>To: [EMAIL PROTECTED]
>From: [EMAIL PROTECTED]
>Date: Tue, 14 May 2002 15:00:00 -0500
>Subject: Addison-Wesley Book Announcement
>
>This announcement is sent to all subscribers of the Addison-Wesley
>All Subjects mailing list. To unsubscribe from this newsletter,
>please go to: http://www.awprofessional.com/member/subscriptions.asp
>If you are not logged in, please do so, then click on "Manage Newsletters",
>and remove the check in the Newsletter box. If you do not have a password,
>or can't remember your password, enter your email address in the Forgot
>Your Password area and your password will be sent to you.
>
>The following titles have just published by the Addison-Wesley
>Professional Publishing Group.
>________________________________________________________
>Have You Locked the Castle Gate? - Brian Shea
>The Power of Events - David Luckham
>Component-Based Development - Katharine Whitehead
>Enterprise Content Services - Greg Laugero, Alden Globe
>Framework Process Patterns - James Carey, Brent Carlson
>Multitool Linux - Michael Schwarz, Jeremy Anderson, Peter Curtis,
>Steven Murphy
>IT Measurement - International Function Point Users Group
>Interdomain Multicast Routing - Brian M. Edwards, Leonard A. Giuliano,
>Brian R. Wright
>ABAP Objects - Horst Keller, Sascha Kruger
>Developing Software with UML, Second Edition - Bernd Oestereich
>Oracle Performance Tuning - Edward Whalen, Mitchell Schroeter
>Managing Enterprise Active Directory Services - Robbie Allen, Richard Puckett
>NET Framework Security - Brian A. LaMacchia, Sebastian Lange,
>Matthew Lyons, Rudi Martin, Kevin T. Price
>Micro Java Game Development - David Fox, Roman Verhovsek
>Inside Citrix Metaframe XP - Ted Harwood
>_________________________________
>Have You Locked the Castle Gate? Home and Small Business Computer Security
>Brian Shea
>http://www.awprofessional.com/titles/020171955X
>
>Is your computer safe? Could an intruder sneak in and steal your
>information, or plant a virus? Have you locked your castle gate?
>This book outlines the fundamental concepts and techniques behind
>information security that every computer user needs to know. Primarily
>geared toward home and small business Windows users, Have You Locked
>the Castle Gate? is a basic yet highly effective guide to protecting
>your personal files, fending off viruses and hackers, and purchasing
>goods and services securely online. It addresses common security issues
>in a clear, easy-to-understand way that non-technical users will greatly
>appreciate.
>_________________________________
>The Power of Events: An Introduction to Complex Event Processing
>in Distributed Enterprise Systems
>David Luckham
>http://www.awprofessional.com/titles/0201727897
>
>Complex Event Processing (CEP) is a defined set of tools and techniques
>for analyzing and controlling the complex series of interrelated events
>that drive modern distributed information systems. This emerging technology
>helps IS and IT professionals understand what is happening within the
>system, quickly identify and solve problems, and more effectively utilize
>events for enhanced operation, performance, and security. The Power of
>Events introduces CEP and shows specifically how this innovative
>technology can be utilized to enhance the quality of large-scale,
>distributed enterprise systems. The book describes the challenges faced
>by today's information systems, explains fundamental CEP concepts, and
>highlights CEP's role within a complex and evolving contemporary context.
>_________________________________
>Component-Based Development: Principles and Planning for Business Systems
>Katharine Whitehead
>http://www.awprofessional.com/titles/0201675285
>
>This book introduces the key principles of component-based development
>(CBD) that need to be understood in order to adopt a component-based
>model of software development, and explains the benefits of adopting
>such an approach for an organization. It guides the reader through the
>program-planning process, and outlines the need-to-know issues in
>designing and assembling components. Software developers, architects
>and IT project managers will learn how to springboard over to using a
>component-based approach, and discover the organizational issues
>affecting its adoption.
>_________________________________
>Enterprise Content Services: Connecting Information and Profitability
>Greg Laugero, Alden Globe
>http://www.awprofessional.com/titles/0201730162
>
>Written for executives, managers, and information technology professionals,
>Enterprise Content Services will help you identify the most important
>content driving your business, improve its accuracy, and make it more
>usable for all of your audiences. This book will teach you how to bring
>together your organization's people, processes, and technologies for
>effective content management. In addition, you will learn about the
>specific tools, techniques, strategies, and approaches for the
>implementation of an effective content services program. This book
>includes a useful guide for content managers. Focusing on vendors
>and products, it describes key features, strengths, and drawbacks of
>relevant companies, terms, and technologies. Real case studies illustrate
>the value of comprehensive content services and techniques for successful
>implementation.
>_________________________________
>Framework Process Patterns: Lessons Learned Developing Application Frameworks
>James Carey, Brent Carlson
>http://www.awprofessional.com/titles/0201731320
>
>Frameworks represent a rapidly growing field within object-oriented
>programming and development. Frameworks, which are cooperating classes
>that make up a reusable design that addresses a specific application
>domain, are, for all of their value, widely misunderstood. Framework
>Process Patterns presents working patterns that apply to all phases of
>the framework development process, from requirements and analysis to
>documentation. It focuses on the essential issue of what constitutes
>an appropriate domain and how to strike the delicate balance between
>content and reusability. This book also examines the human side of
>framework development, offering advice on effective communication and
>optimal team organization.
>_________________________________
>Multitool Linux: Practical Uses for Open Source Software
>Michael Schwarz, Jeremy Anderson, Peter Curtis, Steven Murphy
>http://www.awprofessional.com/titles/0201734206
>
>This resource-packed guide delivers pragmatic solutions for real-world
>Linux development needs-all using open-source software tools. Viewing
>Linux as a well-stocked toolbox, Multitool Linux shows programmers and
>sophisticated users how to create a wide variety of exciting and useful
>applications for business and entertainment, from speech synthesis and
>video production to network security. The book begins with a general
>introduction to Linux and a look at working with its source code. A
>wide variety of programming projects-encompassing communications,
>privacy, music and audio, graphics, photography, and much more-are
>then explored in-depth. Each chapter is filled with examples, helpful
>screenshots, step-by-step tutorials, lists of open-source tools, and
>URLs for sites where those tools can be obtained for free.
>_________________________________
>IT Measurement: Practical Advice from the Experts
>International Function Point Users Group
>http://www.awprofessional.com/titles/020174158X
>
>The accurate, quantitative measurement of software quality and process
>performance is rapidly becoming an essential part of competition in the
>ever-tightening software marketplace. Software metrics provides insights
>into productivity and quality gains from improvements in skill,
>technology, and development methodology. An effective metrics program
>helps practitioners assemble the best team, select the optimal
>development methodology, and enhance the quality of a software product.
>Written by the world's leading authorities in the field, IT Measurement
>showcases state-of-the-art in software metrics and provides the practical
>knowledge that practitioners need in order to take full advantage of
>software metrics technology. The book's collected articles offer important
>perspectives on the role of metrics in the development process, and show
>how metrics directly enhance software quality and output efficiency.
>_________________________________
>Interdomain Multicast Routing: Practical Juniper Networks and Cisco
>Systems Solutions
>Brian M. Edwards, Leonard A. Giuliano, Brian R. Wright
>http://www.awprofessional.com/titles/0201746123
>
>Increasing numbers of ISPs have begun implementing multicast
>infrastructure. Soon the Internet will provide multicast connectivity
>between any two points on the Internet, the way it provides for unicast
>traffic today. Interdomain Multicast Routing is the key to unlocking
>the complexities of this growing technology. Starting with a summary of
>the technology and its relevant protocols, this book shows readers the
>big picture before revealing a detailed analysis of important protocols
>and the way they work with one another. Throughout, the authors focus
>on both Cisco Systems and Juniper Networks technology--the two leading
>vendors of routers and routing technology. Real-life examples are used
>to clearly illustrate key concepts.
>_________________________________
>Oracle Performance Tuning
>Edward Whalen, Mitchell Schroeter
>http://www.awprofessional.com/titles/0672321467
>
>In this book you'll learn how to properly configure and tune an Oracle
>database. This book starts with the basics, describing what OS and
>hardware components affect Oracle performance and why. From this basic
>understanding you will be able to better configure and tune your Oracle
>database system. The authors of this book are experienced in hardware
>and operating systems, as well as with the Oracle RDBMS. It is this
>unique perspective that makes this book different from other Oracle
>tuning books. This book's unique perspective on Oracle tuning provides
>information that other Oracle performance books do not, such as how RAID
>levels affect Oracle performance and the basic operation of a disk drive
>and how its performance limitations must be taken into account. Tuning
>an Oracle system involves more than tuning SQL statements. It involves
>proper sizing and capacity planning, and careful monitoring. This book
>teaches you how to do that.
>_________________________________
>Managing Enterprise Active Directory Services
>Robbie Allen, Richard Puckett
>http://www.awprofessional.com/titles/0672321254
>
>Managing Enterprise Active Directory Services is your hands-on
>guide to programmatically managing Windows 2000 Active Directory.
>This guide equips network and systems administrators with innovative
>management and monitoring philosophies and working scripts and programs
>to ease Active Directory administration. Our expert authors, Robbie Allen
>and Richard Puckett, share common challenges associated with managing
>Active Directory before presenting the Active Directory management
>interfaces--WMI, ADSI, and LDAP. They then delve into the core
>components of managing Active Directory, such as DNS, site topology and
>replication, accounts, security, and group policy objects, providing
>Visual Basic, VBScript, and Perl code samples that have been
>thoroughly tested in real-world Active Directory environments.
>_________________________________
>NET Framework Security
>Brian A. LaMacchia, Sebastian Lange, Matthew Lyons, Rudi Martin,
>Kevin T. Price
>http://www.awprofessional.com/titles/067232184X
>
>NET Framework Security provides the ultimate high-end comprehensive
>reference to all of the new security features available in .NET.
>Through extensive code samples and step-by-step walkthroughs of
>configuration techniques, the reader is taken deep into the world of
>secure applications. Demonstrations of creating custom procedures and
>a full explanation of each aspect separate this book from many other
>"lecture books." Many of the concepts expressed in this book are not
>only viable in .NET, but on the Internet in general. These factors
>combined make this the one reference that every developer and system
>administrator should have.
>_________________________________
>Micro Java Game Development
>David Fox, Roman Verhovsek
>http://www.awprofessional.com/titles/0672323427
>
>Wireless games are always on and always with you, and can reach a more
>massive audience than any other gaming platform in history. No programming
>language is as suited for micro games as Java 2 Micro Edition (J2ME).
>Micro Java(tm) Game Development is your step-by-step guide to creating
>games for devices that support J2ME/MIDP. The material covers a full
>range of topics, from a tour of all available micro devices (PDAs,
>cell phones, and pagers) to a discussion of software standards that
>support J2ME (WAP, SMS, i-mode, and wireless enhancements such as
>Bluetooth) to an overview of J2ME extensions (Siemens Game API, NTT
>DoCoMo I-Appli). Chapter by chapter, this book will guide you through
>the development of Micro Racer, a professional-level J2ME game.
>_________________________________
>Inside Citrix Metaframe XP: A System Administrator's Guide to Citrix
>MetaFrame XP/1.8 and Windows Terminal Services
>Ted Harwood
>http://www.awprofessional.com/titles/0735711925
>
>Inside Citrix MetaFrame is the most-detailed, technically in-depth
>reference available for Citrix MetaFrame and Windows Terminal Services.
>System administrators will not only learn how the products work, but
>how to best implement them in different environments. Ted Harwood
>describes the steps involved in planning for a Citrix MetaFrame solution,
>implementing that solution, and deploying a server farm. Harwood also
>explains more advanced topics, such as performance tuning, network
>management and monitoring techniques, application installation and
>management, Terminal Server and NetWare integration, and disaster
>recovery and reliability. Administrators and consultants planning to
>implement Citrix MetaFrame and Terminal Server solutions on their
>networks will certainly benefit from Harwood's hands-on experience
>and up-to-date coverage. This comprehensive resource provides
>real-world solutions and examples, command and technical article
>references, and lists of technical resources and web sites. As an
>added bonus, many chapters contain a valuable list of Harwood's
>"Top-Ten Tips."
>______________________________________________________
>"The Reverse Challenge"
>
>The Honeynet Project, authors of Know Your Enemy: Revealing the
>Security Tools, Tactics, and Motives of the Blackhat Community, would
>like to announce "The Reverse Challenge".  Your mission, should you
>choose to accept it, is to analyze a binary captured in the wild, dig
>the most you can out of the attacker's tool, and communicate your
>findings in a concise manner.  The challenge is to have fun, solve a
>common real world problem, and learn from the process.  The 20 best
>submissions will win free copies of Know Your Enemy!
>
>For more information and contest rules please visit
>http://project.honeynet.org/reverse/
>______________________________________________________
>Join Eric Newcomer, author of Understanding Web Services: XML, WSDL,
>SOAP, and UDDI, at Softpro Books on Wednesday, June 12 at 6:30 PM.
>
>Web services enable the new generation of Internet-based applications.
>These services support application-to-application Internet
>communication--that is, applications at different network locations
>can be integrated to function as if they were part of a single, large
>software system. Examples of applications made possible by Web services
>include automated B2B transactions, as well as desktop and handheld
>devices client access to reservation and order-tracking and the like.
>
>Eric will introduce the main ideas and concepts behind core and
>extended Web services technologies and provide you with an understanding
>of each of the major technologies that have emerged in this space.
>
>Free Event!
>Date: Wednesday, June 12, 2002
>Time: 6:00 PM
>Softpro Books
>112 Mall Road
>Burlington, MA 01803-5300
>(781) 273-2919
>http://www.softpro.com/
>______________________________________________________
>Robbie Allen, co-author of Managing Enterprise Active Directory
>Services will be speaking at the Directory Experts Conference.
>
>May 19-21, 2002
>Radisson Resort & Spa Scottsdale
>Scottsdale, Arizona
>http://www.netpro.com/welcome/directoryexperts/
>________________________________________________________
>Join Addison-Wesley authors Steve Bellovin, Bill Cheswick,
>Fred Douglis, Peter Galvin, Gary McGraw, Marshall Kirk McKusick,
>Avi Rubin, and Peter Salus at the 2002 USENIX Annual Technical
>Conference.  USENIX 2002 is the place to learn from the experts,
>share solutions, and explore the wealth of exciting new titles from
>Addison-Wesley.
>
>Stop by booth #301 and check out these new gems:
>Advanced Linux Networking by Roderick Smith
>Multitool Linux by Michael Schwarz et al
>Have You Locked the Castle Gate? by Brian Shea
>Interdomain Multicast Routing by Brian Edwards et al
>Building Secure Software by John Viega and Gary McGraw
>Linux Kernel Programming, Third Edition by Michael Beck et al
>Understanding Open Source Software Development by Joseph Feller and
>Brian Fitzgerald...and many more!
>
>June 13-14, 2002
>Doubletree Hotel
>Monterey, California
>http://www.usenix.org/events/usenix02/
>________________________________________________________
>If you develop with the Visual Studio .NET tool suite, VSLive!
>is the conference for you. Learn from the Microsoft Development
>Team Managers, industry experts, and Addison-Wesley authors from
>around the world. You'll get cutting edge techniques to solve your
>development challenges today and build the next generation applications
>of tomorrow.
>
>VSLive! speakers include Aaron Skonnard, Ken Getz, Chris Kinsman,
>Ted Pattison, and Brian Randell.
>
>June 16-19, 2002
>New York Marriott Marquis
>New York, NY
>http://www.vslive.com/2002/ny/
>________________________________________________________
>Join Addison-Wesley at the SIGGRAPH 2002 Conference in San Antonio, TX.
>SIGGRAPH 2002 is the world's annual gathering of the international
>computer graphics community, where the digital future is defined and
>revealed. It is also the place to learn from the experts, share
>solutions, and explore the wealth of exciting new titles from Addison-Wesley.
>
>Stop by booth #17099 and check out these new books:
>Shaping Web Usability: Interaction Design in Context by Albert N. Badre
>The Design of Sites: Patterns, Principles, and Processes for Crafting
>a Customer-Centered Web Experience by Douglas K. van Duyne, James A. Landay,
>and Jason I. Hong...and more!
>
>July 23-25, 2002
>Henry B. Gonzalez Convention Center
>San Antonio, Texas
>http://www.siggraph.org/s2002/flashhome.html
>________________________________________________________
>Join our DevelopMentor Series authors at the C# Summer Camp.
>Pack your gear, head to the Microsoft Campus in Redmond, and
>be part of the .NET community at this week-long training event.
>C# Summer Camp is sure to be an intense learning experience, spiked
>with lots of fun.
>
>August 19-23, 2002
>Microsoft Campus in Redmond
>Redmond, Washington
>http://www.develop.com/conferences/csharpsummer/csharpsummer.aspx
>________________________________________________________
>All Addison Wesley Longman titles are available at a discount for
>bulk purchases by corporations, organizations, institutions,
>and the government. To place an order or to inquire about further
>information, please contact the Addison Wesley Longman Corporate,
>Government, and Special Sales Department. Phone: 1-800-238-9682
>Fax: 781-942-1621 or via e-mail: [EMAIL PROTECTED]
>
>If you are interested in adopting our books for a class, please visit
>our sales representative's page at: http://www.awlonline.com/RepLocator


---
Dustin Puryear <[EMAIL PROTECTED]>
UNIX and Network Consultant
http://members.telocity.com/~dpuryear
PGP Key available at http://www.us.pgp.net
In the beginning the Universe was created.
This has been widely regarded as a bad move. - Douglas Adams


Reply via email to