>To: [EMAIL PROTECTED] >From: [EMAIL PROTECTED] >Date: Tue, 5 Nov 2002 17:23:09 -0500 >Subject: Addison-Wesley Book Announcement > >This announcement is sent to all subscribers of the >Addison-Wesley All Subjects mailing list. To unsubscribe >from this newsletter, please go to: >http://www.awprofessional.com/member/subscriptions.asp >If you are not logged in, please do so, then click on >"Manage Newsletters", and remove the check in the >Newsletter box. If you do not have a password, or can't >remember your password, enter your email address in the >Forgot Your Password area and your password will be sent >to you. > >The following titles have just published by the >Addison-Wesley Professional Publishing Group. >________________________________________________________ >OBJECT DESIGN - Rebecca Wirfs-Brock, Alan McKean >ESSENTIAL .NET, VOLUME 1 - Don Box, Chris Sells >C++ TEMPLATES - David Vandevoorde, Nicolai M. Josuttis >SOFTWARE CONFIGURATION MANAGEMENT PATTERNS - Stephen P. >Berczuk, Brad Appleton >PRAGMATIC ADO.NET - Shawn Wildermuth >COMPONENT SOFTWARE, SECOND EDITION - Clemens Szyperski >PRACTICAL STORAGE AREA NETWORKING - Daniel Pollack >PROCESS QUALITY ASSURANCE FOR UML-BASED PROJECTS - Bhuvan >Unhelkar >PROGRAMMING IN THE .NET ENVIRONMENT - Damien Watkins, Mark >Hammond, Brad Abrams >PROCESSING XML WITH JAVA - Elliotte Rusty Harold >JUNIPER NETWORKS REFERENCE GUIDE - Thomas M. II Thomas, >Doris Pavlichek, Lawrence H. Dwyer III, Rajah Chowbay, Wayne >W. Downing III, James Sonderegger >iSCSI - John L. Hufferd >C++ NETWORK PROGRAMMING, VOLUME 2 - Douglas C. Schmidt, >Stephen D. Huston >REAL WEB PROJECT MANAGEMENT - Thomas J. Shelford, Gregory A. >Remillard >TESTING EXTREME PROGRAMMING - Lisa Crispin, Tip House >FACTS AND FALLACIES OF SOFTWARE ENGINEERING - Robert L. >Glass >INFINIBAND NETWORK ARCHITECTURE - Mindshare, Inc., Tom >Shanley >UNDERSTANDING PKI, SECOND EDITION - Carlisle Adams, Steve >Lloyd >PATTERNS OF ENTERPRISE APPLICATION ARCHITECTURE - Martin >Fowler >TEST-DRIVEN DEVELOPMENT - Kent Beck >________________________________________________________ >Object Design >Rebecca Wirfs-Brock, Alan McKean >http://www.awprofessional.com/titles/0201379430 > >If you create software using object-oriented languages and >tools, then Responsibility-Driven Design has likely >influenced your work. For over ten years >Responsibility-Driven Design methodology has been the >standard bearer of the behavioral approach to designing >object-oriented software. Object Design: Roles, >Responsibilities, and Collaborations focuses on the practice >of designing objects as integral members of a community >where each object has specific roles and responsibilities. >The authors present the latest practices and techniques of >Responsibility-Driven Design and show how you can apply them >as you develop modern object-based applications. >_________________________________ >Essential .NET, Volume 1: The Common Language Runtime >Don Box, Chris Sells >http://www.awprofessional.com/titles/0201734117 > >Essential .NET, Volume 1, provides everything developers >need to take full advantage of the power of Microsoft .NET. >This book describes, in depth, the glue of the .NET >Framework: the Common Language Runtime (CLR). Box and Sells >explain the inner workings of the CLR-the rationale behind >its design, the problems it solves, and the role of type in >CLR programming-and show readers how to build better >applications using the .NET Framework while gaining a more >complete understanding of how the CLR works. >_________________________________ >C++ Templates: The Complete Guide >David Vandevoorde, Nicolai M. Josuttis >http://www.awprofessional.com/titles/0201734842 > >Templates are among the most powerful features of C++, but >they are too often neglected, misunderstood, and misused. >C++ Templates: The Complete Guide provides software >architects and engineers with a clear understanding of why, >when, and how to use templates to build and maintain >cleaner, faster, and smarter software more efficiently. C++ >Templates begins with an insightful tutorial on basic >concepts and language features. The remainder of the book >serves as a comprehensive reference, focusing first on >language details, then on a wide range of coding techniques, >and finally on advanced applications for templates. >_________________________________ >Software Configuration Management Patterns: Effective >Teamwork, Practical Integration >Stephen P. Berczuk, Brad Appleton >http://www.awprofessional.com/titles/0201741172 > >Effective software configuration management (SCM) strategies >promote a healthy, team-oriented culture that produces >better software. Software Configuration Management Patterns >alleviates software engineers' most common concerns about >software configuration management-perceived rigidity and an >overemphasis on process. Through the use of patterns, the >authors show that a properly managed workflow can avert >delays, morale problems, and cost overruns. The patterns >approach illustrates how SCM can be easily and successfully >applied in small- to mid-size organizations. By learning how >these patterns relate to each other, readers can avoid >common mistakes that too often result in frustrated >developers and reduced productivity. >_________________________________ >Pragmatic ADO.NET: Data Access for the Internet World >Shawn Wildermuth >http://www.awprofessional.com/titles/0201745682 > >Pragmatic ADO.NET is a practical guide to using the first >data access services designed specifically for Web-based >applications. This tutorial provides developers with a clear >introduction to ADO.NET, and gives practical solutions for >using it effectively. The book begins with a concise history >of Microsoft's Universal Data Access strategy and the >evolution of technology that has led us to ADO.NET. The core >of the book demonstrates how to use ADO.NET to interact with >databases and the rest of the .NET framework. In addition, >readers learn by example the best practices for using >ADO.NET to build scalable, high-performance systems. >_________________________________ >Component Software, Second Edition: Beyond Object-Oriented >Programming >Clemens Szyperski >http://www.awprofessional.com/titles/0201745720 > >There has been an explosive growth in component software >technologies since the first edition of this classic book >was published. The advent of EJB, J2EE, CORBA 3, COM+ and >the .NET framework are evidence of a maturing market in >component software that goes 'beyond OOP'. Clemens Szyperski >gives us an objective survey of the component landscape, >blended with unique insights into the market forces that >influence deployment and in-depth coverage of real problems >and their solutions. >_________________________________ >Practical Storage Area Networking >Daniel Pollack >http://www.awprofessional.com/titles/0201750414 > >The rate at which information is produced and shared is >growing at an astounding pace. As a result, the size, >complexity-and importance-of storage systems has increased >dramatically. The implementation of a Storage Area Network >(SAN) allows system and storage administrators to ensure the >consistent storage and retrieval of data on a network. With >its unique focus on the nuts and bolts of SAN construction >and operation, Practical Storage Area Networking explores >the full technology, from the more common Fibre Channel SANs >to cutting edge IP SANs, and beyond. This book examines SAN >design, integration, maintenance, and security, highlighting >best practices for each. Its close attention to the ideal >practices of SAN implementation provides SAN builders with >an invaluable frame of reference that bridges the gap >between concept and deployment. >_________________________________ >Process Quality Assurance for UML-Based Projects >Bhuvan Unhelkar >http://www.awprofessional.com/titles/0201758210 > >This highly acclaimed book demonstrates how the Unified >Modeling Language (UML) can be used within a process >framework to help reduce complexity, clarify requirements, >and add structure to project management in order to yield >software quality here and now. Process Quality Assurance for >UML-Based Projects focuses on the crucial process aspect of >software quality. In an easy, entertaining way, the author >outlines common-sense strategies for determining the >applicability of UML to a project, creating and managing >project teams, identifying levels of quality standards, >applying quality techniques, and estimating and testing in >UML-based projects. >_________________________________ >Programming in the .NET Environment >Damien Watkins, Mark Hammond, Brad Abrams >http://www.awprofessional.com/titles/0201770180 > >Programming in the .NET Environment is the software >developer's guide to the .NET Framework. Authors Damien >Watkins, Mark Hammond, and Brad Abrams describe Microsoft's >vision for distributed component-based systems development, >and then show programmers how to develop software that >utilizes the facilities of the .NET Framework. Readers learn >how to author components, libraries, and frameworks that not >only exploit the capabilities of the .NET Framework but also >integrate seamlessly into that environment. This book begins >with an introduction to the goals and architecture of the >NET Framework. Readers will then gain a thorough >understanding of the type, metadata, and execution systems; >learn how to build and deploy their components within .NET >assemblies; and gain an understanding of the facilities of >the Framework Class Libraries. >_________________________________ >Processing XML with Java: A Guide to SAX, DOM, JDOM, JAXP, >and TrAX >Elliotte Rusty Harold >http://www.awprofessional.com/titles/0201771861 > >Written for Java programmers who want to integrate XML into >their systems, this practical, comprehensive guide and >reference shows how to process XML documents with the Java >programming language. It leads experienced Java developers >beyond the basics of XML, allowing them to design >sophisticated XML applications and parse complicated >documents. Processing XML with Java(tm) provides a brief >review of XML fundamentals, including XML syntax; DTDs, >schemas, and validity; stylesheets; and the XML protocols >XML-RPC, SOAP, and RSS. The core of the book comprises >in-depth discussions on the key XML APIs Java programmers >must use to create and manipulate XML files with Java. These >include the Simple API for XML (SAX), the Document Object >Model (DOM), and JDOM (a Java native API). In addition, the >book covers many useful supplements to these core APIs, >including XPath, XSLT, TrAX, and JAXP. >_________________________________ >Juniper Networks Reference Guide: JUNOS Routing, >Configuration, and Architecture >Thomas M. II Thomas, Doris Pavlichek, Lawrence H. Dwyer III, >Rajah Chowbay, Wayne W. Downing III, James Sonderegger >http://www.awprofessional.com/titles/0201775921 > >Juniper Networks(r) Reference Guide is the ideal >implementation guide to the Juniper Networks(r) family of >Internet routers and the network operating system JUNOS(tm). >With concise explanations of internetworking theory and >detailed examples, this book teaches readers how to >configure, deploy, and maintain their Juniper Networks >routing solutions. Experienced JUNOS engineers will benefit >from the tested configuration examples, which they can apply >to their own networks. Those new to the JUNOS Internet >software will find everything they need to pass the Juniper >Networks JNCIS(tm) certification exam. >_________________________________ >iSCSI: The Universal Storage Connection >John L. Hufferd >http://www.awprofessional.com/titles/020178419X > >iSCSI: The Universal Storage Connection is an informative >overview and in-depth guide to the emerging iSCSI standard, >the technology that enables data storage, access, and >management over networks, intranets, and the Internet. The >iSCSI protocol reduces the total cost of ownership of shared >storage solutions and enables an organization to tie >together disparate systems and data, including both server >class systems and laptop and desktop systems. Numerous >leading technology companies, including IBM(r), Cisco >Systems(r), and Intel(r), are currently supporting iSCSI >initiatives. Written for network and data storage >professionals, this comprehensive book introduces iSCSI and >explores its growing role within the data storage industry. >_________________________________ >C++ Network Programming, Volume 2: Systematic Reuse with ACE >and Frameworks >Douglas C. Schmidt, Stephen D. Huston >http://www.awprofessional.com/titles/0201795256 > >C++ Network Programming, Volume 2, focuses on ACE >frameworks, providing thorough coverage of the concepts, >patterns, and usage rules that form their structure. This >book is a practical guide to designing object-oriented >frameworks and shows developers how to apply frameworks to >concurrent networked applications. C++ Networking, Volume 1, >introduced ACE and the wrapper facades, which are basic >network computing ingredients. Volume 2 explains how >frameworks build on wrapper facades to provide higher-level >communication services. >_________________________________ >Real Web Project Management: Case Studies and Best Practices >from the Trenches >Thomas J. Shelford, Gregory A. Remillard >http://www.awprofessional.com/titles/0321112555 > >The process of designing and building today's dynamic Web >applications comes with a host of challenges not typically >solved by traditional project management methodologies. A >wealth of practical resources, Real Web Project Management: >Case Studies and Best Practices from the Trenches is a book >of solutions for designing, managing, and delivering >virtually any type of Web-based project under even the most >challenging of conditions. Based on solutions implemented >from actual, real-world scenarios, this practical book >offers a complete road map for navigating every facet of a >contemporary Web project. Filled with tips and techniques, >it provides practices to implement and pitfalls to avoid to >ensure success. >_________________________________ >Testing Extreme Programming >Lisa Crispin, Tip House >http://www.awprofessional.com/titles/0321113551 > >Testing Extreme Programming is a practical tutorial that >gives software builders a lucid understanding of this >important aspect of development. This book demonstrates how >testing is central to the XP project, clearly spelling out >what testing should be done and when and how it should be >performed. The authors teach by example, and readers will be >able to improve their knowledge of the testing process by >completing the book's exercises. Many software engineers >have dismissed XP as a throw-out-the-rulebook, anything-goes >technique. It isn't. As this book shows, XP is a deliberate >and disciplined approach to software development. Many >software engineers have reaped the benefits of this agile >methodology because its emphasis on testing eliminates much >of the risk inherent in software projects. XP helps >developers produce software on time, under budget, and at a >higher quality level. >_________________________________ >Facts and Fallacies of Software Engineering >Robert L. Glass >http://www.awprofessional.com/titles/0321117425 > >The practice of building software is a "new kid on the >block" technology. Though it may not seem this way for those >who have been in the field for most of their careers, in the >overall scheme of professions, software builders are >relative "newbies." In the short history of the software >field, a lot of facts have been identified, and a lot of >fallacies promulgated. Those facts and fallacies are what >this book is about. >_________________________________ >InfiniBand Network Architecture >Mindshare, Inc., Tom Shanley >http://www.awprofessional.com/titles/0321117654 > >InfiniBand is a new networking specification that >revolutionizes the interconnect between processor and IO >subsystems in the datacenter environment. InfiniBand >delivers better performance, flexibility, and scalability >than alternative network architectures. InfiniBand Network >Architecture is a comprehensive guide to InfiniBand >technology. It describes all hardware and software >operational aspects of InfiniBand networking. Using the same >building-block approach found in all of the books in the PC >System Architecture Series, this book details important >concepts relating to the design and implementation of data >networks using this emerging standard. A broad overview of >the InfiniBand specification is provided, as well as >detailed descriptions of all the architecture's operational >characteristics. >_________________________________ >Understanding PKI, Second Edition: Concepts, Standards, and >Deployment Considerations >Carlisle Adams, Steve Lloyd >http://www.awprofessional.com/titles/0672323915 > >Understanding PKI, Second Edition, is both a guide for >software engineers involved in PKI development and a >readable resource for technical managers responsible for >their organization's security policies and investments. It >is a comprehensive primer to the latest in PKI technology >and how it is used today. Taking a non-vendor-specific >approach, this book explains fundamental concepts, examines >emerging standards, and discusses deployment considerations >and strategies that effect success. This second edition has >been updated throughout to incorporate all of the most >recent developments in the PKI field. Two new chapters have >been added to address the use of PKI in the real world and >to explore the technology's future. >_________________________________ >Patterns of Enterprise Application Architecture >Martin Fowler >http://www.awprofessional.com/titles/0321127420 > >Patterns of Enterprise Application Architecture is written >in direct response to the stiff challenges that face >enterprise application developers. The author, noted >object-oriented designer Martin Fowler, noticed that despite >changes in technology--from Smalltalk to CORBA to Java to >NET--the same basic design ideas can be adapted and applied >to solve common problems. With the help of an expert group >of contributors, Martin distills over forty recurring >solutions into patterns. The result is an indispensable >handbook of solutions that are applicable to any enterprise >application platform. >_________________________________ >Test-Driven Development: By Example >Kent Beck >http://www.awprofessional.com/titles/0321146530 > >Clean code that works--now. This is the seeming >contradiction that lies behind much of the pain of >programming. Test-driven development replies to this >contradiction with a paradox--test the program before you >write it. A new idea? Not at all. Since the dawn of >computing, programmers have been specifying the inputs and >outputs before programming precisely. Test-driven >development (TDD) takes this age-old idea, mixes it with >modern languages and programming environments, and cooks up >a tasty stew guaranteed to satisfy your appetite for clean >code that works--now. This book follows two test-driven >development projects from start to finish, illustrating >techniques programmers can use to easily and dramatically >increase the quality of their work. >________________________________________________________ >Rick Smith, author of Authentication: From Passwords to >Public Keys is giving a talk on Authentication at the CSI >29th Annual Computer Security Conference and Exhibition on >November 11 in Chicago. > >http://www.gocsi.com/ >________________________________________________________ >All Addison-Wesley titles are available at a discount for >bulk purchases by corporations, organizations, institutions, >and the government. To place an order or to inquire about >further information, please contact the Addison-Wesley >Corporate, Government, and Special Sales Department. Phone: >1-800-238-9682 or via e-mail: [EMAIL PROTECTED] > >If you are interested in adopting our books for a class, >please visit our sales representatives page at: >http://www.awlonline.com/RepLocator
--- Dustin Puryear <[EMAIL PROTECTED]> Puryear Information Technology Windows, UNIX, and IT Consulting http://www.puryear-it.com
