portable Document Format (PDF) file, a Scalable Vector Graphics (SVG) file, a Virtual Reality Modeling Language (VRML) file, Java code, or a number of other things. You write an XSLT stylesheet to define the rules for transforming an XML document, and the XSLT processor does the work.As useful as XSLT is, its peculiar characteristics make it a difficult language in which to get started. In fact, newcomers are often a little dazed on first contact. Learning XSLT offers a hands-on introduction to help them get up to speed with XSLT quickly. The book will help web developers and designers understand this powerful but often mystifying template-driven and functional-styled language, getting them over the many differences between XSLT and the more conventional programming languages.Learning XSLT moves smoothly from the simple to complex, illustrating all aspects of XSLT 1.0 through step-by-step examples that you'll practice as you work through the book. Thorough in its coverage of the language, the book makes few assumptions about what you may already know. You'll learn about XSLT's template-based syntax, how XSLT templates work with each other, and gain an understanding of XSLT variables. Learning XSLT also explains how the XML Path Language (XPath) is used by XSLT and provides a glimpse of what the future holds for XSLT 2.0 and XPath 2.0.The ability to transform one XML vocabulary to another is fundamental to exploiting the power of XML. Learning XSLT is a carefully paced, example-rich introduction to XSLT that will have you understanding and using XSLT on your own in no time.
Aimed at Oracle DBAs moving to Unix from another environment such as Windows NT or IBM Mainframe, this pocket-sized book introduces the most important Unix commands.
Written by the author of Expect, this book explains how this part of the UNIX toolbox can be used to automate TelNet, FTP, PASSWD, RLOGIN and other interactive applications. Based on TCL (tool control language), Expect lets the user automate interactive applications.
This edition with Toad for Oracle V8.0 and V8.5, provides a quick reference to this very popular interactive environment tool. It covers new features, shortcut keys and productivity tips. This pocket-sized guide is useful for developers needing to streamline code development or a DBA trying to simplify day-to-day administrative tasks.
O'Reilly's bestselling book on Linux's bash shell is at it again. Now that Linux is an established player both as a server and on the desktop Learning the bash Shell has been updated and refreshed to account for all the latest changes. Indeed, this third edition serves as the most valuable guide yet to the bash shell.As any good programmer knows, the first thing users of the Linux operating system come face to face with is the shell the UNIX term for a user interface to the system. In other words, it's what lets you communicate with the computer via the keyboard and display. Mastering the bash shell might sound fairly simple but it isn't. In truth, there are many complexities that need careful explanation, which is just what Learning the bash Shell provides.If you are new to shell programming, the book provides an excellent introduction, covering everything from the most basic to the most advanced features. And if you've been writing shell scripts for years, it offers a great way to find out what the new shell offers. Learning the bash Shell is also full of practical examples of shell commands and programs that will make everyday use of Linux that much easier. With this book, programmers will learn:How to install bash as your login shellThe basics of interactive shell use, including UNIX file and directory structures, standard I/O, and background jobsCommand line editing, history substitution, and key bindingsHow to customize your shell environment without programmingThe nuts and bolts of basic shell programming, flow control structures, command-line options and typed variablesProcess handling, from job control to processes, coroutines and subshellsDebugging techniques, such as trace and verbose modesTechniques for implementing system-wide shell customization and features related to system security
As part of the Microsoft Office suite, Access has become the industry's leading desktop database management program for organizing, accessing, and sharing information. But taking advantage of this product to build increasingly complex Access applications requires something more than your typical how-to book. What it calls for is Access Hacks from O'Reilly.This valuable guide provides direct, hands-on solutions that can help relieve the frustrations felt by users struggling to master the program's various complexities. For experienced users, Access Hacks offers a unique collection of proven techniques and tools that enable them to take their database skills and productivity to the next level. For Access beginners, it helps them acquire a firm grasp of the program's most productive features.A smart collection of insider tips and tricks, Access Hacks covers all of the program's finer points. Among the multitude of topics addressed, it shows users how to:work with Access in multi-user environmentsutilize SQL querieswork with external data and programsintegrate Access with third-party productsJust imagine: a learning process without the angst. Well, Access Hacks delivers it with ease, thanks to these down-and-dirty techniques not collected together anywhere else.Part of O'Reilly's best-selling Hacks series, Access Hacks is based on author Ken Bluttman's two decades of real-world experience in database programming and business application building. It's because of his vast experiences that the book is able to offer such a deep understanding of the program's expanding possibilities.
Like most complex tasks, .NET programming is fraught with potential costly, and time-consuming hazards. The millions of Microsoft developers worldwide who create applications for the .NET platform can attest to that. Thankfully there's now a book that shows you how to avoid such costly and time-consuming mistakes. It's called .NET Gotchas.The ultimate guide for efficient, pain-free coding, .NET Gotchas from O'Reilly contains 75 common .NET programming pitfalls--and advice on how to work around them. It will help you steer away from those mistakes that cause application performance problems, or so taint code that it just doesn't work right.The book is organized into nine chapters, each focusing on those features and constructs of the .NET platform that consistently baffle developers. Within each chapter are several "e;gotchas,"e; with detailed examples, discussions, and guidelines for avoiding them. No doubt about it, when applied, these concise presentations of best practices will help you lead a more productive, stress-free existence.What's more, because code examples are written in both VB.NET and C#, .NET Gotchas is of interest to more than 75 percent of the growing numbers of .NET programmers. So if you're a .NET developer who's mired in the trenches and yearning for a better way, this book is most definitely for you.
A car PC or carputer is a car tricked-out with electronics for playing radio, music and DVD movies, connecting to the Internet, navigating and tracking with satellite, taking photos, and any electronic gadget a person wants in a car. All these devices are managed and controlled through a single screen or interface. The only place car PC enthusiasts can go for advice, tips and tools is a handful of hard-to-find Web sites--until now. Car PC Hacks is your guide into the car PC revolution.Packing MP3 players, handheld devices, computers and video-on-demand systems gives you a pile too heavy to carry. But add a car and put them together, you've got a powerful and mobile multimedia center requiring no lifting. The next time you give kids a lift, you won't hear, "e;Are we there yet?"e; Instead, expect "e;We're there already?"e; as they won't want to leave the car while playing video games from multiple consoles.Car PC Hacks is the first book available to introduce and entrench you into this hot new market. You can count on the book because it hails from O'Reilly, a trusted resource for technical books. Expect innovation, useful tools, and fun experiments that you've come to expect from O'Reilly's Hacks Series.Maybe you've hacked computers and gadgets, and now you're ready to take it to your car. If hacking is new and you would like to mix cars and computers, this book gets you started with its introduction to the basics of car electrical systems. Even when you're unclear on the difference between amps and watts, expect a clear explanation along with real-life examples to get on track. Whether you're venturing into car PC for the first time or an experienced hobbyist, hop in the book for a joy ride.
Although the number of commercial Java games is still small compared to those written in C or C++, the market is expanding rapidly. Recent updates to Java make it faster and easier to create powerful gaming applications-particularly Java 3D-is fueling an explosive growth in Java games. Java games like Puzzle Pirates, Chrome, Star Wars Galaxies, Runescape, Alien Flux, Kingdom of Wars, Law and Order II, Roboforge, Tom Clancy's Politika, and scores of others have earned awards and become bestsellers.Java developers new to graphics and game programming, as well as game developers new to Java 3D, will find Killer Game Programming in Java invaluable. This new book is a practical introduction to the latest Java graphics and game programming technologies and techniques. It is the first book to thoroughly cover Java's 3D capabilities for all types of graphics and game development projects.Killer Game Programming in Java is a comprehensive guide to everything you need to know to program cool, testosterone-drenched Java games. It will give you reusable techniques to create everything from fast, full-screen action games to multiplayer 3D games. In addition to the most thorough coverage of Java 3D available, Killer Game Programming in Java also clearly details the older, better-known 2D APIs, 3D sprites, animated 3D sprites, first-person shooter programming, sound, fractals, and networked games. Killer Game Programming in Java is a must-have for anyone who wants to create adrenaline-fueled games in Java.
From building, packaging, and deploying applications, to optimizing the runtime WebLogic environment, dealing with security issues, and understanding Enterprise APIs, this guide covers everything developers, administrators, and system architects must understand to work with this powerful and complex application server.
This pocket reference aims to helps make the switch from C# to Visual Basic.NET and vice versa. Differences between the two languages occur in three main areas: syntax, object-oriented principles, and the Visual Studio.NET IDE.
This work covers two distinct areas: performance tuning, or the art of increasing performance for a specific application, and capacity planning, or deciding what hardware best fulfils a given role. This book focuses on the operating system, the underlying hardware, and their interactions.
This volume takes the reader behind the details of the interface, focusing on the general knowledge necessary for Access power users or developers to create effective database applications. The main sections of this book include: database design, queries, and programming.
This text is aimed at Perl programmers who need to work with XML documents and data. It offers a comprehensive tour of the landscape of Perl and XML, the myriad of modules, terminology, and techniques. The last two chapters give examples of XML applications, pulling together all the tools.
This text addresses both open source and commercial tools for use with Simple Object Access Protocol and Java. It introduces Web developers to SOAP to enable them to design and implement new Web services.
ColdFusion has enjoyed widespread use among developers as a powerful, easy-to-learn platform for creating and deploying dynamic web applications. ColdFusion's simple, tag-based language makes it easy to handle basic tasks, like processing form data and querying databases, but the language is also powerful enough to deliver highly scalable, robust applications. And now that Macromedia has integrated ColdFusion into its MX family of technologies, ColdFusion is capable of interacting with Flash MX applications, which opens up even more possibilities.The first edition of this book has been praised as "e;the best reference book available on the subject."e; This new edition, Programming ColdFusion MX, 2nd Edition, goes even further, documenting new techniques for using ColdFusion MX 6.1 to develop and serve dynamic web page content. This exhaustive guide covers everything from the basics to advanced topics, with numerous examples that you can use for your own applications. Contents include:Sharing application data using the web application framework and shared scope variablesAccessing databases, maintaining database records, and advanced database techniques such as drill-down queries, query caching, and query of queriesIntegrating applications with ColdFusion MX's new security frameworkInteracting with other data sources, including LDAP directories, email servers, and other web serversExtending ColdFusion with user-defined functions (UDFs), custom tags, and ColdFusion Components (CFCs)Advanced topics such as working with XML, consuming and producing web services, and integrating ColdFusion with Flash via Flash RemotingReference material for all the tags and functions that comprise CFML, the ColdFusion Markup LanguageProgramming ColdFusion MX, 2nd Edition, covers ColdFusion MX 6.1, the latest release of ColdFusion, and is packed with advanced strategies, insider hints, tips, and tricks for creating effective web applications. If you are a ColdFusion developer, you need this book to help you make the most out of ColdFusion MX.
If you are a Python programmer who wants to incorporate XML into your skill set, this is the book for you. Python has attracted a wide variety of developers, who use it either as glue to connect critical programming tasks together, or as a complete cross-platform application development language. Yet, because it is object-oriented and has powerful text manipulation abilities, Python is an ideal language for manipulating XML.Python & XML gives you a solid foundation for using these two languages together. Loaded with practical examples, this new volume highlights common application tasks, so that you can learn by doing. The book starts with the basics then quickly progresses to complex topics, like transforming XML with XSLT, querying XML with XPath, and working with XML dialects and validation. It also explores the more advanced issues: using Python with SOAP and distributed web services, and using Python to create scalable streams between distributed applications (like databases and web servers).The book provides effective practical applications, while referencing many of the tools involved in XML processing and Python, and highlights cross-platform issues along with tasks relevant to enterprise computing. You will find ample coverage of XML flow analysis and details on ways in which you can transport XML through your network.Whether you are using Python as an application language, or as an administrative or middleware scripting language, you are sure to benefit from this book. If you want to use Python to manipulate XML, this is your guide.
The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system--including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE--all of it free and open source.SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days--when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system--are prevented on a properly administered SELinux system.The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include:* A readable and concrete explanation of SELinux concepts and the SELinux security model* Installation instructions for numerous distributions* Basic system and user administration* A detailed dissection of the SELinux policy language* Examples and guidelines for altering and adding policiesWith SELinux, a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.
'Managing Projects with GNU Make', 3rd edition provides guidelines on meeting the needs of large, modern projects. This edition focuses on the GNU version of make, which has deservedly become the industry standard. GNU's powerful extensions are explored in this book, including a number of interesting advanced topics.
Helps Java developers move beyond the basics of Swing, the graphical user interface (GUI) standard since Java 2. The Hacks format provides short advanced tricks that you can instantly apply to increase your competency with interface-building tools. Example hacks include how to filter lists, power-up trees and tables, and add drag-and-drop support.
There's a lot to know about XML, and it s constantly evolving. But you don't need to commit every syntax, API, or XSLT transformation to memory; you only need to know where to find it. And if it's a detail that has to do with XML or its companion standards, you'll find it here.
JUnit, created by Kent Beck and Erich Gamma, is an open source framework for test-driven development in any Java-based code. JUnit automates unit testing and reduces the effort required to frequently test code while developing it.While there are lots of bits of documentation all over the place, there isn't a go-to-manual that serves as a quick reference for JUnit. This Pocket Guide meets the need, bringing together all the bits of hard to remember information, syntax, and rules for working with JUnit, as well as delivering the insight and sage advice that can only come from a technology's creator. Any programmer who has written, or is writing, Java Code will find this book valuable. Specifically it will appeal to programmers and developers of any level that use JUnit to do their unit testing in test-driven development under agile methodologies such as Extreme Programming (XP) [another Beck creation].
SpamAssassin (SA), the leading open source spam-fighting tool, is free, flexible, powerful, highly-regarded, and remarkably effective. Until now, it was SpamAssassin lacked published documentation. This clear, concise new guide provides the expertise you need to take back your inbox.
'Mastering FreeBSD and OpenBSD Security' is 'devoted completely to BSD security. Dozens of practical examples help administrators of all stripes select, configure, and deploy these operating systems. By describing security solutions for real-life scenarios, the guide lets administrators push their server's security to the next level.
Licensing is a major part of what open source and free software are all about, but it's still one of the most complicated areas of law. This book explains your licensing options, how they compare and interoperate, and how license choices affect project possibilities.
This handy reference provides a quick tour of the .NET compact framework and includes several working projects for getting productive straightaway.
This is a quick reference to all the fundamental and essential tasks required to run such divergent Unix systems as Solaris, Linux, AIX, BSD, SuSe, Red Hat, and more. Beginners and experienced administrators alike will quickly be able to apply its principles and advice to solve everyday problems.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.