Pages: pp. 77
The Greening of IT: How Companies Can Make a Difference for the Environment, John Lamb. In an era of unpredictable energy costs, reducing energy usage throughout a company's data center and IT infrastructure is a powerful cost-cutting opportunity. In this book, the author helps companies realistically assess the business case for green IT, set priorities, and overcome the internal and external challenges to making it work. He offers proven solutions for issues ranging from organizational obstacles to executive motivation and discusses crucial issues such as utility rate incentives and metrics. He also presents solutions that will improve business flexibility and energy-saving opportunities, including virtualization, consolidation, and cloud and grid computing.
IBM Press; www.ibmpressbooks.com; 978-0-13715-083-0; 352 pp.
Semantic Digital Libraries, Sebastian Ryszard Kruk and Bill McDaniel, eds. Libraries have always been an inspiration for Semantic Web activities' standards and technologies. However, despite the fact that semantic technologies offer a new level of flexibility, interoperability, and relationships for digital repositories, Semantic Web and social networking technologies have not been widely adopted and further developed by major digital library initiatives and projects.
This book presents Semantic-Web-related aspects of current digital library activities and introduces their functionality using examples ranging from general architectural descriptions to detailed usages of specific ontologies. It also discusses existing prototype systems such as JeromeDL, BRICKS, and Greenstone. Aimed at researchers and graduate students in areas such as digital libraries, the Semantic Web, social networks, and information retrieval, this book details the possibilities and shortcomings of applying Semantic Web technologies to large digital repositories of unstructured data.
Springer; www.springer.com; 978-3-540-85433-3; 246 pp.
SQL Injection Attacks and Defense, Justin Clarke. SQL injection is one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. Devoted exclusively to this long-established but recently growing threat, this book includes all the current known information about SQL injection attacks as well as significant insight from a team of experts. Readers will learn how to find, confirm, and automate SQL injection; create exploits using SQL injection; and design to avoid the dangers of these attacks.
Syngress; www.elsevierdirect.com; 978-1-597-49424-3; 496 pp.
Principles of Software Development Leadership: Applying Project Management Principles to Agile Software Development, Ken Whitaker. As the software development market continues to grow worldwide, projects become more complicated and the pressure to "do more with less" becomes the rule of thumb. The need for software managers to be well-versed in project management is critical. This book provides all levels of software management, from program managers and project managers to software executives, with a set of best practices that creates successful outcomes. It also shows software managers how to deliver quality products on time by managing the relationships between planning, process, and people.
Course Technology PTR; www.courseptr.com; 978-1-584-50586-0; 400 pp.
Wireless Engineering Body of Knowledge (WEBOK), Gustavo Giannattasio, ed. Wireless technology has enabled connectivity and communications for over a century, and in recent years it has broadened significantly, providing consumers with previously unknown flexibility and mobility. Though it depends on generic communication principles, wireless technology has its own unique attributes such as wireless infrastructure, radio engineering, link design, spectrum and frequency allocations, networking and mobility management, user devices and interfaces, and regulatory and compatibility requirements.
This book summarizes the technical areas with which a wireless practitioner should be familiar. It features more than 50 wireless communications experts who outline the evolution, impact, and best practices of technical areas, including wireless access technologies; network and service architecture; network management and security; radio frequency engineering, propagation, and antennae; facilities infrastructure; and agreements, standards, policies, and regulations.
Wiley; www.wiley.com; 978-0-470-43366-9; 253 pp.