advertisement

O'Reilly Book Excerpts

Apache

Apache Under Windows
by Ben Laurie and Peter Laurie
This excerpt is from Chapter 1 of Apache: The Definitive Guide, 2nd Edition. Covers installing an Apache binary under Windows and, for more adventurous souls, compiling from source.

Cooking with Apache
by Ken Coar and Rich Bowen
The recently released Apache Cookbook contains over 100 solutions to problems that webmasters, web administrators, programmers, and anyone who works with Apache have come upon at one time or another. This week we've excerpted sample recipes from the book that contain solutions to problems with virtual hosting, highlighting PHP source, and enabling WebDAV.

SysAdmin

Cooking with Apache, Part 2
by Rich Bowen and Ken Coar
At the end of 2003, we published our first batch of recipes from O'Reilly's Apache Cookbook. This week, we've excerpted three more samples. Find out how to make part of your web site available via SSL, how to place a CGI program in a directory that contains non-CGI documents, and how to redirect a 404 ("not found") page to another page (such as the front page of the site) in these latest samplings.

Cooking with Apache, Part 3
by Rich Bowen and Ken Coar
We've three more samples this week from O'Reilly's Apache Cookbook to tempt you with. Learn how to set up authentication requirements for a proxied server, how to optimize performance of symbolic links, and how to solve the "trailing slash" problem.

Apache

Securing Your Apache Server
by Ben Laurie and Peter Laurie
This excerpt is from Chapter 13 of O'Reilly's book Apache: The Definitive Guide, 2nd Edition. Enable Apache to communicate securely over Secure Sockets Layer (SSL). Covers building, configuring, and securing an SSL-enabled Apache server under Unix.

Setting Up a Win32 Server
by Ben Laurie and Peter Laurie
This excerpt from Chapter 2 of Apache: The Definitive Guide, 2nd Edition discusses starting, stopping, and basic configuration of Apache under Win32.

BSD

Hacking BSD, Part 1
by Dru Lavigne
In these two excerpts from O'Reilly's BSD Hacks, learn a few administrator tricks: make it easier for your users to find files in Unix, and add more temporary files or swap space without having to repartition.

Hacking BSD, Part 2
by Dru Lavigne
Last week's excerpts from O'Reilly's BSD Hacks offered a few administrator tricks -- finding files easily, and managing disk space without reinstalling. This week's excerpt provides administrators and users alike with a hack on how to get the most out of FTP using macros and scripts.

Databases

Cooking with MySQL
by Paul DuBois
Paul DuBois has selected sample recipes from the hundreds you'll find in his book, MySQL Cookbook. In this second article in a three-part series showcasing these recipes, find out how to manage simultaneous AUTO_INCREMENT values, and how to use AUTO_INCREMENT values and related tables.

Digital Media

Hacking Digital Video
by Josh Paul
Need an inexpensive dolly to capture moving footage? Want to have some fun turning digital video into Matrix-style symbols? How about learning a way to create text on screen? You'll find hacks that provide the answers to these questions, and more, in these excerpts from Digital Video Hacks. If you're a digital video addict, be sure to check out the book for more hacks you'll find you can't live without.

Hacking iPod and iTunes
by Hadley Stern
Hadley Stern, author of iPod and iTunes Hacks, has chosen five useful hacks to help you push the envelope of your iPod's capabilities. Your favorite toy just got better; learn how to turn your iPod into a universal remote, install it in your car permanently, and run Linux on it. In addition, make smart playlists and tame iTunes with AppleScript.

Managing Digital Images: Applying Ratings and Keywords
by Peter Krogh
The explosion of digital imaging has left professional and serious amateur photographers drowning in photographs, with little guidance on how to store, sort and organize them. In this excerpt from The DAM Book, Peter Krogh shows you expert techniques for applying ratings and keywords so you can begin to take control of your digital photo library.

Six Fresh Tips from iPod: the Missing Manual
by J.D. Biersdorfer
The fifth edition of O'Reilly's action-packed iPod guide just hit the streets, and here are six free excerpted tips you can put to use right now. Learn how to load high-res photos, where to get free vids, how to share your player among multiple computers, and more.

General

An Excerpt from Search Engine Optimization
by Harold Davis
To give you a sampling of what you'll find in Search Engine Optimization, one of O'Reilly's newest downloadable PDFs, we've excerpted the section on how to view your website as a search bot sees it, using an all-text browser. Viewing your site with an all-text browser is the only way to know for sure if a bot will be able to crawl your site; if a bot can't find your site, it can't be indexed by a search engine.

Cooking with Cisco, Part 1
by Kevin Dooley
Kevin Dooley, author of Cisco Cookbook, has selected recipes to showcase here from among the hundreds you'll find in his book. In this first installment in a two-part series, Kevin provides a recipe on using a feature called "Frame-Relay Traffic Shaping" to ensure that the router doesn't overrun the capacity of the individual PVCs in a Frame Relay WAN, and a script to use to automatically scan and analyze your log files.

Cooking with Cisco, Part 2
by Kevin Dooley
In this second installment in a two-part series of recipes excerpted from Cisco Cookbook, author Kevin Dooley shows you how to use a little-known IOS feature called IP Multicast Helper, as well as a simple way to ensure that your routers never send unimportant messages.

Cooking with DNS & BIND
by Cricket Liu
Here are five sample recipes from the recently released DNS & BIND Cookbook. The problems and solutions in this excerpt range from how to determine the amount of memory a name server needs to how to modify zone data without restarting the name server.

Cooking with DNS & BIND
by Cricket Liu
Here are five sample recipes from the recently released DNS & BIND Cookbook. The problems and solutions in this excerpt range from configuring a name server to work with a firewall to configuring an authoritative-only name server.

Flash: Workflow and Workspace Tips
by Robert Hoekman, Jr.
Robert Hoekman, author of Flash Out of the Box, has an excerpt offering to help improve your workflow and organize your workspace while using Flash. Learn how to adjust preferences under each tab, customize the keyboard shortcuts, and personalize the panel layout.

Hacking Google
by Tara Calishain, Rael Dornfest
With access to more than three million documents in over 30 languages, Google is a researcher's dream. But like any invaluable tool, knowing the insider tricks of the trade is a must to save time and needless effort. Tara Calishain and Rael Dornfest, authors of Google Hacks, 2nd Edition, have set out to educate the masses to the ins and outs of Google. In today's excerpt, they offer the inside scoop on scattersearching, cartography, Google on the go, gmail-lite, and AdSense. With over 150 million Google searches conducted every day, why be just a number?

Hacking Maps: Who Are the Neighbors Voting For?

Michael Frumin presents this hack on Fundrace, which he contributed to the recently released Mapping Hacks. Fundrace can show you which political candidates and parties have the most support in your area--and which of your neighbors are supporting them. Michael has prepared a talk on Fundrace, called "Visualizing Democracy," which he'll present at O'Reilly's upcoming Where 2.0 Conference.

Online Investing Hacks
by Bonnie Biafore
Bonnie Biafore offers 100 tips and tricks to help you get a better handle on your finances in her new book, Online Investing Hacks. In this sample excerpt, Bonnie walks you through the steps you should consider for picking the best brokerage (or broker) for your trading style.

Online Investing Hacks, Part 2
by Bonnie Biafore
In Online Investing Hacks, author Bonnie Biafore presents 100 tips and hacks to help you reach your investment goals. In these two sample hacks from the book, Bonnie covers ways to manipulate stock screens to your advantage, and how to avoid manual data entry when evaluating financial ratio trends in the statements you download.

Secure Cooking with C and C++
by Matt Messier and John Viega
In this first in a three-part series of sample recipes from Secure Programming Cookbook for C and C++, the authors offer nine basic rules for proper data validation, which they recommend all programmers follow. From their first rule: "Assume all input is guilty until proven otherwise" to their last: "The better you understand the data, the better you can filter it," the advice presented here will help programmers keep unwanted, malicious data out of their applications.

Secure Cooking with C and C++, Part 2

In part two in this three-part series of sample recipes from Secure Programming Cookbook for C and C++, the authors discuss some of the factors to consider to properly decode a URL, and they provide example code programmers can use to securely decode URLs.

Secure Cooking with C and C++, Part 3

In the final installment in this three-part series of sample recipes from Secure Programming Cookbook for C and C++, the authors discuss what you need to do to verify that a supplied email address, which your program has accepted as input, is valid.

Java

Hacking Swing: A JDBC Table Model
by Chris Adamson, Joshua Marinacci
Databases have tables, Swing has tables. Why should it be a hassle to bring the two together? In this excerpt from Swing Hacks, authors Joshua Marinacci and Chris Adamson show you how to put some JDBC behind your table model, and bring your database to life in Swing.

Hacking Swing: Translucent Windows
by Chris Adamson, Joshua Marinacci
All Java windows are absolutely rectangular, so you can forget about creating a nice Winamp-like window for your Swing app, right? Wrong. In this excerpt from Swing Hacks, authors Joshua Marinacci and Chris Adamson show how you can use some imaging trickery to create arbitrarily shaped windows with Swing.

Advanced Synchronization in Java Threads, Part 1
by Scott Oaks and Henry Wong
J2SE 5.0 introduces sophisticated new options for coordinating multiple threads. In this excerpt from Java Threads, 3rd Edition, Scott Oaks and Henry Wong look at new scheduling strategies represented by the java.util.concurrent package.

Advanced Synchronization in Java Threads, Part 2
by Scott Oaks and Henry Wong
J2SE 5.0 introduces new utilities for coordinating multiple threads. But where you have synchronized threads, you have a risk of deadlock. In this excerpt from Java Threads, 3rd Edition, Scott Oaks and Henry Wong look at deadlock and how to deal with it.

An Introduction to JDBC, Part 1
by William Crawford, Jim Farley and David Flanagan
In this excerpt from Chapter 2 of Java Enterprise in a Nutshell, the authors introduce the JDBC architecture.

An Introduction to JDBC, Part 2
by William Crawford, Jim Farley and David Flanagan
Part Two of this excerpt from Java Enterprise in a Nutshell focuses on database connection, statements and results.

An Introduction to JDBC, Part 3
by William Crawford, Jim Farley and David Flanagan
In part three of this four-part excerpt on JDBC from Java Enterprise in a Nutshell, learn about error handling, prepared statements, BLOBs and CLOBs.

Business Logic, Part 1
by Brett McLaughlin
In this excerpt from Chapter 8 of Building Java Enterprise Applications, Vol I: Architecture, Brett McLaughlin discusses the fašade pattern, in which you use session beans to access entity beans. This access method is used instead of allowing direct access to entity beans, and is key to a sound strategy in building enterprise applications.

Business Logic, Part 2
by Brett McLaughlin
In Part 2 of our excerpt from Chapter 8 of Building Java Enterprise Applications, Vol I: Architecture, Brett McLaughlin builds a UserManager component, and illustrates why managers are a good thing.

Business Logic, Part 3
by Brett McLaughlin
In Part 3 of our excerpt from Building Java Enterprise Applications (Vol. 1, Architecture), Brett McLaughlin addresses issues of statelessness and statefulness.

Compiling an AspectJ Project Using Eclipse
by Russell Miles
You may be ready for aspect-oriented programming, but are your tools? In this PDF excerpt from AspectJ Cookbook, Russell Miles shows you how to install and use an AspectJ-aware plugin for the Eclipse IDE.

Cooking with Eclipse
by Steve Holzner
In these sample recipes from O'Reilly's Eclipse Cookbook learn how to create a custom perspective in Eclipse, and how to speed up the JDT Editor.

Cooking with Eclipse, Part 2
by Steve Holzner
In this second batch of recipes from O'Reilly's Eclipse Cookbook, find out how to connect Eclipse to a CVS repository and how to use Swing and AWT inside of SWT for Eclipse 3.0.

Cooking with Java Servlets & JSP
by Bruce W. Perry
Learn how to use the Java Plug-in HTML Converter tool to generate the tags for embedding an applet, how to configure a javax.sql.DataSource for use in a servlet with the Tomcat web container, and how to use the JSTL's XML and XSLT-related tags, in these sample recipes from O'Reilly's Java Servlets & JSP Cookbook.

Cooking with Java Servlets & JSP, Part 2
by Bruce W. Perry
In this second and final batch of recipes excerpted from Java Servlet & JSP Cookbook, author Bruce Perry shows you how to access an EJB from a servlet on WebLogic, and how to connect to Amazon Web Services (AWS) with a servlet or JSP.

Cooking with Java XP
by Eric M. Burke and Brian M. Coyner
In this recipe from Chapter 5 of Java Extreme Programming Cookbook, learn how to configure your development environment to support test-first development with HttpUnit, JUnit, Tomcat, and Ant.

Cooking with Java XP, Part 2
by Eric M. Burke and Brian M. Coyner
In these two recipes, excerpted from Chapter 6 of Java Extreme Programming Cookbook, learn how to create a mock implementation of an event listener interface, and how to avoid duplicated validation logic in your tests. And check back here next week for recipes on creating a load test and executing a custom template.

Cooking with Java XP, Part 3
by Eric M. Burke and Brian M. Coyner
Here are more sample recipes from Java Extreme Programming Cookbook. From Chapter 8 ("JUnitPerf"), learn how to create a load test; and from Chapter 9 ("XDoclet"), find out how to execute a custom template.

Creating Toolbars Using SWT
by Tim Hatton
The final element that end users expect to see in a well-designed window is the toolbar. In this PDF excerpt from SWT: A Developer's Notebook, Tim Hatton succinctly explains each step and guides you through the development of the toolbar.

Creating Varargs in Java 1.5 Tiger
by Brett McLaughlin and David Flanagan
This excerpt from Java 1.5 Tiger: A Developer's Notebook, by bestselling Java authors Brett McLaughlin and David Flanagan, shows you how to create and iterate over Java 1.5 varargs (variable-length argument lists). Learning to use varargs will have you writing better, cleaner, more flexible code in no time.

Demonstrating Spring's Finesse
by and Justin Gehtland
In this excerpt from Better, Faster, Lighter Java, authors Bruce Tate and Justin Gehtland provide an example of Spring (their counter-example to the J2EE Pet Store application) in action, to show why you too will come to appreciate this simple framework as elegant and important.

Developing a Simple JMS Example
by David A. Chappell
This excerpt from Chapter 2 of Java Message Service provides a gentle introduction to JMS using the publish-and-subscribe messaging model.

Developing Custom Tag Libraries as Tag Files
by Hans Bergsten
This excerpt from Hans Bergsten's JavaServer Pages, 3rd Edition describes implementing custom tag library actions as plain text files and packaging them as tag libraries that can be used in JSP pages.

Developing for the Web with Ant, Part 1
by Steve Holzner
Developing for the Web is bread and butter for Ant developers. In part one of this two-part excerpt from Ant: The Definitive Guide, 2nd Edition, author Steve Holzner covers the tasks specifically designed for packaging web applications, including war, cab, ear, and jspc. And stay tuned for part two next week, which will cover the tasks for deploying web apps, including get, serverdeploy, and scp.

Developing for the Web with Ant, Part 2
by Steve Holzner
In this second installment of a two-part excerpt from Ant: The Definitive Guide, 2nd Edition, Steve Holzner covers the tasks for deploying web apps with get, serverdeploy, and scp.

Developing Your First EJBs, Part 2
by Bill Burke, Richard Monson-Haefel and Sacha Labourey
In part one of this two-part excerpt from Chapter 4 of Enterprise JavaBeans, 4th Edition, the authors walked through what you need to do to develop your first entity bean. This week concludes this series with a look at how to develop a session bean, building on the examples presented in part one.

Developing Your First Enterprise Beans, Part 1
by Bill Burke, Richard Monson-Haefel and Sacha Labourey
In this first installment of a two-part series of excerpts from Chapter 4 of Enterprise JavaBeans, 4th Edition, you'll learn how to develop your first entity bean. This segment covers how to define the remote interface, how to create a deployment descriptor, how to deploy, and more. Code examples step you through everything you need to do to create and use your first entity bean.

Eclipse: A Java Developer's Guide
by Steve Holzner
A beta preview of Steve Holzner's Eclipse: A Java Developers Guide. This chapter is titled "Building Eclipse Projects Using Ant."

EJB Message-Driven Beans
by Richard Monson-Haefel
In this excerpt from Chapter 13 of Enterprise JavaBeans, Richard Monson-Haefel explains EJB 2.0 Message-Driven Beans, and shows you how to use these in your enterprise Java and Web services development efforts.

Enterprise Servlets and J2EE
by Jason Hunter and William Crawford
Jason Hunter demonstrates how the robust Servlets API and its containers are used and integrated with other J2EE API on a growing number of enterprise-based Web sites in this excerpt from O'Reilly's Java Servlet Programming, 2nd Edition.

Generic Types, Part 1
by David Flanagan
In part one of this two-part excerpt from Java in a Nutshell, 5th Edition author David Flanagan explores the basic use of generics in typesafe collections, and then delves into their more complex uses. In addition, he covers type parameter wildcards and bounded wildcards. In part two next week, David tackles how to write your own generic types and generic methods.

Generic Types, Part 2
by David Flanagan
In part one of this two-part excerpt from Java in a Nutshell, 5th Edition, David Flanagan described how to use generic types. This week David details how to write your own generic types and generic methods, and concludes with a tour of important generic types in the core Java API.

Getting Started with JXTA, Part 1
by Scott Oaks, Bernard Traversat and Li Gong
In part one in this series of excerpts from JXTA in a Nutshell, learn about setting up the JXTA Java environment as well as JXTA class files, shells, and peers.

Getting Started with JXTA, Part 2
by Scott Oaks, Bernard Traversat and Li Gong
In part two of this series of book excerpts on getting started with JXTA, from JXTA in a Nutshell, learn about peergroups and discovery, which are important for understanding peer-to-peer Web services.

Getting Started with JXTA, Part 3
by Scott Oaks, Bernard Traversat and Li Gong
In part three in this series of excerpts from JXTA in a Nutshell, learn how to configure a JXTA application.

Getting Started with JXTA, Part 4
by Scott Oaks, Bernard Traversat and Li Gong
In part four in this series of book excerpts from JXTA in a Nutshell, learn about JXTA pipes.

Getting Started with JXTA, Part 5
by Scott Oaks, Bernard Traversat and Li Gong
In this fifth and final excerpt on getting started with JXTA from JXTA in a Nutshell, learn about advertisements: structured XML documents for JXTA infrastructure.

Getting Started with Maven
by Vincent Massol, Timothy M. O'Brien
In this excerpt from Maven: A Developer's Notebook, authors Vincent Massol and Timothy M. O'Brien show you how to install and start working with Maven, the do-it-all Java project builder/manager.

Handling Events in JavaServer Faces, Part 1
by Hans Bergsten
In this excerpt from Chapter 8 of JavaServer Faces, author Hans Bergsten looks at the event model in JSF and how it relates to the request processing lifecycle. Next week, in part two of this excerpt, Hans implements event handling for parts of the sample application.

Handling Events in JavaServer Faces, Part 2
by Hans Bergsten
In the JSF event model, user actions take place in a client separated from the server, causing delays in the delivery of some types of events. In last week's part one of this two-part excerpt from JavaServer Faces, author Hans Bergsten provided examples to show how JSF deals with this, by using a strict request processing lifecycle. Here in part two, Hans implements event handling for parts of the sample application discussed in part one.

Integrating Ant with Eclipse, Part 1

Ant and Eclipse are the top Java build system and IDE, both by wide margins, so it's only natural you'd want to integrate them. In this excerpt from Ant: The Definitive Guide, 2nd Edition, Steve Holzner shows how to create and run Ant build.xml files from within Eclipse.

Integrating Ant with Eclipse, Part 2

It's one thing to be able to run Ant builds from within Eclipse, but the integration of the top Java build tool and IDE goes deeper than this. In this excerpt from Ant: The Definitive Guide, 2nd Edition, Steve Holzner shows how to customize your Ant/Eclipse integration.

Internationalization, Part 1
by David Flanagan
Writing software that is truly multilingual is not an easy task. In this excerpt from Chapter 8 of Java Examples in a Nutshell, 3rd Edition, author David Flanagan offers programming examples for the three steps to internationalization in Java: using Unicode character encoding, handling local customs, and localizing user-visible messages.

Internationalization, Part 2

Having your Java apps run correctly both down the street and across the globe presents some hefty challenges. Part one of this two-part excerpt from Java Examples in a Nutshell, 3rd Edition covered the first two steps to internationalization in Java: using Unicode character encoding and handling local customs. This week deals with the third step in the process: localizing user-visible messages.

Java and Security, Part 1
by Avinash Chugh, Jon Mountjoy
In part one in a two-part series of excerpts from Chapter 17 of WebLogic: The Definitive Guide, authors Avinash Chugh and Jon Mountjoy examine WebLogic's various security mechanisms, beginning with a look at the Java Security Manager and how WebLogic filters connection requests. They also cover WebLogic's authentication and authorization framework and how it supports the standard J2EE security services.

Java and Security, Part 2
by Avinash Chugh, Jon Mountjoy
This second and final excerpt from Chapter 17 of WebLogic: The Definitive Guide covers WebLogic's various security providers and their default implementations, along with a look at how to authenticate using JAAS, and examples of Authentication and Identity Assertion Providers.

Java and Sound, Part 1
by David Flanagan
Where can you learn how to play simple audio clips with the java.applet.AudioClip class, as well as how to use the javax.sound.sampled and javax.sound.midi packages to do such things as load and play sound clips, and monitor and change the playback position within a clip? In these first excerpts in a two-part series of excerpts from Chapter 17 ("Sound") of Java Examples in a Nutshell, 3rd Edition.

Java and Sound, Part 2
by David Flanagan
This second installment in a two-part series of excerpts from Java Examples in a Nutshell, 3rd Edition follows last week's (on playing streaming sounds in both sampled audio and MIDI formats) with examples of how to read a simple musical score and convert it into a MIDI sequence. Author David Flanagan also shows you how to make music by directly controlling a MidiChannel of a Synthesizer.

Java and XML: SOAP
by Brett McLaughlin
In this excerpt from Chapter 12 of Java & XML, 2nd Edition, Brett explains what SOAP is, and why it is such an important part of where the web development paradigm is moving. That will help you get the fundamentals down, and prepare you for actually working with a SOAP toolkit.

Java and XML: Web Publishing Frameworks
by Brett McLaughlin
In this excerpt from Chapter 9 of Java and XML, McLaughlin takes a detailed look at using Java and XML to create web publishing frameworks.

Java Application Security
by Scott Oaks
In this excerpt from Chapter 1 of Java Security, 2nd Edition, Scott Oaks covers Java application security by defining security; bounding the Java security model; and finally debugging Java security in an applet or application.

Java Development on Eclipse, Part 1
by Steve Holzner
Steve Holzner contends that Eclipse makes it easier to create Java code from scratch. In this excerpt from Chapter 2 of his book, Eclipse, Steve shows how Eclipse makes it easy to create new methods, classes, and packages, as well as how to build and run the code.

Java Development on Eclipse, Part 2
by Steve Holzner
In this conclusion of a two-part series of excerpts from Eclipse, author Steve Holzner provides still more examples of how Eclipse makes it easier to create Java code from scratch. This week he covers creating Javadocs, refactoring, adding certain skills to your Eclipse toolbox, and customizing the development environment.

Java Generics and Collections: Evolution, Not Revolution, Part 1
by Maurice Naftalin and Philip Wadler
In this excerpt from Java Generics and Collections, authors Maurice Naftalin and Philip Wadler show how to make the switch to Java 5.0 generics, not by expecting you to flip a switch across your whole code base, but by having you gradually work generics into your code while maintaining compatibility.

Java Generics and Collections: Evolution, Not Revolution, Part 2
by Maurice Naftalin, Philip Wadler
In the second part of an excerpt from Java Generics and Collections, authors Maurice Naftalin and Philip Wadler continue their study of how to adopt Java 5.0 generics in a measured, sustainable fashion. Having shown how to genericize a library while leaving the library in legacy mode, they now present three approaches to the opposite scenario: genericizing a client that uses a non-genericized library.

Java Programming with Oracle JDBC: Performance
by Donald Bales
When it comes to JDBC performance issues, there are two major factors to consider: performance of the database structure and the SQL statements used against it and relative efficiency of the different ways you can use the JDBC interfaces to manipulate a database. This excerpt from Java Programming with Oracle JDBC explores these.

Java Programming with Oracle SQLJ: Contexts and Multithreading
by Jason Price
A multithreaded program is one that is able to carry out several tasks in parallel using Java threads. As you will see in this excerpt from Java Programming with Oracle SQLJ, execution contexts are very important when writing a multithreaded SQLJ program.

Java RMI: Serialization
by William Grosso
In this excerpt from Java RMI, William Grosso drills down on the serialization mechanism; by the end of it, you will understand exactly how serialization works and how to use it efficiently within your applications.

Java Swing: Menus and Toolbars, Part 1
by Brian Cole, Robert Eckstein, James Elliott, Marc Loy, Dave Wood
In this excerpt from Java Swing, 2nd Edition, learn how to use Swing menus.

Java Swing: Menus and Toolbars, Part 2
by Brian Cole, Robert Eckstein, James Elliott, Marc Loy, Dave Wood
In this excerpt from Java Swing, 2nd Edition, learn about menu selections and the JMenuBar class.

Java Swing: Menus and Toolbars, Part 3
by Brian Cole, Robert Eckstein, James Elliott, Marc Loy, Dave Wood
In this third excerpt from Java Swing, learn how to add strings and icons to menus with the JMenuItem class.

Java Swing: Menus and Toolbars, Part 4
by Brian Cole, Robert Eckstein, James Elliott, Marc Loy, Dave Wood
In the fourth excerpt from Java Swing, learn how to create context-sensitive menus with the JPopupMenu class.

Java Swing: Menus and Toolbars, Part 5
by Brian Cole, Robert Eckstein, James Elliott, Marc Loy, Dave Wood
In this fifth excerpt from Java Swing, learn how to attach menus to menu bars with the JMenu class.

Java Swing: Menus and Toolbars, Part 6
by Brian Cole, Robert Eckstein, James Elliott, Marc Loy, Dave Wood
In this sixth excerpt from Java Swing, learn how to use complex menu items like radio buttons and checkbox menus.

Java Swing: Menus and Toolbars, Part 7
by Brian Cole, Robert Eckstein, James Elliott, Marc Loy, Dave Wood
In the final excerpt from Java Swing, learn how to use toolbars.

JavaServer Pages: Generating Dynamic Content
by Hans Bergsten
Chapter 5 -- excerpted from the O'Reilly book "Java Server Pages" --covers using JSP to create dynamic content with a few simple examples to get a feel for how the basic JSP elements work.

JDO Architectures
by David Jordan and Craig Russell
In this excerpt from Java Data Objects, authors David Jordan and Craig Russell provide a high-level overview of the architectural aspects of JDO, as well as examples of environments in which JDO can be used.

JDO Persistence, Part 1
by George Reese
In this first of three excerpts from Chapter 7 of Java Database Best Practices, author George Reese describes all the available persistence options for Java architects and developers, and provides data to help you choose the persistence option that best fits the requirements and scale of your application.

JDO Persistence, Part 2
by George Reese
In part two in this three-part series of excerpts on JDO persistence from Java Database Best Practices, author George Reese covers basic JDO persistence best practices for transaction management and query control.

JDO Persistence, Part 3
by George Reese
In this third and final excerpt from Chapter 7 of Java Database Best Practices, author George Reese covers using JDO as a bean-managed persistence tool.

JSP Overview, Part 1
by Hans Bergsten
In part one of two book excerpts on JSP Overview from JavaServer Pages, 2nd Edition, understand the problem with Servlets as well as the anatomy of a JSP page.

JSP Overview, Part 2
by Hans Bergsten
In this excerpt from JavaServer Pages, 2nd Edition, the second in a two-part series providing an overview of JSP, you'll find an introduction to JSP application design with MVC and learn about JSP processing.

Killer Game Programming in Java: A 3D Checkerboard, Part 1

Our book excerpt today is for all you Java gamers, especially the 3D junkies--we know you're out there. In part one of a two-part series taken from Chapter 15 of Killer Game Programming in Java, author Andrew Davison describes how to create a scene in a Checkers3D application, using Java 3D. And check back next week when Andrew shows how to create a floating sphere for the Checkers3D app.

Killer Game Programming in Java: A 3D Checkerboard, Part 2

In part one of this two-part excerpt from Killer Game Programming in Java, author Andrew Davison strode through some complex programming issues for developing Java 3D graphics, such as how to add shapes, lighting, and backgrounds to a Checkers3D application. Here in part two, Andrew continues the theme by demonstrating how to create a floating sphere for the Checkers3D app.

Managing and Monitoring JBoss, Part 1

In part one of this two-part excerpt from JBoss: A Developer's Notebook, you'll learn how use the Web Console (an advanced version of the JMX Console), how to work with its enhanced monitoring capabilities and MBeans, and how to create snapshots of your data over regular intervals.

Managing and Monitoring JBoss, Part 2

In part one of this two-part excerpt from JBoss: A Developer's Notebook, authors Norman Richards and Sam Griffith covered how to use the Web Console and its MBeans to manage your web apps. In today's excerpt, learn how to create a monitor for your app, how to configure alerts to be sent via email, and how to manage JBoss from the command line.

Maven Project Reporting and Publishing, Part 1

Maven's not just about building; it's about viewing, understanding, and managing your projects. In this first part of a two-part excerpt from Maven: A Developer's Notebook, authors Vincent Massol and Timothy M. O'Brien introduce Maven's reporting features for issue tracking, dependencies, code style, and more.

Maven Project Reporting and Publishing, Part 2

Maven helps you not only with building and tracking your project, but also with releasing it. In this second excerpt from Maven: A Developer's Notebook, authors Vincent Massol and Timothy M. O'Brien show how Maven can publish artifacts like JAR/WAR/EAR files, automate announcements, generate changelogs, and publish a project website.

MIDP GUI Programming, Part 1
by Qusay Mahmoud
This is the first in a series of excerpts from Chapter 5 of Learning Wireless Java. Why not use AWT? Well, MIDP contains its own abbreviated GUI, which is much different from AWT. This chapter excerpt introduces you to the MIDP GUI APIs.

MIDP GUI Programming, Part 2
by Qusay Mahmoud
This is the second in a series of excerpts from Chapter 5 of Learning Wireless Java. It discusses how the various classes in the high-level MIDP API can be used to create GUI components.

MIDP GUI Programming, Part 3
by Qusay Mahmoud
This is the third in a series of excerpts from Chapter 5 of Learning Wireless Java. It discusses how the various classes in the low-level MIDP API can be used to create GUI components.

Nested Classes, Part 1
by Robert Simmons, Jr.
One aspect of the Java language that is not widely understood is the concept of nested classes. But because you're bound to encounter one or more of them in other people's code, it's important to understand how they work. Chapter six of Hardcore Java covers the various nested classes. In this first excerpt in a three-part series of excerpts from the chapter, author Robert Simmons covers the first of the three basic categories of nested classes: inner classes.

Nested Classes, Part 2

Robert Simmons continues his efforts to clarify confusion over the use of nested classes in Java. In this week's installment, excerpted from Chapter 6 ("Nested Classes") of Hardcore Java, Robert discusses the somewhat troublesome limited-scope inner classes; one specific type within this category, known as anonymous classes; and the problems programmers encounter with limited-scope classes.

Nested Classes, Part 3
by Robert Simmons, Jr.
In this third and final installment on nested classes, excerpted from Hardcore Java, author Robert Simmons covers static nested classes, double nested classes, and nested classes in interfaces.

NetBeans: Working with XML, Part 1
by Tim Boudreau, Jesse Glick, Simeon Greene, Vaughn Spurlin, Jack J. Woehr
In part one in this series of book excerpts from NetBeans: The Definitive Guide, learn how to work with XML within the NetBeans framework by installing XML support and working with XML editors.

NetBeans: Working with XML, Part 2
by Tim Boudreau, Jesse Glick, Simeon Greene, Vaughn Spurlin, Jack J. Woehr
In part two of this three-part series excerpted from NetBeans: The Definitive Guide, go beyond editing XML in your editors, within the open source NetBeans framework.

NetBeans: Working with XML, Part 3
by Tim Boudreau, Jesse Glick, Simeon Greene, Vaughn Spurlin, Jack J. Woehr
In this final installment on working with XML, excerpted from NetBeans: The Definitive Guide, learn how to generate Java classes.

Persistence in Spring
by and Justin Gehtland
Bruce Tate and Justin Gehtland continue where they left off in part one of this two-part series on Spring. This week, the authors of Better, Faster, Lighter Java take you through adding persistence to their Pet Store counter-example, and look at the use of presentation logic in the Spring framework.

Programming Jakarta Struts: Using Tiles, Part 1
by Chuck Cavaness
In part one in this series of book excerpts on using tiles from Programming Jakarta Struts, learn how to use tiles, and gain an understanding of templates.

Programming Jakarta Struts: Using Tiles, Part 2
by Chuck Cavaness
In part two in this series of book excerpts on using tiles from Programming Jakarta Struts, learn how to install and configure tiles, as well as get an overview on tiles.

Programming Jakarta Struts: Using Tiles, Part 3
by Chuck Cavaness
In part 3 in this series of book excerpts on using tiles from Programming Jakarta Struts, learn how to use the tile tag library.

Programming Jakarta Struts: Using Tiles, Part 4
by Chuck Cavaness
We conclude this book excerpt series on using tiles from Programming Jakarta Struts by showing you how to use definitions. You'll also find coverage on support for internationalization of tiles.

Servlet Best Practices, Part 1
by The O'Reilly Java Authors and Robert Eckstein
Servlets have dominated the recent server-side Java landscape and have become the standard way to interface Java to the Web. This chapter, the first of three book excerpts from Java Enterprise Best Practices, discusses effective servlet-based development and deployment.

Servlet Best Practices, Part 2
by Jason Hunter and Robert Eckstein
In part two of three in this series of book excerpts on servlet best practices from Java Enterprise Best Practices, learn about caching with servlets.

Servlet Best Practices, Part 3
by The O'Reilly Java Authors
In this final excerpt on servlets from Java Enterprise Best Practices, we present how to effectively send files for download. Getting it right across Web browsers takes a bit of work, but with this tip you'll have it right in no time.

The Java Platform
by David Flanagan
In this excerpt from O'Reilly & Associates' Java in a Nutshell, 4th Edition, David Flanagan shows you a number of the Java 2SE platform packages, using examples of the most useful classes in these packages.

The Mobile Information Device Profile and MIDlets, Part 1
by Kim Topley
This is the first of a five part book excerpt series based on O'Reilly's J2ME in a Nutshell by Kim Topley. Part one is an overview of the Mobile Independent Device Profile and the MIDP Java platform.

The Mobile Information Device Profile and MIDlets, Part 2
by Kim Topley
This is the second of a five part book excerpt series based on O'Reilly's J2ME in a Nutshell by Kim Topley. Part 2 focuses on MIDlets and their suites.

The Mobile Information Device Profile and MIDlets, Part 3
by Kim Topley
Part three of a five-part book excerpt from O'Reilly's J2ME in a Nutshell by Kim Topley. This installment focuses on a MIDlet's three states: paused, active, and destroyed.

The Mobile Information Device Profile and MIDlets, Part 4
by Kim Topley
In Part 4 of this five-part excerpt from J2ME in a Nutshell, author Kim Topley shows you how to develop MIDlets.

The Mobile Information Device Profile and MIDlets, Part 5
by Kim Topley
This is the final excerpt in a series on MIDP and MIDlets from J2ME in a Nutshell, focusing on the delivery and installation of MIDlets.

UDDI: Universal Description, Discovery, and Integration, Part 1
by Tyler Jewell and David A. Chappell
UDDI -- Universal Description, Discovery and Integration -- is a key Web services technology. In this series of excerpts from Java Web Services, you'll learn how to program UDDI services. The first excerpt provides a basic understanding of UDDI.

UDDI: Universal Description, Discovery, and Integration, Part 2
by Tyler Jewell and David A. Chappell
UDDI -- Universal Description, Discovery and Integration -- is a key Web services technology. In this series of excerpts from Java Web Services, you'll learn how to program UDDI services.

UDDI: Universal Description, Discovery, and Integration, Part 3
by David A. Chappell, Tyler Jewell
This excerpt from O'Reilly's Java Web Services focuses on UDDI programming with the Java API for XML Registries.

UDDI: Universal Description, Discovery, and Integration, Part 4
by Tyler Jewell and David A. Chappell
The final installment in an excerpt from Java Web Services, focusing on WSDL definitions using UDDI.

URLs and URIs, Proxies and Passwords
by Elliotte Rusty Harold
Java networking is seldom as simple as it first seems. In this excerpt, one of a series from Java Network Programming, 3rd Edition, Elliotte Rusty Harold shows how to encode and decode URLs, work with URIs, use multiple proxy servers, query servers with HTTP GET, and use password-based authentication.

Web Server Java -- Servlets and JSP
by Ian F. Darwin
Ian Darwin gives us two examples in this book excerpt from Java Cookbook: Solutions and Examples for Java Developers using Servlets and JSP: Task of displaying a web page with five randomly chosen integer numbers and a dictionary (list of terms).

Working with Complex Data Types, Part 1
by Robert Englander
In this excerpt on complex data types from Java and SOAP, the authors discuss passing arrays as parameters.

Working with Complex Data Types, Part 2
by Robert Englander
In part two in this series of book excerpts from Java and SOAP, learn about returning arrays.

Working with Complex Data Types, Part 3
by Robert Englander
The third in a series of excerpts from Java and SOAP, this article excerpt covers passing custom types as parameters.

Working with Complex Data Types, Part 4
by Robert Englander
This is the last in a series of book excerpts on working with complex data types from Java and SOAP. In this excerpt, learn about returning custom types, using a stock market example.

XML Basics for Java Developers, Part 1
by Jonathan Knudsen and Patrick Niemeyer
This is the first in a series of book excerpts on XML for Java developers from Learning Java, 2nd Edition. This excerpt covers XML fundamentals.

XML Basics for Java Developers, Part 2
by Jonathan Knudsen and Patrick Niemeyer
In this second part in a several part series on XML for Java developers from Learning Java, 2nd Edition, learn about SAX and the SAX API.

XML Basics for Java Developers, Part 3
by Jonathan Knudsen and Patrick Niemeyer
In part three in this series of book excerpts on XML basics for Java developers from Learning Java, 2nd Edition, learn about the Document Object Model (DOM).

XML Basics for Java Developers, Part 4
by Jonathan Knudsen and Patrick Niemeyer
In part four in a series of XML basics for Java developers book excerpts from Learning Java, 2nd Edition, learn about validating documents.

XML Basics for Java Developers, Part 5
by Jonathan Knudsen and Patrick Niemeyer
In this final in a series of XML basics for Java developers book excerpts from Learning Java, 2nd Edition, get an introduction to XSL/XSLT and Web services.

XSLT Processing with Java
by Eric M. Burke
This chapter from Java and XSLT is devoted to Java and XSLT programming techniques that work for both standalone applications as well as servlets, with a particular emphasis on Sun's Java API for XML Processing (JAXP) API.

Zero Configuration Networking: Using the Java APIs, Part 1
by Stuart Cheshire, Daniel H. Steinberg
Zeroconf, also known as Bonjour and previously known as Rendezvous, offers a robust system for self-networking that has been adopted by many applications. With a provided Java API, now it's easy to make Zeroconf applications hop platforms. In this excerpt from Zero Configuration Networking: The Definitive Guide, Stuart Cheshire and Daniel H. Steinberg show how to register a service with Zeroconf.

Zero Configuration Networking: Using the Java APIs, Part 2
by Stuart Cheshire, Daniel H. Steinberg
In this second part of an excerpt from Zero Configuration Networking: The Definitive Guide, Stuart Cheshire and Daniel H. Steinberg show how Java clients can browse for and resolve Zeroconf services, and how to register and add, update, and delete services with DNS TXT attributes.

Zero Configuration Networking: Using the Java APIs, Part 3
by Stuart Cheshire, Daniel H. Steinberg
In this final excerpt from Zero Configuration Networking: The Definitive Guide, Stuart Cheshire and Daniel H. Steinberg take the Java bindings to Apple's Zeroconf implementation and apply them to creating a networked Swing tic-tac-toe game, in which each instance can discover and compete against other instances on the network.

Linux

A Linux Quick Reference to Useful Commands
by Daniel J. Barrett
Daniel J. Barrett, author of O'Reilly's Linux Pocket Guide, has compiled a quick-reference guide to the most essential Linux commands and the tasks they perform. We are presenting this quick reference as a PDF download. Print it and keep it by your keyboard for quick answers to problems that arise.

SysAdmin

Adding Permissions Using SELinux
by Bill McCarty
As an SELinux administrator, one of the most frequent SELinux policy customizations you're likely to perform is adding permissions to coax the security engine into accepting an operation. In today's excerpt from SELinux, author Bill McCarty considers an actual situation based on Fedora Core 2's SELinux implementation and shows how it's resolved.

Linux

Hacking the Linux Desktop

Modifying stuff to suit individual desire is the credo of hackers everywhere. These two excerpts from Linux Desktop Hacks let you modify Linux to suit your desires: The first hack uses Virtual Network Computer (VNC) to access Windows and Mac OS X from your Linux desktop. The second shows how to lock down KDE with Kiosk mode, allowing you to control exactly what users can and can't change.

Hacking the Linux Desktop, Part 2

In Part 1 of this two-part excerpt from Linux Desktop Hacks, we offered hacks on controlling desktop access. In this second installment, learn how to view Microsoft Word documents in a terminal and how to create an internet phone.

How Your Computer Boots
by Daniel P. Bovet and Marco Cesati
Have you ever wondered what happens right after you switch on your Linux computer? Here's an article that explains exactly how the Linux kernel image is copied into memory and executed -- in other words, how it's "bootstrapped." Excerpted from Understanding the Linux Kernel.

PC Hacks for Linux
by Jim Aspinwall
PC Hacks author Jim Aspinwall handpicks two Linux-specific hacks to share from his new book. Whether Linux just won't boot or it isn't as zippy as you'd expect, help is merely a hack away. Jim will teach you how to recover your system's boot-ability as well as how to test and optimize Linux's settings for the best hard drive performance.

Red Hat and Debian GNU/Linux Package Managers
by Stephen Figgins, Jessica P. Hekman, Ellen Siever, Stephen Spainhour
Learn about the two major Linux packaging systems, the Red Hat Package Manager (RPM) and the Debian GNU/Linux Package Manager, in this complete chapter excerpt from "Linux in a Nutshell."

Secure Cooking with Linux, Part 1
by Daniel J. Barrett, Robert G. Byrnes, Richard E. Silverman
The authors of Linux Security Cookbook have selected a number of recipes from their book to present on ONLamp. These recipes are organized into basic, intermediate, and advanced categories. This week's set consists of three recipes of a basic flavor. You'll find recipes on authenticating by public key, encrypting backups, and combining log files. Over the next two weeks we'll present the intermediate and then advanced recipes. There'll be something for everyone here. Enjoy.

Secure Cooking with Linux, Part 2
by Daniel J. Barrett, Robert G. Byrnes, Richard E. Silverman
In part two in our series of sample recipes from Linux Security Cookbook, the authors have selected two recipes of an intermediate flavor. Learn how to restrict access to network services by time of day, and how to use sudo to permit read-only access to a shared file.

Secure Cooking with Linux, Part 3
by Daniel J. Barrett, Robert G. Byrnes, Richard E. Silverman
This week's set of recipes from Linux Security Cookbook fall into an advanced category. Learn how to use PAM to restrict authentication on Linux systems and how to use SMTP to accept connections from arbitrary clients securely.

Mac

Hacking Mac OS X Panther

Rael Dornfest, coauthor of Mac OS X Panther Hacks, has selected three hacks from the book for your sampling pleasure. The first two detail how to find anyone in your Address Book who has an Amazon Wish List, and how to build a GUI to your Unix scripts with some Perl or Python glue code; the third is just for fun.

Mac Modding Shortcuts
by Erica Sadun
Make repetitive tasks simpler and maximize ergonomic efficiency with this excerpted chapter from Erica Sadun's Modding Mac OS X. Neat, concise, and easy-to-use, this excerpt helps you add, remove, and change keyboard shortcuts to meet your personal computing needs. Keep your hands on the keyboard and give that mouse a rest.

Mac OS X Power Hound Helpful Hints, Part 1
by Rob Griffiths
Mac OS X Power Hound author Rob Griffiths has hand-picked 16 of his favorite hints and organized them into this two-part series. This week, in part one, you'll discover eight tricks to help your Mac OS X system run smoother, and see new ways to personalize your working environment. Examples include activating Exposé with a multi-button mouse, saving iTunes Music Store videos and trailers, and customizing the Dock "poof."

Mac OS X Power Hound Helpful Hints, Part 2
by Rob Griffiths
Last week, in part one of this two-part series, Mac OS X Power Hound author Rob Griffiths shared eight of 16 hand-picked favorite OS X hints. This week, Rob shares his knowledge on creating a smart iPhoto album for general searching, using Internet shortcuts, creating a disk image from a directory in the terminal, and more.

Memory Management in Cocoa
by James Duncan Davidson and Apple Computer, Inc.
This excerpt from Learning Cocoa with Objective-C provides a concise description of how memory management in Cocoa works, as well as a set of rules to help you manage things correctly.

Scheduling Tasks in Panther
by James Duncan Davidson
Mac OS X gives you several tools to help execute tasks at certain times of day and on a regular basis. To manage this, the system uses a set of utilities called cron and periodic. In this book excerpt from Running Mac OS X Panther, James Duncan Davidson takes you inside the ticking brain of your Mac.

Unix on Panther: Accessing the Internet
by Dave Taylor and Brian Jepson
This excerpt from Learning Unix for Mac OS X Panther introduces Unix networking: remotely accessing your Mac from other computers and copying files between computers. It also shows you how the Connect to Server capability of Terminal can make common connections a breeze once you've set them up the first time.

Mozilla

Hacking Firefox

This excerpt from Firefox Hacks shows you how to use overlays (essentially hunks of UI data) to make something you want to appear in the Firefox default application, perhaps to carry out a particular function of your extension. For example, you might want to add a menu item to the Tools menu to launch your extension. Overlays allow existing Firefox GUIs to be enhanced.

ONLamp

Cooking with MySQL
by Paul DuBois
Paul DuBois has selected sample recipes from the hundreds you'll find in his book, MySQL Cookbook. In this first in a three-part series showcasing these sample recipes, find out how to interpret results from summaries and NULL values and how to identify duplicates in a table or record.

Cooking with MySQL
by Paul DuBois
Paul DuBois has selected sample recipes from the hundreds you'll find in his book, MySQL Cookbook. In this third and final series of excerpts showcasing these recipes, learn how to compute team standings, how to calculate the differences between successive rows, and how to find cumulative sums and running averages.

SysAdmin

Cooking with sendmail
by Craig Hunt
You need to configure sendmail to use the IETF Internet Draft LDAP schema and to read internal mail-routing information from the LDAP server. Get the solution and the configuration code fast in this excerpt from sendmail Cookbook. This is just one of hundreds of recipes in the book that administrators can use to quickly solve configurations problems.

Cooking with sendmail, Part 2
by Craig Hunt
Last week we published a sample recipe from O'Reilly's sendmail Cookbook on using LDAP for sendmail routing information. This week, we offer two more configuration recipes from the book: the first on configuring sendmail for STARTTLS, and the second on limiting the SMTP command set.

ONLamp

Design Tips for Building Tag Clouds
by Jim Bumgardner
To give you a sampling of what you'll find in Building Tag Clouds in Perl and PHP, a new, downloadable PDF from O'Reilly, we've excerpted this section on tips for designing the most effective tag clouds.

Ethereal and NMap
by Richard Forno and Kenneth R. van Wyk
This is the first in a series of excerpts from Chapter 7 of Incident Response, covering the nmap port scanner and the Ethereal network scanner.

Gaming Hacks for Geeks, Part 2
by chromatic and Simon Carless
Last week, in part one of this two-part series of hack excerpts from Gaming Hacks, author Simon Carless showed you how to write your own MMORPG macros. This week, Simon is back, giving you the hacking tools you need to create your own animations using this hack by chromatic .

Getting Started with FreeRADIUS
by Jonathan Hassell
This excerpt from Chapter 5 of RADIUS focuses on practical applications of this protocol: implementing it, customizing it for your specific needs, and extending its capabilities to meet other needs in your business--all using a RADIUS server called FreeRADIUS.

Hacking TiVo
by Raffi Krikorian
TiVo addicts: View the latest sports scores, weather forecasts, stock quotes, and more without ever leaving your couch. This excerpt from O'Reilly's TiVo Hacks shows you how to use the TiVo Control Station to populate your TV screen with whatever information it is that you just can't live without.

Hacking TiVo, Part 2
by Raffi Krikorian
This week we bring you two more sample hacks from TiVo Hacks. Learn how to use TiVoWeb to schedule recordings of your favorite programs while you're on the road, and how to play downloaded video streams right from your TiVo over your home network. Break out the popcorn!

How to Write a Basic Gtk# Program with Mono

Gtk#, the Mono API for the GTK+ UI toolkit, is the open source alternative to Windows.Forms. This article shows how to install Mono on Windows, how Gtk# works, and how to write a simple Gtk# program. This kind of mini-project is just the sort you'll find in O'Reilly's upcoming Mono: A Developer's Notebook.

Name Resolution and Browsing in Samba, Part 1
by David Collier-Brown, Robert Eckstein, Jay Ts
This excerpt from Chapter 7 of Using Samba, 2nd Edition focuses on name resolution using WINS, which is supported by Samba with the nmbd daemon. Learn how to configure your network to handle name resolution any way you want.

Name Resolution and Browsing in Samba, Part 2
by David Collier-Brown, Robert Eckstein, Jay Ts
Part two of this excerpt from Chapter 7 of Using Samba, 2nd Edition starts by describing browsing in a network that contains only Windows systems, then shows you how to add a Samba server.

Running Samba on the Mac OS X Server
by David Collier-Brown, Robert Eckstein, Jay Ts
Mac OS X Server differs from Mac OS X in how it deals with the configuration of Samba-based services. In this excerpt from Using Samba, 2nd Edition, learn how to set up SMB files and printer shares, enable client user access, and monitor activity, all on Mac OS X Server 10.

Secure Programming Techniques
by Simson Garfinkel, Alan Schwartz, Gene Spafford
In this first installment in a multipart series of excerpts from Practical Unix & Internet Security, 3rd Edition, you'll find tips and general design principles to code by that will help you avoid security-related bugs. And check back to this space over the next few week for additional tips, all selected from Chapter 16 on "Secure Programming Techniques."

Secure Programming Techniques, Part 2
by Simson Garfinkel, Alan Schwartz, Gene Spafford
In part two in this multipart series of excerpts from Practical Unix & Internet Security, 3rd Edition, you'll find tips both on what to do and what not to do when you are coding a new network program. And check back to this space over the next few weeks for more tips, all selected from Chapter 16 on "Secure Programming Techniques."

Secure Programming Techniques, Part 3

An overwhelming number of Unix security problems have been caused by SUID/SGID programs. In this week's excerpt from Chapter 16 ("Secure Programming Techniques") of Practical Unix & Internet Security, 3rd Edition, we offer tips on writing SUID and SGID programs. And as an added bonus, this excerpt also includes advice on using the chroot( ) system call to enhance the security of your programs.

Secure Programming Techniques, Part 4

In this fourth and final excerpt from Chapter 16 ("Secure Programming Techniques") of Practical Unix & Internet Security, 3rd Edition, we offer tips on using passwords more securely, and on generating random numbers, both of which play important roles in maintaining computer security.

Snort 'n Dragon
by Richard Forno and Kenneth R. van Wyk
Snort and Dragon are two intrusion-detection programs that allow you to detect hackers trying to break into your system. This is the third in a series of excerpts from Chapter 7 of Incident Response.

SSH Port Forwarding
by Daniel J. Barrett and Richard E. Silverman
Port forwarding is another method of allowing SSH through a firewall. This excerpt also touches on some security concerns and SSH authentication. Excerpted from Chapter 11 of SSH, The Secure Shell: The Definitive Guide.

SSH Public-Key Authentication
by Daniel J. Barrett and Richard E. Silverman
Passwords--even encrypted ones--sent over the Internet can still pose a security problem. However, with public-key authentication, you don't need to send passwords at all. Excerpted from Chapter 8 of SSH, The Secure Shell: The Definitive Guide.

Traffic Engineering: Finding the Right Route
by Iljitsch van Beijnum
In this first installment on Traffic Engineering, excerpted from O'Reilly's BGP, learn how to find the best route in a multihomed setup--the one that will take advantage of all available bandwidth.

Traffic Engineering: Incoming Traffic
by Iljitsch van Beijnum
In this third installment on Traffic Engineering, excerpted from O'Reilly's BGP, learn how to balance inbound traffic.

Traffic Engineering: Local Routing Policy
by Iljitsch van Beijnum
In this second installment on Traffic Engineering, excerpted from O'Reilly's BGP, learn how to influence the BGP path-selection process.

Traffic Engineering: Queuing, Traffic Shaping, and Policing
by Iljitsch van Beijnum
In the fifth and final installment in this series of excerpts on Traffic Engineering from O'Reilly's BGP, learn how to increase performance for certain protocols or sessions using special queuing strategies, traffic shaping, and rate limiting.

Traffic Engineering: Specific Routes
by Iljitsch van Beijnum
In this fourth installment on Traffic Engineering, excerpted from O'Reilly's BGP, learn how to balance incoming traffic by announcing more specific routes.

Tripwire
by Richard Forno, Kenneth R. van Wyk
When a hacker gets through your primary defences, its hard to tell what they may have done to your system. Tripwire can reliably detect changes to your system, including rootkits. This is the second in a series of excerpts from Chapter 7 of Incident Response.

ONLamp Security

Anatomy of an Attack: The Five Ps
by Kerry J. Cox, Christopher Gerg
The five Ps--Probe, Penetrate, Persist, Propagate, and Paralyze--represent a model of how a security attack progresses. In this excerpt from Managing Security with Snort & IDS Tools, the authors discuss an attack's progression through these five steps, whether the attack is sourced from a person or an automated worm or script, with emphasis on the Probe and Penetrate phases, the stages that Snort monitors.

Open Source

Version Control with Subversion: Basic Concepts
by Ben Collins-Sussman, Brian W. Fitzpatrick, C. Michael Pilato
Subversion is an open source version control system that can access its file repository across networks. Various users are able to modify and manage the same set of data from their respective locations. Collaboration is fostered, and changes can occur more rapidly. This preview of Chapter 2 from Version Control with Subversion highlights the basic concepts of this important new version control system.

Version Control with Subversion: Introduction
by Ben Collins-Sussman, Brian W. Fitzpatrick, C. Michael Pilato
Subversion is an open source version control system that can access its file repository across networks. Various users are able to modify and manage the same set of data from their respective locations. Collaboration is fostered, and changes can occur more rapidly. This preview of Chapter 1 from Version Control with Subversion gives you the history, features, architecture, and components of this important new version control system.

P2P

The Power of Metadata
by Rael Dornfest and Dan Brickley
The Web is a big, glorious mess of unstructured, unlabeled data of every possible flavor. Will P2P go down the same road? Now is the time to adopt some metadata standards that will allow P2P to become truly interoperable. This essay is an excerpt from Peer-To-Peer.

PHP

PHP Pocket Reference
by Rasmus Lerdorf
The introductory chapter excerpted from O'Reilly's "PHP Pocket Reference," a handy quick reference for PHP, an open-source, HTML-embedded scripting language that can be used to develop web applications.

PHP Session Management With Cookies
by David Lane and Hugh E. Williams
The stateless nature of HTTP allows applications to distribute content across multiple servers. However, applications that require complex user interaction can't be implemented as stateless web pages. Using sessions and cookies is one way around this. Excerpted from Chapter 8 of Web Database Applications with PHP & MySQL.

Policy

Protect Your OSP with logfinder
by Richard Koman
Do you keep all your logs? Get ready for trouble. The EFF has issued a warning to online service providers, including ISPs, web site publishers, and bloggers, to start deleting their log files ASAP. To help, the EFF has created a free tool called logfinder that makes it easier to find and delete those log files.

PT - ActionScript

ActionScript Overview: Chapter 1 - Learning ActionScript 3.0
by Rich Shupe and Zevan Rosser
Learning ActionScript 3.0 gives you a solid foundation in the Flash language and demonstrates how you can use it for practical, everyday projects. Now available, an excerpt from Learning ActionScript 3.0: Chapter 1, ActionScript Overview. While you likely know what ActionScript is and are eager to begin working with the new version, a brief overview of its development will give you some insight into its use—particularly related to Flash Player and how it handles different versions of ActionScript. This brief introductory chapter will give you a quick look at where ActionScript 3.0 fits into your workflow.

PT - Certification

Glossary - Junos Enterprise Switching
by Doug Marschke, Harry Reynolds
JUNOS Enterprise Switching is the only detailed technical book on Juniper Networks' new Ethernet-switching EX product platform. This extremely practical book is a useful, hands-on field guide to the EX platform, and also makes a excellent study guide for certification exams in the JNTCP enterprise tracks. Includes all-inclusive coverage of Juniper Networks switching platforms, architecture and packet flow, management options, user interface options, JUNOS switch deployment, as well as configuration, maintenance, and troubleshooting guidelines.

PT - Web Development

Could They Do It?: Real User Monitoring: Chapter 10 - Complete Web Monitoring
by Alistair Croll, Sean Power
Could They Do It?: Real User Monitoring - Complete Web Monitoring

PT - Devices

Buying and Setting Up Your Netbook: Chapter 1 - Netbooks: The Missing Manual
by J.D. Biersdorfer
Buying and Setting Up Your Netbook: Chapter 1 - Netbooks: The Missing Manual

Troubleshooting Your Netbook: Chapter 12 - Netbooks: The Missing Manual
by J.D. Biersdorfer
Troubleshooting Your Netbook: Chapter 12 - Netbooks: The Missing Manual

PT - iPhone

Making Money in Mobile: Chapter 14 - Mobile Design and Development
by Brian Fling
Making Money in Mobile: Chapter 14 - Mobile Design and Development

Mobile 2.0: Chapter 10 - Mobile Design and Development
by Brian Fling
Mobile 2.0: Chapter 10 - Mobile Design and Development

PT - Web 2.0

A Reference Architecture for Developers: Chapter 5 - Web 2.0 Architectures
by James Governor and Dion Hinchcliffe, Duane Nickull
Web 2.0 Reference Architecture: about reference architectures, web 2.0 reference architecture, resource tier, service tier, client application tier, architectural models that span tiers, model-view-controller, SOA, and consistent object and event models

Building the New Age of Participation - The Art of Community
by Jono Bacon
Building communities is vital today, whether it's to build a reliable support network, serve as a valuable source of new ideas, or provide a powerful marketing tool. In The Art of Community, you'll learn about the broad range of talents required to recruit, motivate, and manage community members. The book takes you through the stages of community, and covers topics ranging from software tools to conflict resolution skills.

Dissecting Web 2.0 Examples: Chapter 3 - Web 2.0 Architectures
by James Governor and Dion Hinchcliffe, Duane Nickull
Dissecting Web 2.0 examples from DoubleClick & AdSense, Ofoto and Flickr, Akamai & BitTorrent, MP3.com & Napster, and Britannica Online & Wikipedia - personal websites & blogs, screen scraping & web services, content management systems & wikis, taxonomy & folksonomy, more hints for defining Web 2.0

Modeling Web 2.0: Chapter 4 - Web 2.0 Architectures
by James Governor and Dion Hinchcliffe, Duane Nickull
Modeling Web 2.0: A new client/server model for Web 2.0, capabilities, services, connectivity/reachability, client applications/runtimes, users

Specific Patterns of Web 2.0: Chapter 7 - Web 2.0 Architectures
by James Governor and Dion Hinchcliffe, Duane Nickull
Web 2.0 Reference Architecture: about reference architectures, web 2.0 reference architecture, resource tier, service tier, client application tier, architectural models that span tiers, model-view-controller, SOA, and consistent object and event models

PT - Web Development

An Introduction to Google Wave - Google Wave: Up and Running
by Andres Ferrate
Simply stated, Google Wave is a real-time communication and collaboration platform that incorporates several types of web technologies, including email, instant messaging (IM), wiki, online documents, and gadgets. This article provides a general overview of Google Wave that should serve to familiarize you with this new and exciting platform.

Dreamweaver Behaviors - Dreamweaver CS5: The Missing Manual
by David Sawyer McFarland
This Missing Manual helps you quickly and painlessly master the latest version of this industry-standard web design and management program. Perfect for beginners who need step-by-step guidance and for longtime Dreamweaver masters who need a handy reference, the 7th edition of this bestselling Missing Manual offers jargon-free language and clear descriptions for designing, organizing, building, and deploying websites. It's the ultimate atlas for Dreamweaver CS5.

Introducing Site Management - Dreamweaver CS5: The Missing Manual
by David Sawyer McFarland
This Missing Manual helps you quickly and painlessly master the latest version of this industry-standard web design and management program. Perfect for beginners who need step-by-step guidance and for longtime Dreamweaver masters who need a handy reference, the 7th edition of this bestselling Missing Manual offers jargon-free language and clear descriptions for designing, organizing, building, and deploying websites. It's the ultimate atlas for Dreamweaver CS5.

Templates - Dreamweaver CS5: The Missing Manual
by David Sawyer McFarland
This Missing Manual helps you quickly and painlessly master the latest version of this industry-standard web design and management program. Perfect for beginners who need step-by-step guidance and for longtime Dreamweaver masters who need a handy reference, the 7th edition of this bestselling Missing Manual offers jargon-free language and clear descriptions for designing, organizing, building, and deploying websites. It's the ultimate atlas for Dreamweaver CS5.

PT - Windows

Recipe 3.11 Ethernet Traffic Shaping - VMWare Cookbook
by Ryan Troy and Matthew Helmke
VMware is a powerful and flexible platform for pooling the resources from computer clusters or several hardware servers and distributing them quickly. This book provides a look into real-world use of VMware ESX and ESXi, with step-by-step solutions for problems that occur in a wide range of environments. This article features an excerpt from VMWare Cookbook, Recipe 3.11: Ethernet Traffic Shaping.

Recipe: 5.9 Monitoring CPU Usage - VMWare Cookbook
by Ryan Troy and Matthew Helmke
VMware is a powerful and flexible platform for pooling the resources from computer clusters or several hardware servers and distributing them quickly. This book provides a look into real-world use of VMware ESX and ESXi, with step-by-step solutions for problems that occur in a wide range of environments. This article features an excerpt from VMWare Cookbook, Recipe 5.9: Monitoring CPU Usage.

Python

A Python Quick Reference to Useful Commands

Plucked from the pages of Python in a Nutshell and Learning Python, 2nd Edition, these excerpts, available for download as a PDF (55K), offer a quick reference to useful Python commands, covering methods, common file operations, and much more. Print it out to keep by your keyboard as you program.

Cooking with Python, Part 1

In these sample recipes from Python Cookbook, Second Edition, learn how to use Unicode to handle international text strings that include non-ASCII characters, and how to select the nth smallest element of a sequence. Check back here next week for two more recipes on implementing a ring buffer and computing prime numbers.

Cooking with Python, Part 2

Recipes from part one of this two-part series of excerpts from Python Cookbook, 2nd Edition covered how to handle international text with Unicode and how to select elements from an unsorted sequence. In today's recipes, learn how to implement a ring buffer and how to compute prime numbers.

Python Programming on Win32
by Mark Hammond, Andy Robinson
Excerpt from Chapter 20 of O'Reilly's book Python Programming on Win32.

Python Programming on Win32 using PythonWin
by Mark Hammond and Andy Robinson
Excerpt from Chapter 20 of O'Reilly's book Python Programming on Win32.

Python Programming on Win32 using Tkinter
by Mark Hammond and Andy Robinson
Excerpt from Chapter 20 of O'Reilly's book Python Programming on Win32.

Python Programming on Win32 using WxPython
by Mark Hammond and Andy Robinson
Another GUI toolkit available for Python is called wxPython. The current incarnation is fairly new to the Python scene and is rapidly gaining popularity amongst Python developers. Excerpted from Chapter 20 of O'Reilly's book Python Programming on Win32.

Run Python Scripts on Your Nokia Smartphone

Most users do not need a full-blown programming platform to develop small hacks for their phones. A scripting language like Python is the perfect tool to automate simple tasks and perform simple logical processing. This excerpt from Nokia Smartphone Hacks shows you how to use Python to develop and run scripts for your Series 60 device.

Web Development

Adding Movies to Your Web Page
by Jennifer Robbins
If you've just started out creating your own Web pages, chances are you've asked yourself, "How did they get that little movie to play right on their page." In this excerpt from Learning Web Design, 2nd Edition, Jennifer Niederst offers advice on creating good video for web sites.

Cascading Style Sheets: HTML and CSS
by Eric A. Meyer
In its inherent ability to allow richly styled structural documents, CSS is both a step forward and a step backward -- but it's a good step backward, and a needed one. To see what is meant by this, it is first necessary to understand how the Web got to the point of desperately needing something like CSS, and how CSS makes the web a better place for both page authors and web surfers. Excerpted from Chapter 1 of Cascading Style Sheets: The Definitive Guide.

Cooking with ActionScript
by Joey Lott
We've a diverse slate this week of recipes for ActionScript developers from the recently released ActionScript Cookbook: Our first is on formatting currency amounts; the second on using a unique depth when creating a new movie clip; and the third on creating timers and clocks. And check back to this space next week for recipes on pausing and resuming a sound, saving a local shared object; and searching XML.

Cooking with ActionScript, Part 2
by Joey Lott
We conclude our two-part series of excerpts from ActionScript Cookbook this week with sample recipes on pausing and resuming a sound, saving a local shared object, and searching XML.

Cooking with JavaScript & DHTML
by Danny Goodman
In this first sample recipe excerpted from JavaScript & DHTML Cookbook learn how to use auto-tabbing for fixed-length text boxes. And check back to this space over the next several weeks for more sample recipes covering arrays and objects, browser feature detection, style-sheet management, and HTML elements positioning.

Cooking with JavaScript & DHTML, Part 2
by Danny Goodman
In this week's sample recipe excerpted from JavaScript & DHTML Cookbook, learn how to simulate a hash table for fast array lookup. And check back to this space next week for a recipe on detecting object property and method support.

Cooking with JavaScript & DHTML, Part 3
by Danny Goodman
In this week's sample recipe from JavaScript & DHTML Cookbook, learn how to detect object property and method support. And check back here next week for a sample recipe on importing browser- or operating system-specific style sheets.

Cooking with JavaScript & DHTML, Part 4
by Danny Goodman
In this week's sample recipe from JavaScript & DHTML Cookbook, you'll find a quick and simple solution to importing browser- or operating system-specific style sheets. And check back to this space next week for a recipe on reading effective style sheet property values.

Cooking with JavaScript & DHTML, Part 5
by Danny Goodman
In this week's sample recipe from JavaScript & DHTML Cookbook, learn how to read effective style sheet property values. Once you've assigned a value to a property of an element's style object, the value can be read subsequently through the style property.

Cooking with JavaScript & DHTML, Part 6
by Danny Goodman
In our sixth and final sample recipe from Danny Goodman's JavaScript & DHTML Cookbook, learn how to locate the pixel coordinates of a nonpositioned element that the browser has placed during normal page flow. And if you've enjoyed sampling these recipes, check back here in two weeks; we'll be publishing a bonus recipe Danny has written that you won't find in his book.

Hacking Amazon
by Paul Bausch
O'Reilly's Amazon Hacks recently released, so we asked author Paul Bausch to select some hacks from the book to highlight here. Find out how to search Amazon from any web page in IE, and how to create Amazon Associate links on your Movable Type weblog. And check back to this space next week for hacks on listing your Amazon items for sale on your own web site, and on creating a wireless wish list.

Hacking Amazon, Part 2
by Paul Bausch
Paul Bausch, author of Amazon Hacks, is back this week with more hand-selected hacks from his book. Learn how to list your Amazon items for sale on your own web site, and how to create a wireless wish list.

Hacking eBay
by David A. Karp
This week we're showcasing excerpts from the recently released eBay Hacks. These three hacks have a common thread--they all deal in some manner with hacking the view of eBay from your browser. In these sample hacks, learn how to tap into eBay's massive database right from your own address bar; how to use Cascading Style Sheets to change the look of your eBay page; and how to control the view of other eBayers' pages with your own browser.

Hacking Flash

In these two excerpts from Flash Hacks, learn how to simulate pixel-based fades and wipes, as supported in Macromedia Director; and how to use complex shapes as masks.

Hacking Flash, Part 2

Today we offer two more hacks excerpted from O'Reilly's Flash Hacks. Learn how to create a performance budget that shows where your money is going, and how to secure your online Flash content. And if you missed them, be sure to check out last week's hacks from the book.

Hacking IRC
by Paul Mutton
IRC Hacks author Paul Mutton has selected some of his favorite hacks to excerpt here. This week find out how to add your IRC nickname to your webcam, and how to make your own IRC bot for passing on short messages to other users. Be sure to check back to this space next week for hacks on performing feats of math; announcing newsgroup posts; and using IRC within a screen.

Hacking IRC, Part 2
by Paul Mutton
Paul Mutton has selected three hacks for IRC addicts from his book, IRC Hacks. Learn how to create a calculator bot and a bot for viewing up-to-the-minute newsgroup postings, and a way to keep track of IRC while away from your computer.

Hacking PayPal
by Dave Burchell, Dave Nielsen, Shannon Sofield
The authors of PayPal Hacks offer two hacks designed to make PayPal more customer-friendly, profitable, and accountable, plus an additional hack to catch IPN system errors.

Hacking PayPal, Part 2
by Dave Burchell, Dave Nielsen, Shannon Sofield
Last week, in Part 1 of this two-part excerpt from PayPal Hacks, the authors offered three hacks to ensure PayPal's convenience and effectiveness. This week, they present two more hacks to help make you and your customers happy. The first hack highlights using IPN to effortlessly deliver digital goods to your customers, and the second shows how to set up phony Sandbox accounts to test your code.

JavaScript: Windows and Frames
by David Flanagan
David Flanagan explains some of the most commonly used properties and methods using windows and frames in this preview excerpt of the new edition of "JavaScript: The Definitive Guide".

More Spidering Hacks
by Kevin Hemenway and Tara Calishain
This week we offer two more hacks on grabbing--or scraping--the information you need, whether it's the link count for a particular Yahoo! category, or the quick answer for the word that's just on the tip of your tongue! Just two of the 100 such workarounds you'll find in O'Reilly's Spidering Hacks.

Resizing an Image
by Deke McClelland
O'Reilly has just released Adobe Photoshop CS One-on-One. To give photographers and web designers a sense of what they'll find in the book, we've excerpted a lesson from Chapter 5 that explains how to modify image size, when to resample, and what to do about resolution. And to make things crystal clear, we've also included one of the QuickTime-based video lessons, called "Image and Canvas Size" (26MB). (If you're not interested in a long download, check out the one-minute excerpt instead. Note: To download either file, you must have QuickTime installed on your machine.)

Spidering Hacks
by Kevin Hemenway and Tara Calishain
This week we offer two hacks from Spidering Hacks that save you time as well as extra trips to your favorite web sites. The first is on using Template::Extract, a Perl module that allows you to scrape a web page to generate RSS from its data structure. And the second is on using a program called dailystrips to grab all your favorite online comic strips and have them presented in one HTML file.

Windows

.NET Framework Essentials, 2nd Ed.: Web Services, Part 1
by Hoang Lam, Thuan L. Thai
In this article, O'Reilly's .NET Framework Essentials, 2nd Ed. authors Thuan L. Thai and Hoang Lam discuss Web Services in practice and provides a .NET Web services framework overview.

.NET Framework Essentials, 2nd Ed.: Web Services, Part 3
by Hoang Lam, Thuan L. Thai
In this book excerpt, O'Reilly's .NET Framework Essentials, 2nd Ed. authors Thuan L. Thai and Hoang Lam cover Web services consumer clients.

Creating ASP.NET Web Services, Part 1
by Alex Ferrara and Matthew MacDonald
In part one in this series of book excerpts from Programming .NET Web Services, learn how to write an ASP.NET HelloWorld Web service application.

.NET Framework Essentials, 2nd Ed.: Web Services, Part 2
by Hoang Lam, Thuan L. Thai
In this book excerpt, O'Reilly's .NET Framework Essentials, 2nd Ed. authors Thuan L. Thai and Hoang Lam discuss Web Services service providers, which implement Web Services and advertise them so that the clients can discover and make use of the services.

.NET Framework Essentials, 2nd Ed.: Web Services, Part 4
by Hoang Lam, Thuan L. Thai
This fourth and final excerpt from O'Reilly's .NET Framework Essentials, covers Web services and security from the perspective of both system-level and application-level security.

.NET Serviced Components
by Juval Löwy
This chapter from COM and .NET Component Services shows you how to create .NET serviced components that can take advantage of the COM+ component services that you have learned to apply from this book.

ADO.NET, Part 1
by Dave Grundgeiger
Many software applications benefit from storing their data in database management systems. In this excerpt from Chapter 8 of Programming Visual Basic .NET, the author show you how to connect to a SQL Server using ADO.

ADO.NET, Part 2
by Dave Grundgeiger
In this second installment from Programming Visual Basic .NET, learn to connect to an OLE DB data source and read data into a dataset using ADO.NET.

ADO.NET, Part 3
by Dave Grundgeiger
This is the third installment from Programming Visual Basic .NET, focusing on the relations between DataTables in a DataSet, and the DataSets XML capabilities.

ADO.NET, Part 4
by Dave Grundgeiger
This is the forth installment from Programming Visual Basic .NET, focusing on binding a DataSet to a Windows and a Web Forms DataGrid.

ADO.NET, Part 5
by Dave Grundgeiger
This final excerpt from Programming Visual Basic .NET concludes this series of excerpts with Typed DataSets, reading data into a DataReader, and executing stored procedures through a SqlCommand object.

An Introduction to the .NET FCL, Part 1
by Budi Kurniawan and Ted Neward
In part one of a five-part series of book excerpts from VB.NET Core Classes in a Nutshell, learn what it's like to develop without the .NET FCL library and its core classes.

An Introduction to the .NET FCL, Part 2

In part two of this book excerpt series on the .NET Framework Class Library from O'Reilly's VB.NET Core Classes in a Nutshell, get an introduction to the .NET Framework Class Library (FCL).

An Introduction to the .NET FCL, Part 3

In part three in this series of book excerpts on the .NET Framework Class Library from VB.NET Core Classes in a Nutshell, learn how to work with the .NET FCL.

An Introduction to the .NET FCL, Part 4
by Budi Kurniawan and Ted Neward
In part four in this five part series on the .NET FCL from VB.NET Core Classes in a Nutshell, learn the types of a .NET namespace.

An Introduction to the .NET FCL, Part 5
by Budi Kurniawan and Ted Neward
In this final installment from VB.NET Core Classes in a Nutshell, learn how to approach the .NET FCL.

An Introduction to VB.NET Attributes, Part 1
by Paul Lomax, Ron Petrusha, Steven Roman
In Part One of a three-part excerpt from O'Reilly's VB .NET Language in a Nutshell, the authors give an introduction to Attributes and its syntax and use.

An Introduction to VB.NET Attributes, Part 2
by Paul Lomax, Ron Petrusha, Steven Roman
In this part two of three from a series of book excerpts from O'Reilly's VB.NET Language in a Nutshell, the authors show you how to define custom attributes.

An Introduction to VB.NET Attributes, Part 3
by Paul Lomax, Ron Petrusha, Steven Roman
The third and final part of this excerpt from O'Reilly's VB .NET Language in a Nutshell, the authors address custom attributes.

Building Palm Conduits, Part 1
by Roger Knoell and Patrick Burton, Matthew Holmes
This excerpt from Programming VB for PalmOS, offers an introduction to building conduits, synchronization software that connects Palm apps and data stores.

Building Palm Conduits, Part 2
by Roger Knoell and Patrick Burton, Matthew Holmes
In this excerpt from Programming Visual Basic for the Palm OS, learn how to design conduits using VB for the Palm OS.

Building Palm Conduits, Part 3
by Roger Knoell and Patrick Burton, Matthew Holmes
Learn about synchronization logic in building Palm conduits, in this excerpt from Programming Visual Basic for the Palm OS.

Building Palm Conduits, Part 4
by Roger Knoell and Patrick Burton, Matthew Holmes
This final book excerpt in this series from Programming Palm OS with Visual Basic covers data formats, and packing and unpacking record data in a Palm application.

C# Generics: Collection Interfaces
by Jesse Liberty
The .NET framework provides two sets of standard interfaces for enumerating and comparing collections: the traditional (non-type-safe) and the new generic type-safe collections. In this excerpt from Programming C#, 4th Edition, Jesse Liberty focuses on the key type-safe collection interfaces, reviewing each collection interface and providing code examples that demonstrate how to implement each one.

C# in a Nutshell: Introducing C# and the .NET Framework, Part 1
by Ben Albahari, Peter Drayton
What makes C# different? Besides being a full-fledged object-oriented language, C# was designed from the ground up for component-based programming, a unified type system, type safety, and most of all a pragmatic world view. Get a full introduction to C# is a three-part installment of O'Reilly's C# in a Nutshell.

C# in a Nutshell: Introducing C# and the .NET Framework, Part 2

In the second part of our excerpt from O'Reilly's C# in a Nutshell, the authors introduce the Common Language Runtime and the Framework Class Library.

C# in a Nutshell: Introducing C# and the .NET Framework, Part 3

One of the most encouraging aspects about the .NET Framework is the degree of openness that Microsoft has shown during its development. This excerpt from C# in a Nutshell details how C# became an ECMA standard.

Cooking with Access
by Ken Getz, Paul Litwin and Andy Baron
The authors of Access Cookbook, 2nd Edition have selected four recipes offering practical solutions to common problems Access users face. Read on and learn how to perform a mail merge from Access to Word, create a web front end to an Access table, build an object inventory, and export columns to an HTML table.

Cooking with Active Directory
by Robbie Allen
Active Directory Cookbook contains hundreds of step-by-step solutions for common and uncommon problems system administrators encounter using Active Directory. To provide a sense of the kind of examples you'll find in the book, we present two sample recipes: the first on finding the domain controllers that are acting as one of the FSMO roles; the second on determining the last time a user logged into a domain. And check back to this space in two weeks for recipes on modifying an attribute for several users at once and viewing the nested members of a group.

Cooking with Active Directory, Part 2

Active Directory Cookbook offers Windows administrators hundreds of troubleshooting recipes for working with AD. This week we're showcasing two more recipes for you to sample: the first is from Chapter 6 ("Users") on modifying an attribute for several users at once; and the second is from Chapter 7 ("Groups") on viewing the nested members of a group.

Cooking with ADO.NET
by Bill Hamilton
O'Reilly's recently released ADO.NET Cookbook contains over 150 solutions and best practices for everyday dilemmas. This week, we're excerpting three recipes from the book that show how to asynchronously update data in a database, how to protect login credentials during network transmissions, and how to enforce a business rule with column expressions.

Cooking with ADO.NET, Part 2

In O'Reilly's ADO.NET Cookbook, you'll find more than 150 solutions and best practices for everyday dilemmas. This week, we're offering two more recipes from the book that show how to create and then synchronize a master-detail pair of DataGrid controls, as well as how to improve performance when a user pages through a large result set in a data grid.

Cooking with ASP.NET

Michael Kittel and Geoffrey LeBlond have selected a few of their favorite recipes from O'Reilly's recently released ASP.NET Cookbook. Learn how to add a Totals row to a DataGrid, communicate between user controls, and display user-friendly error messages. Check back next week, as the authors offer two more recipes--for creating a reusable image handler and saving and reusing HTML output.

Cooking with ASP.NET, Part 2
by Mikkel Aaland, Geoffrey T. LeBlond
Last week, in part one of this two-part excerpt from the ASP.NET Cookbook , authors Michael Kittel and Geoffrey LeBlond cooked up three recipes to make ASP.NET work for you. This week, they're back in the kitchen with two more recipes: one to create a reusable handler that reads image data from the database and sends it to the browser, and another to improve the performance of pages that rarely change by saving and reusing HTML output.

Cooking with C#
by Stephen Teilhet and Jay Hilyard
Learn how to convert a string returned as a Byte[ ] back into a string, and how to handle an exception that occurs within a method invoked via reflection, in these sample recipes from C# Cookbook.

Cooking with C#, Part 2
by Stephen Teilhet and Jay Hilyard
In this second and final batch of recipes excerpted from the recently released C# Cookbook, learn how to obtain the HTML from a URL and how to efficiently synchronize the reading and writing of a resource.

Cooking with Windows Server, Part 1
by Robbie Allen
In this excerpt from Robbie Allen's Windows Server Cookbook, Robbie shows you how to activate Windows Server 2003, how to find large folders and files on a volume, and how to hide a file or folder.

Cooking with Windows Server, Part 2
by Robbie Allen
In this excerpt from Robbie Allen's Windows Server Cookbook, Robbie shows you how to build web sites and how to mailbox-enable a user.

DHCP and DNS Security
by Mike Danseglio
In this excerpt from Securing Windows Server 2003, author Mike Danseglio explores the core network services of DHCP and DNS. These services are essential to most IP networks today in that they respectively provide automatic addressing and name resolution. However, their security considerations and safe operations are often neglected. Mike shows you how these services work, how they're vulnerable to attack, and how to protect them against those attacks when possible.

Getting Started with C#, Part 1
by Jesse Liberty
Find out how to write your first C# program in this book excerpt from Learning C#. This is the first of two excerpts on getting started with C#.

Getting Started with C#, Part 2
by Jesse Liberty
In this final installment from Learning C#, we'll break down your first C# program by examining the details that went into creating it.

Go Wireless

Here's an excerpt from Windows XP Annoyances for Geeks, 2nd Edition, that shows you how to set up a simple wireless network, connect that network to the internet, connect your wireless devices to other people's wireless networks, and prevent others from sneaking on to your network. All without wires, and the most amazing thing is that it actually works.

Hacking Access

In these three excerpts from Access Hacks, learn how to populate a listbox with values from more than one source; how to put a watermark on your reports; and how to use Word's Compare and Merge Documents feature to identify discrepancies between similar tables.

Hacking Excel, Part 1
by David Hawley and Raina Hawley
Learn how to create a workable speedometer (or "speedo") chart, complete with moving needle, by using a combination of doughnut and pie charts, in this sample hack from O'Reilly's Excel Hacks.

Hacking Excel, Part 2
by David Hawley and Raina Hawley
In this week's excerpts from Excel Hacks, learn how to remove phantom links from your workbook, and how to make Excel return the nth occurrence of specified data.

Hacking Firefox: Add Stuff to Your Toolbars

Learn how to trick out your Firefox toolbars in this excerpt from Firefox Hacks. This hack shows you how to upgrade toolbars, with a focus on two example extensions that benefit from toolbar icons: InfoLister and Gmail Notifier.

Hacking Visual Studio

Author James Avery has selected five hacks from his recently released book, Visual Studio Hacks. Learn to create comments faster using GhostDoc; to refactor your code with Visual Studio 2005's new Refactor menu; and more.

Hacking Windows Server
by Mitch Tulloch
Mitch Tulloch has gathered 100 hacks in his Windows Server Hacks book to help system administrators master the more powerful features of Windows Server. To provide a real look at what these hacks can help you do, we offer three excerpts here: How to use an ADSI-based script to search for domain users; how to use the Hyena utility to quickly find out which user on your network has a particular file open; and how to locate all machines that have automatic logon enabled in their registry.

Hacking Windows XP
by Preston Gralla
In these two hacks excerpted from Windows XP Hacks, author Preston Gralla walks through how to shorten the time it takes for your desktop to appear when you turn on your PC (and make XP shut down faster as well), and how to use some of Preston's favorite Registry hacks to make nifty interface changes.

Hacking Windows XP
by Preston Gralla
Learn how to make better use of the XP login screen, how to give Internet Explorer a face lift, and how to build your own Firefox search engine, in these three excerpts from Windows XP Hacks, 2nd Edition.

Hacking Windows XP, Part 2
by Preston Gralla
In this week's batch of sample hacks from Windows XP Hacks, find out how to hack the Registry to improve the Context Menu; how to surf anonymously without a trace; and how to tweak DNS settings to gain faster Internet access.

Hacking Word
by Andrew Savikas
How can you make the world's most widely used word processing program work even better for you? Andrew Savikas, author of Word Hacks, gets you five steps closer to taming your text with his generous collection of hacks. Rid yourself of hidden character styles, tap VBScript for powerful string searching, use Perl from within a Word macro, and more.

Hacking Your Car: Install Windows on a CompactFlash Card
by Damien Stolarz
The car PC community is constantly searching for hardware and software solutions to improve the system's boot speed and reliability, and reduce the physical size of the computer. One of these solutions is to build a system that boots off of a CompactFlash (CF) drive. In this excerpt from Car PC Hacks, learn how to install Windows on a CompactFlash card.

Internet Security Annoyances
by Preston Gralla
Spyware, Trojans, worms, viruses, phishing, and now pharming--all security issues that can lead to a disenchanting internet experience. This excerpt from Internet Annoyances can help you prevent these kinds of security breaches with tips on configuring your home router for maximum security, constructing your own personal firewall, and more.

PC Hacks for Windows
by Jim Aspinwall
Jim Aspinwall, author of PC Hacks, has hand-selected three must-have hacks for Windows. Jim will show you how to give your Plug and Play a lesson in playing well with others by tweaking your BIOS parameters; how to pick up CPU speed by applying proper CPU cooling techniques; and how to help your hard drive perform better with less wasted space by setting it up the way you want it.

Performing Web Queries in Excel 2003
by Jeff Webb
Excel 2003 Programming: A Developer's Notebook shows programmers how to best use Excel 2003's new features, through a series of hands-on projects. In this sample lab from the book, learn how to perform a web query to import data from a web page into a worksheet using Excel's QueryTable object.

Power Hound Tips for Online Protection
by Preston Gralla
Windows XP Power Hound author Preston Gralla offers relief from some of your online security worries with four important tips. Protect yourself by testing your security, controlling your security levels, limiting AutoComplete, and keeping an eye on web bugs. Preston shows you how.

Programming ASP.NET: Custom and User Controls, Part 1
by Dan Hurwitz, Jesse Liberty
In Part 1 of this chapter from Programming ASP.NET, the authors describe how to program user controls.

Programming ASP.NET: Custom and User Controls, Part 2
by Dan Hurwitz, Jesse Liberty
In Part 2 of this chapter from Programming ASP.NET, the authors describe how to program custom controls.

Programming C#: Attributes and Reflection
by Jesse Liberty
NET applications contain code, data, and metadata. Metadata is information about the data--that is, information about the types, code, assembly, and so forth--that is stored along with your program. This excerpt from Chapter 18 of Programming C# will explore how some of that metadata is created and used.

Protect Yourself Against Denial-of-Service Attacks
by Anton Chuvakin and Cyrus Peikari
The only way to defend yourself is to understand your attacker in-depth. This excerpt from the recently released Security Warrior by Cyrus Peikari and Anton Chuvakin details denial-of-service attacks against Windows XP. Read it and prepare yourself.

Protect Yourself Against Kerberos Attacks
by Anton Chuvakin and Cyrus Peikari
The only way to defend yourself is to understand your attacker in-depth. This excerpt from the recently released Security Warrior by Cyrus Peikari and Anton Chuvakin details Kerberos attacks. Read it and prepare yourself.

Security Centers and Firewalls
by David Pogue
With the release of Windows XP Service Pack 2 (SP2), Microsoft's latest and most reliable corporate desktop operating system now provides better protection against viruses, worms, and malicious hackers. David Pogue, creator of the Missing Manuals series, offers an excerpt from his newest book, Windows XP Pro: The Missing Manual, 2nd Edition, which covers all the intricacies of SP2. This excerpt deals more specifically with the Security Center and the Windows Firewall. Knowledge is power; protect your system.

User Controls and Custom Server Controls, Part 1
by Matthew MacDonald and G. Andrew Duthie
In part one from this series of book excerpts from ASP.NET in a Nutshell, get an overview on ASP.NET controls, and learn about ASP.NET user controls.

User Controls and Custom Server Controls, Part 2
by Matthew MacDonald and G. Andrew Duthie
In Part 2 in this series of excerpts from ASP.NET in a Nutshell, learn ASP.NET custom server controls.

User Controls and Custom Server Controls, Part 3
by Matthew MacDonald and G. Andrew Duthie
Part 3 of this four-part excerpt from ASP .NET in a Nutshell covers custom server contols.

User Controls and Custom Server Controls, Part 4
by Matthew MacDonald and G. Andrew Duthie
In this final installment in a series of excerpts from ASP.NET in a Nutshell, learn how to share ASP.NET controls across applications.

Wireless

Dispelling the Myth of Wireless Security
by Rob Flickenger
Want to find out for yourself just how secure your standard wireless network really is? Rob Flickenger lets you in on what it took to circumvent the security of his own standard 802.11b network. Read what he discovered in this excerpt from his latest book, Wireless Hacks.

Do-It-Yourself Access Point Hardware
by Rob Flickenger
Rob Flickenger is back this week with another excerpt from his latest book, the recently released Wireless Hacks. Like the title of this hack says, Rob offers do-it-yourselfers four PC-compatible hardware solutions you can buy--without breaking the bank--to build and run your own custom access point.

Enabling BSS Master Mode on Hermes-Based Radios
by Rob Flickenger
Rob Flickenger is back with yet another excerpt from his latest book, the recently released Wireless Hacks. This week, Rob shows you what you'll need to do to operate a Hermes-based radio card--the kind found in the original AirPort AP--as BSS master.

Learning WML: Tasks and Events
by Martin Frost
From Chapter 3 of Learning WML & WMLScript, Martin Frost explains two parts of WML—tasks and events

Point-to-Point Links
by Rob Flickenger
In this excerpt from Chapter 7 of Building Wireless Community Networks, 2nd Edition, author Rob Flickenger offers practical tips on wireless point-to-point networking he learned from the field. If you're working on long-distance networks, these techinques will help you to accurately and optimally position your dish.

Structure of a Palm Application, Part 1
by Neil Rhodes and Julie McKeehan
In this excerpt from "Palm OS Programming, 2nd Edition," Neil Rhodes and Julie McKeehan introduce the terminology and conventions of a Palm application. This is the first in a series of three excerpts designed to familiarize developers with the structure of Palm apps.

Structure of a Palm Application, Part 2
by Neil Rhodes and Julie McKeehan
In this second excerpt from "Palm OS Programming, 2nd Edition," Neil Rhodes and Julie McKeehan build on the terminology and conventions they introduced in the first excerpt and walk us through a sample application. This is the second in a series of three excerpts designed to familiarize developers with the structure of Palm apps.

Structure of a Palm Application, Part 3
by Neil Rhodes and Julie McKeehan
In this third excerpt from "Palm OS Programming, 2nd Edition," Neil Rhodes and Julie McKeehan discuss how the operating system communicates with an application when it's not running. This is the third in a series of three excerpts designed to familiarize developers with the structure of Palm apps.

WET11 Upgrades
by Rob Flickenger
Many people use the WET11 to connect devices that otherwise can't accommodate a radio with their wireless network. But these features aren't nearly enough for wireless hackers. In this excerpt from Wireless Hacks, author Rob Flickenger offers a couple of nifty hacks that significantly increase the range, sensitivity, and functionality of your WET11.