Learning Java, 4th EditionJava is the preferred language for many of today's leading-edge technologies—everything from smartphones and game consoles to robots, massive enterprise systems, and supercomputers. If you're new to Java, the fourth edition of this bestselling guide provides an example-driven introduction to the latest language features and APIs in Java 6 and 7. Advanced Java developers will be able to take a deep dive into areas such as concurrency and JVM enhancements.
You'll learn powerful new ways to manage resources and exceptions in your applications, and quickly get up to speed on Java's new concurrency utilities, and APIs for web services and XML. You'll also find an updated tutorial on how to get started with the Eclipse IDE, and a brand-new introduction to database access in Java. ...
Web Content Management with DocumentumOne of the world leaders in Enterprise Content Management, the EMC Documentum family of applications helps you manage all types of content across multiple departments within a single repository. With the Web Content Management suite of applications, you can efficiently manage content and underlying processes for your Web properties, and ensures that they are responsive to business needs.
To fully realize the power of this system can seem daunting, but this book will help you achieve that. With easy to follow examples, this book will take you the simplest and most straightforward route to success. Along the way, you will learn insights that only a seasoned professional would know. ...
Plone 3 MultimediaPlone is a free and open source content management system built on top of the Zope application server. Multimedia provides us with stunning interactive user experiences and many design options, but it requires discipline and knowledge to utilize it effectively so that we do not alienate our audiences. By providing an overview of multimedia content together with a practical focus on how to process it in the web context, this book will be your ideal partner when turning your Plone site into a full-featured multimedia Internet presence. ...
Oracle 11g Streams Implementer's GuideFrom smaller businesses through to huge enterprises - users all over the world often require access to data 24 hours a day. Distributed database systems proliferate the world of data sharing providing an ability to access real-time data anywhere, anytime. Oracle Streams, a built-in feature of the Oracle database, is a data replication and integration feature critical to the success and wellbeing of enterprises in today's fast moving economy. This book provides the reader with solid techniques to master Oracle Streams technology and successfully deploy distributed database systems.
This book quickly goes over the basics and gets you up and running with a simple Oracle 11g Streams environment. It will serve as an excellent companion to the Oracle Streams Administration Guide. ...
Essential XML Quick ReferenceEven the most experienced XML developer needs a reference guide with essential information and quick answers to the questions and problems that inevitably arise. Essential XML Quick Reference - is the most comprehensive and authoritative book available. Covering all of XML, as well as many related protocols and technologies, this book provides a handy, one-stop resource to XML syntax, usage, and programming techniques.
Compiled and written by two leading XML authorities, the book provides complete coverage of all relevant topics. Each chapter provides a topic overview, explanations of various elements, and several meaningful examples. ...
Security MetricsSecurity Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. ...
Continuous DeliveryGetting software released to users is often a painful, risky, and time-consuming process. This groundbreaking new book sets out the principles and technical practices that enable rapid, incremental delivery of high quality, valuable new functionality to users. Through automation of the build, deployment, and testing process, and improved collaboration between developers, testers, and operations, delivery teams can get changes released in a matter of hours - sometimes even minutes–no matter what the size of a project or the complexity of its code base. ...
It's Never Done That Before!When Windows works properly, it's relatively easy to ignore; you can concentrate on the work you're trying to do and forget about the plumbing inside your computer. But when something goes wrong, it often requires an experienced guide to solve the problem and restore the computer to working condition. Everybody who uses Microsoft Windows eventually has to deal with cryptic error messages, frozen screens, and other more or less dramatic problems. Windows troubleshooting is the set of tools and techniques that can identify the source of a problem and find a solution. ...
Wicked Cool PHPPHP is an easy-to-use scripting language perfect for quickly creating the Web features you need. Once you know the basics of how the language works, wouldn't it be great to have a collection of useful scripts that solve those tricky problems and add interesting functionality to your site? We thought so, too.
Instead of starting at "Hello World," Wicked Cool PHP assumes that you're familiar with the language and jumps right into the good stuff. After you learn the FAQs of life - the most commonly wished for PHP scripts - you'll work your way through smart configuration options and the art of forms, all the way through to complex database-backed scripts. ...
Hacking VoIPVoice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.
Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook. ...