>To: [EMAIL PROTECTED]
>From: [EMAIL PROTECTED]
>Date: Tue, 5 Nov 2002 17:23:09 -0500
>Subject: Addison-Wesley Book Announcement
>
>This announcement is sent to all subscribers of the
>Addison-Wesley All Subjects mailing list. To unsubscribe
>from this newsletter, please go to:
>http://www.awprofessional.com/member/subscriptions.asp
>If you are not logged in, please do so, then click on
>"Manage Newsletters", and remove the check in the
>Newsletter box. If you do not have a password, or can't
>remember your password, enter your email address in the
>Forgot Your Password area and your password will be sent
>to you.
>
>The following titles have just published by the
>Addison-Wesley Professional Publishing Group.
>________________________________________________________
>OBJECT DESIGN - Rebecca Wirfs-Brock, Alan McKean
>ESSENTIAL .NET, VOLUME 1 - Don Box, Chris Sells
>C++ TEMPLATES - David Vandevoorde, Nicolai M. Josuttis
>SOFTWARE CONFIGURATION MANAGEMENT PATTERNS - Stephen P.
>Berczuk, Brad Appleton
>PRAGMATIC ADO.NET - Shawn Wildermuth
>COMPONENT SOFTWARE, SECOND EDITION - Clemens Szyperski
>PRACTICAL STORAGE AREA NETWORKING - Daniel Pollack
>PROCESS QUALITY ASSURANCE FOR UML-BASED PROJECTS - Bhuvan
>Unhelkar
>PROGRAMMING IN THE .NET ENVIRONMENT - Damien Watkins, Mark
>Hammond, Brad Abrams
>PROCESSING XML WITH JAVA - Elliotte Rusty Harold
>JUNIPER NETWORKS REFERENCE GUIDE - Thomas M. II Thomas,
>Doris Pavlichek, Lawrence H. Dwyer III, Rajah Chowbay, Wayne
>W. Downing III, James Sonderegger
>iSCSI - John L. Hufferd
>C++ NETWORK PROGRAMMING, VOLUME 2 - Douglas C. Schmidt,
>Stephen D. Huston
>REAL WEB PROJECT MANAGEMENT - Thomas J. Shelford, Gregory A.
>Remillard
>TESTING EXTREME PROGRAMMING - Lisa Crispin, Tip House
>FACTS AND FALLACIES OF SOFTWARE ENGINEERING - Robert L.
>Glass
>INFINIBAND NETWORK ARCHITECTURE - Mindshare, Inc., Tom
>Shanley
>UNDERSTANDING PKI, SECOND EDITION - Carlisle Adams, Steve
>Lloyd
>PATTERNS OF ENTERPRISE APPLICATION ARCHITECTURE - Martin
>Fowler
>TEST-DRIVEN DEVELOPMENT - Kent Beck
>________________________________________________________
>Object Design
>Rebecca Wirfs-Brock, Alan McKean
>http://www.awprofessional.com/titles/0201379430
>
>If you create software using object-oriented languages and
>tools, then Responsibility-Driven Design has likely
>influenced your work. For over ten years
>Responsibility-Driven Design methodology has been the
>standard bearer of the behavioral approach to designing
>object-oriented software. Object Design: Roles,
>Responsibilities, and Collaborations focuses on the practice
>of designing objects as integral members of a community
>where each object has specific roles and responsibilities.
>The authors present the latest practices and techniques of
>Responsibility-Driven Design and show how you can apply them
>as you develop modern object-based applications.
>_________________________________
>Essential .NET, Volume 1: The Common Language Runtime
>Don Box, Chris Sells
>http://www.awprofessional.com/titles/0201734117
>
>Essential .NET, Volume 1, provides everything developers
>need to take full advantage of the power of Microsoft .NET.
>This book describes, in depth, the glue of the .NET
>Framework: the Common Language Runtime (CLR). Box and Sells
>explain the inner workings of the CLR-the rationale behind
>its design, the problems it solves, and the role of type in
>CLR programming-and show readers how to build better
>applications using the .NET Framework while gaining a more
>complete understanding of how the CLR works.
>_________________________________
>C++ Templates: The Complete Guide
>David Vandevoorde, Nicolai M. Josuttis
>http://www.awprofessional.com/titles/0201734842
>
>Templates are among the most powerful features of C++, but
>they are too often neglected, misunderstood, and misused.
>C++ Templates: The Complete Guide provides software
>architects and engineers with a clear understanding of why,
>when, and how to use templates to build and maintain
>cleaner, faster, and smarter software more efficiently. C++
>Templates begins with an insightful tutorial on basic
>concepts and language features. The remainder of the book
>serves as a comprehensive reference, focusing first on
>language details, then on a wide range of coding techniques,
>and finally on advanced applications for templates.
>_________________________________
>Software Configuration Management Patterns: Effective
>Teamwork, Practical Integration
>Stephen P. Berczuk, Brad Appleton
>http://www.awprofessional.com/titles/0201741172
>
>Effective software configuration management (SCM) strategies
>promote a healthy, team-oriented culture that produces
>better software. Software Configuration Management Patterns
>alleviates software engineers' most common concerns about
>software configuration management-perceived rigidity and an
>overemphasis on process. Through the use of patterns, the
>authors show that a properly managed workflow can avert
>delays, morale problems, and cost overruns. The patterns
>approach illustrates how SCM can be easily and successfully
>applied in small- to mid-size organizations. By learning how
>these patterns relate to each other, readers can avoid
>common mistakes that too often result in frustrated
>developers and reduced productivity.
>_________________________________
>Pragmatic ADO.NET: Data Access for the Internet World
>Shawn Wildermuth
>http://www.awprofessional.com/titles/0201745682
>
>Pragmatic ADO.NET is a practical guide to using the first
>data access services designed specifically for Web-based
>applications. This tutorial provides developers with a clear
>introduction to ADO.NET, and gives practical solutions for
>using it effectively. The book begins with a concise history
>of Microsoft's Universal Data Access strategy and the
>evolution of technology that has led us to ADO.NET. The core
>of the book demonstrates how to use ADO.NET to interact with
>databases and the rest of the .NET framework. In addition,
>readers learn by example the best practices for using
>ADO.NET to build scalable, high-performance systems.
>_________________________________
>Component Software, Second Edition: Beyond Object-Oriented
>Programming
>Clemens Szyperski
>http://www.awprofessional.com/titles/0201745720
>
>There has been an explosive growth in component software
>technologies since the first edition of this classic book
>was published. The advent of EJB, J2EE, CORBA 3, COM+ and
>the .NET framework are evidence of a maturing market in
>component software that goes 'beyond OOP'. Clemens Szyperski
>gives us an objective survey of the component landscape,
>blended with unique insights into the market forces that
>influence deployment and in-depth coverage of real problems
>and their solutions.
>_________________________________
>Practical Storage Area Networking
>Daniel Pollack
>http://www.awprofessional.com/titles/0201750414
>
>The rate at which information is produced and shared is
>growing at an astounding pace. As a result, the size,
>complexity-and importance-of storage systems has increased
>dramatically. The implementation of a Storage Area Network
>(SAN) allows system and storage administrators to ensure the
>consistent storage and retrieval of data on a network. With
>its unique focus on the nuts and bolts of SAN construction
>and operation, Practical Storage Area Networking explores
>the full technology, from the more common Fibre Channel SANs
>to cutting edge IP SANs, and beyond. This book examines SAN
>design, integration, maintenance, and security, highlighting
>best practices for each. Its close attention to the ideal
>practices of SAN implementation provides SAN builders with
>an invaluable frame of reference that bridges the gap
>between concept and deployment.
>_________________________________
>Process Quality Assurance for UML-Based Projects
>Bhuvan Unhelkar
>http://www.awprofessional.com/titles/0201758210
>
>This highly acclaimed book demonstrates how the Unified
>Modeling Language (UML) can be used within a process
>framework to help reduce complexity, clarify requirements,
>and add structure to project management in order to yield
>software quality here and now. Process Quality Assurance for
>UML-Based Projects focuses on the crucial process aspect of
>software quality. In an easy, entertaining way, the author
>outlines common-sense strategies for determining the
>applicability of UML to a project, creating and managing
>project teams, identifying levels of quality standards,
>applying quality techniques, and estimating and testing in
>UML-based projects.
>_________________________________
>Programming in the .NET Environment
>Damien Watkins, Mark Hammond, Brad Abrams
>http://www.awprofessional.com/titles/0201770180
>
>Programming in the .NET Environment is the software
>developer's guide to the .NET Framework. Authors Damien
>Watkins, Mark Hammond, and Brad Abrams describe Microsoft's
>vision for distributed component-based systems development,
>and then show programmers how to develop software that
>utilizes the facilities of the .NET Framework. Readers learn
>how to author components, libraries, and frameworks that not
>only exploit the capabilities of the .NET Framework but also
>integrate seamlessly into that environment. This book begins
>with an introduction to the goals and architecture of the
>NET Framework. Readers will then gain a thorough
>understanding of the type, metadata, and execution systems;
>learn how to build and deploy their components within .NET
>assemblies; and gain an understanding of the facilities of
>the Framework Class Libraries.
>_________________________________
>Processing XML with Java: A Guide to SAX, DOM, JDOM, JAXP,
>and TrAX
>Elliotte Rusty Harold
>http://www.awprofessional.com/titles/0201771861
>
>Written for Java programmers who want to integrate XML into
>their systems, this practical, comprehensive guide and
>reference shows how to process XML documents with the Java
>programming language. It leads experienced Java developers
>beyond the basics of XML, allowing them to design
>sophisticated XML applications and parse complicated
>documents. Processing XML with Java(tm) provides a brief
>review of XML fundamentals, including XML syntax; DTDs,
>schemas, and validity; stylesheets; and the XML protocols
>XML-RPC, SOAP, and RSS. The core of the book comprises
>in-depth discussions on the key XML APIs Java programmers
>must use to create and manipulate XML files with Java. These
>include the Simple API for XML (SAX), the Document Object
>Model (DOM), and JDOM (a Java native API). In addition, the
>book covers many useful supplements to these core APIs,
>including XPath, XSLT, TrAX, and JAXP.
>_________________________________
>Juniper Networks Reference Guide: JUNOS  Routing,
>Configuration, and Architecture
>Thomas M. II Thomas, Doris Pavlichek, Lawrence H. Dwyer III,
>Rajah Chowbay, Wayne W. Downing III, James Sonderegger
>http://www.awprofessional.com/titles/0201775921
>
>Juniper Networks(r) Reference Guide is the ideal
>implementation guide to the Juniper Networks(r) family of
>Internet routers and the network operating system JUNOS(tm).
>With concise explanations of internetworking theory and
>detailed examples, this book teaches readers how to
>configure, deploy, and maintain their Juniper Networks
>routing solutions. Experienced JUNOS engineers will benefit
>from the tested configuration examples, which they can apply
>to their own networks. Those new to the JUNOS Internet
>software will find everything they need to pass the Juniper
>Networks JNCIS(tm) certification exam.
>_________________________________
>iSCSI: The Universal Storage Connection
>John L. Hufferd
>http://www.awprofessional.com/titles/020178419X
>
>iSCSI: The Universal Storage Connection is an informative
>overview and in-depth guide to the emerging iSCSI standard,
>the technology that enables data storage, access, and
>management over networks, intranets, and the Internet. The
>iSCSI protocol reduces the total cost of ownership of shared
>storage solutions and enables an organization to tie
>together disparate systems and data, including both server
>class systems and laptop and desktop systems. Numerous
>leading technology companies, including IBM(r), Cisco
>Systems(r), and Intel(r), are currently supporting iSCSI
>initiatives. Written for network and data storage
>professionals, this comprehensive book introduces iSCSI and
>explores its growing role within the data storage industry.
>_________________________________
>C++ Network Programming, Volume 2: Systematic Reuse with ACE
>and Frameworks
>Douglas C. Schmidt, Stephen D. Huston
>http://www.awprofessional.com/titles/0201795256
>
>C++ Network Programming, Volume 2, focuses on ACE
>frameworks, providing thorough coverage of the concepts,
>patterns, and usage rules that form their structure. This
>book is a practical guide to designing object-oriented
>frameworks and shows developers how to apply frameworks to
>concurrent networked applications. C++ Networking, Volume 1,
>introduced ACE and the wrapper facades, which are basic
>network computing ingredients. Volume 2 explains how
>frameworks build on wrapper facades to provide higher-level
>communication services.
>_________________________________
>Real Web Project Management: Case Studies and Best Practices
>from the Trenches
>Thomas J. Shelford, Gregory A. Remillard
>http://www.awprofessional.com/titles/0321112555
>
>The process of designing and building today's dynamic Web
>applications comes with a host of challenges not typically
>solved by traditional project management methodologies. A
>wealth of practical resources, Real Web Project Management:
>Case Studies and Best Practices from the Trenches is a book
>of solutions for designing, managing, and delivering
>virtually any type of Web-based project under even the most
>challenging of conditions.  Based on solutions implemented
>from actual, real-world scenarios, this practical book
>offers a complete road map for navigating every facet of a
>contemporary Web project. Filled with tips and techniques,
>it provides practices to implement and pitfalls to avoid to
>ensure success.
>_________________________________
>Testing Extreme Programming
>Lisa Crispin, Tip House
>http://www.awprofessional.com/titles/0321113551
>
>Testing Extreme Programming is a practical tutorial that
>gives software builders a lucid understanding of this
>important aspect of development. This book demonstrates how
>testing is central to the XP project, clearly spelling out
>what testing should be done and when and how it should be
>performed. The authors teach by example, and readers will be
>able to improve their knowledge of the testing process by
>completing the book's exercises. Many software engineers
>have dismissed XP as a throw-out-the-rulebook, anything-goes
>technique. It isn't. As this book shows, XP is a deliberate
>and disciplined approach to software development. Many
>software engineers have reaped the benefits of this agile
>methodology because its emphasis on testing eliminates much
>of the risk inherent in software projects. XP helps
>developers produce software on time, under budget, and at a
>higher quality level.
>_________________________________
>Facts and Fallacies of Software Engineering
>Robert L. Glass
>http://www.awprofessional.com/titles/0321117425
>
>The practice of building software is a "new kid on the
>block" technology. Though it may not seem this way for those
>who have been in the field for most of their careers, in the
>overall scheme of professions, software builders are
>relative "newbies." In the short history of the software
>field, a lot of facts have been identified, and a lot of
>fallacies promulgated. Those facts and fallacies are what
>this book is about.
>_________________________________
>InfiniBand Network Architecture
>Mindshare, Inc., Tom Shanley
>http://www.awprofessional.com/titles/0321117654
>
>InfiniBand is a new networking specification that
>revolutionizes the interconnect between processor and IO
>subsystems in the datacenter environment. InfiniBand
>delivers better performance, flexibility, and scalability
>than alternative network architectures. InfiniBand Network
>Architecture is a comprehensive guide to InfiniBand
>technology. It describes all hardware and software
>operational aspects of InfiniBand networking. Using the same
>building-block approach found in all of the books in the PC
>System Architecture Series, this book details important
>concepts relating to the design and implementation of data
>networks using this emerging standard. A broad overview of
>the InfiniBand specification is provided, as well as
>detailed descriptions of all the architecture's operational
>characteristics.
>_________________________________
>Understanding PKI, Second Edition: Concepts, Standards, and
>Deployment Considerations
>Carlisle Adams, Steve Lloyd
>http://www.awprofessional.com/titles/0672323915
>
>Understanding PKI, Second Edition, is both a guide for
>software engineers involved in PKI development and a
>readable resource for technical managers responsible for
>their organization's security policies and investments. It
>is a comprehensive primer to the latest in PKI technology
>and how it is used today. Taking a non-vendor-specific
>approach, this book explains fundamental concepts, examines
>emerging standards, and discusses deployment considerations
>and strategies that effect success. This second edition has
>been updated throughout to incorporate all of the most
>recent developments in the PKI field. Two new chapters have
>been added to address the use of PKI in the real world and
>to explore the technology's future.
>_________________________________
>Patterns of Enterprise Application Architecture
>Martin Fowler
>http://www.awprofessional.com/titles/0321127420
>
>Patterns of Enterprise Application Architecture is written
>in direct response to the stiff challenges that face
>enterprise application developers. The author, noted
>object-oriented designer Martin Fowler, noticed that despite
>changes in technology--from Smalltalk to CORBA to Java to
>NET--the same basic design ideas can be adapted and applied
>to solve common problems. With the help of an expert group
>of contributors, Martin distills over forty recurring
>solutions into patterns. The result is an indispensable
>handbook of solutions that are applicable to any enterprise
>application platform.
>_________________________________
>Test-Driven Development: By Example
>Kent Beck
>http://www.awprofessional.com/titles/0321146530
>
>Clean code that works--now. This is the seeming
>contradiction that lies behind much of the pain of
>programming. Test-driven development replies to this
>contradiction with a paradox--test the program before you
>write it. A new idea? Not at all. Since the dawn of
>computing, programmers have been specifying the inputs and
>outputs before programming precisely. Test-driven
>development (TDD) takes this age-old idea, mixes it with
>modern languages and programming environments, and cooks up
>a tasty stew guaranteed to satisfy your appetite for clean
>code that works--now. This book follows two test-driven
>development projects from start to finish, illustrating
>techniques programmers can use to easily and dramatically
>increase the quality of their work.
>________________________________________________________
>Rick Smith, author of Authentication: From Passwords to
>Public Keys is giving a talk on Authentication at the CSI
>29th Annual Computer Security Conference and Exhibition on
>November 11 in Chicago.
>
>http://www.gocsi.com/
>________________________________________________________
>All Addison-Wesley titles are available at a discount for
>bulk purchases by corporations, organizations, institutions,
>and the government. To place an order or to inquire about
>further information, please contact the Addison-Wesley
>Corporate, Government, and Special Sales Department. Phone:
>1-800-238-9682 or via e-mail: [EMAIL PROTECTED]
>
>If you are interested in adopting our books for a class,
>please visit our sales representatives page at:
>http://www.awlonline.com/RepLocator


---
Dustin Puryear <[EMAIL PROTECTED]>
Puryear Information Technology
Windows, UNIX, and IT Consulting
http://www.puryear-it.com



Reply via email to