Sebanyak 383 item atau buku ditemukan

XSLT

After years of anticipation and delay, the W3C finally released the XSLT 2.0 standard in January 2007. The revised edition of this classic book offers practical, real-world examples that demonstrate how you can apply XSLT stylesheets to XML data using either the new specification, or the older XSLT 1.0 standard. XSLT is a critical language for converting XML documents into other formats, such as HTML code or a PDF file. With XSLT, you get a thorough understanding of XSLT and XPath and their relationship to other web standards, along with recommendations for a honed toolkit in an open platform-neutral, standards-based environment. This book: Covers the XSLT basics, including simple stylesheets and methods for setting up transformation engines Walks you through the many parts of XSLT, particularly XSLT's template-based approach to transformations Applies both XSLT 1.0 and 2.0 solutions to the same problems, helping you decide which version of XSLT is more appropriate for your project Includes profuse examples that complement both the tutorial and the reference material The new edition of XSLT has been updated thoroughly to explain XSLT 2.0's many dependencies, notably XML Schema and XPath 2.0. Want to find out how the 2.0 specification improves on the old? This book will explain.

This book: Covers the XSLT basics, including simple stylesheets and methods for setting up transformation engines Walks you through the many parts of XSLT, particularly XSLT's template-based approach to transformations Applies both XSLT 1.0 ...

Twisted Network Programming Essentials

Get started with Twisted, the event-driven networking framework written in Python. With this introductory guide, you’ll learn the key concepts and design patterns to build event-driven client and server applications for many popular networking protocols. You’ll also learn the tools to build new protocols using Twisted’s primitives. Start by building basic TCP clients and servers, and then focus on deploying production-grade applications with the Twisted Application infrastructure. Along the way, you can play with and extend examples of common tasks you’ll face when building network applications. If you’re familiar with Python, you’re ready for Twisted. Learn the core components of Twisted servers and clients Write asynchronous code with the Deferred API Construct HTTP servers with Twisted’s high-level web APIs Use the Agent API to develop flexible web clients Configure and deploy Twisted services in a robust and standardized fashion Access databases using Twisted’s nonblocking interface Add common server components: logging, authentication, threads and processes, and testing Explore ways to build clients and servers for IRC, popular mail protocols, and SSH

With this introductory guide, you’ll learn the key concepts and design patterns to build event-driven client and server applications for many popular networking protocols.

Environmental Monitoring with Arduino

Building Simple Devices to Collect Data about the World Around Us

"Watching our world with sensors"--Cover.

"Watching our world with sensors"--Cover.

BGP

Building Reliable Networks with the Border Gateway Protocol

Border Gateway Protocol (BGP) is the routing protocol used to exchange routing information across the Internet. It makes it possible for ISPs to connect to each other and for end-users to connect to more than one ISP. BGP is the only protocol that is designed to deal with a network of the Internet's size, and the only protocol that can deal well with having multiple connections to unrelated routing domains.This book is a guide to all aspects of BGP: the protocol, its configuration and operation in an Internet environment, and how to troubleshooting it. The book also describes how to secure BGP, and how BGP can be used as a tool in combating Distributed Denial of Service (DDoS) attacks. Although the examples throughout this book are for Cisco routers, the techniques discussed can be applied to any BGP-capable router.The topics include: Requesting an AS number and IP addresses Route filtering by remote ISPs and how to avoid this Configuring the initial BGP setup Balancing the available incoming or outgoing traffic over the available connections Securing and troubleshooting BGP BGP in larger networks: interaction with internal routing protocols, scalability issues BGP in Internet Service Provider networks The book is filled with numerous configuration examples with more complex case studies at the end of the book to strengthen your understanding. BGP is for anyone interested in creating reliable connectivity to the Internet.

Although the examples throughout this book are for Cisco routers, the techniques discussed can be applied to any BGP-capable router.The topics include: Requesting an AS number and IP addresses Route filtering by remote ISPs and how to avoid ...

Integrating Excel and Access

In a corporate setting, the Microsoft Office Suite is an invaluable set of applications. One of Offices' biggest advantages is that its applications can work together to share information, produce reports, and so on. The problem is, there isn't much documentation on their cross-usage. Until now. Introducing Integrating Excel and Access, the unique reference that shows you how to combine the strengths of Microsoft Excel with those of Microsoft Access. In particular, the book explains how the powerful analysis tools of Excel can work in concert with the structured storage and more powerful querying of Access. The results that these two applications can produce together are virtually impossible to achieve with one program separately. But the book isn't just limited to Excel and Access. There's also a chapter on SQL Server, as well as one dedicated to integrating with other Microsoft Office applications. In no time, you'll discover how to: Utilize the built in features of Access and Excel to access data Use VBA within Access or Excel to access data Build connection strings using ADO and DAO Automate Excel reports including formatting, functions, and page setup Write complex functions and queries with VBA Write simple and advanced queries with the Access GUI Produce pivot tables and charts with your data With Integrating Excel and Access, you can crunch and visualize data like never before. It's the ideal guide for anyone who uses Microsoft Office to handle data.

In particular, the book explains how the powerful analysis tools of Excel can work in concert with the structured storage and more powerful querying of Access.

Developing Android Applications with Adobe AIR

For developers who want to use their ActionScript skills to build mobile applications for the Android OS, this thorough guide will show them how to use the unique programming environment, architecture, and tools in the Adobe AIR for Android SDK.

Put your ActionScript 3 skills to work building mobile apps. This book shows you how to develop native applications for Android-based smartphones and tablets from the ground up, using Adobe AIR.

Java Cryptography

Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards.The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters.Topics include: The Java Cryptography Architecture (JCA) The Java Cryptography Extension (JCE) Cryptographic providers The Sun key management tools Message digests, digital signatures, and certificates (X509v3) Block and stream ciphers Implementations of the ElGamal signature and cipher algorithms A network talk application that encrypts all data sent over the network An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2.

This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards.The book is designed for moderately experienced Java programmers who want to learn how to build cryptography ...

App Inventor

Yes, you can create your own apps for Android phones—and it's easy to do. This extraordinary book introduces App Inventor for Android, a powerful visual tool that lets anyone build apps for Android-based devices. Learn the basics of App Inventor with step-by-step instructions for more than a dozen fun projects, such as creating location-aware apps, data storage, and apps that include decision-making logic. The second half of the book features an Inventor's manual to help you understand the fundamentals of app building and computer science. App Inventor makes an excellent textbook for beginners and experienced developers alike. Design games and other apps with 2D graphics and animation Create custom multi-media quizzes and study guides Create a custom tour of your city, school, or workplace Use an Android phone to control a LEGO® MINDSTORMS® NXT robot Build location-aware apps by working with your phone’s sensors Explore apps that incorporate information from the Web Learn computer science as you build your apps

Yes, you can create your own apps for Android phones—and it's easy to do. This extraordinary book introduces App Inventor for Android, a powerful visual tool that lets anyone build apps for Android-based devices.

The Art of Concurrency

A Thread Monkey's Guide to Writing Parallel Applications

If you're looking to take full advantage of multi-core processors with concurrent programming, this practical book provides the knowledge and hands-on experience you need. The Art of Concurrency is one of the few resources to focus on implementing algorithms in the shared-memory model of multi-core processors, rather than just theoretical models or distributed-memory architectures. The book provides detailed explanations and usable samples to help you transform algorithms from serial to parallel code, along with advice and analysis for avoiding mistakes that programmers typically make when first attempting these computations. Written by an Intel engineer with over two decades of parallel and concurrent programming experience, this book will help you: Understand parallelism and concurrency Explore differences between programming for shared-memory and distributed-memory Learn guidelines for designing multithreaded applications, including testing and tuning Discover how to make best use of different threading libraries, including Windows threads, POSIX threads, OpenMP, and Intel Threading Building Blocks Explore how to implement concurrent algorithms that involve sorting, searching, graphs, and other practical computations The Art of Concurrency shows you how to keep algorithms scalable to take advantage of new processors with even more cores. For developing parallel code algorithms for concurrent programming, this book is a must.

Written by an Intel engineer with over two decades of parallel and concurrent programming experience, this book will help you: Understand parallelism and concurrency Explore differences between programming for shared-memory and distributed ...

Understanding the Linux Kernel

In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order. It manages limited memory so well that hundreds of processes can share the system efficiently, and expertly organizes data transfers so that the CPU isn't kept waiting any longer than necessary for the relatively slow disks. The third edition of Understanding the Linux Kernel takes you on a guided tour of the most significant data structures, algorithms, and programming tricks used in the kernel. Probing beyond superficial features, the authors offer valuable insights to people who want to know how things really work inside their machine. Important Intel-specific features are discussed. Relevant segments of code are dissected line by line. But the book covers more than just the functioning of the code; it explains the theoretical underpinnings of why Linux does things the way it does. This edition of the book covers Version 2.6, which has seen significant changes to nearly every kernel subsystem, particularly in the areas of memory management and block devices. The book focuses on the following topics: Memory management, including file buffering, process swapping, and Direct memory Access (DMA) The Virtual Filesystem layer and the Second and Third Extended Filesystems Process creation and scheduling Signals, interrupts, and the essential interfaces to device drivers Timing Synchronization within the kernel Interprocess Communication (IPC) Program execution Understanding the Linux Kernel will acquaint you with all the inner workings of Linux, but it's more than just an academic exercise. You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments. This book will help you make the most of your Linux system.

This book will help you make the most of your Linux system.