SharePoint is central to the Microsoft Office and developer platform, and at seventy-five million licenses sold, is the fastest growing server product at Microsoft. This book is an anthology of the best thinking on critical SharePoint 2007 topics by a dozen SharePoint MVPs, the best and the most recognized experts in the field. Topics covered include but are not limited to branding, business data connector, classified networks, forms-based authentication, InfoPath and SharePoint, installation, and zones and alternate access mapping.
Essential C# 3.0 is an extremely well-written and well-organized “no-fluff” guide to C# 3.0, which will appeal to programmers at all levels of experience with C#. This fully updated edition dives deep into the new features that are revolutionizing programming, with brand new chapters covering query expressions, lambda expressions, extension methods, collection interface extensions, standard query operators, and LINQ as a whole. Author Mark Michaelis covers the C# language in depth, and each importantconstruct is illustrated with succinct, relevant code examples. (Complete code examples are available online.) Graphical “mind maps” at the beginning of each chapter show what material is covered and how each topic relates to the whole. Topics intended for beginners and advanced readers are clearly marked. Following an introduction to C#, readers learn about C# primitive data types, value types, reference types, type conversions, and arrays Operators and control flow, loops, conditional logic, and sequential programming Methods, parameters, exception handling, and structured programming Classes, inheritance, structures, interfaces, and object-oriented programming Well-formed types, operator overloading, namespaces, and garbage collection Generics, collections, custom collections, and iterators Delegates and lambda expressions Standard query operators and query expressions LINQ: language integrated query Reflection, attributes, and declarative programming Threading, synchronization, and multithreaded patterns Interoperability and unsafe code The Common Language Infrastructure that underlies C# Whether you are just starting out as a programmer, are an experienced developer looking to learn C#, or are a seasoned C# programmer interested in learning the new features of C# 3.0, Essential C# 3.0 gives you just what you need to quickly get up and running writing C# applications.
With iText, one can transform PDF documents into live, interactive applications quickly and easily. This free and open source library for Java and .NET is the leading tool of its kind, and was primarily developed and maintained by Bruno Lowagie, the author of this book. iText in Action, Second Edition offers an introduction and a practical guide to iText and the internals of PDF. While at the entry level iText is easy to learn, there's an astonishing range of things you can do once you dive below the surface. This book lowers the learning curve and, through numerous innovative and practical examples, unlocks the secrets hidden in Adobe's PDF Reference. This totally revised new edition introduces the new functionality added to iText in recent releases, and it updates all examples from JDK 1.4 to Java 5. The examples are in Java but they can be easily adapted to.NET.
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat hackers, this book is aimed at making vital information known so that you can find ways to secure your Mac OS X systems, and examines the sorts of attacks that are prevented by Leopard’s security defenses, what attacks aren’t, and how to best handle those weaknesses.
Records management helps users address evolving governance mandates to meet regulatory, legal, and fiduciary requirements. Proactive adherence to information retention policies and procedures is a critical facet of any compliance strategy. IBM® Enterprise Records helps organizations enforce centralized policy management for file plans, retention schedules, legal preservation holds, and auditing. IBM Enterprise Records enables your organization to securely capture, declare, classify, store, and dispose of electronic and physical records. In this IBM Redbooks® publication, we introduce the records management concept and provide an overview of IBM Enterprise Records. We address records management topics, including the retention schedule, file plan, records ingestion and declaration, records disposition, records hold, and Enterprise Records application programming interfaces (APIs). We also use a case study to describe step-by-step instructions to implement a sample records management solution using Enterprise Records. We provide concrete examples of how to perform tasks, such as file plan creation, records ingestion and declaration, records disposition, and records hold. This book helps you to understand the records management concept, the IBM Enterprise Records features and capabilities, and its use.
Thoroughly updated and revised, this Second Edition is the only book currently on the market to present the most important and commonly used methods in human resource management in such detail. The authors clearly outline how organizations can create programs to improve hiring and training, make jobs safer, provide a satisfying work environment, and help employees to work smarter. Throughout, they provide practical tips on how to conduct a job analysis, often offering anecdotes from their own experiences.
Health Informatics (HI) focuses on the application of Information Technology (IT) to the field of medicine to improve individual and population healthcare delivery, education and research. This extensively updated fifth edition reflects the current knowledge in Health Informatics and provides learning objectives, key points, case studies and references.