>Firewalls and Internet Security, Second Edition
>by William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin
>
>Guerrilla Oracle
>by Richard J. Staron
>
>Essential ASP.NET with Examples in C#
>by Fritz Onion
>
>Essential ASP.NET with Examples in Visual Basic .NET
>by Fritz Onion
>
>Business Intelligence Roadmap
>by Larissa T. Moss, Shaku Atre
>
>LDAP Directories Explained
>by Brian Arkills
>
>NET Web Services
>by Keith Ballinger
>
>Modernizing Legacy Systems
>by Robert C. Seacord, Daniel Plakosh, Grace A. Lewis
>
>Database Access with Visual Basic  .NET, Third Edition
>by Jeffrey P. McManus, Jackie Goldstein
>
>CMMI
>by Mary Beth Chrissis, Mike Konrad, Sandy Shrum
>
>Software Fortresses
>by Roger Sessions
>
>HyperTransport System Architecture
>by Mindshare, Inc., Jay Trodden, Don Anderson
>
>The Cg Tutorial
>by Randima Fernando, Mark J. Kilgard
>
>Beyond Software Architecture
>by Luke Hohmann
>
>LINUX and UNIX Programming Tools: A Primer for Software
>Developers
>by Syed Mansoor Sarwar, Khaled H. Al-Saqabi
>
>Learning SQL: A Step-by-Step Guide Using Access
>by Sikha Bagui, Richard Earp
>
>An Introduction to Parallel Computing: Design and Analysis
>of Algorithms
>by Ananth Grama, Vipin Kumar, Anshul Gupta, George Karypis
>
>Software Engineering and Computer Games
>by Rudy Rucker
>
>Operating Systems
>by Jean Bacon, Tim Harris
>
>Object Oriented Software Development Using Java, 2/E
>by Xiaoping Jia
>________________________________________________________
>Firewalls and Internet Security, Second Edition: Repelling
>the Wily Hacker
>William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin
>http://www.awprofessional.com/titles/020163466X
>
>"Firewalls and Internet Security teaches that state of mind;
>imparting in one book, security wisdom that would take most
>professionals years to acquire," Marcus Ranum, Firewall and
>IDS pioneer and consultant
>
>The best-selling first edition of Firewalls and Internet
>Security became the bible of Internet security by showing
>readers how to think about threats and solutions. The
>completely updated and expanded second edition defines the
>security problems companies face in today's Internet,
>identifies the weaknesses of the most popular security
>technologies, and illustrates the ins and outs of deploying
>an effective firewall. Readers learn how to plan and execute
>a security strategy that allows easy access to Internet
>services while defeating even the wiliest of hackers.
>
>_________________________________
>Guerrilla Oracle: The Succinct Windows Perspective
>Richard J. Staron
>http://www.awprofessional.com/titles/0201750775
>
>Are you frustrated by your attempts to learn Oracle or
>improve your Oracle skills because of the sheer amount of
>technical documentation you have to wade through? This
>concise tutorial walks you step-by-step through the process,
>showing you exactly what you need to know to install,
>create, and support a successful Oracle 8i or 9i environment
>with Web capabilities. Guerrilla Oracle(r): The Succinct
>Windows Perspective presents clear explanations of database,
>SQL, and Oracle fundamentals. Using a real-world,
>large-scale example to demonstrate essential tasks, the book
>follows the Oracle DBMS life cycle from business idea to
>functioning database.
>_________________________________
>Essential ASP.NET with Examples in C#
>Fritz Onion
>http://www.awprofessional.com/titles/0201760401
>
>Essential ASP.NET with Examples in C# is the C# programmer's
>definitive reference for ASP.NET through version 1.1. It
>provides experienced programmers with the information needed
>to fully understand the technology, and is a clear guide to
>using ASP.NET to build robust and well architected Web
>applications.
>_________________________________
>Essential ASP.NET with Examples in Visual Basic .NET
>Fritz Onion
>http://www.awprofessional.com/titles/0201760398
>
>Essential ASP.NET with Examples in Visual Basic .NET is the
>Visual Basic programmer's definitive reference for ASP.NET
>through version 1.1. It provides experienced programmers
>with the information needed to fully understand the
>technology, and is a clear guide to using ASP.NET to build
>robust and well-architected Web applications.
>_________________________________
>Business Intelligence Roadmap: The Complete Project
>Lifecycle for Decision-Support Applications
>Larissa T. Moss, Shaku Atre
>http://www.awprofessional.com/titles/0201784203
>
>Business Intelligence Roadmap is the visual guide to
>developing an effective business intelligence (BI)
>decision-support application. This book outlines a
>methodology that takes into account the complexity of
>developing applications in an integrated BI environment. The
>authors walk readers through every step of the process-from
>strategic planning to the selection of new technologies and
>the evaluation of application releases. The book also serves
>as a single-source guide to the best practices of BI
>projects. Business Intelligence Roadmap is a clear and
>comprehensive guide to negotiating the complexities inherent
>in the development of valuable business intelligence
>decision-support applications.
>_________________________________
>LDAP Directories Explained: An Introduction and Analysis
>Brian Arkills
>http://www.awprofessional.com/titles/020178792X
>
>Directory technology promises to solve the problem of
>decentralized information that has arisen with the explosion
>of distributed computing. Lightweight Directory Access
>Protocol (LDAP) is a set of protocols that has become the
>Internet standard for accessing information directories.
>Until now, however, those curious about LDAP had no
>introductory source to learn how the technology can help
>them centrally manage information and reduce the cost of
>computing services.  LDAP Directories Explained provides
>technical managers and those new to directory services with
>a fundamental introduction to LDAP.
>_________________________________
>NET Web Services: Architecture and Implementation
>Keith Ballinger
>http://www.awprofessional.com/titles/0321113594
>
>NET Web Services is the authoritative guide to designing
>and architecting better Web services using Microsoft
>technologies. Written by Keith Ballinger, a Program Manager
>for XML Web Services at Microsoft, this book explains what
>Web services are, why they exist, and how they work in .NET.
>Readers will gain a thorough understanding of the
>technologies that allows them to take full advantage of
>NET.
>_________________________________
>Modernizing Legacy Systems: Software Technologies,
>Engineering Processes, and Business Practices
>Robert C. Seacord, Daniel Plakosh, Grace A. Lewis
>http://www.awprofessional.com/titles/0321118847
>
>Businesses inevitably face a critical choice in the design
>and maintenance of their software systems: Dismantle older
>systems and completely replace them, or incrementally
>incorporate new technologies into existing systems. Many
>businesses choose the latter course, seeking to maximize
>their existing investment while adapting to rapidly evolving
>technology. Modernizing Legacy Systems is a much-needed
>guide, showing how to implement a successful modernization
>strategy and describing specifically a risk-managed,
>incremental approach--one that encompasses changes in
>software technologies, engineering processes, and business
>practices.
>_________________________________
>Database Access with Visual Basic  .NET, Third Edition
>Jeffrey P. McManus, Jackie Goldstein
>http://www.awprofessional.com/titles/0672323435
>
>Whether you are using WinForms, WebForms, or Web Services,
>Database Access with Visual Basic(r) .NET, Third Edition, is
>your practical guide to developing database applications
>with Visual Basic .NET and ADO.NET. The authors provide
>real-world solutions to the data-access issues Visual Basic
>NET developers face every day and share their secrets for
>becoming a more effective database programmer using .NET
>technologies. Database Access with Visual Basic(r) .NET,
>Third Edition, equips VB developers with the knowledge and
>skills needed to build a powerful new generation of database
>applications in less time using .NET technologies.
>_________________________________
>CMMI: Guidelines for Process Integration and Product
>Improvement
>Mary Beth Chrissis, Mike Konrad, Sandy Shrum
>http://www.awprofessional.com/titles/0321154967
>
>Whether you are new to the CMMI or already familiar with
>some version of it, this book is an essential resource for
>managers, practitioners, and process-improvement team
>members who need to understand, evaluate, or implement the
>model. The ultimate ends of CMMI are process integration and
>product improvement. This book contains the means for
>getting there. Many organizations use Capability Maturity
>Models (CMMs) to assess development and maintenance
>processes, implement improvements, and measure progress.
>Although consistent in purpose, these models differ in
>terminology and design, enough sometimes to cause conflict
>and confusion when used within the same organization.
>Addressing the need for a more coordinated approach,
>Capability Maturity Model Integration(R) (CMMI) provides a
>single framework for improvement in software engineering,
>systems engineering, integrated product and process
>development, and supplier sourcing.
>_________________________________
>Software Fortresses: Modeling Enterprise Architectures
>Roger Sessions
>http://www.awprofessional.com/titles/0321166086
>
>This book introduces a new approach for modeling large
>enterprise systems: the software fortress model. In the
>software fortress model, an enterprise architecture is
>viewed as a series of self-contained, mutually suspicious,
>marginally cooperating software fortresses interacting with
>each other through carefully crafted and meticulously
>managed treaty relationships.  The software fortress model
>is an intuitive, simple, expressive approach that maps
>readily to existing technologies such as .NET and Java 2
>Enterprise Edition (J2EE). This book is designed to meet an
>immediate need to define, clarify, and explain the basics of
>this new modeling methodology for large enterprise software
>architectures.
>_________________________________
>HyperTransport System Architecture
>Mindshare, Inc., Jay Trodden, Don Anderson
>http://www.awprofessional.com/titles/0321168453
>
>HyperTransport(tm) System Architecture provides a
>comprehensive, technical guide to HyperTransport technology.
>It opens with an overview of HT systems, highlighting the
>technology's fundamental principles, basic architecture, and
>its many advantages. The book goes on to detail all facets
>of HyperTransport systems, including the protocol, I/O,
>routing, configuration, and more. It also features important
>performance considerations and addresses critical
>compatibility issues.
>_________________________________
>The Cg Tutorial: The Definitive Guide to Programmable
>Real-Time Graphics
>Randima Fernando, Mark J. Kilgard
>http://www.awprofessional.com/titles/0321194969
>
>Cg is a complete programming environment for the fast
>creation of special effects and real-time cinematic quality
>experiences on multiple platforms. By providing a new level
>of abstraction, Cg lets developers more directly target
>OpenGL(r), DirectX(r), Windows(r), Linux, Mac OS X(r), and
>console platforms, such as the Xbox(tm), without having to
>program directly to the graphics hardware assembly language.
>Cg was developed by NVIDIA(r) Corporation in close
>collaboration with Microsoft(r) Corporation, and is
>compatible with both the OpenGL API and Microsoft's HLSL for
>DirectX 9.0.  The Cg Tutorial explains how to implement both
>basic and advanced techniques for today's programmable GPU
>architectures.
>_________________________________
>Beyond Software Architecture: Creating and Sustaining
>Winning Solutions
>Luke Hohmann
>http://www.awprofessional.com/titles/0201775948
>
>Successfully managing the relationship between business and
>technology is a daunting task faced by all companies in the
>twenty-first century. Beyond Software Architecture is a
>practical guide to properly managing this mission-critical
>relationship. In our modern economy, every software decision
>can have a significant impact on business; conversely, most
>business decisions will influence a software application's
>viability. This book contains keen insights and useful
>lessons about creating winning software solutions in the
>context of a real-world business.
>_________________________________
>LINUX and UNIX Programming Tools: A Primer for Software
>Developers
>Syed Mansoor Sarwar, Khaled H. Al-Saqabi
>http://www.aw.com/productpage?ISBN=0201773457
>
>This concise programming companion prepares readers for
>programming in both the LINUX and UNIX environments. The
>authors begin with a brief review of commands and utilities
>and then focus on systematically describing those software
>development tools available to a LINUX and UNIX programmer.
>These software development tools include utilities for
>managing libraries for object files and profiling. LINUX and
>UNIX Programming Tools assumes no previous exposure to LINUX
>or UNIX.
>_________________________________
>Learning SQL: A Step-by-Step Guide Using Access
>Sikha Bagui, Richard Earp
>http://www.aw.com/productpage?ISBN=0321119045
>
>Learning SQL: A Step-By-Step Guide Using Access is a brief,
>hands-on tutorial covering the basics of using SQL, as well
>as using the Access database engine with SQL. It assumes no
>previous knowledge of programming or databases.
>_________________________________
>An Introduction to Parallel Computing: Design and Analysis
>of Algorithms
>Ananth Grama, Vipin Kumar, Anshul Gupta, George Karypis
>http://www.aw.com/productpage?ISBN=0201648652
>
>Introduction to Parallel Computing, 2e provides a basic,
>in-depth look at techniques for the design and analysis of
>parallel algorithms and for programming them on commercially
>available parallel platforms. The book discusses principles
>of parallel algorithms design and different parallel
>programming models with extensive coverage of MPI, POSIX
>threads, and Open MP. It provides a broad and balanced
>coverage of various core topics such as sorting, graph
>algorithms, discrete optimization techniques, data mining
>algorithms, and a number of other algorithms used in
>numerical and scientific computing applications.
>_________________________________
>Software Engineering and Computer Games
>Rudy Rucker
>http://www.aw.com/productpage?ISBN=0201767910
>
>This book provides a lively introduction to object-oriented
>software engineering that shows how to bring a complete
>program to the level of a commercial release.
>_________________________________
>Operating Systems
>Jean Bacon, Tim Harris
>http://www.aw.com/productpage?ISBN=0321117891
>
>Incorporating Java and the UML, as well as chapters on
>system security, Linux, Windows 2000 and extensible
>operating systems (including the Java Virtual Machine), this
>new book, building on the operating systems coverage of
>Bacon's Concurrent Systems, provides an overview of
>operating system concepts.
>_________________________________
>Object Oriented Software Development Using Java, 2/E
>Xiaoping Jia
>http://www.aw.com/productpage?ISBN=0201737337
>
>Object-Oriented Software Development Using Java focuses on
>developing skills in designing software-particularly in
>writing well-designed, medium-sized object-oriented
>programs. It provides a broad and coherent coverage of
>object-oriented technology, including object-oriented
>modeling using the Unified Modeling Language (UML),
>object-oriented design using Design Patterns, and
>object-oriented programming using Java.
>______________________________________________________
>SD West 2003
>March 24-28, 2003
>Santa Clara Convention Center
>Santa Clara, CA
>http://www.sdexpo.com/
>
>Now in its 16th year, SD West continues to be the
>must-attend event for software development professionals.
>Attendees will find out what's new in the development world
>and benefit from SD's extensive coverage of the core
>technologies they use everyday.  Addison-Wesley will be
>exhibiting at the conference, and many authors will be in
>attendance.
>________________________________________________________
>Techno-Security 2003
>Myrtle Beach, South Carolina
>April 27-30, 2003
>William Cheswick, co-author of Firewalls and Internet
>Security, Second Edition presents the Special Opening
>Keynote on Monday April 28, 2003, 8:15 AM - 8:45 AM.
>The Fifth Annual International Techno-Security Conference
>promises to be an incredible training and networking
>opportunity. http://www.thetrainingco.com/html/Techno2003.html
>________________________________________________________
>Eric Newcomer, author of Understanding Web Services: XML,
>WSDL, SOAP, and UDDI (0201750813) talks about the road of
>Web services evolution.
>
>The Web services shell game:
>http://news.com.com/2010-1071-984885.html
>________________________________________________________
>Honeyd Challenge
>
>Addison-Wesley author Lance Spitzner, author of Honeypots:
>Tracking Hackers, is hosting the Honeyd Challenge. Honeyd is
>a very flexible tool to create virtual honeypots. Learn more
>about the challenge at:
>http://www.citi.umich.edu/u/provos/honeyd/challenge.html
>
>The ten best submissions are awarded Lance's book signed by
>Lance Spitzner and Niels Provos.
>________________________________________________________
>Aviel Rubin, co-author of Firewalls and Internet Security,
>Repelling the Wily Hacker, 2e (ISBN 0-201-63466-X) was
>recently interviewed by HelpNetSecurity.  The interview is
>posted at http://net-security.org/article.php?id=399
>________________________________________________________
>All Addison-Wesley titles are available at a discount for
>bulk purchases by corporations, organizations, institutions,
>and the government. To place an order or to inquire about
>further information, please contact the Addison-Wesley
>Corporate, Government, and Special Sales Department. Phone:
>1-800-238-9682 or via e-mail: [EMAIL PROTECTED]
>
>If you are interested in adopting our books for a class,
>please visit our sales representatives page at:
>http://www.awl.com/replocator


---
Dustin Puryear <[EMAIL PROTECTED]>
Puryear Information Technology
Windows, UNIX, and IT Consulting
http://www.puryear-it.com



Reply via email to