- Table View
- List View
The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system--including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE--all of it free and open source. SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days--when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system--are prevented on a properly administered SELinux system. The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include: A readable and concrete explanation of SELinux concepts and the SELinux security model Installation instructions for numerous distributions Basic system and user administration A detailed dissection of the SELinux policy language Examples and guidelines for altering and adding policies With SELinux , a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.
Selling the Dream: How to Promote Your Product, Company, or Ideas - And Make A Difference - Using Everyday Evangelismby Guy Kawasaki
Former product manager for Apple Computers, Guy Kawasaki, discusses a new selling technique he names "evangelism."
Selling Used Books Online: The Complete Guide to Bookselling at Amazon's Marketplace and Other Online Sitesby Stephen Windwalker Genevieve Kazdin
Discusses how to get started selling used books online, with an emphasis on amazon.com. Also covers the basics of starting and running a business.
The development of the Semantic Web, with machine-readable content, has the potential to revolutionize the World Wide Web and its use. A Semantic Web Primer provides an introduction and guide to this still emerging field, describing its key ideas, languages, and technologies. Suitable for use as a textbook or for self-study by professionals, it concentrates on undergraduate-level fundamental concepts and techniques that will enable readers to proceed with building applications on their own and includes exercises, project descriptions, and annotated references to relevant online materials. A Semantic Web Primer provides a systematic treatment of the different languages (XML, RDF, OWL, and rules) and technologies (explicit metadata, ontologies, and logic and inference) that are central to Semantic Web development as well as such crucial related topics as ontology engineering and application scenarios. This substantially revised and updated second edition reflects recent developments in the field, covering new application areas and tools. The new material includes a discussion of such topics as SPARQL as the RDF query language; OWL DLP and its interesting practical and theoretical properties; the SWRL language (in the chapter on rules); OWL-S (on which the discussion of Web services is now based). The new final chapter considers the state of the art of the field today, captures ongoing discussions, and outlines the most challenging issues facing the Semantic Web in the future. Supplementary materials, including slides, online versions of many of the code fragments in the book, and links to further reading, can be found at www.semanticwebprimer.org.
The hows and whys of using email, and how to communicate effectively.
The new edition of sendmailhas been completely revised to cover sendmail 8.12--a version with more features and fundamental changes than any previous version of the Unix-based email routing program. Because the latest version of sendmail differs so significantly from earlier versions, a massive rewrite of this best-selling reference was called for. With sendmail, Third Edition in hand, you will be able to configure this challenging but necessary utility for whatever needs your system requires.
A classic O'Reilly title since 1993, sendmail now covers Versions 8.10 through 8.14 of this email routing program, including dozens of new features, options, and macros. This edition also takes a more nuts-and-bolts approach than its predecessors. It includes both an administration handbook and a reference guide that provide you with clear options for installing, configuring and managing sendmail's latest versions and companion programs. The sendmail program has withstood the test of time because of its ability to solve the mail-routing needs of all sites large or small, complex or simple. But it's also difficult to configure and even more difficult to understand. That's why this book has proven valuable since the dawn of email. With it, you will be able to configure the program to meet any need, so that you never again have to call in a sendmail guru to bail you out. sendmail includes the following sections: * Some Basics is especially useful for people new to the program. It covers the basic concepts underlying mail delivery and the roles sendmail plays in that delivery * Administration covers all aspects of handling sendmail, from downloading and installing new releases to managing mailing lists and aliases * Configuration Reference contains a heavily cross-referenced guide for configuring and tuning sendmail. Every arcane detail of sendmail is listed alphabetically * Appendices contain more detail about sendmail than you may ever need This edition also includes new material on SSL and AUTH and a new chapter on Mitlers. If you're interested in what has changed since the last edition, one appendix categorizes the many improvements of sendmail's intervening versions by chapter, complete with references to the appropriate sections and page numbers in the book. With sendmail, system administrators, programmers, network engineers, and even inexperienced users will be able to match this challenging but necessary utility to the needs of their network. This edition also takes a more nuts-and-bolts approach than its predecessors. It includes both an administration handbook and a reference guide that provide you with clear options for installing, configuring and managing sendmail's latest versions and companion programs. The sendmail program has withstood the test of time because of its ability to solve the mail-routing needs of all sites large or small, complex or simple. But it's also difficult to configure and even more difficult to understand. That's why this book has proven valuable since the dawn of email. With it, you will be able to configure the program to meet any need, so that you never again have to call in a sendmail guru to bail you out. sendmail includes the following sections: * Some Basics is especially useful for people new to the program. It covers the basic concepts underlying mail delivery and the roles sendmail plays in that delivery * Administration covers all aspects of handling sendmail, from downloading and installing new releases to managing mailing lists and aliases * Configuration Reference contains a heavily cross-referenced guide for configuring and tuning sendmail. Every arcane detail of sendmail is listed alphabetically * Appendices contain more detail about sendmail than you may ever need This edition also includes new material on SSL and AUTH and a new chapter on Mitlers. If you're interested in what has changed since the last edition, one appendix categorizes the many improvements of sendmail's intervening versions by chapter, complete with references to the appropriate sections and page numbers in the book. With sendmail, system administrators, programmers, network engineers, and even inexperienced users will be able to match this challenging but necessary utility to the needs of their network.
If you had a list of the words used to describe sendmail, they'd probably include reliable, flexible, configurable, complex, monolithic, and daunting. But you're not likely to find the word easy. Even seasoned sendmail pros are sometimes frustrated by the intricacies of sendmail's configuration files. With a little determination and the help of a good reference book, like sendmail , Third Edition, you can master this demanding program. But when there's a significant point release, like sendmail V8.13, where do you turn? An excellent companion to our popular sendmail , Third Edition, the sendmail 8.13 Companion provides a timely way to document the improvements in V8.13 in parallel with its release. The book highlights the important changes in the latest update to sendmail, pointing out not just what is handy or nice to have, but what's critical in getting the best behavior from sendmail. This is especially important now that spam is on the rise, and because mobile technology requires roving laptops to use encrypted connections. Not surprisingly, many of the changes and additions to V8.13 have been driven by the ongoing fight against spam. Anyone concerned about spam--and who isn't?--will benefit greatly by upgrading to V8.13 sendmail. Among its many enhancements, V8.13 includes new routines that support the SPF sending site authentication standard (in the Milter library), simultaneous connection control, high connection rate control, and finer tuning of SASL parameters. The additions to the Milter library, alone, make upgrading worthwhile, but sendmail's connection control makes it a no-brainer. The key to understanding them is the sendmail 8.13 Companion . The book is divided into twenty-five chapters that parallel the chapters in the third edition of the sendmail book. For instance, if you're interested in Options configuration (Chapter 24 in sendmail), you'll turn to Chapter 24 in your companion volume to find out what's new in V8.13. For a simple dot release (8.12 to 8.13), V8.13 sendmail has added more features, options, and fundamental changes than any other single dot release has included. If you need to set up or manage sendmail, you'll want this companion volume close at hand. Even if you aren't ready to upgrade to V8.13, you'll find the key to understanding them is the sendmail 8.13 Companion a useful guide to understanding and staying current with the latest changes in sendmail.
Sequence Analysis in a Nutshell: A Guide to Common Tools and Databasespulls together all of the vital information about the most commonly used databases, analytical tools, and tables used in sequence analysis. The book contains details and examples of the common database formats (GenBank, EMBL, SWISS-PROT) and the GenBank/EMBL/DDBJ Feature Table Definitions. It also provides the command line syntax for popular analysis applications such as Readseq and MEME/MAST, BLAST, ClustalW, and the EMBOSS suite, as wel
Starting where he left off with his "Serious Jazz Practice Book," guitar legend Barry Finnerty has created another woodshed classic for all jazz soloists. Recording artist with Miles Davis, the Brecker Bros., etc., Barry shows how to become a better improviser by melodically mastering the individual chords used in jazz, how they connect with each other, and how they are used in various song forms. Endorsed by Joe Lovano, Hubert Laws, Mark Levine, etc.
All musicians need to thoroughly learn their scales, chords, intervals and various melodic patterns in order to become complete musicians. The question has always been how to approach this universal task. Guitar legend Barry Finnerty (Miles, The Crusaders, Brecker Bros., etc.) provides in this book a rigorous practice regime that will set you well on the road to complete mastery of whatever instrument you play. Endorsed by Randy Brecker, Mark Levine, Dave Liebman, etc.
Service Design is an eminently practical guide to designing services that work for people. It offers powerful insights, methods, and case studies to help you design, implement, and measure multichannel service experiences with greater impact for customers, businesses, and society.
"Is Google making us stupid?" When Nicholas Carr posed that question, in a celebrated Atlantic Monthly cover story, he tapped into a well of anxiety about how the Internet is changing us. He also crystallized one of the most important debates of our time: As we enjoy the Net's bounties, are we sacrificing our ability to read and think deeply?<P><P> Now, Carr expands his argument into the most compelling exploration of the Internet's intellectual and cultural consequences yet published. As he describes how human thought has been shaped through the centuries by "tools of the mind"--from the alphabet to maps, to the printing press, the clock, and the computer--Carr interweaves a fascinating account of recent discoveries in neuroscience by such pioneers as Michael Merzenich and Eric Kandel. Our brains, the historical and scientific evidence reveals, change in response to our experiences. The technologies we use to find, store, and share information can literally reroute our neural pathways.<P> Building on the insights of thinkers from Plato to McLuhan, Carr makes a convincing case that every information technology carries an intellectual ethic--a set of assumptions about the nature of knowledge and intelligence. He explains how the printed book served to focus our attention, promoting deep and creative thought. In stark contrast, the Internet encourages the rapid, distracted sampling of small bits of information from many sources. Its ethic is that of the industrialist, an ethic of speed and efficiency, of optimized production and consumption--and now the Net is remaking us in its own image. We are becoming ever more adept at scanning and skimming, but what we are losing is our capacity for concentration, contemplation, and reflection.<P> Part intellectual history, part popular science, and part cultural criticism, The Shallows sparkles with memorable vignettes--Friedrich Nietzsche wrestling with a typewriter, Sigmund Freud dissecting the brains of sea creatures, Nathaniel Hawthorne contemplating the thunderous approach of a steam locomotive--even as it plumbs profound questions about the state of our modern psyche. This is a book that will forever alter the way we think about media and our minds.
Microsoft's Shared Source CLI (code-named "Rotor") is the publicly available implementation of the ECMA Common Language Infrastructure (CLI) and the ECMA C# language specification. Loaded with three million lines of source code, it presents a wealth of programming language technology that targets developers interested in the internal workings of the Microsoft .NET Framework, academics working with advanced compiler technology, and people developing their own CLI implementations. The CLI, at its heart, is an approach to building software that enables code from many independent sources to co-exist and interoperate safely. Shared Source CLI Essentials is a companion guide to Rotor's code. This concise and insightful volume provides a road map for anyone wishing to navigate, understand, or alter the Shared Source CLI code. This book illustrates the design principles used in the CLI standard and discusses the complexities involved when building virtual machines. Included with the book is a CD-ROM that contains all the source code and files. After introducing the CLI, its core concepts, and the Shared Source CLI implementation, Shared Source CLI Essentials covers these topics: The CLI type system Component packaging and assemblies Type loading and JIT Compilation Managed code and the execution engine Garbage collection and memory management The Platform Adaptation Layer (PAL): a portability layer for Win32Â®, Mac OSÂ® X, and FreeBSD Written by members of the core MicrosoftÂ® team that designed the .NET Framework, Shared Source CLI Essentials is for anyone who wants a deeper understanding of what goes on under the hood of the .NET runtime and the ECMA CLI. Advanced .NET programmers, researchers, the academic community, and CLI implementers who have asked hard questions about the .NET Framework will find that this behind-the-scenes look at the .NET nucleus provides them with excellent resources from which they can extract answers.
For any organization that wants to use Windows SharePoint Services to share and collaborate on Microsoft Office documents, this book shows administrators of all levels how to get up and running with this powerful and popular set of collaboration tools. Microsoft Windows SharePoint Services technology in Office 2007 is an integrated set of services designed to connect people, information, processes, and systems both within and beyond the organizational firewall. SharePoint 2007: The Definitive Guide provides a detailed discussion of all Sharepoint features, applications and extensions. You learn how to build Sharepoint sites and site collections, along with ways to administrate, secure, and extend Sharepoint. This book teaches you how to: * Get up to speed on SharePoint, including ways to create lists, libraries, discussions and surveys * Integrate email, use web parts, track changes with RSS, and use database reporting services * Customize your personal site, create sites and areas, and organize site collections * Integrate with Office applications, including Excel, Word, Outlook, Picture Manager, and InfoPath * Install, deploy, maintain and secure SharePoint * Brand a portal, using your corporate style sheet, designing templates, and building site definitions * Extend SitePoint, such as creating client side and server side web parts, using the SharePoint class library and SharePoint web services Each chapter starts with a "guide" that lets you know what it covers before you dive in. The book also features a detailed reference section that includes information on compatibility, command line utilities, services, and CSS styles. Why wait? Get a hold of SharePoint 2007: The Definitive Guide today!
This straightforward guide shows SharePoint users how to create and use web sites for sharing and collaboration. Learn to use the document and picture libraries for adding and editing content, add discussion boards and surveys, receive alerts when documents and information have been added or changed, and enhance security. Designed to help you find answers quickly, the book shows how to make the most of SharePoint for productivity and collaboration.
A faulty computer chip causes a fatal train accident, sending its manufacturer into a downward spiral. When the chip is traced to sabotage, an FBI agent and a hacker team up to investigate before the next shutdown.
This class-tested learning package provides an introduction to fundamental concepts, specifically discrete-time systems, for beginning engineering students and is widely used as a self-teaching tool to discover more about USP applications, multimedia signals, and MATLAB. Unique features like visual learning demonstrations, MATLAB laboratories, and solved homework problems make this an essential learning tool to master fundamental concepts in today's electrical and computer engineering curricula.
The Silicon Eye: How A Silicon Valley Company Aims to Make All Current Computers, Cameras and Cell Phones Obsoleteby George Gilder
The Silicon Eye is a narrative of some of the smartest - and most colorful - people on earth and their race to transform an entire industry.
Welcome to Silicon Valley -- where fortunes are fast, dating's dysfunctional, and computer geeks rule. Meet Paul Armstrong, a late-twenties computer "consultant" who sits in his cubicle at TeraMemory wondering where it all went horribly wrong. "Well, I wasn't always a nerd. I started out as a liberal-arts type in college -- though I aggressively concealed this on my resume. Hiring managers don't like it. Non-technical outside interests. Bad sign. "Watch him order a latte from the of?ce coffee cart and poke at his Chinese lunch special while his longtime pal Steve Hall, hacker extraordinaire, accuses him of selling out to The Man. "When the money dries up, this place will be just like anywhere else. It was never theplace,anyway -- that's what The Man will never understand. "Meet The Man himself: Barry Dominic, the ?amboyant, lecherous, millionaire founder of TeraMemory. He insists they're poised to revolutionize networking with a cutting-edge technology, appropriately called WHIP. "Nobody fucks with Barry Dominic. "That's where Liz Toulouse comes in. A Stanford English Lit grad and TeraMemory marketing associate, she accidentally cc's the entire company a snide e-mail about The Man's bad grammar on her very ?rst day. . . . "If only I'd had any idea. I'd have stayed in school. I'd have changed majors. Gotten a master's. Anything. "Welcome toSilicon Follies, a hilarious dot. comedy of ambition and disillusionment in a land of luck, loss, and sometimes even love.
<div xmlns="http://www.w3.org/1999/xhtml"><p>Slash the complexity that overwhelms large IT projects\u2014and improve return on investment and increase business agility. Learn a practical methodology for simplifying your IT architecture and improving results from an expert on enterprise architecture.</p></div>
A textbook for the introductory computer science course, using Scheme instead of a more traditional programming language. The primary goal in Parts I-V is preparation for the Scheme-based Structure and Interpretation of Computer Programs, while the focus of Part VI is to connect the course with the kinds of programming used in "real world" application programs like spreadsheets and databases. A PC or Macintosh diskette is available. Annotation c. by Book News, Inc. , Portland, Or.
For over three decades, Ray Kurzweil has been one of the most respected and provocative advocates of the role of technology in our future. In his classic The Age of Spiritual Machines, he argued that computers would soon rival the full range of human intelligence at its best. Now he examines the next step in this inexorable evolutionary process: the union of human and machine, in which the knowledge and skills embedded in our brains will be combined with the vastly greater capacity, speed, and knowledge-sharing ability of our creations.
This story takes place in England, spanning the late 1800s to the not-too-distant future. One layer is the search for the "Skallagrigg", a mythical being known only to institutionalized disabled people. Are Arthur, a lttle boy with cerebral palsy who was left in a grim asylum, and the Skallagrigg merely myth? Read and find out. And then there's Esther Marquand, many years later, who as a woman with spastic cerebral palsy, cannot talk nor move much on her own. Yet she learns computers and writes amazing programming. SDhe goers in search of the Skallagrigg and makes her search into a computer game. Then there are all the other characters, including Tom, the close friend with Downs Syndrome. There are romances and losses. Surprises. Tears of sadness and joy. This is a good clean copy, I have verified accuracy with another person against the print book, but I'm not sure how screenreaders will come through on some of the phonetic disabled speech.
Solving cold cases from the comfort of your living room...<P> The Skeleton Crew provides an entree into the gritty and tumultuous world of Sherlock Holmes-wannabes who race to beat out law enforcement--and one another--at matching missing persons with unidentified remains.<P> In America today, upwards of forty thousand people are dead and unaccounted for. These murder, suicide, and accident victims, separated from their names, are being adopted by the bizarre online world of amateur sleuths.<P> It's DIY CSI.<P> The web sleuths pore over facial reconstructions (a sort of Facebook for the dead) and other online clues as they vie to solve cold cases and tally up personal scorecards of dead bodies. The Skeleton Crew delves into the macabre underside of the Internet, the fleeting nature of identity, and how even the most ordinary citizen with a laptop and a knack for puzzles can reinvent herself as a web sleuth.