Thursday, June 4, 2009

Web Caching (O’Reilly Internet Series)

Web Caching (O’Reilly Internet Series)
By Duane Wessels

* Publisher: O’Reilly Media, Inc.
* Number Of Pages: 318
* Publication Date: 2001-06
* ISBN-10 / ASIN: 156592536X
* ISBN-13 / EAN: 9781565925366
* Binding: Paperback

Product Description:

On the World Wide Web, speed and efficiency are vital. Users have little patience for slow web pages, while network administrators want to make the most of their available bandwidth. A properly designed web cache reduces network traffic and improves access times to popular web sites–a boon to network administrators and web users alike. Web Caching hands you all the technical information you need to design, deploy, and operate an effective web caching service. It starts with the basics of how web caching works, from the HTTP headers that govern cachability to cache validation and replacement algorithms. Topics covered in this book include:

* Designing an effective cache solution
* Configuring web browsers to use a cache
* Setting up a collection of caches that can talk to each other
* Configuring an interception cache or proxy
* Monitoring and fine-tuning the performance of a cache
* Configuring web servers to cooperate with web caches
* Benchmarking cache products

The book also covers the important political aspects of web caching, including privacy, intellectual property, and security issues. Internet service providers, large corporations, or educational institutions–in short, any network that provides connectivity to a wide variety of users–can reap enormous benefit from running a well-tuned web caching service. Web Caching shows you how to do it right.

Cody’s Data Cleaning Techniques Using SAS, Second Edition

Ron Cody, “Cody’s Data Cleaning Techniques Using SAS, Second Edition”
SAS Press | ISBN: 1599946599 | May 13, 2008 | 272 pages | PDF | 1.2MB
Thoroughly updated for SAS 9, this second edition addresses tasks that nearly every SAS programmer needs to do - that is, make sure that data errors are located and corrected. Written in Ron Cody’s signature informal, tutorial style, this book develops and demonstrates data cleaning programs and macros that you can use as written or modify for your own special data cleaning needs. Each topic is developed through specific examples, and every program and macro is explained in detail.

Download from RapidShare

Download from Depositfiles

Real World Camera Raw with Adobe Photoshop CS (Real World)

Real World Camera Raw with Adobe Photoshop CS (Real World)
By Bruce Fraser

* Publisher: Peachpit Press
* Number Of Pages: 256
* Publication Date: 2004-07-18
* ISBN-10 / ASIN: 032127878X
* ISBN-13 / EAN: 9780321278784
* Binding: Paperback

Product Description:

Call it a control thing, but until recently–or, more specifically, until the availability of digital raw camera formats–you simply weren’t ready to make the move to digital photography. Raw formats, however, changed all of that by allowing you to retrieve images before any in-camera processing has been performed. Photoshop’s Adobe Camera Raw plug-in makes that process even easier by providing a standardized way of accessing and working with these uncompressed digital negatives in your favorite image-manipulation software. In the first volume devoted exclusively to the topic, best-selling author Bruce Fraser shows you how to take advantage of Adobe Camera Raw to set white balance, optimize contrast and saturation, handle noise, correct tint, and recover lost detail in images before converting them to another format. After learning about the raw formats themselves, you’ll discover hands-on techniques for exposing and shooting for digital raw, using the File Browser to preview images and automate tasks, and building a workflow around the digital raw process.


Making IT Count: Strategy, Delivery, Infrastructure (Computer Weekly Professional)

Making IT Count: Strategy, Delivery, Infrastructure (Computer Weekly Professional)
By Nancy Olson, Leslie Willcocks, Peter Petherbridge

* Publisher: Butterworth-Heinemann
* Number Of Pages: 288
* Publication Date: 2002-05-01
* ISBN-10 / ASIN: 075064821X
* ISBN-13 / EAN: 9780750648219
* Binding: Paperback

Product Description:

‘Making IT Count: from strategy to implementation’ focuses on the practical elements of delivering Information Technology strategy. Studies regularly show that over half of Information Technology strategies are never implemented, or are unsuccessful in delivering the desired results, and that a significant percentage of strategies implemented were never in the original plans. The linkage between strategy development and delivery needs a very clear focus; this is the key topic that the authors address.

The book highlights eight major fallacies in managing IT, and eighteen better practices. It then details how to draw up strategy, instigate navigation techniques and make sourcing decisions. Change and delivery are a major focus, as is infrastructure development. Caselets and full length case studies of organizations such as General Electric, Siemens, Colonial Mutual, Charles Schwab, Macquarie Bank, ICI, United Airlines, Norwich Union, Walgreens and Dell and have been included to show how strategies have been successfully implemented and managed.

Shows practitioners how to actually carry out, develop and implement an Information Technology strategy
Contains “caselets” and full case studies of recent successful implementations of Information Technology strategies by organizationsAuthors combine a wealth of experience and expertise to provide practical guidance to professionals


Data Mining in Finance: Advances in Relational and Hybrid Methods (The International Series in Engineering and Computer Science)

Data Mining in Finance: Advances in Relational and Hybrid Methods (The Springer International Series in Engineering and Computer Science)
By Boris Kovalerchuk, Evgenii Vityaev

* Publisher: Springer
* Number Of Pages: 328
* Publication Date: 2000-03-01
* ISBN-10 / ASIN: 0792378040
* ISBN-13 / EAN: 9780792378044
* Binding: Hardcover

Product Description:

Data Mining in Finance presents a comprehensive overview of major algorithmic approaches to predictive data mining, including statistical, neural networks, ruled-based, decision-tree, and fuzzy-logic methods, and then examines the suitability of these approaches to financial data mining. The book focuses specifically on relational data mining (RDM), which is a learning method able to learn more expressive rules than other symbolic approaches. RDM is thus better suited for financial mining, because it is able to make greater use of underlying domain knowledge. Relational data mining also has a better ability to explain the discovered rules - an ability critical for avoiding spurious patterns which inevitably arise when the number of variables examined is very large. The earlier algorithms for relational data mining, also known as inductive logic programming (ILP), suffer from a relative computational inefficiency and have rather limited tools for processing numerical data.
Data Mining in Finance introduces a new approach, combining relational data mining with the analysis of statistical significance of discovered rules. This reduces the search space and speeds up the algorithms. The book also presents interactive and fuzzy-logic tools for `mining’ the knowledge from the experts, further reducing the search space.
Data Mining in Finance contains a number of practical examples of forecasting S&P 500, exchange rates, stock directions, and rating stocks for portfolio, allowing interested readers to start building their own models. This book is an excellent reference for researchers and professionals in the fields of artificial intelligence, machine learning, data mining, knowledge discovery, and applied mathematics.


Wednesday, June 3, 2009

Java 2 Developer Exam Cram 2 (Exam Cram CX-310-252A and CX-310-027)

Product Description Join the ranks of readers who have trusted Exam Cram 2 to their certification preparation needs! The Java 2 Developer Exam Cram 2 is focused on what you need to know to pass the Java 2 Developer exam. The Exam Cram 2 Method of Study provides you with a concise method to learn the exam topics. The book includes tips, exam notes, acronyms and memory joggers in order to help you pass the exam. Included in the Java 2 Developer Exam Cram 2 : A tear-out “Cram Sheet” for last minute test preparation.Covers both exams - the SCJD Programming Exam and the SCJD Essay Exam.The PrepLogic Practice Tests, test engine to simulate the testing environment and test your knowledge. Trust in the series that has helped many ot

hers achieve certification success - Exam Cram 2.


Beginning XNA 3.0 Game Programming: From Novice to Professional

Product Description Would you like to create your own games, but never have the time to dig into the details of multimedia programming? Now you don’t have to! XNA 3.0 makes it simple to create your own games, which will run on your PC and Xbox 360 console. Even if you don’t know how to program at all, Beginning XNA 3.0 Game Programming: From Novice to Professional will teach you the basics of C# 2008 programming along the way. Don’t get overwhelmed with details you don’t need to know—just learn what you need to start creating your own games right now! This fast–paced introduction to XNA 3.0 and the C# language provides you with a quick–start guide to creating high–quality XNA games. You’ll be introduced to the key concepts and ideas you need to know in a gradual fashion so that you master one concept before using it as a foundation for the next. Before long you will have the skills to create smooth, professional–looking results in a range of gaming genres. By the end of the book, you will have constructed several working games and have an excellent knowledge base from w

hich to investigate more advanced techniques.


Implementing Cisco Unified Communications Manager, Part 2

Description: Implementing Cisco Unified Communications Manager, Part 2 (CIPT2), is a Cisco-authorized, self-paced learning tool for CCVP foundation learning. This book provides you with the knowledge needed to install and configure a Cisco Unified Communications Manager solution in a multisite environment. By reading this book, you will gain a thorough understanding of how to apply a dial plan for a multisite environment, configure survivability for remote sites during WAN failure, implement solutions to reduce bandwidth requirements in the IP WAN, enable Call Admission Control (CAC) and automated alternate routing (AAR), and implement device mobility, extension mobility, Cisco Unified Mobility, and voice security.


Password default:

Forensics in Telecommunications, Information and Multimedia

Product Description This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Forensics in Telecommunications, Information and Multimendia, e-Forensics 2009, held in Adelaide, Australia, in January 2009. The focus of this year’s conference has shifted to the legal rather than the deeply technical especially by incorporating the International Workshop on e-Forensics. The 21 papers deal with legal issues covering voice and telephony, image source identification and authentication, inv

estigative practice, and applications includeing surveillance.


Password default:

Research-Based Web Design & Usability Guidelines

Although recent findings show the public increasingly interacting with government Web sites, a common problem is that people can’t find what they’re looking for. In other words, the sites lack usability. The Research-Based Web Design and Usability Guidelines aid in correcting this problem by providing the latest Web design guidance from the research and other forms of evidence. This unique publication has been updated from its earlier version to include over 40 new or updated research guidelines, bringing the total to 209. Primary audiences for the book are: Web managers, designers, and all staff involved in the creation of Web sites. Topics in the book include: home page design, page and site navigation, graphics and images, effective Web content writing, and search. A new section on usability testing guidance has been added. Experts from across government, industry, and academia have reviewed and contributed to the development of the Guidelines. And, since their introduction in 2003, the Guidelines have been widely used by government, private, and academic institutions to improve Web design.
Password default:

Tuesday, June 2, 2009

After the Rain How the West Lost the East

After the Rain - How the West Lost the East

Excerpts from an anthology of articles published in Macedonia, Russia, Egypt, the Czech Republic and in periodicals throughout Eastern and Central Europe regarding the politics, economics, geopolitics and history of countries in Centraleastern Europe and SEE (Balkan).


The anthology was published in two print volumes. The first volume (titled "Macedonian on a Crossroads") was published in November 1998 (publisher : "New Literature", Skopje, Macedonia). ISBN: 9989-610-01-0

The second volume (titled "After the Rain - How the West Lost the East") was published in February 2000 (Publishers: "Narcissus Publications and Central Europe Review", Prague, Czech Republic). ISBN: 80-238-5173-X


Taking A Stand On Our National Debt

The author has chosen to use a question-answer format in order to make the often complex subject matter, easier and more enjoyable to read. Q and A is not a dialogue bewteen real people -- the author has provided the dialogue for both Q, standing for Quaero, which is Latin means "I search for" and A, Auctor, which in Latin means "person responsible."

Q- I understand you have been following the federal budget process closely for the past ten years. How did you get interested in a subject which most people find extremely boring as well as complicated?

A- My interest can be traced to 1982 and the formation of the Grace Commission.

Q- What is the Grace Commission?

A- The Grace Commission, originally known as the President's Private Sector Survey on Cost Control was established in February 1982 when President Reagan asked prominent businessman, J. Peter Grace to head a commission for the purpose of conducting a comprehensive study of government spending. The Commission was privately funded and consisted of 161 high-level private business executives familiar with cost control and efficiency.

When the Commission began its work I eagerly anticipated the results, naively thinking they would come up with a relatively quick and easy way out of our national debt problems.

Q- It sure looks like they didn't do their job.

A- Oh but they did. The Commission originally came up with 2,478 recommendations, which if implemented, would have saved $424.2 billion over three years.

Q- Then they didn't follow through?

A- More than half (1,426 proposals) had been implemented by the end of fiscal year 1987.

Q- Then why does our debt keep growing?

A- Eliminating waste is only one part of the problem. Our elected officials have continued on an unprecedented spending spree. You've no doubt heard that it took 204 years to accumulate the nation's first one trillion of debt but only 4 years to accumulate the second trillion.

Q- Which four years?

A- 1981 -1985. The debt ceiling was raised in 1985 to 1.823 trillion and then again in 1986 to 2.3 trillion. But, as was so often said during the eighties, "You, ain't seen nothing yet! " With nobody seeming to care, our elected officials kept spending. In 1990 the ceiling had to be raised to $3.5 trillion but the spending continued so that in 1991 the debt ceiling quietly passed the $4 trillion mark.

Q- You're right. I didn't hear anything about it, and if I had I wouldn't know what to make of it. This may sound stupid, but I doubt that I'm the only one confused about how the deficit is measured. It seems there are a lot of very different numbers out there all claiming to be the deficit.

A-You're absolutely right to be confused and your confusion is the result of intentional obfuscation.

Read More

A New Tax System for the United States

A New Tax System for the United States proposes elimination of the personal and corporate income tax system in the United States. The central theme of the book is that the income tax system is not only a bad tax system from an economic viewpoint, but that it has severe political and sociological drawbacks as well. The book describes how the invasion of privacy and authoritarian tactics on which the current system is based have seriously damaged the relationship of the US citizen to his government.

The book describes the inadequacies of the current US tax system; its incredible complexity; its undesirable economic incentives which discourage saving, investment, and economic growth; the high administrative cost; the instability in government revenues caused by a narrow, volatile tax base; the incentive for wasting productivity in tax avoidance; the problem it causes in international trade; the invasion of privacy; and the tyranny of the IRS. The book shows how the Tax Reform Act of 1986 has not solved the fundamental problems of the income tax system, and explores why the US Government has perpetuated such a bad tax system for so long.

A major problem with the current US tax system is its inability to produce a sufficient level of revenue to cover desired government programs. The current system has resulted in massive government deficits and extreme wealth concentrations that threaten US and world economic collapse. The new tax system proposed in this book addresses these problems; it can help avoid economic collapse and reduce the severity of depressions.

The historical development and inadequacies of the US tax system are summarized. The archaic legislative process by which the current system was developed is described, and a modern approach to "tax engineering," based on the concepts of systems analysis and systems engineering, is presented. Alternative tax methods are identified, and the advantages and disadvantages of each method are discussed. A new tax system, based on the value-added tax, or "VAT," is proposed. The book shows how the VAT can raise the same or greater revenues as the current income tax system, but with far less economic, political, and sociological cost. The new system takes a humanistic approach to taxation: the tax system is viewed as a servant of the citizen, rather than his master. The VAT is a practical and feasible alternative to the income tax system.

Through the income tax system, the US Government has set up an elaborate and powerful police-state system for regimentation of the individual citizen. You are registered and monitored, and have lost not only your privacy but most of your Bill of Rights personal liberties to the IRS. This book tells how you can help eliminate the income tax and stop the intrusion of the IRS into your life.

Read More

The Power To Tax

Geoffrey Brennan

The Power to Tax is, I think, demonstrable proof of the value of genuine research collaboration across national-cultural boundaries. Geoffrey Brennan, as a golden-voiced "wild colonial boy" from Down Under, joined our research team in Blacksburg in the 1970s, and his enthusiasm quickly spilled over and generated joint efforts. We discovered that along many, but not all, dimensions of discourse, we were on the same wavelength.

The Power to Tax is informed by a single idea—the implications of a revenue-maximizing government. The origins of the idea emerged first in a paper that we agreed to write jointly for a festschrift for Joseph Pechman. Once the idea existed, the book, more than any other of my experience, simply wrote itself. Perhaps, in part, this is how it seemed only to me, since Geoffrey Brennan was the coauthor who provided much of the sometimes difficult technical construction.

Read More

Public Finance

1. In any society that has passed beyond the lowest stage of social development, some form of governmental organisation is found to be an essential feature. The various activities or functions of this controlling body furnish the material for what are known as the 'Political Sciences' (Staatswissenschaften). Every governing body or 'State' requires for the due discharge of its functions repeated supplies of commodities and personal services, which it has to apply to the accomplishment of whatever ends it may regard as desirable. The processes involved in obtaining and using these supplies naturally vary much in the several stages of social advance: they are comparatively simple and direct in a primitive community, while in a modern industrial society they present a high degree of complication, and are carried out by elaborate regulations. For all States, however—whether rude or highly developed—some provisions of the kind are necessary, and therefore the supply and application of state resources constitute the subject-matter of a study which is best entitled in English, Public Finance.

Read More

The Demand And Supply Of Public Goods

People are observed to demand and to supply certain goods and services through market institutions. They are observed to demand and to supply other goods and services through political institutions. The first are called private goods; the second are called public goods.

Neoclassical economics provides a theory of the demand for and the supply of private goods. But what does "theory" mean in this context? This question can best be answered by examining the things that theory allows us to do. Explanation is the primary function of theory, here as everywhere else. For the private-goods world, economic theory enables us to take up the familiar questions: What goods and services shall be produced? How shall resources be organized to produce them? How shall final goods and services be distributed? Note, however, that theory here does not provide the basis for specific forecasts. Instead, it allows us to develop an explanation of the structure of the system, the inherent logical structure of the decision processes. With its help we understand and explain how such decisions get made, not what particular pattern of outcome is specifically chosen

Read More

Code And Other Laws Of Cyberspace

In line with the guidelines for this project -- which are to update the book not rewrite it -- some obvious goals suggest themselves:

  • Identify the issues discussed in the chapter that have evolved in the six years or so since the book was written
  • Update the book's discussion of those issues as needed

However, to make the work of revising the book more than an exercise in graduate research, I'd like to try a couple of things (and remain open to other suggestions):

  • Identify the key terms in the chapter's argument and explain them and cross-reference (hyperlink) them to the rest of the book; in particular, focus on the "code is law" argument
  • Outline the central points in the chapter's argument and comment briefly upon how the events of the past six years have reinforced or weakened them

And my personal goals with regard both to this chapter and the Preface:

  • To revisit the distinctions Lessig draws between his view of cyberspace and my own and Vernor Vinge's -- doing this could create a conversational Chapter 1, which perhaps would be its own document separate from Code v.2

Read More

Copyright Basics

(See Format Note at end of document.)

Table of Contents

+ What Is Copyright?
+ Who Can Claim Copyright
+ Copyright and National Origin of the Work
+ What Works Are Protected?
+ What Is Not Protected by Copyright?
+ How to Secure Copyright
+ Publication
+ Notice of Copyright
+ Form of Notice for Visually Perceptible Copies
+ Form of Notice for Phonorecords of Sound Recordings
+ Position of Notice
+ Publications Incorporating U.S. Government Works
+ Unpublished Works
+ Omission of Notice and Errors in Notice
+ How Long Copyright Protection Endures
+ Transfer of Copyright
+ Termination of Transfers
+ International Copyright Protection
+ Copyright Registration
+ Registration Procedures
+ Original Registration
+ Special Deposit Requirements
+ Unpublished Collections
+ Effective Date of Registration
+ Corrections and Amplifications of Existing Registrations
+ Mandatory Deposit for Works Published in the United States
+ Use of Mandatory Deposit to Satisfy Registration Requirements
+ Who May File an Application Form?
+ Application Forms
+ Fill-in Forms
+ Fees
+ Search of Copyright Office Records
+ For Further Information
Read More

Educating Children With Autism by Committee On Educational Interventions For Children With Autism

Executive Summary

Autistic spectrum disorders are present from birth or very early in development and affect essential human behaviors such as social interaction, the ability to communicate ideas and feelings, imagination, and the establishment of relationships with others. Although precise neurobiological mechanisms have not yet been established, it is clear that autistic spectrum disorders reflect the operation of factors in the developing brain. Autistic disorders are unique in their pattern of deficits and areas of relative strengths. They generally have lifelong effects on how children learn to be social beings, to take care of themselves, and to participate in the community. The autism spectrum occurs along with mental retardation and language disorder in many cases. Thus, educational planning must address both the needs typically associated with autistic disorders and needs associated with accompanying disabilities.

Education, both directly of children, and of parents and teachers, is currently the primary form of treatment for autistic spectrum disorders. The education of children with autistic disorders was accepted as a public responsibility under the Education of All Handicapped Children Act in 1975. Despite the federal mandate, however, the goals, methods and resources available vary considerably from state to state and school system to school system. In the last few years, due to a confluence of factors, courts have become increasingly active in determining the methods and resources allocated by school systems for the education of young children with autistic spectrum disorders.


Monday, June 1, 2009

Linux Firewalls mit iptables & Co.

Addison Wesley Verlag | 2005-09-30 | ISBN: 3827321360 | 640 pages | PDF | 10,7 MB
Wohlan, einer muss es ja machen :) Mit Linux Firewalls mit iptables & Co. nimmt sich Ralf Spenneberg den seit dem Linux-Kerneln 2.4 und 2.6 existierende Paketfilter Netfilter/Iptables vor und bereitet das Linux-Firewall-Thema sowohl für Linux-feste Einsteiger als auch für iptables-Kenner auf dem aktuellen Stand verständlich und praxistauglich auf.
Spenneberg hat sich seine Sporen in der Security-OpenSource-Welt bereits mit den zwei erfolgreichen Fachbüchern VPN mit Linux und Intrusion Detection und Prevention mit Snort 2 & Co verdient.
Los geht es mit den Firewall-Grundlagen — dieser Teil richtet sich an Security-Einsteiger, ist aber auch als fundiertes Hintergrundwissen für gestandene Firewaller sinnvoll, denn hin und wieder muss man ja auch beschreiben, was man da den ganzen Tag so macht, wenn man firewalled. Dann steigt Spenneberg in die iptables-Materie ein und zeigt die Umsetzung einer Firewall auf einem Gateway mit iptables — hinzu kommt Background und Praxis zur Systemhärtung und Intrusion-Detection. In Teil drei beschreibt er dann die klassische Firewall-Architektur am Beispiel einer lokalen und einer Firewall mit DMZ vor. Umsetzung und Troubleshooting inbegriffen. Teil vier beherbergt dann die Werkzeugkiste fürs Firewall-basteln: Protokollserver, Zeitserver, Protokollanalysewerkzeuge, Oberflächen für die Administration bis hin zu Test-Tools. Der fünfte Teil richtet sich dann an Leser, die wissen was sie tun: eine Referenz der iptables-Funktionen bis hin zur Zukunftsaussicht der iptables. Spannend auch Teil sechs: transparente Firewalls, die auf der IP-Ebene unsichtbar sind und Teil sieben schließlich beinhaltet die Filterung von DHCP, IPv6 oder IPsec. Auf der CD eine User-Mode-Linux-Umgebung für die einfachen Beispiele aus dem Buch und natürlich alle Werkzeuge.
Konzentriert und umfassend hat Spenneberg seinen Blick auf die Iptables in Linux Firewalls mit iptables & Co. zusammengefasst und aufbereitet — ein Buch von dem man merkt, dass Spenneberg es selbst auch gern lesen würde.