IT eBooks
Download, Read, Use
BIRT: A Field Guide, 3rd Edition
BIRT: A Field Guide, 3rd Edition

More than ten million people have downloaded BIRT (Business Intelligence and Reporting Tools) from the Eclipse web site, and more than one million developers are estimated to be using BIRT. Built on the open source Eclipse platform, BIRT is a powerful report development system that provides an end-to-end solution - from creating and deploying reports to integrating report capabilities in enterprise applications. This book is an essential resource for users who want to create presentation-quality reports quickly. The extensive examples, step-by-step instructions, and abundant illustrations help new users develop report design skills. Power users can find the information they need to make the most of the product's rich set of features to build sophisticated and compelling reports. ...
It's Never Done That Before!
It's Never Done That Before!

When Windows works properly, it's relatively easy to ignore; you can concentrate on the work you're trying to do and forget about the plumbing inside your computer. But when something goes wrong, it often requires an experienced guide to solve the problem and restore the computer to working condition. Everybody who uses Microsoft Windows eventually has to deal with cryptic error messages, frozen screens, and other more or less dramatic problems. Windows troubleshooting is the set of tools and techniques that can identify the source of a problem and find a solution. ...
Hacking VoIP
Hacking VoIP

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook. ...
Realm of Racket
Realm of Racket

Racket is a descendant of Lisp, a programming language renowned for its elegance, power, and challenging learning curve. But while Racket retains the functional goodness of Lisp, it was designed with beginning programmers in mind. Realm of Racket is your introduction to the Racket language. In Realm of Racket, you'll learn to program by creating increasingly complex games. Your journey begins with the Guess My Number game and coverage of some basic Racket etiquette. Next you'll dig into syntax and semantics, lists, structures, and conditionals, and learn to work with recursion and the GUI as you build the Robot Snake game. After that it's on to lambda and mutant structs (and an Orc Battle), and fancy loops and the Dice of Doom. Finally, you'll explore laziness, AI, distributed games, and the Hungry Henry game. ...
Loop-shaping Robust Control
Loop-shaping Robust Control

The loop-shaping approach consists of obtaining a specification in relation to the open loop of the control from specifications regarding various closed loop transfers, because it is easier to work on a single transfer (in addition to the open loop) than on a multitude of transfers (various loopings such as set point/error, disturbance / error, disturbance / control, etc.). The simplicity and flexibility of the approach make it very well adapted to the industrial context. This book presents the loop-shaping approach in its entirety, starting with the declension of high-level specifications into a loop-shaping specification. It then shows how it is possible to fully integrate this approach for the calculation of robust and efficient correctors with the help of existing techniques, which have already been industrially tried and tested, such as H-infinity synthesis. ...
The Data Warehouse Toolkit, 3rd Edition
The Data Warehouse Toolkit, 3rd Edition

The first edition of Ralph Kimball's The Data Warehouse Toolkit introduced the industry to dimensional modeling, and now his books are considered the most authoritative guides in this space. This new third edition is a complete library of updated dimensional modeling techniques, the most comprehensive collection ever. It covers new and enhanced star schema dimensional modeling patterns, adds two new chapters on ETL techniques, includes new and expanded business matrices for 12 case studies, and more. ...
System Building with APL + WIN
System Building with APL + WIN

Software modernisation or re-engineering as a concept lacks universal clarity. System Building with APL + Win seeks to clarify this problem by identifying the solution to the long term survival of the APL application as the elimination of APL specific considerations in the choice of a development tool. The author shows how to deploy mainstream industry standard system components within an APL + Win development environment, enabling the APL application to be just like any application on the Windows platform. ...
Case Study Research in Software Engineering
Case Study Research in Software Engineering

Based on their own experiences of in-depth case studies of software projects in international corporations, in this book the authors present detailed practical guidelines on the preparation, conduct, design and reporting of case studies of software engineering. This is the first software engineering specific book on the case study research method. ...
Semantic Web and Model-Driven Engineering
Semantic Web and Model-Driven Engineering

The next enterprise computing era will rely on the synergy between both technologies: semantic web and model-driven software development (MDSD). The semantic web organizes system knowledge in conceptual domains according to its meaning. It addresses various enterprise computing needs by identifying, abstracting and rationalizing commonalities, and checking for inconsistencies across system specifications. On the other side, model-driven software development is closing the gap among business requirements, designs and executables by using domain-specific languages with custom-built syntax and semantics. It focuses on using modeling languages as programming languages. ...
TrixBox Made Easy
TrixBox Made Easy

TrixBox is a telephone system based on the popular open source Asterisk PBX (Private Branch eXchange) Software. TrixBox allows an individual or organization to setup a telephone system with traditional telephone networks as well as Internet based telephony or VoIP (Voice over Internet Protocol). SugarCRM can be integrated with Asterisk, and is bundled with Trixbox offering real power and flexibility. The book begins by introducing telephony concepts before detailing how to plan a telephone system and moving on to the installation, configuration, and management of a feature packed PBX. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026