Monday, November 30, 2009

Next Generation Java Testing or Cisco Wireless LAN Security

Next Generation Java Testing: TestNG and Advanced Concepts

Author: Cedric Beust

Enterprise Java developers must achieve broader, deeper test coverage, going beyond unit testing to implement functional and integration testing with systematic acceptance. Next Generation Java Testing introduces breakthrough Java testing techniques and TestNG, a powerful open source Java testing platform.

Cédric Beust, TestNG's creator, and leading Java developer Hani Suleiman, present powerful, flexible testing patterns that will work with virtually any testing tool, framework, or language. They show how to leverage key Java platform improvements designed to facilitate effective testing, such as dependency injection and mock objects. They also thoroughly introduce TestNG, demonstrating how it overcomes the limitations of older frameworks and enables new techniques, making it far easier to test today's complex software systems.

Pragmatic and results-focused, Next Generation Java Testing will help Java developers build more robust code for today's mission-critical environments.

This book

  • Illuminates the tradeoffs associated with testing, so you can make better decisions about what and how to test
  • Introduces TestNG, explains its goals and features, and shows how to apply them in real-world environments
  • Shows how to integrate TestNG with your existing code, development frameworks, and software libraries
  • Demonstrates how to test crucial code features, such as encapsulation, state sharing, scopes, and thread safety
  • Shows how to test application elements, including JavaEE APIs, databases, Web pages, and XML files
  • Presents advanced techniques:testing partial failures, factories, dependent testing, remote invocation, cluster-based test farms, and more
  • Walks through installing and using TestNG plug-ins for Eclipse, and IDEA
  • Contains extensive code examples

Whether you use TestNG, JUnit, or another testing framework, the testing design patterns presented in this book will show you how to improve your tests by giving you concrete advice on how to make your code and your design more testable.



Table of Contents:

Foreword xiii
Preface xv
Acknowledgments xxi
About the Authors xxiii

Chapter 1: Getting Started 1

Beyond JUnit 3 3
JUnit 4 7
Designing for Testability 8
TestNG 17
Conclusion 21

Chapter 2: Testing Design Patterns 23

Testing for Failures 23
Factories 34
Data-Driven Testing 39
Asynchronous Testing 67
Testing Multithreaded Code 71
Performance Testing 83
Mocks and Stubs 90
Dependent Testing 103
Inheritance and Annotation Scopes 113
Test Groups 119
Code Coverage 132
Conclusion 150

Chapter 3: Enterprise Testing 153

A Typical Enterprise Scenario 154
A Concrete Example 157
Test Implementation 160
Exploring the Competing Consumers Pattern 182
The Role of Refactoring 186
Conclusion 194

Chapter 4: Java EE Testing 197

In-Container versus Out-of-Container Testing 198
In-Container Testing 200
Java Naming and Directory Interface (JNDI) 207
Java Database Connectivity (JDBC) 210
Java Transaction API (JTA) 215
Java Messaging Service (JMS) 219
Java Persistence API (JPA) 225
Enterprise Java Beans 3.0 (EJB3) 236
Java API for XML Web Services (JAX-WS) 246
Servlets 255
XML 262
Conclusion 266

Chapter 5: Integration 269

Guice 280
DbUnit 295
HtmlUnit 303
Selenium 310
Swing UI Testing 312
Tests for Painting Code 316
Continuous Integration 320
Conclusion 322

Chapter 6: Extending TestNG 325

The TestNG API 325
BeanShell 335
Method Selectors 341
Annotation Transformers 346
Reports 355
Writing Custom Annotations 366
Conclusion 375

Chapter 7: Digressions 377

Motivation 377
The TestNG Philosophy 378
The Care and Feeding of Exceptionsv378
Stateful Tests 382
The Pitfalls of Test-Driven Development 385
Testing Private Methods 388
Testing versus Encapsulation 391
The Power of Debuggers 392
Logging Best Practices 394vThe Value of Time 397
Conclusion 399

Appendix A: IDE Integration 401

Eclipse 401
IntelliJ IDEA 411

Appendix B: TestNG Javadocs 421

JDK 1.4 and JDK 5 421
Shortcut Syntax for JDK 5 Annotations 423
Annotation Javadocs 423
The org.testng.TestNG Class 428
The XML API 432

Appendix C: testng.xml 435

Overview 436
Scopes 437
XML Tags 437

Appendix D: Migrating from JUnit 449

JUnitConverter 449
Integrated Development Environments 453
Incremental Migration and JUnit Mode 455
Converting JUnit Code 456

Index 471

Read also Designing and Engineering Time or Find Gold in Windows Vista

Cisco Wireless LAN Security

Author: Krishna Sankar

Expert guidance for securing your 802.11 networks

  • Learn best practices for securely managing, operating, and scaling WLANs
  • Comprehend the security-related technological underpinnings of WLANs
  • Explore new security protocols in 802.11i and WPA and learn how they prevent attacks
  • Review centralized deployment models for wired/wireless integration
  • Deepen your knowledge of defense by understanding the tools that attackers use to perform reconnaissance and to attack authentication and encryption mechanisms
  • Understand how to design secure WLANs to support enterprise applications with the new standards and practices detailed in this book
  • Reference the next generation authentication standards and protocols
  • Find out about mobility, hotspots, and campus wireless networks
  • Grasp Open Authentication, MAC-based authentication, shared key authentication, EAP authentication protocols, WEP, WPA, and 802.11i

Cisco Wireless LAN Security is an in-depth guide to wireless LAN technology and security, introducing the key aspects of 802.11 security by illustrating major wireless LAN (WLAN) standards that can protect the entire network. Because a WLAN is less effective as an isolated piece of the network, this book emphasizes how to effectively integrate WLAN devices into the wired network while maintaining maximum security.

Cisco Wireless LAN Security covers the spectrum of WLAN security, including protocols and specifications, vulnerabilities and threats, and, especially, deployment patterns and design guidelines. With a unique combination of theory and practice, this book addresses fundamentalwireless concepts, such as WEP, and innovations, such as EAP, switching, and management. Each chapter includes detailed illustrations, checklists, design templates, and other resources. You will also find generic wireless deployment patterns based on real-world customer installations and functional examples of architecture, design, and best practices.

Whether you currently design, configure, implement, and maintain WLANs or simply want to explore wireless security issues, Cisco Wireless LAN Security has everything you need to understand how to create a seamlessly secure, impenetrable 802.11 network.

This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.



Sunday, November 29, 2009

Screenos Cookbook or Digital Manga Workshop

ScreenOs Cookbook

Author: Stefan Brunner

Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep ScreenOS systems on track. ScreenOS Cookbook gives you real-world fixes, techniques, and configurations that save time -- not hypothetical situations out of a textbook. The book comes directly from the experience of engineers who have seen and fixed every conceivable ScreenOS network topology, from small branch office firewalls to appliances for large core enterprise and government, to the heavy duty protocol driven service provider network. Its easy-to-follow format enables you to find the topic and specific recipe you need right away and match it to your network and security issue. Topics include: Configuring and managing ScreenOS firewalls NTP (Network Time Protocol) Interfaces, Zones, and Virtual Routers Mitigating Denial of Service Attacks DDNS, DNS, and DHCP IP Routing Policy-Based Routing Elements of Policies Authentication Application Layer Gateway (SIP, H323, RPC, RTSP, etc., ) Content Security Managing Firewall Policies IPSEC VPN RIP, OSPF, BGP, and NSRP Multicast -- IGPM, PIM, Static Mroutes Wireless Along with the usage and troubleshooting recipes, you will also find plenty of tricks, special considerations, ramifications, and general discussions of interesting tangents and network extrapolation. For the accurate, hard-nosed information you require to get your ScreenOS firewall network secure and operating smoothly, nobookmatches ScreenOS Cookbook.



Interesting book: Marijuana Medicine or Hwa Yu Tai Chi Chuan

Digital Manga Workshop: An Artist's Guide to Creating Manga Illustrations on Your Computer

Author: Jared Hodges

The unique Japanese cartoon style known as manga, with its exaggerated stylistic characters and vivid colors, has caught the attention of America. Now, with the advent of digital tools like Photoshop and Painter, manga artists have discovered new ways of bringing their artwork to life and onto the computer -- with astounding results!

This complete guide presents a wealth of information by exploring the digital possibilities of creating manga-style artwork. It details the entire process, from initial rough sketches, to the finished color image, with in-depth instructions and illustrations that demonstrate the intricacies of each technique. It also deals with a variety of inking and coloring styles.revealing the secrets of how to achieve smooth, highly detailed line art directly on screen, how to recreate the appearance of traditional animation with cel-art techniques, and how to achieve a soft, dreamy, or traditional look with airbrush, watercolor, and painting tools. It also explains how custom backgrounds, special effects, and the use of filters can add the finishing touches that exemplify professional results.



Friday, November 27, 2009

Foundation Flex for Developers or Mastering Dojo

Foundation Flex for Developers: Data-Driven Applications with PHP, ASP.NET, ColdFusion, and FDS

Author: Sas Jacobs

Flex is a very powerful and versatile technology for creating web application front-ends. But what every good web application needs is a robust data source, be it XML, or a database. Flex is very adaptable in terms of connecting to data sources, and that is the main focus of this book.
In Foundation Flex for Developers, Sas Jacobs assumes that you've got the basics of Flex down already, and explores in detail how to create professional data-centric Flex 2 and Flex 3 applications. In the first half of the book, she starts off with a brief exploration of Flex and ActionScript 3.0, before looking at application essentials in detailcreating custom components, user and web browser interactions, binding, formatting, and validating data, debugging, and more.
In the second half of the book, the focus is on connecting Flex to data sources, and covers XML, Flex Data Services, PHP, ASP.NET, and ColdFusion in detail, via a series of step-by-step case studies.

  • Covers Flex application basics
  • Covers connecting Flex 2 and Flex 3 to a variety of Data Sources
  • Includes several complete case studies.


What youll learn
  • How to create custom components
  • How to handle user and web browser interactions
  • How to debug Flex 2 applications
  • How to bind, format, and validate data
  • How to load and write external content
  • The essentials of XML, and working with it in Flex 2, including E4X
  • The essentials of Flex Data Services
  • How to build up data-driven Flex 2 applications with PHP, ASP.NET, and ColdFusion backends


Who is this book for?
This book is forany Flex developer who knows the basics of building Flex UIs, and wants to learn how to connect their applications to data sources.



See also: Prenatal Yoga for Conception Pregnancy and Birth or Complete Natural Medicine Guide to Breast Cancer

Mastering Dojo: JavaScript and Ajax Tools for Great Web Experiences

Author: Rawld Gill

Imagine a true thin-client web application environment, with no browser incompatibilities, no plug-ins, and an interface that's close to a desktop app. You can have it all, today. Welcome to the Dojo Toolkit: a set of client-side JavaScript tools that help you build better web applications.

Mastering Dojo walks you through the whole range of modern web programming problems, from bringing simple web pages to life with widgets and animation to designing and building an enterprise-class, single-page Rich Internet Application.

Dojo blurs the line between local, native applications and browser-based applications; the browser becomes the user interface platform. "Modern" browsers provide an incomplete, inconvenient, and incompatible programming environment, but Dojo eliminates these problems.

You'll get the whole story: from basic usage to advanced idioms; from a fast-moving tutorial to all the details on Dojo Core. See how you can modularize your project for development and automatically package your release for optimal download performance. You'll also learn how Dojo: augments the core JavaScript library, fixes the JavaScript event system, simplifies DOM programming, has a complete class definition facility, includes a powerful remote scripting (XHR) framework, ...and much more.

You'll love using Dojo's HTML user interface control widget system, Dijit. See how to use more than forty widgets, including the powerful tree and grid controls. Turn the browser into a rich development environment with Dojo.

About the Author:
Craig Riecke is a Dojo committer and a writer and editor for the Book of Dojo, Dojo's online documentation. He is currently manager of applicationdevelopment for CXtec in Syracuse, New York

About the Author:
Rawld Gill has served as chief architect of five major lines of commercial, enterprise-class software targeted at the pharmaceutical industry over the past twenty-five years. He is currently president of Vista Information Technologies

About the Author:
Alex Russell is the project lead for the Dojo Toolkit and president of the Dojo Foundation



Table of Contents:

1 Introduction 1

1.1 Key Aspects of Dojo 4

1.2 Using the Book 7

1.3 Acknowledgments 9

I Ajax the Dojo Way 11

2 Powerful Web Forms Made Easy 13

2.1 What Customers Are Saying About Your Form 14

2.2 Installing Dojo on Your Own Server 14

2.3 Adding Dojo and Dijit to a Page 15

2.4 Laying Out the Form 19

2.5 Improved Form Controls 24

2.6 Wrapping It Up 27

3 Connecting to Outside Services 31

3.1 Dojo Remote Scripting 31

3.2 JavaScript Idioms for Calling XHR 33

3.3 A Wish List with dojo.data and dojox.grid.Grid 39

3.4 Researching Cigars Using JSONP 49

3.5 Reviews with dojo.xhrGet 56

3.6 Errors and Debugging 60

II The Dojo APIs 63

4 Dojo In Depth 65

4.1 Modularizing JavaScript 65

4.2 Dojo Source Code Organization 69

4.3 Loading Dojo 72

5 JavaScript Language Extensions 77

5.1 Binding with dojo.hitch 77

5.2 JavaScript 1.6 Array Methods 84

5.3 Support for Polymorphism 88

5.4 Combining, Structuring, and Copying Objects 90

6 Asynchronous Programming 95

6.1 Programming DOM Events with Dojo 95

6.2 Connecting to User-Defined Events with Dojo 111

6.3 Publish-Subscribe 114

6.4 Managing Callbacks with dojo.Deferred 117

7 DOM Utilities 135

7.1 Core Dojo DOM Utility Functions 135

7.2 Finding and Editing Nodes 140

7.3 Inserting, Moving, and Deleting DOM Nodes 153

7.4 Positioning DOM Nodes 156

7.5 Animation 163

8 Remote Scripting with XHR, script, and iframe 173

8.1 Native Remote Scripting 173

8.2 Using the Dojo XHR Framework 175

8.3 Remote Scripting with script 194

8.4 Remote Scripting with iframe 202

8.5 Leveraging Remote Scripting to Access Web Services 206

8.6 Bookmarking and the Back Button Without Navigating 213

9Defining Classes with dojo.declare 221

9.1 Why Use Object-Oriented Programming in JavaScript? 221

9.2 Defining a Simple Class 222

9.3 Defining a Subclass with Single Inheritance 230

9.4 Mixins and Multiple Inheritance 235

9.5 Preprocessing Constructor Arguments 244

9.6 Resolving Property Name Clashes 248

9.7 Two-Phase Construction 251

9.8 Creating Custom Objects Without Constructors 253

10 dojo.data 257

10.1 The Big Picture 258

10.2 dojo.data and Incremental Search 265

10.3 Partitioning with QueryReadStore 269

10.4 Calling Read Methods from JavaScript 272

10.5 A Yahoo Search Driver 277

11 The Dojo Loader and Build System 283

11.1 The Big Picture 284

11.2 The Dojo Loader 287

11.3 Optimizing Deployment with the Dojo Build System 296

11.4 Compressing JavaScript Resources with Dojo-Rhino 310

III Advanced Dijit 315

12 Scripting Widgets 317

12.1 What Exactly Is a Widget? 317

12.2 Finding and Manipulating Declarative Widgets 320

12.3 Creating Instances Programmatically 325

12.4 Extension Points 329

12.5 Example: Live Forms 336

13 Tree 339

13.1 A Simple Tree 339

13.2 Hierarchical Data Stores 342

13.3 Extension Points 347

13.4 Manipulating the Tree 349

13.5 Drag and Drop 354

14 Grid 365

14.1 Grid Display and Design 366

14.2 Programmatic Structures 371

14.3 Extension Points 374

14.4 Cell Editing 384

14.5 Grid Manipulation 388

15 Form Controls 393

15.1 Form Control Features 393

15.2 Streamlined Editing 396

15.3 Feedback 404

15.4 Dates, Numbers, and i18n 408

15.5 Action Buttons, Toolbars, and Menus 417

15.6 Ally 420

16 Dijit Themes, Design, and Layout 427

16.1 Theme Structure 427

16.2 Changing Look and Feel 434

16.3 Ally and Themes 439

16.4 Panes: ContentPane and TitlePane 441

16.5 The Alignment Container: BorderContainer 446

16.6 Stack Containers 450

17 Creating and Extending Widget Classes 455

17.1 Widget Classes Using dijit.Declaration 456

17.2 Widget Classes Using dojo.declare 461

17.3 The Widget Life Cycle 466

17.4 Extending Widgets 469

17.5 Example: A Yahoo Answers Widget 470

IV Rich Internet Applications 477

18 Building a Rich Internet Application 479

18.1 The Big Picture 479

18.2 Step 1: Create the Application Skeleton 488

18.3 Step 2: The Main Menu and Command System 493

18.4 Step 3: A Custom Statusbar Widget 501

19 Adding Dynamic Content to an RIA 507

19.1 Step 4: The Navigator Pane and On-Demand Data Store 507

19.2 Step 5: Workspace Objects 517

20 Going Forward 531

20.1 Foundations 531

20.2 Graphics 533

20.3 Dojo Data and Storage 534

V Appendixes 535

A Bibliography 537

Index 539

Thursday, November 26, 2009

Libraries and Google or Innovation Networks and Knowledge Clusters

Libraries and Google

Author: William Miller

Discover the benefits— and drawbacks— of GoogleSM
GoogleSM has become a nearly omnipresent tool of the Internet, with its potential only now beginning to be realized. How can librarians effectively integrate this powerful search engine to provide service to their patrons? Libraries and GoogleSM presents leading authorities discussing the many possibilities of using Google products as effective, user-friendly tools in libraries. Google Scholar and Print are extensively explored with an eye toward offering an expanded view of what is and may be possible for the future, with practical insights on how to make the most of the product's capabilities.
It seems certain that Google is here to stay. Libraries and GoogleSM comprehensively examines this "disruptive technology" that is seen as both a threat and an opportunity by both librarians and publishers. Both perspectives are explored in depth, along with practical applications of this and other Google technology that may be new to librarians. Google products and other more familiar research tools are compared for effectiveness and ease of use. The various unique needs of users and scholars are detailed and considered as a springboard for insightful discussion of the future role of librarians in today's world. Potential problems are closely examined, such as copyright issues of digitization, and privacy concerns sparked by its collection of personal information about its users. The book comprehensively explores the path libraries need to travel to benefit from the search tool, rather than being overwhelmed and destroyed by it.
Topics in Libraries and GoogleSM include:
the viewpoint that Google may make librariesobsolete
new opportunities for libraries through using Google products
technical aspects of purchasing and implementing Google search products with proprietary vendor databases
testing the performance of Google Scholar and Print
practical use of Google's products
personal privacy issues
making digitized library resources more accessible
digitization of copyrighted materials
much, much more!
Libraries and GoogleSM is horizon-expanding reading for all librarians, library science educators and students, library administrators, publishers, and university presses.

"As the first book-length treatment of this topic, THIS FASCINATING COLLECTION OF DIVERSE PERSPECTIVES about the usefulness of google and its potential menace to libraries and scholarly communication is A CALL TO ACTION FOR LIBRARIANS. We ignore Google, or rail against it, at our peril. Many of the contributions focus on specific Google products that have already had an impact on libraries— Google Print and Google Scholar. These fine, practical pieces for librarians and publishers are the heart of this collection." — Kathleen Hoeth, MLS, University Librarian and Director of Library Services, Florida Gulf Coast University

"I RECOMMEND THIS

Library Journal

Today GoogleR dominates the search engine market and is the first choice for finding information among Internet users. Many librarians, but certainly not all, feel threatened by its foray into services seen as competition for libraries, such as Google Scholar and Google Print. Miller and Pellen, director and associate director, respectively, of the Florida Atlantic University Libraries, have compiled a collection of articles on Google's effect on libraries, which run the gamut from outright alarm, to critical evaluations of its services, practices, and products to practical advice on how to incorporate Google products into your library services. The final chapter lists resources for staying current on Google offerings. All of the contributing authors are from academic settings, and they provide valuable guidance and keen insight into both the positive aspects and "dark side" of Google and how it will impact the future of libraries. This very timely and thought-provoking collection should be read by all librarians. Robert L. Battenfeld, B. Davis Schwartz Memorial Lib., Brookville, NY Copyright 2006 Reed Business Information.



New interesting textbook: Abnormal Pap Smears or The Womens Migraine Survival Guide

Innovation Networks and Knowledge Clusters: Findings and Insights from the US, EU and Japan

Author: Elias G Carayannis

This book focuses on profiling, analysing, benchmarking and modelling in socio-economic terms, the ways that creativity, invention and innovation flourish. The work is based on comparative, conceptual and empirical research of 15 American, European and Asian knowledge-based innovation networks and knowledge clusters. It highlights critical success and failure factors, and the lessons learned about entrepreneurial initiatives, outcomes and impacts. It identifies and articulates insights that inform both public sector policies and private sector practices to render them more effective and efficient.



Table of Contents:
List of Tables     vii
List of Figures     x
List of Abbreviations     xii
Preface     xv
The Role of the Firm in Innovation Networks and Knowledge Clusters   Elias G. Carayannis   Vivienne Wang     1
Measuring Firm Innovative Performance: A Review of the Literature and Empirical Exploration   Elias G. Carayannis   Mike Provance     21
Academic Entrepreneurship - Roles and Relations in the Venture Creation Process   Christer Olofsson   Borje Svensson   Richard Ferguson     54
Buyer Discourse Perspective on Market Entry: Co-Evolutionary Dynamics of Opinions and Entrepreneurial Action   Mike Provance   Dante Di Gregorio     77
Asymmetric Knowledge, Digital Knowledge Flow Platforms and Regional Innovation Systems   Philip Cooke     89
Big Science as a Catalyst of New Business Development   Olli Vuola     110
Knowledge-Based Geospatial Information System (KB-GIS) and the Informational Space Economy   Elias G. Carayannis   Vivienne Wang     133
From Regional Innovation Strategies to the Multi-Level Governance of Science, Technology and Innovation: the Case of the NorthEast of England   David Charles     166
Information Flow and GlobalCompetitiveness of Industrial Districts: Lessons Learned from Kastoria's Fur District in Greece   Nikos I. Dimitriadis     186
The Role of Clusters and Regional Networks in Economic Transformation - Empirical Evidence and Conclusions from the East German Innovation System   Knut Koschatzky     210
Weak Ties and Innovation among Indian and Chinese Engineers in Silicon Valley   Rafiq Dossani     230
K-Cores, Team Dynamics and Intra-Organizational Development in an Aerospace Firm   Dimitris Assimakopoulos   Kristie Ogilvie     284
Venturing Clusters: the Case of Sapporo Region to Create Biotech University Spin-Offs   Masayuki Kondo     299
The Role of the Government and the Academia-Industry Network in the Biopharmaceutical Industry of China   Xielin Liua   Jinhui An   Nannan Lundin     314
From Bureaucratic Mode of Technological Entrepreneurship to Clustering Mode of Technological Entrepreneurship: Daedeok Science Park, Korea   Jong-in Choi     330
Innovation Symbiosis among Geographical Knowledge Networks: the Case of the Hsinchu Science-Based Industrial Park, Taiwan (1991-2002)   Yuan-Chieh Chang   Bou-Wen Lin   Meng-Chu Liu   Shih-Chang Hung   Yi-Pe Ou     343
To Cluster or Not to Cluster? The Growth of High-Tech Firms in New Zealand    Sally Davenport     361
Biographies     384
Index     401

Wednesday, November 25, 2009

Pattern Oriented Software Architecture Patterns for Concurrent and Networked Objects or Marketing to the Social Web

Pattern-Oriented Software Architecture, Patterns for Concurrent and Networked Objects, Vol. 2

Author:

Designing application and middleware software to run in concurrent and networked environments is a significant challenge to software developers. The patterns catalogued in this second volume of Pattern-Oriented Software Architectures (POSA) form the basis of a pattern language that addresses issues associated with concurrency and networking.

The book presents 17 interrelated patterns ranging from idioms through architectural designs. They cover core elements of building concurrent and network systems: service access and configuration, event handling, synchronization,

and concurrency. All patterns present extensive examples and known uses in multiple programming languages, including C++, C, and Java.

The book can be used to tackle specific software development problems or read from cover to cover to provide a fundamental understanding of the best practices for constructing concurrent and networked applications and middleware.

About the Authors

This book has been written by the award winning team responsible for the first POSA volume "A System of Patterns", joined in this volume by Douglas C. Schmidt from University of California, Irvine (UCI), USA.

Visit our Web Page

Booknews

This guide for software designers and advanced students presents 17 interrelated patterns ranging from idioms through architectural designs and covering core elements of building concurrent and network systems, including service access and configuration, event handling, synchronization, and concurrency. The focus here on concurrency and networking complements the general-purpose patterns from the previous volume, , though many can be applied outside the context of concurrency and networking. The patterns presented are general, domain-independent, rather than those specific to a particular application domain (such as telecommunications). All patterns are accompanied by examples and known uses in multiple programming languages, including C++, C, and Java. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Table of Contents:
About This Book.
About The Authors.
Guide To The Reader.
1 Concurrent and Distributed Objects
2 The Patterns.
2.1 Introduction.
2.2 Service Access Patterns.
Wrapper Facade.
Extension Interface.
Interceptor.
2.3 Event Handling Patterns.
Reactor.
Proactor.
Asynchronous Completion Token.
2.4 Initialization Patterns.
Acceptor-Connector.
Activator.
Component Configurator.
2.5 Synchronization Patterns.
Scoped Locking.
Strategized Locking.
Thread-Safe Interface.
Double Checked Locking Optimization.
2.6 Concurrency Patterns.
Active Object.
Monitor Object.
Leader/Followers.
Half Sync/Half-Async.
Thread-Specific Storage.
3 Tying the Patterns Together.
3.1 From Individual Patterns To Pattern Languages.
3.2 A Pattern Language for Distributed.
Object Computing.
3.3 Beyond Networking, Distribution, and Concurrency Notations.
Glossary.
References.
Index of Patterns.
Index.

Go to: Rum and Rum Drinks or Bourbon Bourbon Drinks

Marketing to the Social Web: How Digital Customer Communities Build Your Business

Author: Larry Weber

Praise for Marketing to the Social Web

"Weber understands that the world is going digital and that competitive advantage will accrue to those who understand the transformation. CEOs should heed this transformation and learn from Weber's insights how to navigate this new landscape to fully maximize their business opportunities."
-Mark Fuller, Chairman, Monitor Group

"Consumers are using technology to grab power from companies, the media, and the government. Marketing to the Social Web succinctly outlines how institutions can survive and win in this chaotic new world, and lays out the revised rules of engagement-ignore them at your peril."
-George F. Colony, CEO, Forrester Research, Inc.

"Larry has brought pragmatic and useful recommendations to help brand builders manage the complexity of social interaction in a digital age. I was pleased to read a book that actually suggests how to do something with social networks, instead of just ponder them."
-David Kenny, Chairman and Chief Executive Officer, Digitas Inc.

"Where's the allure of social 2.0? Brands can talk . . . customers talk louder! Digital influence has arrived."
-Jeff Taylor, CEO, Eons and Founder of Monster.com

"Larry Weber provides a simple and effective roadmap of the new customer information highway. Marketing to the Social Web is a valuable tool that will give everyone the confidence and know-how to compete in this fast-growing marketplace of ideas."
-Steve Harris, Vice President, Global Communications, General Motors Corporation

"As all lines and boundaries are washed away by the Web, Weber describes how to become part of the sea versus the sand."
-NicholasNegroponte, Chairman, One Laptop per Child