Interactive television (iTV)—an evolutionary merging of digital TV and the Internet—is set to take the world by storm! For consumers, iTV technology offers powerful new ways to interact with content providers and merchants. These include enjoying video on demand; participating in online shopping, banking, and...
Animation Presets, an advanced Clone tool, scripting support, and a powerful new color correction system are just a few of the reasons you're chomping at the bit to get down to work with After Effects 6.5. In these pages, a master of the medium allows you to do just that, presenting a series of projects that explore every aspect of Adobe's...
The 70-299 exam measures your ability to implement, manage, maintain, and troubleshoot security in a Windows Server 2003 network infrastructure and also plan and configure a Windows Server 2003 PKI. The MCSE 70-299 Exam Cram 2 gives you the essential information you need to know to learn how to implement, manage,...
This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...
Building Embedded Linux Systems shows you how to design and build your own embedded systems using Linux® as the kernel and freely available open source tools as the framework. Written by an active member of the open source community, the book is structured to gradually introduce readers to the intricacies of...
Next time you hit the wall with a tough C# development problem, get the code behind the solution—and solve it the right way. The C# Programmer’s Cookbook provides at-a-glance reference to hundreds of C# and Microsoft .NET Framework programming scenarios using a concise, problem/solution format. The book’s organized so...
Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?
The release of Unified Modeling Language (UML) 2.0 places renewed emphasis on the Object Constraint Language (OCL). Within UML, OCL is the standard for specifying expressions that add vital information to object-oriented models and other object-modeling artifacts. Model-Driven Architecture (MDA) relies on OCL to add the level of...
Maya is famed for its intuitive interface, and yet this high-end 3D application is so powerful that no one masters it without help. Maya 4.5 Savvy is an update to the successful Mastering Maya 3 and provides precisely the help you need to take your skills to the next level, regardless of your field and how much or little you...
Do you use Dreamweaver? Have you downloaded and installed extensions from the Dreamweaver Exchange, and do you love the whole idea of being able to add objects, behaviors, commands, and so forth, to the program? Do you often find yourself thinking, "If only Dreamweaver did it this way..." or "Why doesn't someone...
In the wake of increased traffic, today's service providers and enterprises must assure high availability across a variety of networked services and applications. Multiprotocol Label Switching (MPLS) is the enabling technology for the widespread deployment of IP networks in core and Metro Ethernet applications. Many service...