>Firewalls and Internet Security, Second Edition >by William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin > >Guerrilla Oracle >by Richard J. Staron > >Essential ASP.NET with Examples in C# >by Fritz Onion > >Essential ASP.NET with Examples in Visual Basic .NET >by Fritz Onion > >Business Intelligence Roadmap >by Larissa T. Moss, Shaku Atre > >LDAP Directories Explained >by Brian Arkills > >NET Web Services >by Keith Ballinger > >Modernizing Legacy Systems >by Robert C. Seacord, Daniel Plakosh, Grace A. Lewis > >Database Access with Visual Basic .NET, Third Edition >by Jeffrey P. McManus, Jackie Goldstein > >CMMI >by Mary Beth Chrissis, Mike Konrad, Sandy Shrum > >Software Fortresses >by Roger Sessions > >HyperTransport System Architecture >by Mindshare, Inc., Jay Trodden, Don Anderson > >The Cg Tutorial >by Randima Fernando, Mark J. Kilgard > >Beyond Software Architecture >by Luke Hohmann > >LINUX and UNIX Programming Tools: A Primer for Software >Developers >by Syed Mansoor Sarwar, Khaled H. Al-Saqabi > >Learning SQL: A Step-by-Step Guide Using Access >by Sikha Bagui, Richard Earp > >An Introduction to Parallel Computing: Design and Analysis >of Algorithms >by Ananth Grama, Vipin Kumar, Anshul Gupta, George Karypis > >Software Engineering and Computer Games >by Rudy Rucker > >Operating Systems >by Jean Bacon, Tim Harris > >Object Oriented Software Development Using Java, 2/E >by Xiaoping Jia >________________________________________________________ >Firewalls and Internet Security, Second Edition: Repelling >the Wily Hacker >William R. Cheswick, Steven M. Bellovin, Aviel D. Rubin >http://www.awprofessional.com/titles/020163466X > >"Firewalls and Internet Security teaches that state of mind; >imparting in one book, security wisdom that would take most >professionals years to acquire," Marcus Ranum, Firewall and >IDS pioneer and consultant > >The best-selling first edition of Firewalls and Internet >Security became the bible of Internet security by showing >readers how to think about threats and solutions. The >completely updated and expanded second edition defines the >security problems companies face in today's Internet, >identifies the weaknesses of the most popular security >technologies, and illustrates the ins and outs of deploying >an effective firewall. Readers learn how to plan and execute >a security strategy that allows easy access to Internet >services while defeating even the wiliest of hackers. > >_________________________________ >Guerrilla Oracle: The Succinct Windows Perspective >Richard J. Staron >http://www.awprofessional.com/titles/0201750775 > >Are you frustrated by your attempts to learn Oracle or >improve your Oracle skills because of the sheer amount of >technical documentation you have to wade through? This >concise tutorial walks you step-by-step through the process, >showing you exactly what you need to know to install, >create, and support a successful Oracle 8i or 9i environment >with Web capabilities. Guerrilla Oracle(r): The Succinct >Windows Perspective presents clear explanations of database, >SQL, and Oracle fundamentals. Using a real-world, >large-scale example to demonstrate essential tasks, the book >follows the Oracle DBMS life cycle from business idea to >functioning database. >_________________________________ >Essential ASP.NET with Examples in C# >Fritz Onion >http://www.awprofessional.com/titles/0201760401 > >Essential ASP.NET with Examples in C# is the C# programmer's >definitive reference for ASP.NET through version 1.1. It >provides experienced programmers with the information needed >to fully understand the technology, and is a clear guide to >using ASP.NET to build robust and well architected Web >applications. >_________________________________ >Essential ASP.NET with Examples in Visual Basic .NET >Fritz Onion >http://www.awprofessional.com/titles/0201760398 > >Essential ASP.NET with Examples in Visual Basic .NET is the >Visual Basic programmer's definitive reference for ASP.NET >through version 1.1. It provides experienced programmers >with the information needed to fully understand the >technology, and is a clear guide to using ASP.NET to build >robust and well-architected Web applications. >_________________________________ >Business Intelligence Roadmap: The Complete Project >Lifecycle for Decision-Support Applications >Larissa T. Moss, Shaku Atre >http://www.awprofessional.com/titles/0201784203 > >Business Intelligence Roadmap is the visual guide to >developing an effective business intelligence (BI) >decision-support application. This book outlines a >methodology that takes into account the complexity of >developing applications in an integrated BI environment. The >authors walk readers through every step of the process-from >strategic planning to the selection of new technologies and >the evaluation of application releases. The book also serves >as a single-source guide to the best practices of BI >projects. Business Intelligence Roadmap is a clear and >comprehensive guide to negotiating the complexities inherent >in the development of valuable business intelligence >decision-support applications. >_________________________________ >LDAP Directories Explained: An Introduction and Analysis >Brian Arkills >http://www.awprofessional.com/titles/020178792X > >Directory technology promises to solve the problem of >decentralized information that has arisen with the explosion >of distributed computing. Lightweight Directory Access >Protocol (LDAP) is a set of protocols that has become the >Internet standard for accessing information directories. >Until now, however, those curious about LDAP had no >introductory source to learn how the technology can help >them centrally manage information and reduce the cost of >computing services. LDAP Directories Explained provides >technical managers and those new to directory services with >a fundamental introduction to LDAP. >_________________________________ >NET Web Services: Architecture and Implementation >Keith Ballinger >http://www.awprofessional.com/titles/0321113594 > >NET Web Services is the authoritative guide to designing >and architecting better Web services using Microsoft >technologies. Written by Keith Ballinger, a Program Manager >for XML Web Services at Microsoft, this book explains what >Web services are, why they exist, and how they work in .NET. >Readers will gain a thorough understanding of the >technologies that allows them to take full advantage of >NET. >_________________________________ >Modernizing Legacy Systems: Software Technologies, >Engineering Processes, and Business Practices >Robert C. Seacord, Daniel Plakosh, Grace A. Lewis >http://www.awprofessional.com/titles/0321118847 > >Businesses inevitably face a critical choice in the design >and maintenance of their software systems: Dismantle older >systems and completely replace them, or incrementally >incorporate new technologies into existing systems. Many >businesses choose the latter course, seeking to maximize >their existing investment while adapting to rapidly evolving >technology. Modernizing Legacy Systems is a much-needed >guide, showing how to implement a successful modernization >strategy and describing specifically a risk-managed, >incremental approach--one that encompasses changes in >software technologies, engineering processes, and business >practices. >_________________________________ >Database Access with Visual Basic .NET, Third Edition >Jeffrey P. McManus, Jackie Goldstein >http://www.awprofessional.com/titles/0672323435 > >Whether you are using WinForms, WebForms, or Web Services, >Database Access with Visual Basic(r) .NET, Third Edition, is >your practical guide to developing database applications >with Visual Basic .NET and ADO.NET. The authors provide >real-world solutions to the data-access issues Visual Basic >NET developers face every day and share their secrets for >becoming a more effective database programmer using .NET >technologies. Database Access with Visual Basic(r) .NET, >Third Edition, equips VB developers with the knowledge and >skills needed to build a powerful new generation of database >applications in less time using .NET technologies. >_________________________________ >CMMI: Guidelines for Process Integration and Product >Improvement >Mary Beth Chrissis, Mike Konrad, Sandy Shrum >http://www.awprofessional.com/titles/0321154967 > >Whether you are new to the CMMI or already familiar with >some version of it, this book is an essential resource for >managers, practitioners, and process-improvement team >members who need to understand, evaluate, or implement the >model. The ultimate ends of CMMI are process integration and >product improvement. This book contains the means for >getting there. Many organizations use Capability Maturity >Models (CMMs) to assess development and maintenance >processes, implement improvements, and measure progress. >Although consistent in purpose, these models differ in >terminology and design, enough sometimes to cause conflict >and confusion when used within the same organization. >Addressing the need for a more coordinated approach, >Capability Maturity Model Integration(R) (CMMI) provides a >single framework for improvement in software engineering, >systems engineering, integrated product and process >development, and supplier sourcing. >_________________________________ >Software Fortresses: Modeling Enterprise Architectures >Roger Sessions >http://www.awprofessional.com/titles/0321166086 > >This book introduces a new approach for modeling large >enterprise systems: the software fortress model. In the >software fortress model, an enterprise architecture is >viewed as a series of self-contained, mutually suspicious, >marginally cooperating software fortresses interacting with >each other through carefully crafted and meticulously >managed treaty relationships. The software fortress model >is an intuitive, simple, expressive approach that maps >readily to existing technologies such as .NET and Java 2 >Enterprise Edition (J2EE). This book is designed to meet an >immediate need to define, clarify, and explain the basics of >this new modeling methodology for large enterprise software >architectures. >_________________________________ >HyperTransport System Architecture >Mindshare, Inc., Jay Trodden, Don Anderson >http://www.awprofessional.com/titles/0321168453 > >HyperTransport(tm) System Architecture provides a >comprehensive, technical guide to HyperTransport technology. >It opens with an overview of HT systems, highlighting the >technology's fundamental principles, basic architecture, and >its many advantages. The book goes on to detail all facets >of HyperTransport systems, including the protocol, I/O, >routing, configuration, and more. It also features important >performance considerations and addresses critical >compatibility issues. >_________________________________ >The Cg Tutorial: The Definitive Guide to Programmable >Real-Time Graphics >Randima Fernando, Mark J. Kilgard >http://www.awprofessional.com/titles/0321194969 > >Cg is a complete programming environment for the fast >creation of special effects and real-time cinematic quality >experiences on multiple platforms. By providing a new level >of abstraction, Cg lets developers more directly target >OpenGL(r), DirectX(r), Windows(r), Linux, Mac OS X(r), and >console platforms, such as the Xbox(tm), without having to >program directly to the graphics hardware assembly language. >Cg was developed by NVIDIA(r) Corporation in close >collaboration with Microsoft(r) Corporation, and is >compatible with both the OpenGL API and Microsoft's HLSL for >DirectX 9.0. The Cg Tutorial explains how to implement both >basic and advanced techniques for today's programmable GPU >architectures. >_________________________________ >Beyond Software Architecture: Creating and Sustaining >Winning Solutions >Luke Hohmann >http://www.awprofessional.com/titles/0201775948 > >Successfully managing the relationship between business and >technology is a daunting task faced by all companies in the >twenty-first century. Beyond Software Architecture is a >practical guide to properly managing this mission-critical >relationship. In our modern economy, every software decision >can have a significant impact on business; conversely, most >business decisions will influence a software application's >viability. This book contains keen insights and useful >lessons about creating winning software solutions in the >context of a real-world business. >_________________________________ >LINUX and UNIX Programming Tools: A Primer for Software >Developers >Syed Mansoor Sarwar, Khaled H. Al-Saqabi >http://www.aw.com/productpage?ISBN=0201773457 > >This concise programming companion prepares readers for >programming in both the LINUX and UNIX environments. The >authors begin with a brief review of commands and utilities >and then focus on systematically describing those software >development tools available to a LINUX and UNIX programmer. >These software development tools include utilities for >managing libraries for object files and profiling. LINUX and >UNIX Programming Tools assumes no previous exposure to LINUX >or UNIX. >_________________________________ >Learning SQL: A Step-by-Step Guide Using Access >Sikha Bagui, Richard Earp >http://www.aw.com/productpage?ISBN=0321119045 > >Learning SQL: A Step-By-Step Guide Using Access is a brief, >hands-on tutorial covering the basics of using SQL, as well >as using the Access database engine with SQL. It assumes no >previous knowledge of programming or databases. >_________________________________ >An Introduction to Parallel Computing: Design and Analysis >of Algorithms >Ananth Grama, Vipin Kumar, Anshul Gupta, George Karypis >http://www.aw.com/productpage?ISBN=0201648652 > >Introduction to Parallel Computing, 2e provides a basic, >in-depth look at techniques for the design and analysis of >parallel algorithms and for programming them on commercially >available parallel platforms. The book discusses principles >of parallel algorithms design and different parallel >programming models with extensive coverage of MPI, POSIX >threads, and Open MP. It provides a broad and balanced >coverage of various core topics such as sorting, graph >algorithms, discrete optimization techniques, data mining >algorithms, and a number of other algorithms used in >numerical and scientific computing applications. >_________________________________ >Software Engineering and Computer Games >Rudy Rucker >http://www.aw.com/productpage?ISBN=0201767910 > >This book provides a lively introduction to object-oriented >software engineering that shows how to bring a complete >program to the level of a commercial release. >_________________________________ >Operating Systems >Jean Bacon, Tim Harris >http://www.aw.com/productpage?ISBN=0321117891 > >Incorporating Java and the UML, as well as chapters on >system security, Linux, Windows 2000 and extensible >operating systems (including the Java Virtual Machine), this >new book, building on the operating systems coverage of >Bacon's Concurrent Systems, provides an overview of >operating system concepts. >_________________________________ >Object Oriented Software Development Using Java, 2/E >Xiaoping Jia >http://www.aw.com/productpage?ISBN=0201737337 > >Object-Oriented Software Development Using Java focuses on >developing skills in designing software-particularly in >writing well-designed, medium-sized object-oriented >programs. It provides a broad and coherent coverage of >object-oriented technology, including object-oriented >modeling using the Unified Modeling Language (UML), >object-oriented design using Design Patterns, and >object-oriented programming using Java. >______________________________________________________ >SD West 2003 >March 24-28, 2003 >Santa Clara Convention Center >Santa Clara, CA >http://www.sdexpo.com/ > >Now in its 16th year, SD West continues to be the >must-attend event for software development professionals. >Attendees will find out what's new in the development world >and benefit from SD's extensive coverage of the core >technologies they use everyday. Addison-Wesley will be >exhibiting at the conference, and many authors will be in >attendance. >________________________________________________________ >Techno-Security 2003 >Myrtle Beach, South Carolina >April 27-30, 2003 >William Cheswick, co-author of Firewalls and Internet >Security, Second Edition presents the Special Opening >Keynote on Monday April 28, 2003, 8:15 AM - 8:45 AM. >The Fifth Annual International Techno-Security Conference >promises to be an incredible training and networking >opportunity. http://www.thetrainingco.com/html/Techno2003.html >________________________________________________________ >Eric Newcomer, author of Understanding Web Services: XML, >WSDL, SOAP, and UDDI (0201750813) talks about the road of >Web services evolution. > >The Web services shell game: >http://news.com.com/2010-1071-984885.html >________________________________________________________ >Honeyd Challenge > >Addison-Wesley author Lance Spitzner, author of Honeypots: >Tracking Hackers, is hosting the Honeyd Challenge. Honeyd is >a very flexible tool to create virtual honeypots. Learn more >about the challenge at: >http://www.citi.umich.edu/u/provos/honeyd/challenge.html > >The ten best submissions are awarded Lance's book signed by >Lance Spitzner and Niels Provos. >________________________________________________________ >Aviel Rubin, co-author of Firewalls and Internet Security, >Repelling the Wily Hacker, 2e (ISBN 0-201-63466-X) was >recently interviewed by HelpNetSecurity. The interview is >posted at http://net-security.org/article.php?id=399 >________________________________________________________ >All Addison-Wesley titles are available at a discount for >bulk purchases by corporations, organizations, institutions, >and the government. To place an order or to inquire about >further information, please contact the Addison-Wesley >Corporate, Government, and Special Sales Department. Phone: >1-800-238-9682 or via e-mail: [EMAIL PROTECTED] > >If you are interested in adopting our books for a class, >please visit our sales representatives page at: >http://www.awl.com/replocator
--- Dustin Puryear <[EMAIL PROTECTED]> Puryear Information Technology Windows, UNIX, and IT Consulting http://www.puryear-it.com
