Foreword
The four case studies that follow each have a number of common features. They each illustrate the birth of an idea and show how that idea can be realised into a marketable product. Each case study deals with engineering design and development issues and each highlights the importance of developing sound marketing strategies including market research. The importance of appropriate support mechanisms for young entrepreneurs is also covered. The case studies illustrate how successful entrepreneurs deploy a range of entrepreneurial skills and know-how. Above all, the entrepreneurs are seen to have the capacity to innovate and exercise vision.
We are grateful to Liz Read, Development Manager for Enterprise and Entrepreneurship (Students) at Coventry University for providing these case studies.
As I write this Foreword, I am collaborating with four leading user interface
(UI) component vendors on a presentation for the 2004 JavaOneSM conference.
In our presentation, the vendors will show how they leverage JavaServerTM
Faces technology in their products. While developing the presentation, I am
learning some things about the work we’ve been doing on JavaServer Faces for
the past three years. The vendors have their own set of concerns unique to
adapting their product for JavaServer Faces, but they all voice one opinion
loud and clear: they are very relieved to finally have a standard for web-based
user interfaces.
By Tom Christiansen and Nathan Torkington
ISBN 1-56592-243-3
First Edition, published August 1998.
(See the catalog page for this book.)
Search the text of Perl Cookbook.
Table of Contents
Copyright Page
Foreword
Preface
Chapter 1: Strings
Chapter 2: Numbers
Chapter 3: Dates and Times
Chapter 4: Arrays
Chapter 5: Hashes
Chapter 6: Pattern Matching
Chapter 7: File Access
Chapter 8: File Contents
Chapter 9: Directories
Chapter 10: Subroutines
Chapter 11: References and Records
Chapter 12: Packages, Libraries, and Modules
Chapter 13: Classes, Objects, and Ties
Chapter 14: Database Access
Chapter 15: User Interfaces
Chapter 16: Process Management and Communication
Chapter 17: Sockets
Chapter 18: Internet Services
Chapter 19: CGI Programming
Chapter 20: Web Automation
Index
Colophon
《為Windows Vista編寫安全的代碼》,2007年出版
Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base.
Table of Contents
Writing Secure Code for Windows Vista
Foreword
Introduction
Chapter 1 - Code Quality
Chapter 2 - User Account Control, Tokens, and Integrity Levels
Chapter 3 - Buffer Overrun Defenses
Chapter 4 - Networking Defenses
Chapter 5 - Creating Secure and Resilient
Chapter 6 - Internet Explorer 7 Defenses
Chapter 7 - Cryptographic Enhancements
Chapter 8 - Authentication and Authorization
Chapter 9 - Miscellaneous Defenses and Security-Related Technologies
Index
List of Figures
List of Tables
List of Sidebars
本書是英文版,但內(nèi)容非常不錯,本書目錄如下:
Table of Contents
SIP—Understanding the Session Initiation Protocol, Second Edition
Foreword to the First Edition
Preface to - the Second Edition
Preface to - the First Edition
Chapter 1 - SIP and the Internet
Chapter 2 - Introduction to SIP
Chapter 3 - SIP Clients and Servers
Chapter 4 - SIP Request Messages
Chapter 5 - SIP Response Messages
Chapter 6 - SIP Header Fields
Chapter 7 - Related Protocols
Chapter 8 - Comparison to H.323
Chapter 9 - Wireless and 3GPP
Chapter 10 - Call Flow Examples
Chapter 11 - Future Directions
Appendix A - Changes in the SIP Specification from RFC 2543 to RFC 3261
When the authors of this book asked me to write the Foreword of
their work on the digital enterprise, I immediately thought that it was
one more document on a fashionable topic in the technology and the
business world of the 21st Century often addressed by consulting
firms, some of which have aspired to become experts on the subject.
However, a more careful observation reveals that an issue more
important than the sole subject of the digital enterprise is: “Is your
company fully operational?”, because this is the real topic.