- Table View
- List View
Inside Microsoft® Windows® SharePoint® Services 3.0
by Daniel Larson Ted PattisonFocus in on the internals of the Windows SharePoint Services 3.0 platform with this in-depth, straightforward reference. You get expert insights, task-oriented guidance, and extensive code samples to help you master the intricacies of building robust, enterprise content management applications. Discover how to: Build application pages and site pages Develop and deploy reusable Web parts to enable customization and personalization Exploit Windows SharePoint APIs to deploy Microsoft ASP.NET AJAX components Use XML and Collaborative Application Markup Language (CAML) to create provisioning components Design and implement custom document libraries Use Windows Workflow Foundation to create applications that automate business process Create Site Definitions to aggregate components and package them for deployment Implement Code Access Security, Trust Levels, authentication, and authorization PLUS--Get Microsoft Visual C# and XML code samples on the Web
Inside Multi-Media Case Based Instruction
by Roger C. SchankThe fourth in the Inside series, this volume includes four theses completed under the editor's direction at the Institute for the Learning Sciences at Northwestern University. This series bridges the gap between Schank's books introducing (for a popular audience) the theories behind his work in artificial intelligence (AI) and the many articles and books written by Schank and other AI researchers for their colleagues and students. The series will be of interest to graduate students in AI and professionals in other academic fields who seek the retraining necessary to join the AI effort or to understand it at the professional level. This volume elaborates the Case-Based Teaching Architecture. A central tenet of this architecture is the importance of acquiring cases, and being able to retrieve and use those cases to solve new problems. The theses address the problems of building case bases, indexing large amounts of data contained within those case bases, and retrieving information on a need-to-know basis. They also reflect the work of researchers at the Institute to design tools that enable software programs to be built more effectively and efficiently.
Inside PixInsight (The\patrick Moore Practical Astronomy Ser.)
by Warren A. KellerPixInsight has taken the astro-imaging world by storm. As the first comprehensive postprocessing platform to be created by astro-imagers for astro-imagers, it has for many replaced other generic graphics editors as the software of choice. PixInsight has been embraced by professionals such as the James Webb (and Hubble) Space Telescope's science imager Joseph DePasquale and Calar Alto's Vicent Peris, as well as thousands of amateurs around the world. While PixInsight is extremely powerful, very little has been printed on the subject. The first edition of this book broke that mold, offering a comprehensive look into the software’s capabilities. This second edition expands on the several new processes added to the PixInsight platform since that time, detailing and demonstrating each one with a now-expanded workflow. Addressing topics such as PhotometricColorCalibration, Large-Scale Pixel Rejection, LocalNormalization and a host of other functions, this text remains the authoritative guide to PixInsight.
Inside Radio: An Attack and Defense Guide
by Qing Yang Lin HuangThis book discusses the security issues in a wide range of wireless devices and systems, such as RFID, Bluetooth, ZigBee, GSM, LTE, and GPS. It collects the findings of recent research by the UnicornTeam at 360 Technology, and reviews the state-of-the-art literature on wireless security. The book also offers detailed case studies and theoretical treatments – specifically it lists numerous laboratory procedures, results, plots, commands and screenshots from real-world experiments. It is a valuable reference guide for practitioners and researchers who want to learn more about the advanced research findings and use the off-the-shelf tools to explore the wireless world.
Inside Solid State Drives (SSDs)
by Alessia Marelli Kam Eshghi Rino MicheloniSolid State Drives (SSDs) are gaining momentum in enterprise and client applications, replacing Hard Disk Drives (HDDs) by offering higher performance and lower power. In the enterprise, developers of data center server and storage systems have seen CPU performance growing exponentially for the past two decades, while HDD performance has improved linearly for the same period. Additionally, multi-core CPU designs and virtualization have increased randomness of storage I/Os. These trends have shifted performance bottlenecks to enterprise storage systems. Business critical applications such as online transaction processing, financial data processing and database mining are increasingly limited by storage performance. In client applications, small mobile platforms are leaving little room for batteries while demanding long life out of them. Therefore, reducing both idle and active power consumption has become critical. Additionally, client storage systems are in need of significant performance improvement as well as supporting small robust form factors. Ultimately, client systems are optimizing for best performance/power ratio as well as performance/cost ratio. SSDs promise to address both enterprise and client storage requirements by drastically improving performance while at the same time reducing power. Inside Solid State Drives walks the reader through all the main topics related to SSDs: from NAND Flash to memory controller (hardware and software), from I/O interfaces (PCIe/SAS/SATA) to reliability, from error correction codes (BCH and LDPC) to encryption, from Flash signal processing to hybrid storage. We hope you enjoy this tour inside Solid State Drives.
Inside Solid State Drives (Springer Series in Advanced Microelectronics #37)
by Alessia Marelli Kam Eshghi Rino MicheloniThe revised second edition of this respected text provides a state-of-the-art overview of the main topics relating to solid state drives (SSDs), covering NAND flash memories, memory controllers (including booth hardware and software), I/O interfaces (PCIe/SAS/SATA), reliability, error correction codes (BCH and LDPC), encryption, flash signal processing and hybrid storage.Updated throughout to include all recent work in the field, significant changes for the new edition include:A new chapter on flash memory errors and data recovery procedures in SSDs for reliability and lifetime improvementUpdated coverage of SSD Architecture and PCI Express Interfaces moving from PCIe Gen3 to PCIe Gen4 and including a section on NVMe over fabric (NVMf)An additional section on 3D flash memoriesAn update on standard reliability procedures for SSDsExpanded coverage of BCH for SSDs, with a specific section on detectionA new section on non-binary Low-Density Parity-Check (LDPC) codes, the most recent advancement in the fieldA description of randomization in the protection of SSD data against attacks, particularly relevant to 3D architecturesThe SSD market is booming, with many industries placing a huge effort in this space, spending billions of dollars in R&D and product development. Moreover, flash manufacturers are now moving to 3D architectures, thus enabling an even higher level of storage capacity. This book takes the reader through the fundamentals and brings them up to speed with the most recent developments in the field, and is suitable for advanced students, researchers and engineers alike.
Inside WikiLeaks
by Daniel Domscheit-BergFormer Wikileaks insider and spokesman Daniel Domscheit-Berg authors an expose of the "World's Most Dangerous Website." In an eye-opening account, Daniel Domscheit-Berg, the former spokesman of WikiLeaks, reveals never-disclosed details about the inner workings of the increasingly controversial organization that has struck fear into governments and business organizations worldwide, prompting the Pentagon to convene a 120-person task force. Under the pseudonym Daniel Schmitt, Domscheit-Berg was the effective Number 2 at Wikileaks and the organization's public face, after Julian Assange. In this book, he reveals the evolution, finances, and inner tensions of the whistleblower organization, beginning with this first meeting with Assange in December 2007. He also describes what led to his September 2010 withdrawal from WikiLeaks, including his disenchantment with the organization's lack of transparency, its abandonment of political neutrality, and Assange's increasing concentration of power.From the Hardcover edition.
Inside Windows® Communication Foundation
by Justin SmithDig into Windows Communication Foundation internals--and uncover the power of service-oriented design. This practical guide delivers in-depth insights and plenty of code samples to help you master the intricacies of developing and implementing connected applications. Discover how to: Use service-oriented concepts to build a reliable messaging infrastructure Build support for ever-evolving messaging transports, protocols, and functionality Develop and listen on multiple endpoints Add messaging functionality with message exchange patterns, topologies, and choreographies Serialize, deserialize, encode, and decode Message objects Generate industry-standard documents with service, data, and message contracts Build stacks of channel factory and listener objects with binding types Develop channel layer constructs and manage them over their lifetime Create custom channels with the Windows Communication Foundation API PLUS--Get Microsoft Visual C# code samples on the Web
Inside Windows® Debugging
by Tarik SoulamiUse Windows debuggers throughout the development cycle--and build better software Rethink your use of Windows debugging and tracing tools--and learn how to make them a key part of test-driven software development. Led by a member of the Windows Fundamentals Team at Microsoft, you'll apply expert debugging and tracing techniques--and sharpen your C++ and C# code analysis skills--through practical examples and common scenarios. Learn why experienced developers use debuggers in every step of the development process, and not just when bugs appear. Discover how to: Go behind the scenes to examine how powerful Windows debuggers work Catch bugs early in the development cycle with static and runtime analysis tools Gain practical strategies to tackle the most common code defects Apply expert tricks to handle user-mode and kernel-mode debugging tasks Implement postmortem techniques such as JIT and dump debugging Debug the concurrency and security aspects of your software Use debuggers to analyze interactions between your code and the operating system Analyze software behavior with Xperf and the Event Tracing for Windows (ETW) framework
Inside the Dark Web
by Rafiqul Islam Erdal OzkayaInside the Dark Web provides a broad overview of emerging digital threats and computer crimes, with an emphasis on cyberstalking, hacktivism, fraud and identity theft, and attacks on critical infrastructure. The book also analyzes the online underground economy and digital currencies and cybercrime on the dark web. The book further explores how dark web crimes are conducted on the surface web in new mediums, such as the Internet of Things (IoT) and peer-to-peer file sharing systems as well as dark web forensics and mitigating techniques. This book starts with the fundamentals of the dark web along with explaining its threat landscape. The book then introduces the Tor browser, which is used to access the dark web ecosystem. The book continues to take a deep dive into cybersecurity criminal activities in the dark net and analyzes the malpractices used to secure your system. Furthermore, the book digs deeper into the forensics of dark web, web content analysis, threat intelligence, IoT, crypto market, and cryptocurrencies. This book is a comprehensive guide for those who want to understand the dark web quickly. After reading Inside the Dark Web, you’ll understand The core concepts of the dark web. The different theoretical and cross-disciplinary approaches of the dark web and its evolution in the context of emerging crime threats. The forms of cybercriminal activity through the dark web and the technological and "social engineering" methods used to undertake such crimes. The behavior and role of offenders and victims in the dark web and analyze and assess the impact of cybercrime and the effectiveness of their mitigating techniques on the various domains. How to mitigate cyberattacks happening through the dark web. The dark web ecosystem with cutting edge areas like IoT, forensics, and threat intelligence and so on. The dark web-related research and applications and up-to-date on the latest technologies and research findings in this area. For all present and aspiring cybersecurity professionals who want to upgrade their skills by understanding the concepts of the dark web, Inside the Dark Web is their one-stop guide to understanding the dark web and building a cybersecurity plan.
Inside the IMF
by Richard HarperIn this book, Richard Harper uses the International Monetary Fund as a case study to show how thinking differently about IT systems can dramatically improve the manageability and accessibility of documents in organisations. The systems he considers uses search and retrieval applications, the use of hypertext documents and shared database applications like Lotus Notes.
Inside the Index and Search Engines: Microsoft® Office SharePoint® Server 2007
by Lars Fastrup Patrick TisseghamOptimize the user search experience in your workplace by customizing and extending the enterprise search capabilities in SharePoint Server 2007. Recognized SharePoint experts deliver the straightforward guidance and pragmatic coding samples you need to enable quick access to critical information. Discover how to: Configure and manage the SharePoint Server 2007 index file and search engines Plan a search deployment strategy that balances performance, scalability, and security considerations Set up and customize search functionality and UI controls Monitor and analyze search-usage metrics to optimize the end-user experience Use search APIs to prepare and execute a query, and to process the results Program administrative functions using the search administration object model Develop and install custom IFilters and protocol handlers Use the Business Data Catalog to structure and index critical line-of-business data Program search operations using Windows SharePoint Services 3.0
Inside the Machine: An Illustrated Introduction to Microprocessors and Computer Architecture
by Jon StokesComputers perform countless tasks ranging from the business critical to the recreational, but regardless of how differently they may look and behave, they're all amazingly similar in basic function. Once you understand how the microprocessor—or central processing unit (CPU)—works, you'll have a firm grasp of the fundamental concepts at the heart of all modern computing.Inside the Machine, from the co-founder of the highly respected Ars Technica website, explains how microprocessors operate—what they do and how they do it. The book uses analogies, full-color diagrams, and clear language to convey the ideas that form the basis of modern computing. After discussing computers in the abstract, the book examines specific microprocessors from Intel, IBM, and Motorola, from the original models up through today's leading processors. It contains the most comprehensive and up-to-date information available (online or in print) on Intel’s latest processors: the Pentium M, Core, and Core 2 Duo. Inside the Machine also explains technology terms and concepts that readers often hear but may not fully understand, such as "pipelining," "L1 cache," "main memory," "superscalar processing," and "out-of-order execution."Includes discussion of:–Parts of the computer and microprocessor–Programming fundamentals (arithmetic instructions, memory accesses, control flow instructions, and data types)–Intermediate and advanced microprocessor concepts (branch prediction and speculative execution)–Intermediate and advanced computing concepts (instruction set architectures, RISC and CISC, the memory hierarchy, and encoding and decoding machine language instructions)–64-bit computing vs. 32-bit computing–Caching and performanceInside the Machine is perfect for students of science and engineering, IT and business professionals, and the growing community of hardware tinkerers who like to dig into the guts of their machines.
Inside the Microsoft® Build Engine
by William Bartholomew Sayed Ibrahim HashimiAs software complexity increases, proper build practices become ever more important. This essential reference--fully updated for Visual Studio 2010--drills inside MSBuild and shows you how to maximize your control over the build and deployment process. Learn how to customize and extend build processes with MSBuild--and scale them to the team, product, or enterprise level with Team Foundation Build.
Inside the Microsoft® Build Engine: Using MSBuild and Team Foundation Build
by Sayed Hashimi William BartholomewWritten for . NET developers, build masters, and anyone else who wants to use MSBuild or Team Build, this reference describes the fundamentals of creating and extending MSBuild project files, then covers the two ways that MSBuild can be extended: custom tasks and custom loggers. It discusses advanced topics such as batching and incremental builds, and offers an MSBuild 'cookbook' with real-world examples (code is available on a web site). The last three chapters of the book focus on installation, configuration, and use of Team Foundation Build 2008 (Team Build), the latest version of the build automation component of the Visual Studio Team System. No background in the build process is assumed. Hashimi is a software developer and trainer. Bartholomew is a software engineer. Annotation ©2009 Book News, Inc. , Portland, OR (booknews. com)
Inside the Microsoft® Build Engine: Using MSBuild and Team Foundation Build
by William Bartholomew Sayed Ibrahim HashimiAs software complexity increases, proper build practices become ever more important. This essential reference drills inside MSBuild--and shows how to maximize your control over the build and deployment process. Learn how to customize and extend build processes with MSBuild--and scale them to the team, product, or enterprise level with Team Foundation Build. Discover how to: Create and modify MSBuild files--outside the Visual Studio IDE Use XML-based syntax to declare dynamic properties and items Apply built-in tasks or write your own Customize the build process--adding code generation, unit testing, or code analysis Use batching and incremental builds to reduce build times Invoke external tools in scripts and create reusable files Start and stop services Set assembly versions and extend the clean process Configure, customize, and extend Team Build--and automate build from end to end
Inside the Spam Cartel
by Spammer-XFrom the Author: "You may hate spam and think all spammers are evil, but listen to my story and see why I do this and more importantly, HOW." For most people, the term "SPAM" conjures up the image of hundreds of annoying, and at times offensive, e-mails flooding your inbox every week. But for a few, SPAM is a way of life that delivers an adrenaline rush fueled by cash, danger, retribution, porn and the avoidance of local, federal, and international law enforcement agencies. "Inside the SPAM Cartel" offer you a never-before view inside this dark sub-economy. You'll meet the characters that control the flow of money as well as the hackers and programmers committed to keeping the enterprise up and running. You may disagree with their objectives, but you can't help but to marvel at their ingenuity and resourcefullness in defeating spam filters, avoiding being identified, and staying one step ahead of the law.
Inside the Tornado: Strategies for Developing, Leveraging, and Surviving Hypergrowth Markets
by Geoffrey A. MooreGeoffrey A. Moore delves into the high-stakes world of hypergrowth markets. Here, Moore examines these markets and their implications for business strategies and, in turn, provides effective guidelines for winning market share and building margin share in mainstream markets. Once a product reaches the mainstream market, it faces three often vexing questions: What is the best way to develop a stronger market for the product's growth? What is the most effective way to capitalize on and sustain growth? And when this market inevitably subsides, how can businesses survive the change? Moore deftly answers these questions and provides businesses with the knowledge and tools they need in this fast-paced lucrative market.
Inside the Video Game Industry: Game Developers Talk About the Business of Play
by Judd Ruggill Ken McAllister Randy Nichols Ryan KaufmanInside the Video Game Industry offers a provocative look into one of today's most dynamic and creative businesses. Through in-depth structured interviews, industry professionals discuss their roles, providing invaluable insight into game programming, art, animation, design, production, quality assurance, audio and business professions. From hiring and firing conventions, attitudes about gender disparity, goals for work-life balance, and a span of legal, psychological, and communal intellectual property protection mechanisms, the book's combination of accessible industry talk and incisive thematic overviews is ideal for anyone interested in games as a global industry, a site of cultural study, or a prospective career path. Designed for researchers, educators, and students, this book provides a critical perspective on an often opaque business and its highly mobile workforce. Additional teaching materials, including activities and study questions, can be found at https://www.routledge.com/9780415828284.
Inside the World of Adopt Me! (Adopt Me!)
by Uplift Games LlcInside the World of Adopt Me! has descriptive copy which is not yet available from the Publisher.
Inside the World of Computing: Technologies, Uses, Challenges
by Jean-Loïc DelhayeComputers and the Internet are an undeniable and inextricable part of our daily lives. This book is for those who wish to better understand how this came to be. It explores the technological bases of computers, networks, software and data management, leading to the development of four "pillars" on which the essential applications that have a strong impact on individuals and society are based: embedded systems, Artificial Intelligence, the Internet, image processing and vision. We will travel to the heart of major application areas: robotics, virtual reality, health, mobility, energy, the factory of the future, not forgetting the major questions that this "digitization" can raise. This book is the author's testimony after fifty years spent in environments that are very open to new technologies. It offers perspectives on the evolution of the digital world that we live in.
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
by Kenneth BrancikAn organization‘s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Comput
Insider Power Techniques for Microsoft® Windows® XP
by Paul Mcfedries Geoff Winslow Scott Andersen Austin WilsonAccept no limits! Tweak Windows XP for ultimate performance with the undocumented secrets and hidden gems of the experts who work with the technology every day. Three Microsoft Consulting Services (MCS) professionals have teamed with well-known Windows book author Paul McFedries to reveal their best from-the-field techniques, practices, hacks, tricks, and workarounds for putting all of your PC's muscle to work. Smart, straightforward, and uncompromisingly practical, this book is the ultimate insider's guide to pushing Windows XP as far as it can go! Put professional-level practices to work for you: Tweak registry settings without getting burned Employ lethal techniques to help fight viruses, intruders, and spam Customize startup and shutdown--get work done behind the scenes Install devices and drivers--painlessly Learn 10 ways to help give your system rock-solid stability Write your own scripts--or run the ones inside Share your PC using group policies, account lock-outs, and other management tools Optimize memory, performance, and usability Easily synchronize files between your mobile and desktop PCs Troubleshoot problems the way the experts do
Insider Power Techniques for Microsoft® Windows® XP
by Paul Mcfedries<div xmlns="http://www.w3.org/1999/xhtml"><p>Tweak Windows\xae XP for ultimate performance with the undocumented secrets and hidden gems of the experts who work with the technology every day. Use their best techniques, practices, hacks, tricks, and workarounds to put all of your PC\u2019s muscle to work.</p></div>
Insider Threats: Insider Threats
by Pierre-Emmanuel ArduinAn information system may be regarded as an organized set of resources, both technological and human. Security should take this specificity into consideration in order to ensure an overall security of information systems. The security of information systems is usually tackled in a technological perspective. This book proposes to focus not only on information systems' security in a technological perspective, but also in a human, managerial and organizational perspective.