Industrial and Engineering Software Reference Materials
Engineering Books
Reference Articles 201 - 300 of 418
-
MCSA/MCSE Exam 70-290: Managing and Maintaining a Windows Server 2003 Environment Study Guide
Description: MCSA/MCSE Exam 70-290: Managing and Maintaining a Windows Server 2003 Environment Study Guide This study system gives readers 100 percent coverage of the official Microsoft 70-290 exam objectives ...
-
MCSA/MCSE Exam 70-292: Managing and Maintaining a Windows Server 2003 Environment for an MCSE Certified on Windows 2000 Study Guide
Description: MCSA/MCSE Exam 70-292: Managing and Maintaining a Windows Server 2003 Environment for an MCSE Certified on Windows 2000 Study Guide This study guide gaurantees full coverage of Microsoft's Exam ...
-
MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure: Exam 70-297 Study Guide
Description: MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure: Exam 70-297 Study Guide This guide will help you prepare for and pass Microsoft Exam 70-297, Designing a Windows ...
-
MCSE Designing Security for a Windows Server 2003 Network Exam 70-298 Study Guide
Description: MCSE Designing Security for a Windows Server 2003 Network Exam 70-298 Study Guide Use this guide to help you prepare for and pass Microsoft s exam 70-298, Designing Security for a Microsoft Windows ...
-
MCSE Exam 70-296: Planning, Implementing and Maintaining a Windows Server 2003 Environment for an MCSE Certified on Windows 2000 Study Guide
Description: MCSE Exam 70-296: Planning, Implementing and Maintaining a Windows Server 2003 Environment for an MCSE Certified on Windows 2000 Study Guide This study guide and training system gives you 100% ...
-
MCSE/MCSA Implementing & Administering Security in a Windows 2000 Network Study Guide (Exam 70-214)
Description: MCSE/MCSA Implementing & Administering Security in a Windows 2000 Network Study Guide (Exam 70-214) This study guide includes 100% coverage of all exam objectives for MCSE/MCSA exam 70-214. ...
-
Metasploit Toolkit: For Penetration Testing, Exploit Development, and Vulnerability Research
Description: Metasploit Toolkit: For Penetration Testing, Exploit Development, and Vulnerability Research Providing penetration testers and security researchers with a fully integrated suite of tools for ...
-
MICO: An Open Source CORBA Implementation
Description: MICO: An Open Source CORBA Implementation This book shows you how to build and manage your own professional, industrial-strength CORBA applications using MICO. ...
-
Microsoft Log Parser Toolkit
Description: Microsoft Log Parser Toolkit Written by Microsoft's Log Parser developer, this book contains hundreds of customized, working scripts and templates that system administrators will find invaluable for ...
-
Microsoft Outlook 2000 E-mail and Fax Guide
Description: Microsoft Outlook 2000 E-mail and Fax Guide A tutorial and reference for advanced users and administrators. ...
-
Microsoft Outlook Programming: Jumpstart for Administrators, Power Users, and Developers
Description: Microsoft Outlook Programming: Jumpstart for Administrators, Power Users, and Developers Unleash the power of MS Outlook to cutomize and use macros and templates for programs like Excel and Word, and ...
-
Microsoft SharePoint Portal Server: Building Knowledge-Sharing Applications
Description: Microsoft SharePoint Portal Server: Building Knowledge-Sharing Applications A hands-on guide to understanding and using Microsoft s knowledge-based portal server. ...
-
Microsoft SQL Server 2000 Performance Optimization and Tuning Handbook
Description: Microsoft SQL Server 2000 Performance Optimization and Tuning Handbook A step by step guide to designing and tuning your SQL Server DBMS for maximum performance. ...
-
Microsoft Vista for IT Security Professionals
Description: Microsoft Vista for IT Security Professionals Describing the security features of Vista, this guide shows how to safely integrate Vista with existing wired and wireless network infrastructure and how ...
-
Mission Critical Microsoft Exchange 2003
Description: Mission Critical Microsoft Exchange 2003 This resource meets the needs of those striving to maintain a production Exchange environment that delivers superior service levels, high availability, ...
-
Mission-Critical Active Directory
Description: Mission-Critical Active Directory Learn how to plan and manage a large-scale enterprise through Windows 2000 Active Directory. ...
-
Mission-Critical Microsoft Exchange 2000: Building Highly Available Messaging and Knowledge Management Systems
Description: Mission-Critical Microsoft Exchange 2000: Building Highly Available Messaging and Knowledge Management Systems Learn important best practices for ensuring high availability of Exchange Server ...
-
Modeling and Simulation of Aerospace Vehicle Dynamics
Description: Modeling and Simulation of Aerospace Vehicle Dynamics Unifying all aspects of flight dynamics for the efficient development of aerospace vehicle simulations, this detailed text provides the reader ...
-
Modelling of Mechanical Systems: Discrete Systems, Volume 1
Description: Modelling of Mechanical Systems: Discrete Systems, Volume 1 This text provides new and unusual insights into the fascinating and notoriously difficult-to-master subject of predicting and controlling ...
-
Monitoring and Managing Microsoft Exchange 2000 Server
Description: Monitoring and Managing Microsoft Exchange 2000 Server Presents best practices and innovative everyday techniques for running Exchange Server for Windows 2000. ...
-
Monitoring and Managing Microsoft Exchange Server 2003
Description: Monitoring and Managing Microsoft Exchange Server 2003 This authoritative book teaches IT professionals responsible for Exchange messaging systems how to efficiently manage the program's many and ...
-
Hack Proofing Your Web Applications
Description: Hack Proofing Your Web Applications It's easier to protect your Web applications if you know how crackers will attack them. ...
-
Hacking a Terror Network: The Silent Threat of Covert Channels
Description: Hacking a Terror Network: The Silent Threat of Covert Channels Using technologies drawn straight from the computer security world, this cyber-thriller uses a fictional scenario to demonstrate how ...
-
Hacking the Code: ASP.NET Web Application Security
Description: Hacking the Code: ASP.NET Web Application Security This unique book walks you through the many threats to your web application code, from managing and authorizing users and encrypting private data to ...
-
Implementing a Digital Asset Management System: For Animation, Computer Games, and Web Development
Description: Implementing a Digital Asset Management System: For Animation, Computer Games, and Web Development Covering all the essentials of digital asset management systems, this guide explains how top CG ...
-
Information Modeling and Relational Databases: From Conceptual Analysis to Logical Design
Description: Information Modeling and Relational Databases: From Conceptual Analysis to Logical Design The only book to go beyond introductory coverage of Object-Role-Modeling and provide all the in-depth ...
-
Information Security Best Practices: 205 Basic Rules
Description: Information Security Best Practices: 205 Basic Rules This manual will take the mystery out of configuring an information security solution and provide a framework which the novice as well as ...
-
Information Visualization: Perception for Design
Description: Information Visualization: Perception for Design This text explores the art and science of why we see objects the way we do. The author isolates key principles at work in vision and perception, and ...
-
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Description: Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft Written to teach IT professionals and law enforcement officials about the dangers posed by insiders to their IT ...
-
Instant DVD Workshop 2.0
Description: Instant DVD Workshop 2.0 Featuring carefully detailed screenshots and step-by-step instructions, this Instant guide will show you how to create DVDs with Ulead software in a concise, time-efficient ...
-
Instant Encore 1.5
Description: Instant Encore 1.5 As a learning tool or a handy reference, this screenshot-intensive guide illustrates how to use Encore 1.5 in a concise, time-efficient way. You get a complete tour of the DVD ...
-
Intangible Management: Tools for Solving the Accounting and Management Crisis
Description: Intangible Management: Tools for Solving the Accounting and Management Crisis By using case studies, a compelling mixture of theory and applications, and a set of accounting tools, the authors ...
-
Integrating E-mail: From the Intranet to the Internet
Description: Integrating E-mail: From the Intranet to the Internet Basic information and tips on implementing a unified e-mail system across different platforms and locations. ...
-
Intelligent Innovation: Four Steps to Achieving a Competitive Edge
Description: Intelligent Innovation: Four Steps to Achieving a Competitive Edge Explaining the importance and application of innovation throughout the lifecycle of any product or service, this book uses a ...
-
Introduction to Knowledge Management: KM in Business
Description: Introduction to Knowledge Management: KM in Business Easy to read and user-friendly, this book introduces you to a wide range of knowledge management (KM) tools, techniques and terminology for ...
-
Investigative Data Mining for Security and Criminal Detection
Description: Investigative Data Mining for Security and Criminal Detection This text introduces security professionals, intelligence and law enforcement analysts, and criminal investigators to the use of data ...
-
IT Investment: Making a Business Case
Description: IT Investment: Making a Business Case Shows how to present an IT project s expenses in terms of an investment in business practices and processes. ...
-
IT Manager's Handbook: Getting Your New Job Done
Description: IT Manager's Handbook: Getting Your New Job Done This is a how to be an IT manager book, and it covers every area possible and then some. ...
-
IT Performance Management
Description: IT Performance Management Taking an approach based on the flow of money and related management objectives, this book addresses the way organizations should balance the demand and supply of IT, ...
-
Joe Celko's SQL for Smarties: Advanced SQL Programming, Third Edition
Description: Joe Celko's SQL for Smarties: Advanced SQL Programming, Third Edition Offering tips and techniques, as well as the best solutions to old and new challenges, this book features new examples and ...
-
Juniper Networks Secure Access SSL VPN Configuration Guide
Description: Juniper Networks Secure Access SSL VPN Configuration Guide Offering complete coverage of the Juniper Networks Secure Access SSL VPN line, this comprehensive guide will allow you to configure these ...
-
Knowledge Discovery and Data Mining
Description: Knowledge Discovery and Data Mining Presents many fundamental technologies and recent advances in data mining and knowledge discovery. ...
-
LEAN Manufacturing Implementation: A Complete Execution Manual for Any Size Manufacturer
Description: LEAN Manufacturing Implementation: A Complete Execution Manual for Any Size Manufacturer This manual illustrates the methodologies that will help you produce higher quality products at a lower cost ...
-
Lean Six Sigma Logistics: Strategic Development to Operational Success
Description: Lean Six Sigma Logistics: Strategic Development to Operational Success Covering the technical issues as well as the leadership aspects of Lean Six Sigma Logistics, this book provides the vehicle to ...
-
Linking Learning and Performance: A Practical Guide to Measuring Learning and On-the-Job Application
Description: Linking Learning and Performance: A Practical Guide to Measuring Learning and On-the-Job Application Provides a step-by-step approach for developing learning and performance measures and a method for ...
-
Linux & OpenVMS Interoperability: Tricks for Old Dogs, New Dogs, and Hot Dogs with Open Systems
Description: Linux & OpenVMS Interoperability: Tricks for Old Dogs, New Dogs, and Hot Dogs with Open Systems This book gives you access to the best resources of both Linux and Open VMS systems by providing ...
-
Linux and the Unix Philosophy
Description: Linux and the Unix Philosophy Unlike so many books that focus on how to use Linux, this text explores why Linux is a superior implementation of Unix's highly capable operating system. ...
-
Nessus Network Auditing
Description: Nessus Network Auditing Learn about this open-source vulnerability scanner, how to get the most out of the tool, recognize its limitations and how to deal with them, and what makes it flexible to ...
-
Nessus, Snort & Ethereal Power Tools: Customizing Open Source Security Applications
Description: Nessus, Snort & Ethereal Power Tools: Customizing Open Source Security Applications If you have Nessus, Snort, and Ethereal up and running and are ready to customize, code, and torque these tools ...
-
Network Security Assessment: From Vulnerability to Patch
Description: Network Security Assessment: From Vulnerability to Patch Using business case studies and examples of real world vulnerabilities, this detailed book takes readers from the creation of corresponding ...
-
Network Security Evaluation Using the NSA IEM
Description: Network Security Evaluation Using the NSA IEM Guiding the INFOSEC professional through a step-by-step process to ensure customers get the most accurate evaluation of their network security posture, ...
-
Directing the Flow of Product: A Guide to Improving Supply Chain Planning
Description: Directing the Flow of Product: A Guide to Improving Supply Chain Planning For those needing insight into how to improve operations through better planning, this text offers the state-of-the-art in ...
-
Distributed Systems Architecture: A Middleware Approach
Description: Distributed Systems Architecture: A Middleware Approach Describing middleware from the viewpoint of the systems programmer and the applications programmer, this hands-on guide focuses on the use of ...
-
Dynamic Scheduling With Microsoft Office Project 2003: The Book by and for Professionals
Description: Dynamic Scheduling With Microsoft Office Project 2003: The Book by and for Professionals Written by a certified PMP and project management practitioner with over 17 years of experience using and ...
-
E-Mail Virus Protection Handbook
Description: E-Mail Virus Protection Handbook This book explains to end users, in plain language, what the threats are, and how to deal with them. ...
-
Elements of Financial Risk Management
Description: Elements of Financial Risk Management Focusing on implementation, this book is for practitioners in the financial services and investment industries, as well as graduate students and advanced ...
-
Fault-Tolerant Systems
Description: Fault-Tolerant Systems Reflecting the real-world challenges faced by designers of fault-tolerant systems, this up-to-date book addresses fault tolerance design with a systems approach to both ...
-
File Interchange Handbook: For Images, Audio, and Metadata
Description: File Interchange Handbook: For Images, Audio, and Metadata A must-read reference for every film and video professional moving to computer-based production and distribution, this one-stop resource ...
-
Financial Planning using Excel: Forecasting, Planning and Budgeting Techniques
Description: Financial Planning using Excel: Forecasting, Planning and Budgeting Techniques Containing a wealth of practical examples, tips, and new techniques, this book will help you to quickly exploit and ...
-
Food Supply Chain Management: Issues for the Hospitality and Retail Sectors
Description: Food Supply Chain Management: Issues for the Hospitality and Retail Sectors Including examples and case studies from large international retail and hospitality organizations, this book undertakes an ...
-
Forecasting Expected Returns in the Financial Markets
Description: Forecasting Expected Returns in the Financial Markets Presenting new and developing techniques in forecasting, this book brings together a collection of leading thinkers and practitioners from around ...
-
From COBOL to OOP
Description: From COBOL to OOP Written for the experienced COBOL programmer, this nuts and bolts guide offers a comprehensive introduction to OOP techniques, and provides a migration of 10 million lines of COBOL ...
-
Globus Toolkit 4: Programming Java Services
Description: Globus Toolkit 4: Programming Java Services If you re making the leap into Grid Computing using the Globus Toolkit, this tutorial helps you use the exciting new computing paradigm to share processing ...
-
Google Hacking for Penetration Testers
Description: Google Hacking for Penetration Testers Borrowing the techniques pioneered by malicious "Google hackers," this book aims to show security practitioners how to properly protect clients from this often ...
-
Google Talking
Description: Google Talking Teaching readers how to blow the lid off Instant Messaging and phone calls over the Internet, this groundbreaking guide covers the program Google Talk in its entirety--from its ...
-
Grid Computing: The New Frontier of High Performance Computing
Description: Grid Computing: The New Frontier of High Performance Computing Written by academic and industrial experts who have developed or used grid computing, this text covers most essential and technically ...
-
Groupware, Workflow and Intranets: Reengineering the Enterprise with Collaborative Software
Description: Groupware, Workflow and Intranets: Reengineering the Enterprise with Collaborative Software How groupware and workflow technologies can improve organizational efficiency. ...
-
GUI Bloopers: Don'ts and Do's for Software Developers and Web Designers
Description: GUI Bloopers: Don'ts and Do's for Software Developers and Web Designers This book cuts right to the core of the most common interface problems, offering real-world advice to the computer software ...
-
Hack Proofing Windows 2000 Server
Description: Hack Proofing Windows 2000 Server Addresses concerns one might have about network security and how to protect your network environment. ...
-
Hack Proofing your E-commerce Site: The Only Way to Stop a Hacker Is to Think Like One
Description: Hack Proofing your E-commerce Site: The Only Way to Stop a Hacker Is to Think Like One Secure your e-commerce site by thinking like a hacker. ...
-
Java Web Services Architecture
Description: Java Web Services Architecture This is a no-nonsense guide to web services technologies including SOAP, WSDL, UDDI and the JAX APIs; it provides an unbiased look at many of the practical ...
-
Joe Celko's Data and Databases: Concepts in Practice
Description: Joe Celko's Data and Databases: Concepts in Practice A "big picture" look at database design and programming for all levels of developers. ...
-
Developer's Guide to Web Application Security
Description: Developer's Guide to Web Application Security Addressing security issues from the earliest stages of development onward, this book offers instructions and recommendations that should reduce both the ...
-
Numerical Computation of Internal & External Flows
Description: Numerical Computation of Internal & External Flows Written to be used as either a course text or reference for practitioners and researchers, this book explains the use of basic CFD methods to ...
-
Object-Oriented Programming for Windows 95 and NT
Description: Object-Oriented Programming for Windows 95 and NT A beginner to intermediate level guide to object-oriented programming for the Windows 95 and NT platforms. ...
-
Object-Oriented Reengineering Patterns
Description: Object-Oriented Reengineering Patterns This reference details how to overturn legacy systems and comprehend difficulties, then reengineer the systems to comply with the new stipulations. ...
-
Open Source Fuzzing Tools
Description: Open Source Fuzzing Tools Examining the fuzz testing transition from a hacker-grown tool to a commercial-grade product, this text explains how Fuzzing finds vulnerabilities, serves as a QA tool, how ...
-
OpenVMS System Management Guide, 2nd Edition
Description: OpenVMS System Management Guide, 2nd Edition This complete text details the tools, technologies and techniques that can configure, maintain, and tune computers running Hewlett-Packard's ...
-
OpenVMS with Apache, OSU, and WASD
Description: OpenVMS with Apache, OSU, and WASD Whether you're an experienced webmaster new to OpenVMS or an old Open VMS new to webservers, this book will save you time and help you do your job better. ...
-
Operational Risk and Resilience
Description: Operational Risk and Resilience This book will help turn your firm into a "risk aware" organization which will be able to avoid catastrophic loss. It will also enable senior management to make better ...
-
Oracle Data Warehouse Tuning for 10g
Description: Oracle Data Warehouse Tuning for 10g Taking users beyond the basics to critical issues in running the most efficient data warehouse applications, this book illustrates how to keep data going in and ...
-
Oracle High Performance Tuning for 9i and 10g
Description: Oracle High Performance Tuning for 9i and 10g This text covers the three parts of tuning an Oracle database: data modeling, SQL code tuning, and physical database configuration, and explains both ...
-
Oracle Real Application Clusters
Description: Oracle Real Application Clusters This book provides comprehensive coverage of the features, technology and principles of RAC that is part of the Oracle9i release of Oracle's RDBMS product. ...
-
Oracle8 on Windows NT
Description: Oracle8 on Windows NT A guide to the care and feeding of an Oracle8 database running under Windows NT. ...
-
Oracle9iR2 Data Warehousing
Description: Oracle9iR2 Data Warehousing This book will show you how to use the Oracle database with tools such as Oracle Discoverer to query the warehouse, generate reports that can be deployed over the web, and ...
-
Palm OS Web Application Developer's Guide: Developing and Delivering PQAs with Web Clipping
Description: Palm OS Web Application Developer's Guide: Developing and Delivering PQAs with Web Clipping Teach yourself how to develop wireless Web applications for the Palm. ...
-
Penetration Tester's Open Source Toolkit
Description: Penetration Tester's Open Source Toolkit Written by the security industry s foremost penetration testers, this authoritative reference allows readers to unravel the mysteries of identifying targets, ...
-
Perfect Passwords: Selection, Protection, Authentication
Description: Perfect Passwords: Selection, Protection, Authentication Balancing the rigid needs of security professionals against the ease of use desired by users, this highly entertaining and informative guide ...
-
Phishing Exposed
Description: Phishing Exposed Providing an in-depth, high-tech view from both sides of the phishing playing field, this invaluable book exposes technical and financial techniques used by international clandestine ...
-
Practical Production Control: A Survival Guide for Planners and Schedulers
Description: Practical Production Control: A Survival Guide for Planners and Schedulers Clearly defining the challenges of daily production control, this text is a soup-to-nuts, practical guide and reference that ...
-
Profitable Sarbanes-Oxley Compliance: Attain Improved Shareholder Value and Bottom-Line Results
Description: Profitable Sarbanes-Oxley Compliance: Attain Improved Shareholder Value and Bottom-Line Results Describing the new realities facing firms, this book spells out the steps needed to meet the new ...
-
Programming with Quartz: 2D and PDF Graphics in Mac OS X
Description: Programming with Quartz: 2D and PDF Graphics in Mac OS X Written by members of the development team at Apple, this unique guide describes the sophisticated graphics system of Mac OS X, and serves as ...
-
Progressive Manufacturing: Managing Uncertainty While Blazing a Trail to Success
Description: Progressive Manufacturing: Managing Uncertainty While Blazing a Trail to Success Written for operations, production, and supply chain professionals, this guide provides thought-provoking techniques ...
-
Project Management for Business and Engineering: Principles and Practice, 2nd Edition
Description: Project Management for Business and Engineering: Principles and Practice, 2nd Edition Including over 230 figures and tables, 60 examples and cases, and end-of-chapter summaries, review problems, ...
-
Project Manager's Toolkit: Practical Checklists for Systems Development
Description: Project Manager's Toolkit: Practical Checklists for Systems Development Offering practical and easy to apply checklists, this quick reference provides a fast way to reduce an insolvable problem/issue ...
-
Project Quality Management: Why, What and How
Description: Project Quality Management: Why, What and How Providing coherent tools and techniques, as well as practical exercises, this book gives project managers a framework of deliberate steps to take in ...
-
Purchase Order Management Best Practices: Process, Technology, and Change Management
Description: Purchase Order Management Best Practices: Process, Technology, and Change Management Offering practical, proven tactics and detailed guidance into every aspect of POM process redesign, this book ...
-
Quality Beyond Six Sigma
Description: Quality Beyond Six Sigma Providing a practical implementation of the issues of Six Sigma, Lean Enterprise and Total Quality, this stimulating guide aligns the 'hard' sigma message with the softer ...
-
QuickTime for .NET and COM Developers
Description: QuickTime for .NET and COM Developers Featuring a number of implementation examples to illustrate key QuickTime features ranging from a simple movie player to a sophisticated interactive application, ...
-
QuickTime for the Web: For Windows and Macintosh, Second Edition
Description: QuickTime for the Web: For Windows and Macintosh, Second Edition A comprehensive explanation of QuickTime for every multimedia author. ...