>To: [EMAIL PROTECTED]
>From: [EMAIL PROTECTED]
>Date: Tue, 9 Jul 2002 10:29:55 -0500
>Subject: Addison-Wesley Book Announcement
>
>This announcement is sent to all subscribers of the
>Addison-Wesley All Subjects mailing list. To unsubscribe from
>this newsletter, please go to:
>http://www.awprofessional.com/member/subscriptions.asp
>If you are not logged in, please do so, then click on "Manage
>Newsletters", and remove the check in the Newsletter
>box. If you do not have a password, or can't remember your
>password, enter your email address in the Forgot Your
>Password area and your password will be sent to you.
>
>The following titles have just published by the Addison-Wesley
>Professional Publishing Group.
>________________________________________________________
>Python Programming with the Java Class Libraries - Richard
>Hightower
>Writers' Workshops & the Work of Making Things - Richard P.
>Gabriel
>Linux Kernel Programming, Third Edition - Michael Beck,
>Harald Bohme, Mirko Dziadzka, Ulrich Kunitz, Robert Magnus, Claus
>Schroter, Dirk Verworner
>Database Administration: The Complete Guide to Practices and
>Procedures - Craig S. Mullins
>Pair Programming Illuminated - Laurie Williams, Robert
>Kessler
>Peer to Peer: Collaboration and Sharing over the Internet -
>Bo Leuf
>Advanced Linux Networking - Roderick W. Smith
>Managing Information Security Risks: The OCTAVE Approach -
>Christopher Alberts, Audrey Dorofee
>________________________________________________________
>Python Programming with the Java Class Libraries: A
>Tutorial for Building Web and Enterprise Applications with
>Jython
>Richard Hightower
>http://www.awprofessional.com/titles/0201616165
>
>This tutorial begins with coverage of some of the basics of
>Python programming. Using plenty of skill-building exercises
>and interactive programming sessions, the book will help
>those new to programming develop an understanding of
>concepts and practical techniques. For experienced
>programmers, the book demonstrates Python's breadth of
>capabilities and shows the ways that Python interfaces with
>the Java APIs for professional application development.
>_________________________________
>Writers' Workshops & the Work of Making Things: Patterns,
>Poetry...
>Richard P. Gabriel
>http://www.awprofessional.com/titles/020172183X
>
>The writers' workshop provides creative writers with a
>time-tested teaching and revision tool, and business and
>technical professionals with a new and effective alternative
>to impersonal peer reviews and scientific workshops. In this
>intense, interactive, gift-based forum, writers help each
>other hone their craft and improve individual pieces of
>work. Writers' Workshops & the Work of Making Things describes in
>detail how to conduct and participate in a successful
>creative or technical workshop.
>_________________________________
>Linux Kernel Programming, Third Edition
>Michael Beck, Harald Bohme, Mirko Dziadzka, Ulrich Kunitz,
>Robert Magnus, Claus Schroter, Dirk Verworner
>http://www.awprofessional.com/titles/0201719754
>
>This book is written for anybody who wants to learn more
>about Linux. It explains the inner mechanisms of Linux from
>process scheduling to memory management and file systems,
>and reveals the structure of the kernel-the heart of the
>Linux operating system. This book is targeted to all
>developers who want to know how the Linux kernel interface
>is implemented, and helps readers to understand the
>operating system mechanisms better and to optimize Linux
>applications.
>_________________________________
>Database Administration: The Complete Guide to Practices and
>Procedures
>Craig S. Mullins
>http://www.awprofessional.com/titles/0201741296
>
>With Database Administration, database professionals now
>have a comprehensive sourcebook of strategies for delivering
>quality administration across today's challenging multi-DBMS
>environments. Filled with practical guidelines and
>strategies, this book provides the most comprehensive survey
>available of the administrator's world for the existing or
>aspiring database professional. Part tutorial and part
>reference, Database Administration explains and examines
>each of the components that comprise the discipline of
>database administration.
>_________________________________
>Pair Programming Illuminated
>Laurie Williams, Robert Kessler
>http://www.awprofessional.com/titles/0201745763
>
>Pair programming is a simple, straightforward concept. Two
>programmers work side-by-side at one computer, continuously
>collaborating on the same design, algorithm, code, and test.
>It allows two people to produce a higher quality of code
>than that produced by the summation of their solitary
>efforts. Written as instruction for team members and leaders
>new to pair programming and as an improvement guide for
>experienced pair programmers, Pair Programming Illuminated
>explains both the principles underlying this method and its
>best practices.
>_________________________________
>Peer to Peer: Collaboration and Sharing over the Internet
>Bo Leuf
>http://www.awprofessional.com/titles/0201767325
>
>Peer to Peer: Collaboration and Sharing over the Internet
>provides the first comprehensive resource to help business
>and communications professionals get started.
>This complete handbook presents everything industry
>professionals and interested users need to know. Readers
>will find a clear overview of peer-to-peer concepts,
>architectural models, and network applications; a practical
>guide to installation and deployment; information on
>specific protocols and tools; and discussions on legal and
>security issues.
>_________________________________
>Advanced Linux Networking
>Roderick W. Smith
>http://www.awprofessional.com/titles/0201774232
>
>With an increasing number of networks and mission-critical
>applications running on Linux, system and network
>administrators must be able to do more than set up a server
>and rely on its default configuration. Advanced Linux
>Networking is designed to help you achieve a higher level of
>competence. It focuses on powerful techniques and features
>of Linux networking and provides you with the know-how you
>need to improve server efficiency, enhance security, and
>adapt to new requirements.
>_________________________________
>Managing Information Security Risks: The OCTAVE Approach
>Christopher Alberts, Audrey Dorofee
>http://www.awprofessional.com/titles/0321118863
>
>Information security requires far more than the latest tool
>or technology. Organizations must understand exactly what
>they are trying to protect--and why--before selecting
>specific solutions. Security issues are complex and often
>are rooted in organizational and business concerns. A
>careful evaluation of security needs and risks in this
>broader context must precede any security implementation to
>insure that all the relevant, underlying problems are first
>uncovered. OCTAVE(SM) enables any organization to develop
>security priorities based on the organization's particular
>business concerns. The approach provides a coherent
>framework for aligning security actions with overall
>objectives.
>Managing Information Security Risks, written by the
>developers of OCTAVE, is the complete and authoritative
>guide to its principles and implementations.
>______________________________________________________
>Java Developers Can Expect Something Better at
>Addison-Wesley!
>
>Attention Java Developers: Are you an experienced programmer
>looking for some Java fun? Are you new to the technology and
>want to be part of the Java Community? Did you attend
>JavaOne? Are you interested in receiving 10% off your next
>purchase of Java titles in the Addison-Wesley Store?
>
>http://www.awprofessional.com/link.asp?link=news102
>______________________________________________________
>Join Addison-Wesley at the SIGGRAPH 2002 Conference in San
>Antonio, TX. SIGGRAPH 2002 is the world's annual gathering
>of the international computer graphics community, where the
>digital future is defined and revealed. It is also the place
>to learn from the experts, share solutions, and explore the
>wealth of exciting new titles from Addison-Wesley.
>
>Stop by booth #17099 and check out these new books:
>Shaping Web Usability: Interaction Design in Context by
>Albert N. Badre
>The Design of Sites: Patterns, Principles, and Processes for
>Crafting a Customer-Centered Web Experience by Douglas K.
>van Duyne, James A. Landay, and Jason I. Hong
>.and more!
>
>July 23-25, 2002
>Henry B. Gonzalez Convention Center
>San Antonio, TX
>http://www.siggraph.org/s2002/flashhome.html
>______________________________________________________
>Announcing a new book by Stuart McClure, Saumil Shah, and
>Shreeraj Shah.
>
>Web Hacking: Attacks and Defense
>Organizations using web-based business applications are
>increasingly at risk. From the author of Hacking Exposed,
>Web Hacking is a powerful guide to the latest in web attacks
>and defense. You will come away with an increased
>understanding of how web hacking occurs, as well as enhanced
>skill at developing defenses against web attacks.
>
>"This book is a virtual battle plan that will help you
>identify and eliminate threats that could take your web
>site off line..."
>-From the Foreword by Bill Boni, Chief Information Security
>Officer, Motorola
>
>Web Hacking: Attacks and Defense
>McClure, Stuart McClure, Saumil Shah, Shreeraj Shah
>Publication Date: August 2, 2002
>ISBN 0-201-76176-9, Addison-Wesley
>http://www.awprofessional.com
>For web site defacement chapter email: [EMAIL PROTECTED]
>
>Advance copies available at Black Hat,
>July 29-August 1, 2002 in Las Vegas, Nevada
>including the author reception on Wednesday July
>31, 2002 at 6:00 p.m.
>http://www.blackhat.com
>______________________________________________________
>Join Donald E. Eastlake, III, co-author of Secure XML: The
>New Syntax for Signatures and Encryption, at the .NET User
>Group of Greater Boston meeting on Wednesday, August 14 at
>7:00PM. The event will take place at Microsoft's Waltham,
>Massachusetts Office.
>
>Presentation summary:
>XML is rapidly spreading as a standard for application-level
>communication. As a result, there is increasing urgency in
>providing facilities to assure the authenticity of and
>provide confidentiality for XML structures including
>sub-documents. The flexibility and complexity of XML make
>its canonicalization a challenging problem although a good
>canonical form is necessary for robust and secure digital
>signatures over XML. This talk will give an overview of the
>current standards and continuing work on XML
>canonicaliztion, signatures, encryption, and key management.
>
>Free Event!
>Date: Wednesday, August 14, 2002
>Time: 7:00 PM - 8:30 PM
>Location: Microsoft's Waltham, Massachusetts Office
>http://www.bostondot.net/
>________________________________________________________
>Rational User Conference 2002
>Join Addison-Wesley authors Alistair Cockburn, Bob
>Maksimchuck, Brian White, Doug Rosenberg, Eric Naiburg,
>Grady Booch, Ivar Jacobson, James Rumbaugh, Kurt Bittner,
>Murray Cantor, Philippe Kruchten, Terry Quatrani, Walker
>Royce, Peter Eeles, Wojtek Kozaczynski, Kelli Houston, Paul
>Reed, and Ellen Gottesdiener at RUC, a resource for software
>development professionals.
>
>August 18-22, 2002
>Orlando, Florida
>http://www.rational.com/events/ruc/index2.jsp
>________________________________________________________
>Join our DevelopMentor Series authors at the C# Summer Camp.
>Pack your gear, head to the Microsoft Campus in Redmond, and
>be part of the .NET community at this week-long training
>event. C# Summer Camp is sure to be an intense learning
>experience, spiked with lots of fun.
>
>August 19-23, 2002
>Microsoft Campus in Redmond
>Redmond, WA
>http://www.develop.com/conferences/csharpsummer/csharpsummer.aspx
>________________________________________________________
>All Addison-Wesley titles are available at a discount for
>bulk purchases by corporations, organizations, institutions,
>and the government. To place an order or to inquire about
>further information, please contact the Addison-Wesley
>Corporate, Government, and Special Sales Department.
>Phone:1-800-238-9682
>Fax: 781-942-1621 or via e-mail:
>[EMAIL PROTECTED]
><mailto:[EMAIL PROTECTED]>
>
>If you are interested in adopting our books for a class, please visit our 
>sales representatives page at:
>http://www.awlonline.com/RepLocator


---
Dustin Puryear <[EMAIL PROTECTED]>
Puryear Information Technology
UNIX, Windows, and IT Consulting
http://www.puryear-it.com



Reply via email to