>To: [EMAIL PROTECTED] >From: [EMAIL PROTECTED] >Date: Tue, 9 Jul 2002 10:29:55 -0500 >Subject: Addison-Wesley Book Announcement > >This announcement is sent to all subscribers of the >Addison-Wesley All Subjects mailing list. To unsubscribe from >this newsletter, please go to: >http://www.awprofessional.com/member/subscriptions.asp >If you are not logged in, please do so, then click on "Manage >Newsletters", and remove the check in the Newsletter >box. If you do not have a password, or can't remember your >password, enter your email address in the Forgot Your >Password area and your password will be sent to you. > >The following titles have just published by the Addison-Wesley >Professional Publishing Group. >________________________________________________________ >Python Programming with the Java Class Libraries - Richard >Hightower >Writers' Workshops & the Work of Making Things - Richard P. >Gabriel >Linux Kernel Programming, Third Edition - Michael Beck, >Harald Bohme, Mirko Dziadzka, Ulrich Kunitz, Robert Magnus, Claus >Schroter, Dirk Verworner >Database Administration: The Complete Guide to Practices and >Procedures - Craig S. Mullins >Pair Programming Illuminated - Laurie Williams, Robert >Kessler >Peer to Peer: Collaboration and Sharing over the Internet - >Bo Leuf >Advanced Linux Networking - Roderick W. Smith >Managing Information Security Risks: The OCTAVE Approach - >Christopher Alberts, Audrey Dorofee >________________________________________________________ >Python Programming with the Java Class Libraries: A >Tutorial for Building Web and Enterprise Applications with >Jython >Richard Hightower >http://www.awprofessional.com/titles/0201616165 > >This tutorial begins with coverage of some of the basics of >Python programming. Using plenty of skill-building exercises >and interactive programming sessions, the book will help >those new to programming develop an understanding of >concepts and practical techniques. For experienced >programmers, the book demonstrates Python's breadth of >capabilities and shows the ways that Python interfaces with >the Java APIs for professional application development. >_________________________________ >Writers' Workshops & the Work of Making Things: Patterns, >Poetry... >Richard P. Gabriel >http://www.awprofessional.com/titles/020172183X > >The writers' workshop provides creative writers with a >time-tested teaching and revision tool, and business and >technical professionals with a new and effective alternative >to impersonal peer reviews and scientific workshops. In this >intense, interactive, gift-based forum, writers help each >other hone their craft and improve individual pieces of >work. Writers' Workshops & the Work of Making Things describes in >detail how to conduct and participate in a successful >creative or technical workshop. >_________________________________ >Linux Kernel Programming, Third Edition >Michael Beck, Harald Bohme, Mirko Dziadzka, Ulrich Kunitz, >Robert Magnus, Claus Schroter, Dirk Verworner >http://www.awprofessional.com/titles/0201719754 > >This book is written for anybody who wants to learn more >about Linux. It explains the inner mechanisms of Linux from >process scheduling to memory management and file systems, >and reveals the structure of the kernel-the heart of the >Linux operating system. This book is targeted to all >developers who want to know how the Linux kernel interface >is implemented, and helps readers to understand the >operating system mechanisms better and to optimize Linux >applications. >_________________________________ >Database Administration: The Complete Guide to Practices and >Procedures >Craig S. Mullins >http://www.awprofessional.com/titles/0201741296 > >With Database Administration, database professionals now >have a comprehensive sourcebook of strategies for delivering >quality administration across today's challenging multi-DBMS >environments. Filled with practical guidelines and >strategies, this book provides the most comprehensive survey >available of the administrator's world for the existing or >aspiring database professional. Part tutorial and part >reference, Database Administration explains and examines >each of the components that comprise the discipline of >database administration. >_________________________________ >Pair Programming Illuminated >Laurie Williams, Robert Kessler >http://www.awprofessional.com/titles/0201745763 > >Pair programming is a simple, straightforward concept. Two >programmers work side-by-side at one computer, continuously >collaborating on the same design, algorithm, code, and test. >It allows two people to produce a higher quality of code >than that produced by the summation of their solitary >efforts. Written as instruction for team members and leaders >new to pair programming and as an improvement guide for >experienced pair programmers, Pair Programming Illuminated >explains both the principles underlying this method and its >best practices. >_________________________________ >Peer to Peer: Collaboration and Sharing over the Internet >Bo Leuf >http://www.awprofessional.com/titles/0201767325 > >Peer to Peer: Collaboration and Sharing over the Internet >provides the first comprehensive resource to help business >and communications professionals get started. >This complete handbook presents everything industry >professionals and interested users need to know. Readers >will find a clear overview of peer-to-peer concepts, >architectural models, and network applications; a practical >guide to installation and deployment; information on >specific protocols and tools; and discussions on legal and >security issues. >_________________________________ >Advanced Linux Networking >Roderick W. Smith >http://www.awprofessional.com/titles/0201774232 > >With an increasing number of networks and mission-critical >applications running on Linux, system and network >administrators must be able to do more than set up a server >and rely on its default configuration. Advanced Linux >Networking is designed to help you achieve a higher level of >competence. It focuses on powerful techniques and features >of Linux networking and provides you with the know-how you >need to improve server efficiency, enhance security, and >adapt to new requirements. >_________________________________ >Managing Information Security Risks: The OCTAVE Approach >Christopher Alberts, Audrey Dorofee >http://www.awprofessional.com/titles/0321118863 > >Information security requires far more than the latest tool >or technology. Organizations must understand exactly what >they are trying to protect--and why--before selecting >specific solutions. Security issues are complex and often >are rooted in organizational and business concerns. A >careful evaluation of security needs and risks in this >broader context must precede any security implementation to >insure that all the relevant, underlying problems are first >uncovered. OCTAVE(SM) enables any organization to develop >security priorities based on the organization's particular >business concerns. The approach provides a coherent >framework for aligning security actions with overall >objectives. >Managing Information Security Risks, written by the >developers of OCTAVE, is the complete and authoritative >guide to its principles and implementations. >______________________________________________________ >Java Developers Can Expect Something Better at >Addison-Wesley! > >Attention Java Developers: Are you an experienced programmer >looking for some Java fun? Are you new to the technology and >want to be part of the Java Community? Did you attend >JavaOne? Are you interested in receiving 10% off your next >purchase of Java titles in the Addison-Wesley Store? > >http://www.awprofessional.com/link.asp?link=news102 >______________________________________________________ >Join Addison-Wesley at the SIGGRAPH 2002 Conference in San >Antonio, TX. SIGGRAPH 2002 is the world's annual gathering >of the international computer graphics community, where the >digital future is defined and revealed. It is also the place >to learn from the experts, share solutions, and explore the >wealth of exciting new titles from Addison-Wesley. > >Stop by booth #17099 and check out these new books: >Shaping Web Usability: Interaction Design in Context by >Albert N. Badre >The Design of Sites: Patterns, Principles, and Processes for >Crafting a Customer-Centered Web Experience by Douglas K. >van Duyne, James A. Landay, and Jason I. Hong >.and more! > >July 23-25, 2002 >Henry B. Gonzalez Convention Center >San Antonio, TX >http://www.siggraph.org/s2002/flashhome.html >______________________________________________________ >Announcing a new book by Stuart McClure, Saumil Shah, and >Shreeraj Shah. > >Web Hacking: Attacks and Defense >Organizations using web-based business applications are >increasingly at risk. From the author of Hacking Exposed, >Web Hacking is a powerful guide to the latest in web attacks >and defense. You will come away with an increased >understanding of how web hacking occurs, as well as enhanced >skill at developing defenses against web attacks. > >"This book is a virtual battle plan that will help you >identify and eliminate threats that could take your web >site off line..." >-From the Foreword by Bill Boni, Chief Information Security >Officer, Motorola > >Web Hacking: Attacks and Defense >McClure, Stuart McClure, Saumil Shah, Shreeraj Shah >Publication Date: August 2, 2002 >ISBN 0-201-76176-9, Addison-Wesley >http://www.awprofessional.com >For web site defacement chapter email: [EMAIL PROTECTED] > >Advance copies available at Black Hat, >July 29-August 1, 2002 in Las Vegas, Nevada >including the author reception on Wednesday July >31, 2002 at 6:00 p.m. >http://www.blackhat.com >______________________________________________________ >Join Donald E. Eastlake, III, co-author of Secure XML: The >New Syntax for Signatures and Encryption, at the .NET User >Group of Greater Boston meeting on Wednesday, August 14 at >7:00PM. The event will take place at Microsoft's Waltham, >Massachusetts Office. > >Presentation summary: >XML is rapidly spreading as a standard for application-level >communication. As a result, there is increasing urgency in >providing facilities to assure the authenticity of and >provide confidentiality for XML structures including >sub-documents. The flexibility and complexity of XML make >its canonicalization a challenging problem although a good >canonical form is necessary for robust and secure digital >signatures over XML. This talk will give an overview of the >current standards and continuing work on XML >canonicaliztion, signatures, encryption, and key management. > >Free Event! >Date: Wednesday, August 14, 2002 >Time: 7:00 PM - 8:30 PM >Location: Microsoft's Waltham, Massachusetts Office >http://www.bostondot.net/ >________________________________________________________ >Rational User Conference 2002 >Join Addison-Wesley authors Alistair Cockburn, Bob >Maksimchuck, Brian White, Doug Rosenberg, Eric Naiburg, >Grady Booch, Ivar Jacobson, James Rumbaugh, Kurt Bittner, >Murray Cantor, Philippe Kruchten, Terry Quatrani, Walker >Royce, Peter Eeles, Wojtek Kozaczynski, Kelli Houston, Paul >Reed, and Ellen Gottesdiener at RUC, a resource for software >development professionals. > >August 18-22, 2002 >Orlando, Florida >http://www.rational.com/events/ruc/index2.jsp >________________________________________________________ >Join our DevelopMentor Series authors at the C# Summer Camp. >Pack your gear, head to the Microsoft Campus in Redmond, and >be part of the .NET community at this week-long training >event. C# Summer Camp is sure to be an intense learning >experience, spiked with lots of fun. > >August 19-23, 2002 >Microsoft Campus in Redmond >Redmond, WA >http://www.develop.com/conferences/csharpsummer/csharpsummer.aspx >________________________________________________________ >All Addison-Wesley titles are available at a discount for >bulk purchases by corporations, organizations, institutions, >and the government. To place an order or to inquire about >further information, please contact the Addison-Wesley >Corporate, Government, and Special Sales Department. >Phone:1-800-238-9682 >Fax: 781-942-1621 or via e-mail: >[EMAIL PROTECTED] ><mailto:[EMAIL PROTECTED]> > >If you are interested in adopting our books for a class, please visit our >sales representatives page at: >http://www.awlonline.com/RepLocator
--- Dustin Puryear <[EMAIL PROTECTED]> Puryear Information Technology UNIX, Windows, and IT Consulting http://www.puryear-it.com
