Synopses & Reviews
As the most effective set of automated tools for managing today's highly diverse, multivendor systems, SNMP (Simple Network Management Protocol), along with the RMON (Remote Network Monitoring) technology, is recognized as the de facto standard in the field of network management.
This book is the definitive guide to SNMP-based network and internetwork management for network administrators, managers, and designers. Concise, focusing on practical issues, and completely up to date, it covers SNMPv1, SNMPv2, and the most recent SNMPv3, as well as RMON1 and RMON2-all of which are currently deployed in today's LANs and WANs. With this book, you will be better equipped to determine your network management needs, gain insight into design issues, and obtain the necessary understanding to evaluate available SNMP-based products.
The author presents helpful background information, including an overview of network management requirements and an explanation of fundamentals such as network management architecture; performance, fault, and accounting monitoring; and configuration and security control.
You will also find detailed information on the specific protocols and operation of SNMPv1 and the enhancements made in SNMPv2 and SNMPv3, focusing in particular on this latest version's security features-message authentication code and encryption, USM (User-Based Security Model), and VACM (View-Based Access Control Model). The book provides an extensive discussion on standard MIBs (Management Information Bases), including MIB-II and the Ethernet Interface MIB. In addition, this third edition presents RMON1 and the RMON2 enhancements, looking at statistics collection, alarms, and filters. Throughout, the book highlights practical issues of network design, SNMP implementation, and daily operation.
To manage today's complex, multivendor network environments effectively and to plan intelligently for the future, you will need a thorough grasp of network management technology and standards. This comprehensive book will serve as your guide.
AUTHOR BIO: William Stallings is a consultant, lecturer, and author of over a dozen professional reference books and textbooks on data communications and computer networking. His clients have included major corporations and government agencies in the United States and Europe. Three times he has received the Best Computer Science Textbook of the Year award from the Text and Academic Authors Association. Dr. Stallings has designed and implemented both TCP/IP-based and OSI-based protocol suites on a variety of computers and operating systems. He has a Ph.D. in computer science from the Massachusetts Institute of Technology. His cyberspace address is http://www.shore.net/~ws.
END
Review
The authors have done an outstanding job on this UML book. The definition of many of the terms are the best I have ever seen! The organization and material in the encyclopedia is fantastic. It is a work of art! - Perry Cole
Synopsis
In this irreverent sequel to the bestselling The Mother of All Windows 95 Books, the irascible and irrepressible Mom and her loyal sidekicks return to give you the inside track on Windows 98. With a wacky sense of humor and in-depth insider knowledge, The Mother of All Windows 98 Books (a.k.a. MOM98) goes right to the heart of what you need to know to become a Win98 power user. MOM98 illustrates how, and more importantly, why things work (or don't work) enabling even novices to quickly become wizards with Win98.
Written in plain language (so even your Mom can understand it) MOM98 is packed with insight, unique tips, and shortcuts so you can customize and fine-tune Win98 to get the maximum benefit of this powerful new operating system.
MOM98 isn't just another Win98 book, no way, Mom serves up a hearty helping of features and coverage for your benefit. Here's some samples of Mom's work:
x coverage is based entirely on the final "shrink-wrapped" version of Windows 98, no beta stuff in here
x describes how Windows 98 really works, not how it's supposed to work
includes a Fast Track chapter to get experienced Windows 95 users up-to- speed rapidly
x reveals what works, what doesn't, and how to work around the obstacles (this coverage is worth the price of the book alone!)
x explains all of Windows 98's snazziest features: the Update Manager, Multilink Channel Aggregation, Virtual Private Networking, FAT32, Win32 Driver Model, DirectX 5.0, The Tune-Up Wizard, HTML Help, VBScript, control panel applets, and more
x covers the mysterious Windows 98 Registry in depth
And, MOM98 has a comprehensive supporting website, that is regularly updated to give you the latest work-arounds as inherent bugs emerge. MOM98 offers you the most on the market-a comprehensive reference and timely updates when you need them.
http://www.wopr.com
Reviews from previous MOM books:
"Witty, idiosyncratic, sometimes cranky, and often corny, the book captures the feeling of a Windows expert sitting at your elbow, chatting away, listening to your complaints, agreeing, offering solutions." - Jim Seymour, PC Magazine
"[A]n exceptional value...written in a style that is at once irreverent, witty and, well, strange." - Brit Hume and T.R. Reid, The Washington Post
Synopsis
In a concise and direct question and answer format, C++ FAQs, Second Edition brings you the most efficient solutions to more than four hundred of the practical programming challenges you face every day.
Moderators of the on-line C++ FAQ at comp.lang.c++, Marshall Cline, Greg Lomow, and Mike Girou are familiar with C++ programmers' most pressing concerns. In this book, the authors concentrate on those issues most critical to the professional programmer's work, and they present more explanatory material and examples than is possible on-line. This book focuses on the effective use of C++, helping programmers avoid combining seemingly legal C++ constructs in incompatible ways.
This second edition is completely up-to-date with the final ANSI/ISO C++ Standard. It covers some of the smaller syntax changes, such as "mutable;" more significant changes, such as RTTI and namespaces; and such major innovations as the C++ Standard Library, including the STL. In addition, this book discusses technologies such as Java, CORBA, COM/COM+, and ActiveX--and the relationship all of these have with C++. These [set "new" icon] features and technologies are iconed to help you quickly find what is new and different in this edition.
Each question and answer section contains an overview of the problem and solution, fuller explanations of concepts, directions for proper use of language features, guidelines for best practices and practices to avoid, and plenty of working, stand-alone examples. This edition is thoroughly cross-referenced and indexed for quick access.
Synopsis
With COM fully established as Microsoft's key middle-tier technology for object-oriented, distributed applications development, the lessons learned from numerous successful deployments have yielded important techniques and best practices for COM's most effective use.
In Effective COM, the authors, Don Box, Keith Brown, Tim Ewald, and Chris Sells, offer 50 concrete guidelines for creating COM-based applications that are efficient, robust, and maintainable. Drawn from the authors' extensive practical experience working with and teaching COM, these rules of thumb, pitfalls to avoid, and experience-based pointers will enable you to become a more productive and successful COM programmer.
The guidelines are presented within six major categories: the transition from C++ to COM; interfaces, the fundamental element of COM development; implementation issues; the unique concept of apartments; security; and transactions. Issues unique to the MTS programming model are also addressed in detail throughout the book. Sample pointers include:
Define your interfaces before you define your classes (and do it in IDL).
Design with distribution in mind.
Dual interfaces are a hack. Don't require people to implement them.
Don't access raw interface pointers across apartment boundaries.
Avoid creating threads from an in-process server.
Smart Interface Pointers add at least as much complexity as they remove.
CoInitializeSecurity is your friend. Learn it, love it, call it.
Use fine-grained authentication.
Beware exposing object references from the middle of a transaction hierarchy.
Don't rely on JIT activation for scalability.
For each guideline, the authors present a succinct summary of the challenge at hand, extensive discussion of their rationale for the advice, and many compilable code examples. Readers will gain a deeper understanding of COM concepts, capabilities, and drawbacks, and the know-how to employ COM effectively for high-quality distributed application development. A supporting Web site, including source code, can be found at http://www.develop.com/effectivecom.
Synopsis
The Unified Modeling Language (UML) has rapidly become the standard notation for modeling software-intensive systems. This book provides the definitive description of UML by its original developers-James Rumbaugh, Ivar Jacobson, and Grady Booch. Whether you are capturing requirements, developing a software architecture, designing the implementation, or trying to understand an existing system, this is the book for you, by the experts who know UML thoroughly.
The bulk of the book is a unique alphabetical list of articles covering every aspect of UML in a form convenient for quick reference and detailed study. This format permits full coverage of UML details as well as high-level articles without confusing the reader by constant shifts in level. The first part of the book-a complete summary of UML concepts by subject area-provides an introduction to UML for the newcomer as well as entry points into alphabetical articles.
Highlights of the book include:
A hyperlinked version of the book in Adobe Reader format on CD-ROM, an excellent resource for browsing or searching the text for specific information. The CD-ROM also contains the full text of the UML specification documents, courtesy of the Object Management Group.
Two-color format for diagrams containing extensive annotation clearly distinguished from the notation itself
Thorough coverage of both semantics and notation, separated in each article for easy reference
Explanations of concepts whose meaning or purpose is obscure in the original specifications
Discussion sections provide usage advice and additional insight into tricky concepts
Notation summary, with hyperlinks to individual articles on CD-ROM
Synopsis
Developing Windows NT Device Drivers: A Programmer's Handbook offers programmers a comprehensive and in-depth guide to building device drivers for Windows NT. Written by two experienced driver developers, Edward N. Dekker and Joseph M. Newcomer, this book provides detailed coverage of techniques, tools, methods, and pitfalls to help make the often complex and byzantine "black art" of driver development straightforward and accessible.
This book is designed for anyone involved in the development of Windows NT Device Drivers, particularly those working on drivers for nonstandard devices that Microsoft has not specifically supported. Because Windows NT does not permit an application program to directly manipulate hardware, a customized kernel mode device driver must be created for these nonstandard devices. And since experience has clearly shown that superficial knowledge can be hazardous when developing device drivers, the authors have taken care to explore each relevant topic in depth.
This book's coverage focuses on drivers for polled, programmed I/O, interrupt-driven, and DMA devices. The authors discuss the components of a kernel mode device driver for Windows NT, including background on the two primary bus interfaces used in today's computers: the ISA and PCI buses. Developers will learn the mechanics of compilation and linking, how the drivers register themselves with the system, experience-based techniques for debugging, and how to build robust, portable, multithread- and multiprocessor-safe device drivers that work as intended and won't crash the system. The authors also show how to call the Windows NT kernel for the many services required to support a device driver and demonstrate some specialized techniques, such as mapping device memory or kernel memory into user space. Thus developers will not only learn the specific mechanics of high-quality device driver development for Windows NT, but will gain a deeper understanding of the foundations of device driver design.