Browse Results

Showing 82,426 through 82,450 of 83,281 results

Parallel Computational Fluid Dynamics 2006: Parallel Computing and its Applications

by J. Periaux P. Fox A. Ecer N. Satofuka J. H. Kwon

The proceedings from Parallel CFD 2006 covers all aspects of parallel computings and its applications. Although CFD is one of basic tools for design procedures to produce machineries, such as automobiles, ships, aircrafts, etc., large scale parallel computing has been realized very recently, especially for the manufactures. Various applications in many areas could be experienced including acoustics, weather prediction and ocean modeling, flow control, turbine flow, fluid-structure interaction, optimization, heat transfer, hydrodynamics.- Report on current research in the field in an area which is rapidly changing - Subject is important to all interested in solving large fluid dynamics problems - Interdisciplinary activity. Contributions include scientists with a variety of backgrounds

Snort Intrusion Detection and Prevention Toolkit

by Jay Beale Andrew Baker Brian Caswell

This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.This fully integrated book and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks. Leading Snort experts Brian Caswell, Andrew Baker, and Jay Beale analyze traffic from real attacks to demonstrate the best practices for implementing the most powerful Snort features. The book will begin with a discussion of packet inspection and the progression from intrusion detection to intrusion prevention. The authors provide examples of packet inspection methods including: protocol standards compliance, protocol anomaly detection, application control, and signature matching. In addition, application-level vulnerabilities including Binary Code in HTTP headers, HTTP/HTTPS Tunneling, URL Directory Traversal, Cross-Site Scripting, and SQL Injection will also be analyzed. Next, a brief chapter on installing and configuring Snort will highlight various methods for fine tuning your installation to optimize Snort performance including hardware/OS selection, finding and eliminating bottlenecks, and benchmarking and testing your deployment. A special chapter also details how to use Barnyard to improve the overall performance of Snort. Next, best practices will be presented allowing readers to enhance the performance of Snort for even the largest and most complex networks. The next chapter reveals the inner workings of Snort by analyzing the source code. The next several chapters will detail how to write, modify, and fine-tune basic to advanced rules and pre-processors. Detailed analysis of real packet captures will be provided both in the book and the companion material. Several examples for optimizing output plugins will then be discussed including a comparison of MySQL and PostrgreSQL. Best practices for monitoring Snort sensors and analyzing intrusion data follow with examples of real world attacks using: ACID, BASE, SGUIL, SnortSnarf, Snort_stat.pl, Swatch, and more.The last part of the book contains several chapters on active response, intrusion prevention, and using Snort’s most advanced capabilities for everything from forensics and incident handling to building and analyzing honey pots.This fully integrated book and Web toolkit covers everything all in one convenient package It is authored by members of the Snort team and it is packed full of their experience and expertiseIncludes full coverage of the brand new Snort version 2.6, packed full of all the latest information

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

by David Maynor

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code.This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter demonstrates all of the features offered by the MSF as an exploitation platform. With a solid understanding of MSF’s capabilities, the book then details techniques for dramatically reducing the amount of time required for developing functional exploits.By working through a real-world vulnerabilities against popular closed source applications, the reader will learn how to use the tools and MSF to quickly build reliable attacks as standalone exploits. The section will also explain how to integrate an exploit directly into the Metasploit Framework by providing a line-by-line analysis of an integrated exploit module. Details as to how the Metasploit engine drives the behind-the-scenes exploitation process will be covered, and along the way the reader will come to understand the advantages of exploitation frameworks. The final section of the book examines the Meterpreter payload system and teaches readers to develop completely new extensions that will integrate fluidly with the Metasploit Framework.A November 2004 survey conducted by "CSO Magazine" stated that 42% of chief security officers considered penetration testing to be a security priority for their organizationsThe Metasploit Framework is the most popular open source exploit platform, and there are no competing books

Wireless Communications & Networking (ISSN)

by Vijay Garg

This book provides comprehensive coverage of mobile data networking and mobile communications under a single cover for diverse audiences including managers, practicing engineers, and students who need to understand this industry. In the last two decades, many books have been written on the subject of wireless communications and networking. However, mobile data networking and mobile communications were not fully addressed in a unified fashion. This book fills that gap in the literature and is written to provide essentials of wireless communications and wireless networking, including Wireless Personal Area Networks (WPAN), Wireless Local Area Networks (WLAN), and Wireless Wide Area Networks (WWAN). The first ten chapters of the book focus on the fundamentals that are required to study mobile data networking and mobile communications. Numerous solved examples have been included to show applications of theoretical concepts. In addition, unsolved problems are given at the end of each chapter for practice. (A solutions manual will be available.)After introducing fundamental concepts, the book focuses on mobile networking aspects. Four chapters are devoted on the discussion of WPAN, WLAN, WWAN, and internetworking between WLAN and WWAN. Remaining seven chapters deal with other aspects of mobile communications such as mobility management, security, cellular network planning, and 4G systems.A unique feature of this book that is missing in most of the available books on wireless communications and networking is a balance between the theoretical and practical concepts. Moreover, this book can be used to teach a one/two semester course in mobile data networking and mobile communications to ECE and CS students.*Details the essentials of Wireless Personal Area Networks(WPAN), Wireless Local Are Networks (WLAN), and Wireless Wide Area Networks (WWAN)*Comprehensive and up-to-date coverage including the latest in standards and 4G technology*Suitable for classroom use in senior/first year grad level courses. Solutions manual and other instructor support available

Visualization in Medicine: Theory, Algorithms, and Applications (The Morgan Kaufmann Series in Computer Graphics)

by Bernhard Preim Dirk Bartz

Visualization in Medicine is the first book on visualization and its application to problems in medical diagnosis, education, and treatment. The book describes the algorithms, the applications and their validation (how reliable are the results?), and the clinical evaluation of the applications (are the techniques useful?). It discusses visualization techniques from research literature as well as the compromises required to solve practical clinical problems. The book covers image acquisition, image analysis, and interaction techniques designed to explore and analyze the data. The final chapter shows how visualization is used for planning liver surgery, one of the most demanding surgical disciplines. The book is based on several years of the authors' teaching and research experience. Both authors have initiated and lead a variety of interdisciplinary projects involving computer scientists and medical doctors, primarily radiologists and surgeons.* A core field of visualization and graphics missing a dedicated book until now* Written by pioneers in the field and illustrated in full color* Covers theory as well as practice

Microsoft Exchange Server 2007: Tony Redmond's Guide to Successful Implementation (HP Technologies)

by Tony Redmond

Microsoft Exchange Server 2007 marks the biggest advancement in the history of the Exchange Product group. The completely re-engineered server system will change the face of how IT administrators approach Exchange. Tony Redmond, one of the world’s most acclaimed Exchange experts, offers insider insight from the very basics of the newly transformed architecture to understanding the nuances of the new and improved Microsoft Management Console (MMC) 3.0 and the two new administrative interfaces—the Exchange Management Console (EMC) and the Exchange Management Shell (EMS).How Exchange works with Active DirectoryHow the new management model worksHow to use the Exchange Management Shell to automate administrative operationsHow Outlook, Outlook Web Access, and Windows Mobile clients work with ExchangeHow Exchange 2007 message routing differs from previous versionsHow to help your users to use Exchange intelligentlyHow to select hardware for Exchange 2007

Electronic and Algorithmic Trading Technology: The Complete Guide (Complete Technology Guides for Financial Services)

by Kendall Kim

Electronic and algorithmic trading has become part of a mainstream response to buy-side traders’ need to move large blocks of shares with minimum market impact in today’s complex institutional trading environment. This book illustrates an overview of key providers in the marketplace. With electronic trading platforms becoming increasingly sophisticated, more cost effective measures handling larger order flow is becoming a reality. The higher reliance on electronic trading has had profound implications for vendors and users of information and trading products. Broker dealers providing solutions through their products are facing changes in their business models such as: relationships with sellside customers, relationships with buyside customers, the importance of broker neutrality, the role of direct market access, and the relationship with prime brokers. Electronic and Algorithmic Trading Technology: The Complete Guide is the ultimate guide to managers, institutional investors, broker dealers, and software vendors to better understand innovative technologies that can cut transaction costs, eliminate human error, boost trading efficiency and supplement productivity. As economic and regulatory pressures are driving financial institutions to seek efficiency gains by improving the quality of software systems, firms are devoting increasing amounts of financial and human capital to maintaining their competitive edge. This book is written to aid the management and development of IT systems for financial institutions. Although the book focuses on the securities industry, its solution framework can be applied to satisfy complex automation requirements within very different sectors of financial services – from payments and cash management, to insurance and securities. Electronic and Algorithmic Trading: The Complete Guide is geared toward all levels of technology, investment management and the financial service professionals responsible for developing and implementing cutting-edge technology. It outlines a complete framework for successfully building a software system that provides the functionalities required by the business model. It is revolutionary as the first guide to cover everything from the technologies to how to evaluate tools to best practices for IT management. First book to address the hot topic of how systems can be designed to maximize the benefits of program and algorithmic trading Outlines a complete framework for developing a software system that meets the needs of the firm's business model Provides a robust system for making the build vs. buy decision based on business requirements

Point-Based Graphics (The Morgan Kaufmann Series in Computer Graphics)

by Markus Gross Hanspeter Pfister

The polygon-mesh approach to 3D modeling was a huge advance, but today its limitations are clear. Longer render times for increasingly complex images effectively cap image complexity, or else stretch budgets and schedules to the breaking point. Comprised of contributions from leaders in the development and application of this technology, Point-Based Graphics examines it from all angles, beginning with the way in which the latest photographic and scanning devices have enabled modeling based on true geometry, rather than appearance. From there, it’s on to the methods themselves. Even though point-based graphics is in its infancy, practitioners have already established many effective, economical techniques for achieving all the major effects associated with traditional 3D Modeling and rendering. You’ll learn to apply these techniques, and you’ll also learn how to create your own. The final chapter demonstrates how to do this using Pointshop3D, an open-source tool for developing new point-based algorithms.The first book on a major development in computer graphics by the pioneers in the fieldShows how 3D images can be manipulated as easily as 2D images are with Photoshop

Network Analysis, Architecture, and Design (ISSN)

by James D. McCabe

Traditionally, networking has had little or no basis in analysis or architectural development, with designers relying on technologies they are most familiar with or being influenced by vendors or consultants. However, the landscape of networking has changed so that network services have now become one of the most important factors to the success of many third generation networks. It has become an important feature of the designer's job to define the problems that exist in his network, choose and analyze several optimization parameters during the analysis process, and then prioritize and evaluate these parameters in the architecture and design of the system. Network Analysis, Architecture, and Design, Third Edition, uses a systems methodology approach to teaching these concepts, which views the network (and the environment it impacts) as part of the larger system, looking at interactions and dependencies between the network and its users, applications, and devices. This approach matches the new business climate where customers drive the development of new services and the book discusses how networks can be architected and designed to provide many different types of services to customers. With a number of examples, analogies, instructor tips, and exercises, this book works through the processes of analysis, architecture, and design step by step, giving designers a solid resource for making good design decisions. With examples, guidelines, and general principles McCabe illuminates how a network begins as a concept, is built with addressing protocol, routing, and management, and harmonizes with the interconnected technology around it. Other topics covered in the book are learning to recognize problems in initial design, analyzing optimization parameters, and then prioritizing these parameters and incorporating them into the architecture and design of the system. This is an essential book for any professional that will be designing or working with a network on a routine basis.Substantially updated design content includes ad hoc networks, GMPLS, IPv6, and mobile networkingWritten by an expert in the field that has designed several large-scale networks for government agencies, universities, and corporationsIncorporates real-life ideas and experiences of many expert designers along with case studies and end-of-chapter exercises

Microsoft Outlook 2007 Programming: Jumpstart for Power Users and Administrators

by Sue Mosher

Microsoft Outlook is the most widely used e-mail program and offers the most programmability. Sue Mosher introduces key concepts for programming Outlook using Visual Basic for Applications, custom Outlook forms, and external scripts, without the need for additional development tools. For those who manage Outlook installations, it demonstrates how to use new features in the Outlook 2007 programming model such as building scripts that can create rules and views and manage categories. Power users will discover how to enhance Outlook with custom features, such as the ability to process incoming mail and extract key information. Aimed at the non-professional programmer, it also provides a quick guide to Outlook programming basics for pro developers who want to dive into Outlook integration. Dozens of new programming objects detailed including views, rules, categories, searchesNo previous coding experience or additional development tools requiredExamples outline issues using real-world functionality

Digital Design and Computer Architecture

by David Harris Sarah L. Harris

Digital Design and Computer Architecture is designed for courses that combine digital logic design with computer organization/architecture or that teach these subjects as a two-course sequence. Digital Design and Computer Architecture begins with a modern approach by rigorously covering the fundamentals of digital logic design and then introducing Hardware Description Languages (HDLs). Featuring examples of the two most widely-used HDLs, VHDL and Verilog, the first half of the text prepares the reader for what follows in the second: the design of a MIPS Processor. By the end of Digital Design and Computer Architecture, readers will be able to build their own microprocessor and will have a top-to-bottom understanding of how it works--even if they have no formal background in design or architecture beyond an introductory class. David Harris and Sarah Harris combine an engaging and humorous writing style with an updated and hands-on approach to digital design.Unique presentation of digital logic design from the perspective of computer architecture using a real instruction set, MIPS.Side-by-side examples of the two most prominent Hardware Design Languages--VHDL and Verilog--illustrate and compare the ways the each can be used in the design of digital systems.Worked examples conclude each section to enhance the reader's understanding and retention of the material.

Security Convergence: Managing Enterprise Security Risk

by Dave Tyson

Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency, greatly improves security, and saves companies money. Implementation of convergence principles has increased rapidly and the number of businesses moving to this model will continue to grow over the next few years. All security professionals, regardless of background, will find this a useful reference and a practical look at the benefits of convergence and a look to the future of how organizations and corporations will protect their assets.* A high-level, manager's overview of the movement in corporations to combine the physical and IT Security functions * Details the challenges and benefits of convergence with an assessment of the future outlook for this growing industry trend* Contains case examples that detail how convergence can be implemented to save money and improve efficiencies

Intruder Alarms

by Gerard Honey

Intruder Alarms provides a definitive and fully up-to-date guide to the specification, systems design, integration, installation and maintenance of intruder alarm systems. It has been written to be the essential handbook for installation engineers and security professionals working in this rapidly expanding and developing area.The second edition includes new material on the use of remote signalling and networking and an expanded section on the integration of security systems, including real-world case studies. Information on police response policy, and the use of confirmed alarm technology has been updated, along with coverage of accreditation systems, NSI and ICON.This book has been endorsed by SITO (the UK's Security Industry Training Organisation) as a suitable text for students following the relevant SITO courses including the SITO / City & Guilds scheme 1851: Knowledge of Security and Emergency Alarm Systems.* The practical guide for installation engineers and security professionals* Essential reading for anyone responsible for the commissioning and maintenance of security alarm systems* New edition covers networking and integration issues

Closed Circuit Television: CCTV Installation, Maintenance and Operation

by Joe Cieszynski

Closed Circuit Television (CCTV) surveillance is one of the fastest growing areas in the security industry. This book is an essential guide for professionals involved the installation and maintenance of CCTV systems, system design, specification and purchasing and the management of CCTV systems. Unlike most existing books on CCTV, this title is not just a discussion of security issues, but a thorough guide to the technical side of the subject - cameras and monitors, video recording, cabling and transmission, installation and maintenance.The concise, accessible text makes it for hard-pressed practitioners and students on training courses.The second edition is fully dual-standard for PAL and NTSC systems. New material in the second edition covers lighting issues and equipment, digital signal transmission, integrated CCTV / intruder alarm systems, CAT5 cabling, digital recording, video printers, ancillary equipment, and a glossary.This book is recommended by SITO (the Security Industry Training Organisation, UK) as suitable for its courses, the City and Guilds 1851 programme, and the underpinning knowledge requirement of Level 3 NVQs from SITO / C & G. Joe Cieszynski is a well known magazine writer and a contributor to the SITO distance learning materials on CCTV. He has extensive experience in the industry and as a lecturer.* Demystifies CCTV technology for installers and managers* Concise, accessible text ideal for hard-pressed practitioners and students* Fully dual-standard coverage for PAL and NTSC based systems

Zero-Day Exploit: Countdown to Darkness (Cyber-Fiction)

by Rob Shein

The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them.* The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community.* This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists.* Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community.

Windows 2000 Configuration Wizards

by Syngress

Developers are used to working with Wizards, component-like products that allow them to create certain elements - like dialog buttons - quickly and easily while they are coding applications. With the launch of Windows 2000, Microsoft has announced a new set of Wizards that will help administrators and users configure and set up Windows 2000 Professional (the Windows NT 4 Workstation successor) and Windows 2000 Server (the Windows NT 4 Server successor). Windows 2000 Setup and Configuration Wizards covers all the available Wizards, with an emphasis on those new to Windows 2000. Each Wizard is broken down by dialog box, with explanations of all options and required elements so administrators will know what to be prepared with.In addition, coverage of new services that will speed configuration and set up (like the Windows Installer) will be covered. * This is the first book to focus on Wizards and Windows 2000 automated components* Network administrators and developers will save time using this book

Time-Varying Image Processing and Moving Object Recognition, 4

by V. Cappellini

New digital image processing and recognition methods, implementation techniques and advanced applications (television, remote sensing, biomedicine, traffic, inspection, robotics, etc.) are presented in this volume. Novel approaches (i.e. digital filters, source coding, neural networks etc.) for solving 2-D and 3-D problems are described. Many papers focus on the motion estimation and tracking recognition of moving objects. The increasingly important field of Cultural Heritage is also covered. Some papers are more theoretical or of review nature, while others contain new implementations and applications. Generally the book presents - for the above outlined area - the state of the art (theory, implementation, applications) with future trends.This book will be of interest not only to researchers, professors and students in university departments of engineering, communications, computers and automatic control, but also to engineers and managers of industries concerned with computer vision, manufacturing, automation, robotics and quality control.

The Design of Computer Supported Cooperative Work and Groupware Systems (ISSN #Volume 12)

by Dan Shapiro Michael Tauber Roland Traunmüller

The phrases the information superhighway and the the information societyare on almost everyone's lips. CSCW and groupware systems are the key to bringing those phrases to life. To an extent that would scarcely have been imaginable a few years ago, the contributions in this volume speak to each other and to a broader interdisciplinary context. The areas of ethnography and design, the requirements and principles of CSCW design, CSCW languages and environments, and the evaluation of CSCW systems are brought together, to bring to light how activities in working domains are really in practice, carried out. The aim above all is to do justice to the creativity and versatility of those whose work they aim to support.

A Student Guide to Object-Oriented Development

by Carol Britton Jill Doake

A Student Guide to Object-Oriented Development is an introductory text that follows the software development process, from requirements capture to implementation, using an object-oriented approach. The book uses object-oriented techniques to present a practical viewpoint on developing software, providing the reader with a basic understanding of object-oriented concepts by developing the subject in an uncomplicated and easy-to-follow manner. It is based on a main worked case study for teaching purposes, plus others with password-protected answers on the web for use in coursework or exams. Readers can benefit from the authors' years of teaching experience. The book outlines standard object-oriented modelling techniques and illustrates them with a variety of examples and exercises, using UML as the modelling language and Java as the language of implementation. It adopts a simple, step by step approach to object-oriented development, and includes case studies, examples, and exercises with solutions to consolidate learning. There are 13 chapters covering a variety of topics such as sequence and collaboration diagrams; state diagrams; activity diagrams; and implementation diagrams. This book is an ideal reference for students taking undergraduate introductory/intermediate computing and information systems courses, as well as business studies courses and conversion masters' programmes.Adopts a simple, step by step approach to object-oriented developmentIncludes case studies, examples, and exercises with solutions to consolidate learningBenefit from the authors' years of teaching experience

SDL '97: SDL, MSC and Trends

by Ana Cavalli Amardeo Sarma

As Cavalli and Sarma astutely remarked in the introduction to this volume, it is quite remarkable that SDL '97 may have the first participant younger than SDL itself. SDL '97 provides the opportunity to reflect the course SDL has taken and why it has been successful over two decades where other languages addressing the same market have failed.SDL now also has a permanent companion in MSC (Message Sequence Charts). MSC today is a language in its own right and has its areas of application both in conjunction with SDL and independently or in combination with other techniques. MSC has strong structuring concepts to specify message sequences for large systems and can be used to develop scenarios, which is extremely useful for test and design environments. The SDL Forum today really is the SDL and MSC Forum.

Skew-Tolerant Circuit Design (ISSN)

by David Harris

As advances in technology and circuit design boost operating frequencies of microprocessors, DSPs and other fast chips, new design challenges continue to emerge. One of the major performance limitations in today's chip designs is clock skew, the uncertainty in arrival times between a pair of clocks. Increasing clock frequencies are forcing many engineers to rethink their timing budgets and to use skew-tolerant circuit techniques for both domino and static circuits. While senior designers have long developed their own techniques for reducing the sequencing overhead of domino circuits, this knowledge has routinely been protected as trade secret and has rarely been shared. Skew-Tolerant Circuit Design presents a systematic way of achieving the same goal and puts it in the hands of all designers. This book clearly presents skew-tolerant techniques and shows how they address the challenges of clocking, latching, and clock skew. It provides the practicing circuit designer with a clearly detailed tutorial and an insightful summary of the most recent literature on these critical clock skew issues.Synthesizes the most recent advances in skew-tolerant design in one cohesive tutorialProvides incisive instruction and advice punctuated by humorous illustrationsIncludes exercises to test understanding of key concepts and solutions to selected exercises

Self-Organization, Computational Maps, and Motor Control (ISSN #Volume 119)

by P.G. Morasso V. Sanguineti

In the study of the computational structure of biological/robotic sensorimotor systems, distributed models have gained center stage in recent years, with a range of issues including self-organization, non-linear dynamics, field computing etc. This multidisciplinary research area is addressed here by a multidisciplinary team of contributors, who provide a balanced set of articulated presentations which include reviews, computational models, simulation studies, psychophysical, and neurophysiological experiments.The book is divided into three parts, each characterized by a slightly different focus: in part I, the major theme concerns computational maps which typically model cortical areas, according to a view of the sensorimotor cortex as "geometric engine" and the site of "internal models" of external spaces. Part II also addresses problems of self-organization and field computing, but in a simpler computational architecture which, although lacking a specialized cortical machinery, can still behave in a very adaptive and surprising way by exploiting the interaction with the real world. Finally part III is focused on the motor control issues related to the physical properties of muscular actuators and the dynamic interactions with the world.The reader will find different approaches on controversial issues, such as the role and nature of force fields, the need for internal representations, the nature of invariant commands, the vexing question about coordinate transformations, the distinction between hierachiacal and bi-directional modelling, and the influence of muscle stiffness.

SDL '99: The Next Millennium

by R. Dssouli G. V. Bochmann Y. Lahav

This book represents the proceedings of the 9th SDL Forum which was held in Montreal, Quebec, Canada, during the week of June 21-25, 1999. The 9th SDL Forum presents papers on the past and future development of the MSC and SDL languages.The volume presents information on experience with the use of these languages in industrial development projects, on tools and techniques for using these languages in the software and hardware development process, and other aspects of these languages.

QuickTime Toolkit Volume Two: Advanced Movie Playback and Media Types (QuickTime Developer Series)

by Tim Monroe

"Buried inside QuickTime are a host of powerful tools for creating, delivering, and playing digital media. The official QuickTime documentation explains 'what' each API function does. But knowing what each function does isn't enough to allow a developer to take full advantage of QuickTime. QuickTime Toolkit fills in the gap—providing plenty of practical examples of 'how' to use QuickTime to perform all kinds of useful tasks. More importantly, [this book] goes beyond 'how' and into 'why' —providing readers with a deeper understanding of QuickTime and how to benefit from using it in their own products." —Peter Hoddie, cofounder of Kinoma and former QuickTime architectQuickTime Toolkit, Volume Two continues the step-by-step investigation of programming QuickTime, the elegant and powerful media engine used by many of Apple's industry-leading services and products (such as the iTunes music store, iMovie, and Final Cut Pro) and also used by a large number of third-party applications. This second collection of articles from the author's highly regarded column in MacTech Magazine builds upon the discussion of playback techniques and media types presented in the first volume to cover advanced types of QuickTime media data, including video effects, Flash tracks, and skins. It shows how to capture audio and video data, broadcast that data to remote computers, play movies full screen, and load movies asynchronously. QuickTime Toolkit Volume Two also shows how to integrate Carbon events into your Macintosh application and how to work with Macintosh resources in your Windows application.Part of the official QuickTime Developer Series, publishing the finest books on QuickTime in cooperation with Apple.Written by one of Apple's premier media engineers skilled in revealing QuickTime's sophisticated technology to programmersOffers many undocumented insider tips for making applications that work well in both Mac OS and Windows

Refine Search

Showing 82,426 through 82,450 of 83,281 results