With iText, one can transform PDF documents into live, interactive applications quickly and easily. "iText in Action, 2nd Ed." offers an introduction and a practical guide to iText and the internals of PDF.
Provides information on using Activiti to streamline the implementation of business processes, covering such topics as process modeling, workflow, event handling, business rule engines, and document management integration.
The Nobel Prize–nominated Kenyan writer’s powerful first novel Two brothers, Njoroge and Kamau, stand on a garbage heap and look into their futures: Njoroge is to attend school, while Kamau will train to be a carpenter. But this is Kenya, and the times are against them: In the forests, the Mau Mau is waging war against the white government, and the two brothers and their family need to decide where their loyalties lie. For the practical Kamau, the choice is simple, but for Njoroge the scholar, the dream of progress through learning is a hard one to give up. The first East African novel published in English, Weep Not, Child is a moving book about the effects of the infamous Mau Mau uprising on the lives of ordinary men and women, and on one family in particular. For more than seventy years, Penguin has been the leading publisher of classic literature in the English-speaking world. With more than 1,700 titles, Penguin Classics represents a global bookshelf of the best works throughout history and across genres and disciplines. Readers trust the series to provide authoritative texts enhanced by introductions and notes by distinguished scholars and contemporary authors, as well as up-to-date translations by award-winning translators.
* 1st and only book to market on the open source Spring MVC and Web Flows, positioned to become the new "Struts." * Will be the only authoritative solution, by the Spring MVC and Spring Web Flows project leads themselves. * Two markets for this book. 1) Ex-patriots from the Struts world who have developed numerous web applications, but are looking for more and willing to take the initiative to experiment with new solutions; and 2) early adopter web developers into Web Flow, which has created a lot of buzz and will generate interest around this book as well as Spring MVC.
Shows readers how to create PDF documents that are far more powerful than simple representations of paper pages, helps them get around common PDF issues, and introduces them to tools that will allow them to manage content in PDF, navigating it and reusing it as necessary. Original. (Intermediate).
Java Enterprise Edition (Java EE) continues to be one of the leading Java technologies and platforms. Beginning Java EE 7 is the first tutorial book on Java EE 7. Step by step and easy to follow, this book describes many of the Java EE 7 specifications and reference implementations, and shows them in action using practical examples. This definitive book also uses the newest version of GlassFish to deploy and administer the code examples. Written by an expert member of the Java EE specification request and review board in the Java Community Process (JCP), this book contains the best information possible, from an expert’s perspective on enterprise Java technologies.
Author: World Health Organization
Publisher: World Health Organization
Release Date: 2014
This is the second edition of the World Health Organization (WHO) handbook on the safe, sustainable and affordable management of health-care waste - commonly known as "the Blue Book". The original Blue Book was a comprehensive publication used widely in health-care centres and government agencies to assist in the adoption of national guidance. It also provided support to committed medical directors and managers to make improvements and presented practical information on waste-management techniques for medical staff and waste workers. In many countries, knowledge about the potential for harm from health-care wastes has now become more prominent to governments, medical practitioners and civil society. Increasingly, managers and medical staff are expected to take more responsibility for the wastes they produce from their medical care and related activities. The indiscriminate and erratic handling and disposal of waste within health-care facilities is now widely recognized as a source of avoidable infection, and is synonymous with public perception of poor standards of health care.
Author: Rod Johnson
Publisher: John Wiley & Sons
Release Date: 2004-08-04
What is this book about? The results of using J2EE in practice are often disappointing: applications are often slow, unduly complex, and take too long to develop. Rod Johnson believes that the problem lies not in J2EE itself, but in that it is often used badly. Many J2EE publications advocate approaches that, while fine in theory, often fail in reality, or deliver no real business value. Expert One-on-One: J2EE Design and Development aims to demystify J2EE development. Using a practical focus, it shows how to use J2EE technologies to reduce, rather than increase, complexity. Rod draws on his experience of designing successful high-volume J2EE applications and salvaging failing projects, as well as intimate knowledge of the J2EE specifications, to offer a real-world, how-to guide on how you too can make J2EE work in practice. It will help you to solve common problems with J2EE and avoid the expensive mistakes often made in J2EE projects. It will guide you through the complexity of the J2EE services and APIs to enable you to build the simplest possible solution, on time and on budget. Rod takes a practical, pragmatic approach, questioning J2EE orthodoxy where it has failed to deliver results in practice and instead suggesting effective, proven approaches. What does this book cover? In this book, you will learn When to use a distributed architecture When and how to use EJB How to develop an efficient data access strategy How to design a clean and maintainable web interface How to design J2EE applications for performance Who is this book for? This book would be of value to most enterprise developers. Although some of the discussion (for example, on performance and scalability) would be most relevant to architects and lead developers, the practical focus would make it useful to anyone with some familiarity with J2EE. Because of the complete design-deployment coverage, a less advanced developer could work through the book along with a more introductory text, and successfully build and understand the sample application. This comprehensive coverage would also be useful to developers in smaller organisations, who might be called upon to fill several normally distinct roles. What is special about this book? Wondering what differentiates this book from others like it in the market? Take a look: It does not just discuss technology, but stress its practical application. The book is driven from the need to solve common tasks, rather than by the elements of J2EE. It discuss risks in J2EE development It takes the reader through the entire design, development and build process of a non-trivial application. This wouldn't be compressed into one or two chapters, like the Java Pet Store, but would be a realistic example comparable to the complexity of applications readers would need to build. At each point in the design, alternative choices would be discussed. This would be important both where there's a real problem with the obvious alternative, and where the obvious alternatives are perhaps equally valid. It emphasizes the use of OO design and design patterns in J2EE, without becoming a theoretical book
Author: Elie Wiesel
Publisher: Hill and Wang
Release Date: 2012-02-07
Genre: Biography & Autobiography
A New Translation From The French By Marion Wiesel Night is Elie Wiesel's masterpiece, a candid, horrific, and deeply poignant autobiographical account of his survival as a teenager in the Nazi death camps. This new translation by Marion Wiesel, Elie's wife and frequent translator, presents this seminal memoir in the language and spirit truest to the author's original intent. And in a substantive new preface, Elie reflects on the enduring importance of Night and his lifelong, passionate dedication to ensuring that the world never forgets man's capacity for inhumanity to man. Night offers much more than a litany of the daily terrors, everyday perversions, and rampant sadism at Auschwitz and Buchenwald; it also eloquently addresses many of the philosophical as well as personal questions implicit in any serious consideration of what the Holocaust was, what it meant, and what its legacy is and will be.
Enterprise Integration Patterns provides an invaluable catalog of sixty-five patterns, with real-world solutions that demonstrate the formidable of messaging and help you to design effective messaging solutions for your enterprise. The authors also include examples covering a variety of different integration technologies, such as JMS, MSMQ, TIBCO ActiveEnterprise, Microsoft BizTalk, SOAP, and XSL. A case study describing a bond trading system illustrates the patterns in practice, and the book offers a look at emerging standards, as well as insights into what the future of enterprise integration might hold. This book provides a consistent vocabulary and visual notation framework to describe large-scale integration solutions across many technologies. It also explores in detail the advantages and limitations of asynchronous messaging architectures. The authors present practical advice on designing code that connects an application to a messaging system, and provide extensive information to help you determine when to send a message, how to route it to the proper destination, and how to monitor the health of a messaging system. If you want to know how to manage, monitor, and maintain a messaging system once it is in use, get this book.
Author: Peter Kim
Release Date: 2015-06-20
Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style "plays," this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing-including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software. From "Pregame" research to "The Drive" and "The Lateral Pass," the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code. Whether you're downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker's library-so there's no reason not to get in the game.
This book follows a Cookbook style and is packed with intermediate and advanced level recipes.This book is for Java developers who have an interest in discovering new ways to quickly get the job done using a new language that shares many similarities with Java. The book's recipes start simple, therefore no previous Groovy experience is required to understand the code and the explanations accompanying the examples.