- Table View
- List View
Complete guide to using Red Hat Linux
Installation manual for Red Hat Linux 9
With new data stores making their way onto the market, it's necessary for businesses to understand the features and techniques to use data stores most effectively. Redis Applied Design Patterns is designed to guide you into the world of Redis and will help you understand how business problems can be solved using Redis in your application stack. This book introduces you to the NoSQL way of thinking and how it is different from SQL. It helps you understand various functionality of Redis through a series of use cases designed for you to learn the more complex and less well-known features of Redis in an incremental way. By the time you've read this book, you will be capable of designing a system using Redis. This book will guide you through various use cases along with code samples, easy-to-understand diagrams, and tips to help you take advantage of Redis. The book explains the benefits of adding Redis to the application stack and discusses various practical use cases for Redis such as the caching system, commenting system, and social networking.
Refactoring in Ruby gives you all the realistic, hands-on practice you need to refactor Ruby code quickly and effectively and shows when and how to refactor with both legacy code and during new test-driven development.
<p>Avoid misunderstandings that can affect the design, programming, and use of database systems. Whether you're using Oracle, DB2, SQL Server, MySQL, or PostgreSQL, <i>The Relational Database Dictionary</i> will prevent confusion about the precise meaning of database-related terms (e.g., attribute, 3NF, one-to-many correspondence, predicate, repeating group, join dependency), helping to ensure the success of your database projects. Carefully reviewed for clarity, accuracy, and completeness, this authoritative and comprehensive quick-reference contains more than 600 terms, many with examples, covering issues and concepts arising from the relational model of data.</p>
Remote studies allow you to recruit subjects quickly, cheaply, and immediately, and give you the opportunity to observe users as they behave naturally in their on environment. In Remote Research, Nate Bolt and Tony Tulathimutte teach you how to design and conduct remote research studies, top to bottom, with little more than a phone and a laptop.
In making decisions, we often seek advice. Online, we check Amazon recommendations, eBay vendors' histories, TripAdvisor ratings, and even our elected representatives' voting records. These online reputation systems serve as filters for information overload. In this book, experts discuss the benefits and risks of such online tools. The contributors offer expert perspectives that range from philanthropy and open access to science and law, addressing reputation and reputation systems in theory and practice. Properly designed reputation systems, they argue, have the potential to create a "reputation society," reshaping society for the better by promoting accountability through the mediated judgments of billions of people. Effective design can also steer systems away from the pitfalls of online opinion sharing by motivating truth-telling, protecting personal privacy, and discouraging digital vigilantism.
In practice, requirements engineering tasks become more and more complex. In order to ensure a high level of knowledge and training, the International Requirements Engineering Board (IREB) worked out the training concept "Certified Professional for Requirements Engineering", which defines a requirements engineer's practical skills on different training levels. The book covers the different subjects of the curriculum for the "Certified Professional for Requirements Engineering" (CPRE) defined by the International Requirements Engineering Board (IREB). It supports its readers in preparing for the test to achieve the "Foundation Level" of the CPRE.
A comprehensive research guide for both quantitative and qualitative research methods Written by a team of authorities in human-computer interaction (HCI) and usability, this pedagogical guide walks you through the methods used in HCI and examines what are considered to be appropriate research practices in the field. Featuring a plethora of real-world examples throughout, you'll discover how these methods have been used in HCI research so that you can gain a stronger understanding of the subject matter. Serves as an authoritative, comprehensive resource on all things related to research methods in human-computer interaction Addresses experimental research and design methods, statistical analysis, and time diaries Shares authentic case studies, interviews, and focus group experiences Reviews analyzing qualitative data, working with human subjects, handling automated computer data collection methods, and more If you are looking for a detailed, no-nonsense resource that offers in-depth coverage of HCI methods, then this is the book for you.
Because of the dynamic nature of the Internet, any web addresses or links contained in this book may have changed since publication and may no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect the views of the publisher, and the publisher hereby disclaims any responsibility for them.
In this analysis of the increasingly violent and uncreative video gaming industry, author Rusel DeMaria offers a road map for parents, educators, gamers, and industry insiders to leverage the inherent potential of games to promote positive personal and social change.
The RESI Basic Lab Guide provides an excellent hands-on component to emphasize the theoretical materials provided in the RESI Basic Concepts and Practices Training Guide. Applying chapter concepts developed in the textbook to these lab exercises is crucial in preparing for a successful career as a computer technician.
Real-time systems and networks are of increasing importance in many applications, including automated factories, telecommunication systems, defense systems, and space systems. This book introduces the concepts and state-of-the-art research developments of resource management in real-time systems and networks. Unlike other texts in the field, it covers the entire spectrum of issues in resource management, including task scheduling in uniprocessor real-time systems; task scheduling, fault-tolerant task scheduling, and resource reclaiming in multiprocessor real-time systems; conventional task scheduling and object-based task scheduling in distributed real-time systems; message scheduling; QoS routing; dependable communication; multicast communication; and medium access protocols in real-time networks. It provides algorithmic treatments for all of the issues addressed, highlighting the intuition behind each algorithm and giving examples. The book also includes two chapters of case studies.
Get the jump on the competition with the first book that tells you how to create a resume that takes advantage of today's technology. Say goodbye to ugly, plain text formats and welcome the return of the handsome resume - fully formatted and reader friendly. This newly revised guide shows you how to craft a "Standout" resume that'll get your foot in the door.
Updated to help job seekers take full advantage of the latest Internet trends and technology, this new edition provides detailed instruction on designing a resume for computer networking. Readers will learn to make their resumes scannable and searchable through use of key words. They'll also find advice on using the World Wide Web and a variety of commercial online services to land a job. New in this edition is a chapter containing career resources on the web, and instructions for building a network of contacts using e-mail and newsgroups.
Maybe it was the recent Atari 2600 milestone anniversary that fueled nostalgia for the golden days of computer and console gaming. Every Game Boy must ponder his roots from time to time. But whatever is driving the current retro gaming craze, one thing is certain: classic games are back for a big second act, and they're being played in both old and new ways. Whether you've just been attacked by Space Invaders for the first time or you've been a Pong junkie since puberty, Chris Kohler's Retro Gaming Hacks is the indispensable new guide to playing and hacking classic games. Kohler has complied tons of how-to information on retro gaming that used to take days or weeks of web surfing to track down and sort through, and he presents it in the popular and highly readable Hacks style. Retro Gaming Hacks serves up 85 hard-nosed hacks for reviving the classic games. Want to game on an original system? Kohler shows you how to hack ancient hardware, and includes a primer for home-brewing classic software. Rather adapt today's equipment to run retro games? Kohler provides emulation techniques, complete with instructions for hacking a classic joystick that's compatible with a contemporary computer. This book also teaches readers to revive old machines for the original gaming experience: hook up an Apple II or a Commodore 64, for example, and play it like you played before. A video game journalist and author of Power Up: How Japanese Video Games Gave the World an Extra Life , Kohler has taught the history of video games at Tufts University. In Retro Gaming Hacks , he locates the convergence of classic games and contemporary software, revealing not only how to retrofit classic games for today's systems, but how to find the golden oldies hidden in contemporary programs as well. Whether you're looking to recreate the magic of a Robotron marathon or simply crave a little handheld Donkey Kong, Retro Gaming Hacks shows you how to set the way-back dial.
Throwing light on a dark problem: Parkland Middle School is a place the students call Darkland, because no one in it does much to stop the daily harassment of kids by other kids. Three bullied seventh graders use their smarts to get the better of their tormentors by starting an unofficial e-mail forum at school in which they publicize their experiences. Unexpectedly, lots of other kids come forward to confess their similar troubles, and it becomes clear that the problem at their school is bigger than anyone knew. The school principal wants to clamp down on the operation, which she does when the trio, in their zealousness for revenge, libel a fellow student in what turns out to have been a setup. Now a new plan of attack is needed ... This suspenseful story of computer-era underground rebellion offers fresh perspectives on some of the most enduring themes in fiction for young readers.
There was a time, not too long ago, when the typewriter and notebook ruled, and the computer as an everyday tool was simply a vision. Revolution in the Valley traces this vision back to its earliest roots: the hallways and backrooms of Apple, where the groundbreaking Macintosh computer was born. The book traces the development of the Macintosh, from its inception as an underground skunkworks project in 1979 to its triumphant introduction in 1984 and beyond. The stories in Revolution in the Valley come on extremely good authority. That's because author Andy Hertzfeld was a core member of the team that built the Macintosh system software, and a key creator of the Mac's radically new user interface software. One of the chosen few who worked with the mercurial Steve Jobs, you might call him the ultimate insider. When Revolution in the Valley begins, Hertzfeld is working on Apple's first attempt at a low-cost, consumer-oriented computer: the Apple II. He sees that Steve Jobs is luring some of the company's most brilliant innovators to work on a tiny research effort the Macintosh. Hertzfeld manages to make his way onto the Macintosh research team, and the rest is history. Through lavish illustrations, period photos (many never before published), and Hertzfeld's vivid first-hand accounts, Revolution in the Valley reveals what it was like to be there at the birth of the personal computer revolution. The story comes to life through the book's portrait of the talented and often eccentric characters who made up the Macintosh team. Now, over 20 years later, millions of people are benefiting from the technical achievements of this determined and brilliant group of people.
There was a time, not too long ago, when the typewriter and notebook ruled, and the computer as an everyday tool was simply a vision. Revolution in the Valley traces this vision back to its earliest roots: the hallways and backrooms of Apple, where the groundbreaking Macintosh computer was born. The book traces the development of the Macintosh, from its inception as an underground skunkworks project in 1979 to its triumphant introduction in 1984 and beyond. The stories in Revolution in the Valley come on extremely good authority. That's because author Andy Hertzfeld was a core member of the team that built the Macintosh system software, and a key creator of the Mac's radically new user interface software. One of the chosen few who worked with the mercurial Steve Jobs, you might call him the ultimate insider.
RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. There are several motives for someone wanting to hack an RFID system: For monetary gain. Hacking a store's RFID system would allow a hacker to lower the pricing on any product(s). One could also steal cars (Prius or Lexus already have RFID keys) with RFID-encoded keys. Wreak havoc with someone's supply chain. Malicous/mischievous hackers can delete/alter/modify all identifying information for an entire shipment of products. Protect personal privacy. Privacy advocates fear that RFID tags embedded in products (which continue to transmit information after leaving a store) will be used to track consumer habits. RFID tags are also being tested as a means for identifying individuals on passports, driver's licenses, etc. This also has the ACLU types up in arms because, just like RFID tags in consumer products, these tags would be "always on" and broadcasting your personal information wherever you are.
This first book in Castells' groundbreaking trilogy, with a substantial new preface, highlights the economic and social dynamics of the information age and shows how the network society has now fully risen on a global scale. Groundbreaking volume on the impact of the age of information on all aspects of society Includes coverage of the influence of the internet and the net-economy Describes the accelerating pace of innovation and social transformation Based on research in the USA, Asia, Latin America, and Europe
An accountant's guide to managing control risks In today's networked world, security and risk control are no longer just the province of the IT department. Accountants and other business managers who are responsible for corporate risk management must fully understand the control and security risks that can affect the financial health of the entire organization. Risks,Controls and Security: Concepts and Applications introduces you to today's control risks and how to manage them. Beginning with basic systems controls and security awareness, the book provides you with a clear comprehension of the concepts,issues, and techniques of information security in a networked environment. Moving from theory to application, you'll cover all the key security principles that are applicable to all businesses,including e-businesses: * Enterprise risk management * Control and security frameworks * Basic cryptography and public key infrastructure * Security for operating systems, applications, database management systems, and telecommunications * Network and web security * Policy, regulation, and ethics Real-world problem scenarios and a wealth of pedagogical features--discussion questions, short exercises, example cases, and"concept maps" that help you visualize the material--ensure your confident grasp of the material and enable you to put "security into practice." Designed for practicing professionals as well as for students in accounting, business management, and computer science, Risks,Controls and Security will prepare you well for meeting the challenge of protecting information assets.
Robots today serve in many roles, from entertainer to educator to executioner. As robotics technology advances, ethical concerns become more pressing: Should robots be programmed to follow a code of ethics, if this is even possible? Are there risks in forming emotional bonds with robots? How might society--and ethics--change with robotics? This volume is the first book to bring together prominent scholars and experts from both science and the humanities to explore these and other questions in this emerging field. Starting with an overview of the issues and relevant ethical theories, the topics flow naturally from the possibility of programming robot ethics to the ethical use of military robots in war to legal and policy questions, including liability and privacy concerns. The contributors then turn to human-robot emotional relationships, examining the ethical implications of robots as sexual partners, caregivers, and servants. Finally, they explore the possibility that robots, whether biological-computational hybrids or pure machines, should be given rights or moral consideration. Ethics is often slow to catch up with technological developments. This authoritative and accessible volume fills a gap in both scholarly literature and policy discussion, offering an impressive collection of expert analyses of the most crucial topics in this increasingly important field.
Choice Outstanding Academic Title, 2008. The Robotics Primer offers a broadly accessible introduction to robotics for students at pre-university and university levels, robot hobbyists, and anyone interested in this burgeoning field. The text takes the reader from the most basic concepts (including perception and movement) to the most novel and sophisticated applications and topics (humanoids, shape-shifting robots, space robotics), with an emphasis on what it takes to create autonomous intelligent robot behavior. The core concepts of robotics are carried through from fundamental definitions to more complex explanations, all presented in an engaging, conversational style that will appeal to readers of different backgrounds. The Robotics Primer covers such topics as the definition of robotics, the history of robotics ("Where do Robots Come From?"), robot components, locomotion, manipulation, sensors, control, control architectures, representation, behavior ("Making Your Robot Behave"), navigation, group robotics, learning, and the future of robotics (and its ethical implications). To encourage further engagement, experimentation, and course and lesson design, The Robotics Primer is accompanied by a free robot programming exercise workbook. The Robotics Primer is unique as a principled, pedagogical treatment of the topic that is accessible to a broad audience; the only prerequisites are curiosity and attention. It can be used effectively in an educational setting or more informally for self-instruction. The Robotics Primer is a springboard for readers of all backgrounds--including students taking robotics as an elective outside the major, graduate students preparing to specialize in robotics, and K-12 teachers who bring robotics into their classrooms.
In this how-to companion to "Don't Make Me Think: A Common Sense Approach to Web Usability," Krug spells out an approach to usability testing that anyone can easily apply to their own Web site, application, or other product. This work makes it realistic for teams to test early and often, catching problems while it's still easy to fix them.
Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.
Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.
- Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
- DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
- BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
- MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
- DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.