This book breaks new ground by doing something for digital photographers that’s never been done before—it cuts through the bull and shows you exactly “how to do it.” It’s not a bunch of theory; it doesn’t challenge you to come up with your own settings or figure things out on your own. Instead, it does...
Maximizing the performance of Unix systems is a challenge that requires a specialized understanding of operating system behavior, knowledge of the design and tuning capabilities of the applications that run on the system, and an intimate acquaintance with system and application performance measuring tools that assist in...
SharePoint 2010 enables businesses to set up collaboration with, and for, many types of entities (employees, vendors, customers, and so on) while integrating disparate technologies. It has proved so valuable a tool at many organizations that its growth has led it to become a mission-critical application. As SharePoint has grown through each...
Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...
Flash is one of the most pervasive technologies
on the Web, delivering interactive
and immersive multimedia. Leading corporate
Web sites use its streamlined graphics
to communicate their brands, major motion
picture studios promote theatrical releases
with Flash video, and online news and educational
sites provide rich user...
The optical networking technology that suffered in the post - dot - com crash
several years ago has since recovered and is once again poised for rapid growth
due to the exhaustion of available bandwidth. Today, photonics networks transport
Internet data over large distances in long - haul and metropolitan networks.
Improvements in...
Doing business online is no longer an oddity, but the norm, and
companies desiring to remain competitive have to maintain
some form of online presence. Doing business online means a
company has to be able to efficiently, reliably, and securely take payments
from consumers and other merchants. This book is written to
provide the...
Knowledge Discovery demonstrates intelligent computing at its best, and is the most desirable and interesting end-product of Information Technology. To be able to discover and to extract knowledge from data is a task that many researchers and practitioners are endeavoring to accomplish. There is a lot of hidden knowledge waiting to be...
A senior database manager at one of the world’s largest banks once told me that the best way to secure Oracle is to unplug it from the wall…and he is probably right. In fact, this holds true for nearly every networked application. Unfortunately, for many of us turning off the database is not an option; we must find another way to...
GWT 2 radically improves web experience for users by using existing Java tools to build no-compromise AJAX for any modern browser. It provides a solid platform so that other great libraries can be built on top of GWT. Creating web applications efficiently and making them impressive, however, is not as easy as it sounds. Writing web...
At the end of the twentieth century, intellectual property rights collided with everyday life. Expansive copyright laws and digital rights management technologies sought to shut down new forms of copying and remixing made possible by the Internet. International laws expanding patent rights threatened the lives of millions of people around the...
Face recognition has a large number of applications, including security, person verification, Internet communication, and computer entertainment. Although research in automatic face recognition has been conducted since the 1960s, this problem is still largely unsolved. Recent years have seen significant progress in this area owing to advances...