A comprehensive tutorial on how to use the power of Velocity 1.3 to build Web sites and generate content Designed to work hand-in-hand with Apache Turbine, Struts, and servlets, Velocity is a powerful template language that greatly enhances the developer's ability to customize Web sites. It separates Java code from the Web pages, making a site more maintainable. Because of this, it is a viable alt…
The first book available on this fast-growing and highly regarded software package MindManager allows users to visually map their ideas and brainstorming sessions in order to better organize thoughts and put them into action. Exploring all there is to know about the MindManager product, including the Standard, Business, Enterprise, and handheld releases, this book walks readers through the process…
Did you ever wish you could draw folks a picture of your business processes or the design of your database, but you just don’t have the graphics skills? Then Visio 2003 might be exactly what you’re looking for, and Visio 2003 For Dummies makes it easy for you to find out. Often, pictures do speak louder than words. Visio enables you to turn business and technical concepts into visual diagrams. Bes…
The heart of the book provides the complete set of models that will support most of an organization's core business functions, including universal meta models for enterprise-wide systems, business meta data and data stewardship, portfolio management, business rules, and XML, messaging, and transactions Developers can directly adapt these models to their own businesses, saving countless hours of de…
Imagine that it’s the 1950s, and you are in charge of developing the U. S. interstate system. There are countless roads already in use. The system can go in numerous different directions. Where do you begin? Starting to transform your business with SAP NetWeaver is that daunting. NetWeaver is both an application platform and an integration platform. It integrates your current IT systems to enable …
Written by one of the leading experts in content management systems (CMS), this newly revised bestseller guides readers through the confusing-and often intimidating-task of building, implementing, running, and managing a CMS Updated to cover recent developments in online delivery systems, as well as XML and related technologies Reflects valuable input from CMS users who attended the author's works…
On its own, C# simplifies network programming. Combine it with the precise instruction found in C# Network Programming, and you'll find that building network applications is easier and quicker than ever. This book helps newcomers get started with a look at the basics of network programming as they relate to C#, including the language's network classes, the Winsock interface, and DNS resolution. Sp…
Still the Best Delphi Resource A Fully Revised Version of the Book That Won the Delphi Informant Readers Choice Award If you're looking to capitalize on the powerful capabilities of the latest release of Delphi, Mastering Delphi 6 is the one resource you can't do without. Practical, tutorial-based coverage helps you develop key skills, solve tough problems, and build and implement sophisticated fu…
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into the networks of many Fortune 1000 companies in ord…
Plan, execute, and sustain a successful IT campaign with Sam Bansal's perfect scorecard approach First came the dot.com bust, then the IT squeeze. Despite software being the tail that wags the dog in most corporations, the cham-pions of IT, the CIOs, are constantly under fire to justify and maximize their IT investments—past, present, and future. Learn how to establish Key Performance Indicators a…
A strategic guide to mastering service provider relationships Well-known business management consultant and Boston Globe columnist Mary Helen Gillespie helps business and IT managers navigate through the confusing technology-driven landscape of service providers. Offering insight into the points of view for both the service provider and client, Gillespie guides readers through available services, …
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators This is the most complete, most advanced guide to Linux security you'll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the standard and advanced techniques you need to know to keep your Linux environment safe from threat…
Have you tried using an «automated» GUI testing tool, only to find that you spent most of your time configuring, adjusting, and directing it? This book presents a sensible and highly effective alternative: it teaches you to build and use your own truly automated tool. The procedure you'll learn is suitable for virtually any development environment, and the tool allows you to store your test data a…
Covers all versions of UNIX, as well as Linux, operating systems that are used by the majority of Fortune 1000 companies for their mission-critical data Offers more detail than other books on the file input/output aspects of UNIX programming Describes implementation of UNIX filesystems over a thirty year period Demonstrates VERITAS and other filesystem examples
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets…