- 博客(0)
- 资源 (15)
空空如也
Windows 7 The Definitive Guide
As you’ve probably noticed, there’s more than enough information about Windows 7
on the Web. There are tutorials, reference sites, discussion groups, and more to help
make it easier to use Windows 7. However, the advantage to reading this book instead
is that all of the information you need to learn Windows 7 is organized in one place
and presented in a straightforward and orderly fashion. This book has everything you
need to customize Windows 7, master your digital media, manage your data, and
maintain your computer.
But wait, there’s more: there are plenty of other Windows 7 books available. Other
books introduce and simplify Windows 7, or provide quick starts or step-by-step
guides, or promise to teach even dummies how to use Windows 7. In this book, I don’t
pretend anyone is a dummy and I don’t just teach you the steps you need to follow; I
teach you how features work, why they work the way they work, and how to customize
them to meet your needs. You’ll also learn why you may want to use certain features
of the operating system and when to use other features to resolve any problems you are
having. In addition, this book provides tips, suggestions, and examples of how to optimize
your computer for performance, not just appearance. This book won’t just teach
you how to configure your computer—it’ll teach you how to squeeze out every last bit
of power, and how to make the most out of the features and programs included in
Windows 7. It’ll also teach you how to take advantage of the latest features.
Also, unlike many other books on the subject, this book doesn’t focus on a specific user
level. This isn’t a lightweight beginner book or a book written exclusively for developers
or administrators. Regardless of whether you are a beginner, power user, or seasoned
professional, many of the concepts in this book will be valuable to you. And you’ll be
able to apply them to your computer regardless of which edition of Windows 7 you are
using.
2014-05-20
XMPP the Definitive Guide
Getting the Most Out of This Book
To get the most out of this book, we do not recommend that you read it cover to cover
in one sitting (although you are welcome to do so!). Instead, first explore the sections
that interest you or that you need to complete a particular task, perhaps after reading
the introductory materials in Part I. You might also consider skimming over the details
of each XML example on your first reading so that you get the general idea of each use
case and protocol extension.
The book is organized as follows:
• Part I provides an overview of XMPP. The first chapter talks about XMPP at a high
level and introduces you to some ways XMPP is being used to build real-time
applications. The second chapter describes the basics of XMPP technologies, including
architectural issues, addressing, and communication primitives. Read this
section first if you’d like a relatively quick orientation to XMPP technologies.
• Part II consists of a series of “developer stories” that illustrate how the tools in the
XMPP toolkit can help you solve particular classes of problems. Each chapter in
Part II introduces the XMPP concepts and services that you need in a given problem
domain, describes how to use those tools, and provides examples showing how
specific protocols come into play. Read the chapters here that interest you most.
The order doesn’t matter, because we recap concepts where needed, and provide
cross-references to more detailed treatments in other chapters.
• Part III shows you how to put it all together by walking you through the thought
processes and design decisions involved in building an XMPP-based application.
Read this part after you have a feel for XMPP from the first two parts, and as you
begin to dig into a large project that uses XMPP to construct a business application
or real-time service.
• Part IV consists of the appendixes, which help you understand the terminology of
XMPP; introduce you to the wealth of XMPP servers, clients, and code libraries;
and guide you through the large “stack” of XMPP protocol specifications so you
can quickly find what you need. Use these appendixes as reference material on an
ongoing basis, or as a quick index to the myriad of XMPP resources available on
the Internet.
xiv |
2014-05-20
Advances in Cryptology - CRYPTO 2010
CRYPTO 2010, the 30th Annual International Cryptology Conference, was sponsored
by the International Association for Cryptologic Research (IACR) in cooperation
with the IEEE Computer Society Technical Committee on Security
and Privacy and the Computer Science Department of the University of California
at Santa Barbara. The conference was held in Santa Barbara, California,
during August 15-19, 2010, in conjunction with CHES 2010 (Workshop on
Cryptographic Hardware and Embedded Systems). Zulfikar Ramzan served as
the General Chair.
The conference received 203 submissions. The quality of the submissions was
very high, and the selection process was a challenging one. The Program Committee,
aided by a 159 external reviewers, reviewed the submissions and after an
intensive review period the committee accepted 41 of these submissions. Three
submissions were merged into a single paper and two papers were merged into
a single talk, yielding a total of 39 papers in the proceedings and 38 presentations
at the conference. The revised versions of the 39 papers appearing in the
proceedings were not subject to editorial review and the authors bear full responsibility
for their contents. The best-paper award was awarded to the paper
“Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness” by
Craig Gentry.
The conference featured two invited presentations. This year we celebrated
25 years from the publication of the ground-breaking work of Shafi Goldwasser,
Silvio Micali and Charles Rackoff “The Knowledge Complexity of Interactive
Proof-Systems.” We had the privilege of having “GMR” give the first invited
talk of the conference. The second invited talk was in a joint session with CHES.
The topic was “Is Theoretical Cryptography Any Good in Practice?” and the
talk was jointly given by Ivan Damg˚ard and Markus Kuhn. The program also
included a Rump Session, chaired by Daniel J. Bernstein and Tanja Lange,
featuring short informal talks on new and in-progress results.
I am in debt to the many people who contributed to the success of the
conference, and I apologize to those I have forgotten. First and foremost I thank
the authors who submitted their papers; a conference is only as good as the
submissions that it receives. The Program Committee members made a great
effort contributing their time, knowledge, expertise and taste and for that I am
grateful. I also thank the large number of external reviewers who assisted in the
process. (The Program Committee and sub-reviewers are listed in the following
pages.) The submission and review process used the software that Shai Halevi
designed and I received a lot of help from him in running it.
2014-02-03
Advances in Cryptology - CRYPTO 2013
CRYPTO 2013 the 33rd Annual International Cryptology Conference was held
August 18–22 2013 on the campus of the University of California Santa Barbara
The event was sponsored by the International Association for Cryptologic
Research IACR in cooperation with the UCSB Computer Science Department
and the IEEE Computer Society’s Technical Committee on Security and Privacy
The program represents the recent significant advances in all areas of cryptology
Sixty one papers were included in the program a record number for IACR
flagship conferences This two volume proceedings contains the revised versions
of all the papers One pair of papers shared a single presentation slot in the
program There were also two invited talks On Monday Cindy Cohn from the
Electronic Frontier Foundation gave a talk entitled “Crypto Wars Part 2 Have
Begun ”On Wednesday Adam Langley from Google spoke about “Why the Web
Still Runs on RC4 ” in a joint session with CHES 2013 To accommodate the
increase in the number of papers sessions were held throughout Tuesday and
Thursday afternoons The rump session took place as usual on Tuesday evening
and was chaired by Dan Bernstein and Tanja Lange
For the Best Paper Award the Program Committee PC unanimously selected
the paper“On the Function Field Sieve and the Impact of Higher Splitting
Probabilities”by Faruk Gologlu Robert Granger Gary McGuire and Jens Zumbragel
This year we also awarded a Best Young Author Paper Award To be eligible
for the award all authors of the paper had to either be full time students or
have received their PhDs in 2011 or later The award was given to the paper
“Counter Cryptanalysis: Reconstructing Flame’s New Variant Collision Attack”
by Marc Stevens
Faced with a large number of high quality submissions the PC decided to
significantly increase the number of papers in the program from last year’s 48
papers at the price of making the program longer and keeping the paper presentations
short 20 minutes per paper including questions and answers Another
option that was seriously considered was to move to parallel sessions on some of
the days of the conference This would have allowed for somewhat longer paper
presentations and an early adjourn on Thursday In the end we opted to retain
the single session format with the hope of keeping the community more unified
by allowing participants to attend all talks ">CRYPTO 2013 the 33rd Annual International Cryptology Conference was held
August 18–22 2013 on the campus of the University of California Santa Barbara
The event was sponsored by the International Association for Cryptologic
Research IACR in cooperation with the UCSB Computer Science Depart [更多]
2014-02-03
Pattern-Oriented Software Architecture,Volume 5, On Patterns and Pattern Languages
Pattern-Oriented Software Architecture,Volume 5, On Patterns and Pattern Languages
2010-07-13
Pattern-Oriented Software Architecture,Volume 3, Patterns For Resource Management
Pattern-Oriented Software Architecture,Volume 3, Patterns For Resource Management
2010-07-13
Pattern-Oriented Software Architecture,Volume 2, Patterns for Concurrent and Networked Objects
Pattern-Oriented Software Architecture,Volume 2, Patterns for Concurrent and Networked Objects
2010-07-13
Pattern-Oriented Software Architecture,Volume 1, A System of Patterns
Pattern-Oriented Software Architecture,Volume 1, A System of Patterns
2010-07-13
jQuery in Action 2008
Do more with less.
Plain and simple, that is the purpose of this book: to help you learn how to
do more on your web application pages with less script. Your authors, one a
jQuery contributor and evangelist and the other an avid and enthusiastic user,
believe that jQuery is the best library available today to help you do just that.
This book is aimed at getting you up and running with jQuery quickly and
effectively and, hopefully, having some fun along the way. The entire core
jQuery API is discussed, and each API method is presented in an easy-to-digest
syntax block that describes the parameters and return values of the method.
Small examples of using the APIs effectively are included; and, for those big
concepts, we provide what we call lab pages. These comprehensive and fun
pages are an excellent way for you to see the nuances of the jQuery methods
in action without the need to write a slew of code yourself.
All example code and lab pages are available for download at http://
www.manning.com/bibeault.
We could go on and on with some marketing jargon telling you how great
this book is, but you don’t want to waste time reading that, do you? What you
really want is to get your arms into the bits and bytes up to your elbows, isn’t it?
What’s holding you back? Read on!
2009-09-17
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人