>To: [EMAIL PROTECTED] >From: [EMAIL PROTECTED] >Date: Tue, 14 May 2002 15:00:00 -0500 >Subject: Addison-Wesley Book Announcement > >This announcement is sent to all subscribers of the Addison-Wesley >All Subjects mailing list. To unsubscribe from this newsletter, >please go to: http://www.awprofessional.com/member/subscriptions.asp >If you are not logged in, please do so, then click on "Manage Newsletters", >and remove the check in the Newsletter box. If you do not have a password, >or can't remember your password, enter your email address in the Forgot >Your Password area and your password will be sent to you. > >The following titles have just published by the Addison-Wesley >Professional Publishing Group. >________________________________________________________ >Have You Locked the Castle Gate? - Brian Shea >The Power of Events - David Luckham >Component-Based Development - Katharine Whitehead >Enterprise Content Services - Greg Laugero, Alden Globe >Framework Process Patterns - James Carey, Brent Carlson >Multitool Linux - Michael Schwarz, Jeremy Anderson, Peter Curtis, >Steven Murphy >IT Measurement - International Function Point Users Group >Interdomain Multicast Routing - Brian M. Edwards, Leonard A. Giuliano, >Brian R. Wright >ABAP Objects - Horst Keller, Sascha Kruger >Developing Software with UML, Second Edition - Bernd Oestereich >Oracle Performance Tuning - Edward Whalen, Mitchell Schroeter >Managing Enterprise Active Directory Services - Robbie Allen, Richard Puckett >NET Framework Security - Brian A. LaMacchia, Sebastian Lange, >Matthew Lyons, Rudi Martin, Kevin T. Price >Micro Java Game Development - David Fox, Roman Verhovsek >Inside Citrix Metaframe XP - Ted Harwood >_________________________________ >Have You Locked the Castle Gate? Home and Small Business Computer Security >Brian Shea >http://www.awprofessional.com/titles/020171955X > >Is your computer safe? Could an intruder sneak in and steal your >information, or plant a virus? Have you locked your castle gate? >This book outlines the fundamental concepts and techniques behind >information security that every computer user needs to know. Primarily >geared toward home and small business Windows users, Have You Locked >the Castle Gate? is a basic yet highly effective guide to protecting >your personal files, fending off viruses and hackers, and purchasing >goods and services securely online. It addresses common security issues >in a clear, easy-to-understand way that non-technical users will greatly >appreciate. >_________________________________ >The Power of Events: An Introduction to Complex Event Processing >in Distributed Enterprise Systems >David Luckham >http://www.awprofessional.com/titles/0201727897 > >Complex Event Processing (CEP) is a defined set of tools and techniques >for analyzing and controlling the complex series of interrelated events >that drive modern distributed information systems. This emerging technology >helps IS and IT professionals understand what is happening within the >system, quickly identify and solve problems, and more effectively utilize >events for enhanced operation, performance, and security. The Power of >Events introduces CEP and shows specifically how this innovative >technology can be utilized to enhance the quality of large-scale, >distributed enterprise systems. The book describes the challenges faced >by today's information systems, explains fundamental CEP concepts, and >highlights CEP's role within a complex and evolving contemporary context. >_________________________________ >Component-Based Development: Principles and Planning for Business Systems >Katharine Whitehead >http://www.awprofessional.com/titles/0201675285 > >This book introduces the key principles of component-based development >(CBD) that need to be understood in order to adopt a component-based >model of software development, and explains the benefits of adopting >such an approach for an organization. It guides the reader through the >program-planning process, and outlines the need-to-know issues in >designing and assembling components. Software developers, architects >and IT project managers will learn how to springboard over to using a >component-based approach, and discover the organizational issues >affecting its adoption. >_________________________________ >Enterprise Content Services: Connecting Information and Profitability >Greg Laugero, Alden Globe >http://www.awprofessional.com/titles/0201730162 > >Written for executives, managers, and information technology professionals, >Enterprise Content Services will help you identify the most important >content driving your business, improve its accuracy, and make it more >usable for all of your audiences. This book will teach you how to bring >together your organization's people, processes, and technologies for >effective content management. In addition, you will learn about the >specific tools, techniques, strategies, and approaches for the >implementation of an effective content services program. This book >includes a useful guide for content managers. Focusing on vendors >and products, it describes key features, strengths, and drawbacks of >relevant companies, terms, and technologies. Real case studies illustrate >the value of comprehensive content services and techniques for successful >implementation. >_________________________________ >Framework Process Patterns: Lessons Learned Developing Application Frameworks >James Carey, Brent Carlson >http://www.awprofessional.com/titles/0201731320 > >Frameworks represent a rapidly growing field within object-oriented >programming and development. Frameworks, which are cooperating classes >that make up a reusable design that addresses a specific application >domain, are, for all of their value, widely misunderstood. Framework >Process Patterns presents working patterns that apply to all phases of >the framework development process, from requirements and analysis to >documentation. It focuses on the essential issue of what constitutes >an appropriate domain and how to strike the delicate balance between >content and reusability. This book also examines the human side of >framework development, offering advice on effective communication and >optimal team organization. >_________________________________ >Multitool Linux: Practical Uses for Open Source Software >Michael Schwarz, Jeremy Anderson, Peter Curtis, Steven Murphy >http://www.awprofessional.com/titles/0201734206 > >This resource-packed guide delivers pragmatic solutions for real-world >Linux development needs-all using open-source software tools. Viewing >Linux as a well-stocked toolbox, Multitool Linux shows programmers and >sophisticated users how to create a wide variety of exciting and useful >applications for business and entertainment, from speech synthesis and >video production to network security. The book begins with a general >introduction to Linux and a look at working with its source code. A >wide variety of programming projects-encompassing communications, >privacy, music and audio, graphics, photography, and much more-are >then explored in-depth. Each chapter is filled with examples, helpful >screenshots, step-by-step tutorials, lists of open-source tools, and >URLs for sites where those tools can be obtained for free. >_________________________________ >IT Measurement: Practical Advice from the Experts >International Function Point Users Group >http://www.awprofessional.com/titles/020174158X > >The accurate, quantitative measurement of software quality and process >performance is rapidly becoming an essential part of competition in the >ever-tightening software marketplace. Software metrics provides insights >into productivity and quality gains from improvements in skill, >technology, and development methodology. An effective metrics program >helps practitioners assemble the best team, select the optimal >development methodology, and enhance the quality of a software product. >Written by the world's leading authorities in the field, IT Measurement >showcases state-of-the-art in software metrics and provides the practical >knowledge that practitioners need in order to take full advantage of >software metrics technology. The book's collected articles offer important >perspectives on the role of metrics in the development process, and show >how metrics directly enhance software quality and output efficiency. >_________________________________ >Interdomain Multicast Routing: Practical Juniper Networks and Cisco >Systems Solutions >Brian M. Edwards, Leonard A. Giuliano, Brian R. Wright >http://www.awprofessional.com/titles/0201746123 > >Increasing numbers of ISPs have begun implementing multicast >infrastructure. Soon the Internet will provide multicast connectivity >between any two points on the Internet, the way it provides for unicast >traffic today. Interdomain Multicast Routing is the key to unlocking >the complexities of this growing technology. Starting with a summary of >the technology and its relevant protocols, this book shows readers the >big picture before revealing a detailed analysis of important protocols >and the way they work with one another. Throughout, the authors focus >on both Cisco Systems and Juniper Networks technology--the two leading >vendors of routers and routing technology. Real-life examples are used >to clearly illustrate key concepts. >_________________________________ >Oracle Performance Tuning >Edward Whalen, Mitchell Schroeter >http://www.awprofessional.com/titles/0672321467 > >In this book you'll learn how to properly configure and tune an Oracle >database. This book starts with the basics, describing what OS and >hardware components affect Oracle performance and why. From this basic >understanding you will be able to better configure and tune your Oracle >database system. The authors of this book are experienced in hardware >and operating systems, as well as with the Oracle RDBMS. It is this >unique perspective that makes this book different from other Oracle >tuning books. This book's unique perspective on Oracle tuning provides >information that other Oracle performance books do not, such as how RAID >levels affect Oracle performance and the basic operation of a disk drive >and how its performance limitations must be taken into account. Tuning >an Oracle system involves more than tuning SQL statements. It involves >proper sizing and capacity planning, and careful monitoring. This book >teaches you how to do that. >_________________________________ >Managing Enterprise Active Directory Services >Robbie Allen, Richard Puckett >http://www.awprofessional.com/titles/0672321254 > >Managing Enterprise Active Directory Services is your hands-on >guide to programmatically managing Windows 2000 Active Directory. >This guide equips network and systems administrators with innovative >management and monitoring philosophies and working scripts and programs >to ease Active Directory administration. Our expert authors, Robbie Allen >and Richard Puckett, share common challenges associated with managing >Active Directory before presenting the Active Directory management >interfaces--WMI, ADSI, and LDAP. They then delve into the core >components of managing Active Directory, such as DNS, site topology and >replication, accounts, security, and group policy objects, providing >Visual Basic, VBScript, and Perl code samples that have been >thoroughly tested in real-world Active Directory environments. >_________________________________ >NET Framework Security >Brian A. LaMacchia, Sebastian Lange, Matthew Lyons, Rudi Martin, >Kevin T. Price >http://www.awprofessional.com/titles/067232184X > >NET Framework Security provides the ultimate high-end comprehensive >reference to all of the new security features available in .NET. >Through extensive code samples and step-by-step walkthroughs of >configuration techniques, the reader is taken deep into the world of >secure applications. Demonstrations of creating custom procedures and >a full explanation of each aspect separate this book from many other >"lecture books." Many of the concepts expressed in this book are not >only viable in .NET, but on the Internet in general. These factors >combined make this the one reference that every developer and system >administrator should have. >_________________________________ >Micro Java Game Development >David Fox, Roman Verhovsek >http://www.awprofessional.com/titles/0672323427 > >Wireless games are always on and always with you, and can reach a more >massive audience than any other gaming platform in history. No programming >language is as suited for micro games as Java 2 Micro Edition (J2ME). >Micro Java(tm) Game Development is your step-by-step guide to creating >games for devices that support J2ME/MIDP. The material covers a full >range of topics, from a tour of all available micro devices (PDAs, >cell phones, and pagers) to a discussion of software standards that >support J2ME (WAP, SMS, i-mode, and wireless enhancements such as >Bluetooth) to an overview of J2ME extensions (Siemens Game API, NTT >DoCoMo I-Appli). Chapter by chapter, this book will guide you through >the development of Micro Racer, a professional-level J2ME game. >_________________________________ >Inside Citrix Metaframe XP: A System Administrator's Guide to Citrix >MetaFrame XP/1.8 and Windows Terminal Services >Ted Harwood >http://www.awprofessional.com/titles/0735711925 > >Inside Citrix MetaFrame is the most-detailed, technically in-depth >reference available for Citrix MetaFrame and Windows Terminal Services. >System administrators will not only learn how the products work, but >how to best implement them in different environments. Ted Harwood >describes the steps involved in planning for a Citrix MetaFrame solution, >implementing that solution, and deploying a server farm. Harwood also >explains more advanced topics, such as performance tuning, network >management and monitoring techniques, application installation and >management, Terminal Server and NetWare integration, and disaster >recovery and reliability. Administrators and consultants planning to >implement Citrix MetaFrame and Terminal Server solutions on their >networks will certainly benefit from Harwood's hands-on experience >and up-to-date coverage. This comprehensive resource provides >real-world solutions and examples, command and technical article >references, and lists of technical resources and web sites. As an >added bonus, many chapters contain a valuable list of Harwood's >"Top-Ten Tips." >______________________________________________________ >"The Reverse Challenge" > >The Honeynet Project, authors of Know Your Enemy: Revealing the >Security Tools, Tactics, and Motives of the Blackhat Community, would >like to announce "The Reverse Challenge". Your mission, should you >choose to accept it, is to analyze a binary captured in the wild, dig >the most you can out of the attacker's tool, and communicate your >findings in a concise manner. The challenge is to have fun, solve a >common real world problem, and learn from the process. The 20 best >submissions will win free copies of Know Your Enemy! > >For more information and contest rules please visit >http://project.honeynet.org/reverse/ >______________________________________________________ >Join Eric Newcomer, author of Understanding Web Services: XML, WSDL, >SOAP, and UDDI, at Softpro Books on Wednesday, June 12 at 6:30 PM. > >Web services enable the new generation of Internet-based applications. >These services support application-to-application Internet >communication--that is, applications at different network locations >can be integrated to function as if they were part of a single, large >software system. Examples of applications made possible by Web services >include automated B2B transactions, as well as desktop and handheld >devices client access to reservation and order-tracking and the like. > >Eric will introduce the main ideas and concepts behind core and >extended Web services technologies and provide you with an understanding >of each of the major technologies that have emerged in this space. > >Free Event! >Date: Wednesday, June 12, 2002 >Time: 6:00 PM >Softpro Books >112 Mall Road >Burlington, MA 01803-5300 >(781) 273-2919 >http://www.softpro.com/ >______________________________________________________ >Robbie Allen, co-author of Managing Enterprise Active Directory >Services will be speaking at the Directory Experts Conference. > >May 19-21, 2002 >Radisson Resort & Spa Scottsdale >Scottsdale, Arizona >http://www.netpro.com/welcome/directoryexperts/ >________________________________________________________ >Join Addison-Wesley authors Steve Bellovin, Bill Cheswick, >Fred Douglis, Peter Galvin, Gary McGraw, Marshall Kirk McKusick, >Avi Rubin, and Peter Salus at the 2002 USENIX Annual Technical >Conference. USENIX 2002 is the place to learn from the experts, >share solutions, and explore the wealth of exciting new titles from >Addison-Wesley. > >Stop by booth #301 and check out these new gems: >Advanced Linux Networking by Roderick Smith >Multitool Linux by Michael Schwarz et al >Have You Locked the Castle Gate? by Brian Shea >Interdomain Multicast Routing by Brian Edwards et al >Building Secure Software by John Viega and Gary McGraw >Linux Kernel Programming, Third Edition by Michael Beck et al >Understanding Open Source Software Development by Joseph Feller and >Brian Fitzgerald...and many more! > >June 13-14, 2002 >Doubletree Hotel >Monterey, California >http://www.usenix.org/events/usenix02/ >________________________________________________________ >If you develop with the Visual Studio .NET tool suite, VSLive! >is the conference for you. Learn from the Microsoft Development >Team Managers, industry experts, and Addison-Wesley authors from >around the world. You'll get cutting edge techniques to solve your >development challenges today and build the next generation applications >of tomorrow. > >VSLive! speakers include Aaron Skonnard, Ken Getz, Chris Kinsman, >Ted Pattison, and Brian Randell. > >June 16-19, 2002 >New York Marriott Marquis >New York, NY >http://www.vslive.com/2002/ny/ >________________________________________________________ >Join Addison-Wesley at the SIGGRAPH 2002 Conference in San Antonio, TX. >SIGGRAPH 2002 is the world's annual gathering of the international >computer graphics community, where the digital future is defined and >revealed. It is also the place to learn from the experts, share >solutions, and explore the wealth of exciting new titles from Addison-Wesley. > >Stop by booth #17099 and check out these new books: >Shaping Web Usability: Interaction Design in Context by Albert N. Badre >The Design of Sites: Patterns, Principles, and Processes for Crafting >a Customer-Centered Web Experience by Douglas K. van Duyne, James A. Landay, >and Jason I. Hong...and more! > >July 23-25, 2002 >Henry B. Gonzalez Convention Center >San Antonio, Texas >http://www.siggraph.org/s2002/flashhome.html >________________________________________________________ >Join our DevelopMentor Series authors at the C# Summer Camp. >Pack your gear, head to the Microsoft Campus in Redmond, and >be part of the .NET community at this week-long training event. >C# Summer Camp is sure to be an intense learning experience, spiked >with lots of fun. > >August 19-23, 2002 >Microsoft Campus in Redmond >Redmond, Washington >http://www.develop.com/conferences/csharpsummer/csharpsummer.aspx >________________________________________________________ >All Addison Wesley Longman titles are available at a discount for >bulk purchases by corporations, organizations, institutions, >and the government. To place an order or to inquire about further >information, please contact the Addison Wesley Longman Corporate, >Government, and Special Sales Department. Phone: 1-800-238-9682 >Fax: 781-942-1621 or via e-mail: [EMAIL PROTECTED] > >If you are interested in adopting our books for a class, please visit >our sales representative's page at: http://www.awlonline.com/RepLocator
--- Dustin Puryear <[EMAIL PROTECTED]> UNIX and Network Consultant http://members.telocity.com/~dpuryear PGP Key available at http://www.us.pgp.net In the beginning the Universe was created. This has been widely regarded as a bad move. - Douglas Adams
