Windows Vista AnnoyancesWindows Vista may be the next big thing, but it still contains enough quirks and unaccountable behaviors to vex anyone. This unique guide not only discusses the most irritating features of the latest Microsoft operating system and how to get around them, but also explains how to improve Windows and do more with the software than Microsoft intended. You'll find information on setup, installation, upgrade from other Windows versions, the revamped interface, new security features, user accounts, troubleshooting, and the markedly improved Internet Explorer 7. ...
Designing Large Scale LansThis unique book outlines the advantages of a top-down, vendor-neutral approach to network design. Everything from network reliability, network topologies, routing and switching, wireless, virtual LANs, firewalls and gateways to security, Internet protocols, bandwidth, and multicast services are covered from the perspective of an organization's specific needs, rather than from product requirements. The book also discusses proprietary technologies that are ubiquitous, such as Cisco's IOS and Novell's IPX. ...
Hardening Cisco RoutersThis succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. This is a reference for protecting the protectors, and author Thomas Akin supplies all the tools necessary to turn a potential vulnerability into a strength. ...
High Performance MySQL, 2nd EditionHigh Performance MySQL is the definitive guide to building fast, reliable systems with MySQL. Written by noted experts with years of real-world experience building very large systems, this book covers every aspect of MySQL performance in detail, and focuses on robustness, security, and data integrity. Learn advanced techniques in depth so you can bring out MySQL's full power. The second edition is completely revised and greatly expanded, with deeper coverage in all areas. ...
C# 4.0 in a Nutshell, 4th EditionWhen you have questions about how to use C# 4.0 or the .NET CLR, this highly acclaimed bestseller has precisely the answers you need. Uniquely organized around concepts and use cases, this fourth edition includes in-depth coverage of new C# topics such as parallel programming, code contracts, dynamic programming, security, and COM interoperability. You'll also find updated information on LINQ, including examples that work with both LINQ to SQL and Entity Framework. ...
Advanced RailsThis is the book for experienced Rails developers who want to go to the next level with this web development framework, with an in-depth look at techniques for dealing with databases, security, performance, web services and much more. Chapters in this book help you understand not only the tricks and techniques used within the Rails framework itself, but also how make use of ideas borrowed from other programming paradigms. ...
Cloud Application ArchitecturesIf you're involved in planning IT infrastructure as a network or system architect, system administrator, or developer, this book will help you adapt your skills to work with these highly scalable, highly redundant infrastructure services. Cloud Application Architectures will help you determine whether and how to put your applications into these virtualized services, with critical guidance on issues of cost, availability, performance, scaling, privacy, and security. ...
Learning OpenCVThis library is useful for practitioners, and is an excellent tool for those entering the field: it is a set of computer vision algorithms that work as advertised.
-William T. Freeman, Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology
Learning OpenCV puts you in the middle of the rapidly expanding field of computer vision. Written by the creators of the free open source OpenCV library, this book introduces you to computer vision and demonstrates how you can quickly build applications that enable computers to "see" and make decisions based on that data.
Computer vision is everywhere-in security systems, manufacturing inspection systems, medical image analysis, Unmanned Aerial Vehicles, and more. It stitches Google maps and Google Earth together, checks the pixels on LCD screens, and makes sure the stitches in your shirt are sewn properly. OpenCV provides an easy-to-use computer vision framework and a comprehensive library wi ...
Java Web ServicesJava Web Services gives the experienced Java developer a way into the Web Services world. It helps you to understand what's going on, what the technologies mean and how they relate, and shows Java developers how to put them to use to solve real problems. You'll learn what's real and what isn't; what the technologies are really supposed to do, and how they do it. Java Web Services shows you how to use SOAP to perform remote method calls and message passing; how to use WSDL to describe the interface to a web service or understand the interface of someone else's service; and how to use UDDI to advertise (publish) and look up services in each local or global registry. Java Web Services also discusses security issues, interoperability issues, integration with other Java enterprise technologies like EJB; the work being done on the JAXM andJAX-RPC packages, and integration with Microsoft's .NET services. ...
grep Pocket Referencegrep Pocket Reference is the first guide devoted to grep, the powerful Unix content-location utility. This handy book is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it - for everything from mail filtering and system log management to malware analysis. ...