- Table View
- List View
Fundamentally, computers just deal with numbers. They store letters and other characters by assigning a number for each one. There are hundreds of different encoding systems for mapping characters to numbers, but Unicode promises a single mapping. Unicode enables a single software product or website to be targeted across multiple platforms, languages and countries without re-engineering. It's no wonder that industry giants like Apple, Hewlett-Packard, IBM andMicrosoft have all adopted Unicode. Containing everything you need to understand Unicode, this comprehensive reference from O'Reilly takes you on a detailed guide through the complex character world. For starters, it explains how to identify and classify characters - whether they're common, uncommon, or exotic. It then shows you how to type them, utilize their properties, and process character data in a robust manner. The book is broken up into three distinct parts. The first few chapters provide you with a tutorial presentation of Unicode and character data. It gives you a firm grasp of the terminology you need to reference various components, including character sets, fonts and encodings, glyphs and character repertoires. The middle section offers more detailed information about using Unicode and other character codes. It explains the principles and methods of defining character codes, describes some of the widely used codes, and presents code conversion techniques. It also discusses properties of characters, collation and sorting, line breaking rules and Unicode encodings. The final four chapters cover more advanced material, such as programming to support Unicode. You simply can't afford to be without the nuggets of valuable information detailed in Unicode Explained .
This guide provides a complete overview of all facets of Unix backup and recovery and offers practical, affordable backup and recovery solutions for environments of all sizes and budgets. It explains everything from freely available backup systems to large-scale commercial utilities.
<p>This quick reference has been reworked to present you with the current state of Unix. Featuring chapter overviews, in-depth command coverage, and specific examples, it's the perfect supplement for Unix users and programmers. New topics include package management programs, source code management systems, and the Solaris 10, GNU/Linux, and Mac OS X systems.</p>
The bestselling, most informative Unix reference book is now more complete and up to date. Not a scaled-down quick reference of common commands, UNIX in a Nutshell is a complete reference containing all commands and options, with descriptions and examples that put the commands in context. For all but the thorniest Unix problems, this one reference should be all you need. Covers System V Release 4 and Solaris 7.
The latest edition of this best-selling favorite is loaded with vital information on Linux, Darwin, and BSD. Unix Power Tools 3rd Edition now offers more coverage of bash, zsh, and other new shells, along with discussions about modern utilities and applications. Several sections focus on security and Internet access. There is a new chapter on access to Unix from Windows, and expanded coverage of software installation and packaging, as well as basic information on Perl and Python.
The information technology revolution is transforming almost every aspect of society, but girls and women are largely out of the loop. Although women surf the Web in equal numbers to men and make a majority of online purchases, few are involved in the design and creation of new technology. It is mostly men whose perspectives and priorities inform the development of computing innovations and who reap the lion's share of the financial rewards. As only a small fraction of high school and college computer science students are female, the field is likely to remain a "male clubhouse," absent major changes. In Unlocking the Clubhouse, social scientist Jane Margolis and computer scientist and educator Allan Fisher examine the many influences contributing to the gender gap in computing. The book is based on interviews with more than 100 computer science students of both sexes from Carnegie Mellon University, a major center of computer science research, over a period of four years, as well as classroom observations and conversations with hundreds of college and high school faculty.
As thinking, writing, and gossip increasingly take place in cyberspace, the part of our life that can be monitored and searched has vastly expanded. E-mail, even after it is deleted, becomes a permanent record that can be resurrected by employers or prosecutors at any point in the future. On the Internet, every website we visit, every store we browse in, every magazine we skim--and the amount of time we skim it--create electronic footprints that can be traced back to us, revealing detailed patterns about our tastes, preferences, and intimate thoughts. In this pathbreaking book, Jeffrey Rosen explores the legal, technological, and cultural changes that have undermined our ability to control how much personal information about ourselves is communicated to others, and he proposes ways of reconstructing some of the zones of privacy that law and technology have been allowed to invade. In the eighteenth century, when the Bill of Rights was drafted, the spectacle of state agents breaking into a citizen's home and rummaging through his or her private diaries was considered the paradigm case of an unconstitutional search and seizure. But during the impeachment of President Bill Clinton, prosecutors were able to subpoena Monica Lewinsky's bookstore receipts and to retrieve unsent love letters from her home computer. And the sense of violation that Monica Lewinsky experienced is not unique. In a world in which everything that Americans read, write, and buy can be recorded and monitored in cyberspace, there is a growing danger that intimate personal information originally disclosed only to our friends and colleagues may be exposed to--and misinterpreted by--a less understanding audience of strangers. Privacy is important, Rosen argues, because it protects us from being judged out of context in a world of short attention spans, a world in which isolated bits of intimate information can be confused with genuine knowledge. Rosen also examines the expansion of sexual-harassment law that has given employers an incentive to monitor our e-mail, Internet browsing habits, and office romances. And he suggests that some forms of offensive speech in the workplace--including the indignities allegedly suffered by Paula Jones and Anita Hill--are better conceived of as invasions of privacy than as examples of sex discrimination. Combining discussions of current events--from Kenneth Starr's tapes to DoubleClick's on-line profiles--with inno-vative legal and cultural analysis, The Unwanted Gaze offers a powerful challenge to Americans to be proactive in the face of new threats to privacy in the twenty-first century.From the Hardcover edition.
This new book is targeted toward PHP developers who are already familiar with PHP 4. Upgrading to PHP 5 offers a concise appraisal of the differences between PHP 4 and PHP 5, a detailed look at what's new in this latest version, and an explanation of how these changes affect you. The book also covers more advanced features and provides hands-on experienced through short, sample programs included throughout.
This book contains topics on Computer Architecture and Circuit Design, Introduction to Database Concepts, Computer Graphics, Programming Language Concepts, Data Communication and Networking, Data Structures and Algorithms, Object-oriented Analysis and Design, System Analysis and Designing, Operating System Concepts and Artificial Intelligence. Objective Questions and Syllabus are addition features of this book.
[From the book jacket] An All-Access Pass to the Populist Insurrection Brewing Across the Country Job outsourcing. Perpetual busy signals at government agencies. Slashed paychecks. Stolen elections. A war without end, fatally mismanaged. Ordinary Americans on both the Right and Left are tired of being disenfranchised by corrupt politicians of both parties and are organizing to change the status quo. In his invigorating new book, David Sirota investigates whether this uprising can be transformed into a unified, lasting political movement. Throughout the course of American history, uprisings like the one we are seeing now have given birth to powerful movements to end wars, protect workers, and expand civil rights, so the prospect of today's uprising turning into a full- fledged populist movement terrifies Wall Street and Washington. In The Uprising, Sirota takes us far from the national media spotlight into the trenches where real change is happening - from the headquarters of the most powerful third party in America to the bowels of the U.S. Senate; from the auditorium of an ExxonMobil shareholder meeting to the quasi-military staging area of a vigilante force on the Mexican border. This is vital, on-the-ground reporting that immerses us in the tumultuous give-and-take of politics at its most personal. Sirota also offers a biting critique of our politics. He shows how the uprising is, at its core, a reaction to faux "bipartisanship" in the nation's capital - the "bipartisanship" whereby Republican and Democratic lawmakers join together in putting the agenda of corporate interests above all those of ordinary citizens. Ultimately, Sirota reminds us that the Declaration of Independence, "America's original uprising manifesto," says that governments "derive their powers from the consent of the governed." Irreverent and insightful, The Uprising shows how the governed have stopped consenting and have started taking action.
ClickOnce, a new technology in Visual Studio 2005, lets you quickly and easily deploy your Windows apps via web servers, file servers, or even CDs. But while ClickOnce delivers web-style deployment of your application, that's only part of the story. Once you've installed an application using ClickOnce, it can automatically check for new updates to the application, which saves time in application maintenance and upgrades. And on the security front, a ClickOnce application runs within a secure sandbox and you configure it using the Code Access Security model. So, how can you take advantage of this new technology? In this step-by-step guide to using ClickOnce, you'll learn how to create an application in Visual Studio 2005 and how to use ClickOnce to quickly get it in the hands of your customers. You'll also learn how to add security to your distributions using Code Access Security; how to update COM files without corrupting DLLs; and more.
Presents a theoretical model for examining technology through a user perspective. Begins with a historical overview of the problem of technology use through the lens of rhetoric theory, and defines central areas of user-centered theory, such as user knowledge, human-technology interaction, and technological determinism. Draws also from human factors engineering, history, philosophy, and sociology to discuss ideological presuppositions of technology design and technological determinism. Ideas are applied in academic and nonacademic contexts. Annotation copyrighted by Book News, Inc., Portland, OR
This guide describes user stories and explains how they can be used to articulate customer programming needs. It highlights both successful and unsuccessful implementations of the concept, and discusses its application for planning, managing, and testing software development projects. Cohn is a programmer and software project manager. Annotation ©2004 Book News, Inc., Portland, OR (booknews.com)
Developed by an extremely active open source community, Moodle is a sophisticated course management system that's ideal for creating dynamic online learning communities and for supplementing face-to-face learning. Used in more than 115 countries and supporting over 60 languages, Moodle can scale from a single-teacher site to a 40,000- student university. Teachers who use Moodle have access to an array of powerful tools such as assignments, forums, journals, quizzes, surveys, chat rooms, and workshops. Using Moodle is a comprehensive, hands-on guide that explains how the system works, with plenty of examples and best practices for its many features and plug-in modules. Authored by a member of the Moodle community, this authoritative book also exposes little-known but powerful hacks for more technically savvy users. For anyone who is using-or thinking of using-this CMS, Using Moodle is required reading.
Using Moodle is a complete, hands-on guide for instructors learning how to use Moodle, the popular course management system (CMS) that enables remote web-based learning and supplements traditional classroom learning. Updated for the latest version, this new edition explains exactly how Moodle works by offering plenty of examples, screenshots and best practices for its many features and plug-in modules. Moodle gives teachers and trainers a powerful set of web-based tools for a flexible array of activities, including assignments, forums, journals, quizzes, surveys, chat rooms, and workshops. This book is not just a how-to manual. Every chapter includes suggestions and case studies for using Moodle effectively. By itself, Moodle won't make your course better. Only by applying effective educational practices can you truly leverage its power. With this book, you will: Get a complete overview CMS in general and Moodle in particular. Review Moodle's basic interface and learn to start a course. Learn to add Moodle tools to your course, and how different tools allow you to give quizzes and assignments, write journals, create pathed lessons, collaboratively develop documents, and record student grades. Discover some of the creative ways teachers have used Moodle. There are plenty of ideas for effectively using each tool. Effectively manage your Moodle course, such as adding and removing users, and creating user groups. Learn to use Moodle's built-in survey functions for assessing your class. Find out how to administer an entire Moodle site. A system administrator usually handles these functions, but if you're on your own, there's a lot of power behind the curtain. Using Moodle is both a guide and a reference manual for this incredibly powerful and flexible CMS. Authored by the Moodle community, this authoritative book also exposes little known but powerful hacks for more technically savvy users, and includes coverage of blogs, RSS, databases, and more. For anyone who is using, or thinking of using, this CMS, Using Moodle is required reading.
This book provides a hands-on approach that covers all aspects of working with SQL Servers must-have resource for serious database users!
This book should provide an excellent introduction to beginners, and the performance section should help those with some experience who want to push OpenMP to its limits.
Using Samba, Second Edition is a comprehensive guide to Samba administration. This new edition covers all versions of Samba from 2.0 to 2.2, including selected features from an alpha version of 3.0, as well as the SWAT graphical configuration tool. Updated for Windows 2000, ME, and XP, the book also explores Samba's new role as a primary domain controller and domain member server, its support for the use of Windows NT/2000/XP authentication and filesystem security on the host Unix system, and accessing shar
This book is the comprehensive guide to Samba administration, officially adopted by the Samba Team. Wondering how to integrate Samba's authentication with that of a Windows domain? How to get Samba to serve Microsoft Dfs shares? How to share files on Mac OS X? These and a dozen other issues of interest to system administrators are covered. A whole chapter is dedicated to troubleshooting! The range of this book knows few bounds. Using Samba takes you from basic installation and configuration -- on both the client and server side, for a wide range of systems -- to subtle details of security, cross-platform compatibility, and resource discovery that make the difference between whether users see the folder they expect or a cryptic error message. Integration with Active Directory and OpenLDAP Migrating from Windows NT 4.0 domains to Samba Delegating administrative tasks to non-root users Central printer management Advanced file serving features, such as making use of Virtual File System (VFS) plugins. Samba is a cross-platform triumph: robust, flexible and fast, it turns a Unix or Linux system into a file and print server for Microsoft Windows network clients. This book will help you make your file and print sharing as powerful and efficient as possible. The authors delve into the internals of the Windows activities and protocols to an unprecedented degree, explaining the strengths and weaknesses of each feature in Windows domains and in Samba itself. Whether you're playing on your personal computer or an enterprise network, on one note or a full three-octave range, Using Samba will give you an efficient and secure server. The current edition covers such advanced 3.x features as:
Application developers, take note: databases aren't just for the IS group any more. You can build database-backed applications for the desktop, Web, embedded systems, or operating systems without linking to heavy-duty client-server databases such as Oracle and MySQL. This book shows you how to use SQLite, a small and lightweight relational database engine that you can build directly into your application. With SQLite, you'll discover how to develop a database-backed application that remains manageable in size and complexity. This book guides you every step of the way. You'll get a crash course in data modeling, become familiar with SQLite's dialect of the SQL database language, and much more. Learn how to maintain localized storage in a single file that requires no configuration Build your own SQLite library or use a precompiled distribution in your application Get a primer on SQL, and learn how to use several language functions and extensions Work with SQLite using a scripting language or a C-based language such as C# or Objective-C Understand the basics of database design, and learn how to transfer what you already know to SQLite Take advantage of virtual tables and modules "Complex SQL concepts explained clearly." --D. Richard Hipp, creator of SQLite
Computers can help teachers accomplish many of their tasks more efficiently and effectively, but how can a time-strapped teacher determine which pieces of technology are likely to be most helpful? This easy-to-read book offers useful guidance for real-world situations. Organized around specific instructional goals (improving student writing, promoting collaborative learning) and commonly encountered tasks (communicating with students between class, distributing course materials), the book shows teachers at all instructional levels when and how technology can help them meet everyday challenges. Written in an anecdotal, non-technical style, the book and its accompanying CD-ROM cover how to use technology to: communicate with students distribute course materials promote collaborative learning learn through experience clarify course objectives improve student writing develop student research skills use assessment and feedback collect course materials identify plagiarism and more Teachers looking for tools to help them work better and more quickly will welcome this invaluable guide to the technology that will expedite their search.
This is a windows 98 tutorial filled with tips and tricks. Its goal is to get you up and running with Windows 98 as quickly and easily as possible.
User Experience (UX) humanizes usability, looking past the efficiency of tasks by examining feelings, emotions, motivations and values. This bibliography is your user experience roadmap. We have curated the most prolific books on the subject and organized them chronologically, based upon how most UX projects unfold. You will start by learning the fundamentals of user experience. You will then learn about gathering business objectives, researching the user, understanding the user, organizing information, designing interfaces and interactions, using common reusable UX patterns, building prototypes, developing a content strategy, optimizing for mobile and search, performing usability tests, analyzing data and finally what it's like to work in the UX field.
VB.NET Core Classes in a Nutshell, provides a concise and thorough reference to the types found in the core namespaces of the .NET Framework Class Library. A companion to VB.NET Language in a Nutshell, this is a reference that VB.NET programmers will turn to repeatedly. Due to a special partnership between O'Reilly and Microsoft, this book also includes a CD that integrates the book's reference into Visual Studio .NET.
Select your download format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. For more details, visit the Formats page under the Getting Started tab.See and hear words read aloud
- DAISY Text - See words on the screen and hear words being read aloud with the text-to-speech voice installed on your reading tool. Navigate by page, chapter, section, and more. Can also be used in audio-only mode. Compatible with many reading tools, including Bookshare’s free reading tools.
- DAISY Text with Images - Similar to DAISY Text with the addition of images within the Text. Your reading tool must support images.
- Read Now with Bookshare Web Reader - Read and see images directly from your Internet browser without downloading! Text-to-speech voicing and word highlighting are available on Google Chrome (extension installation required). Other browsers can be used with limited features. Learn more
- DAISY Audio - Listen to books in audio-only mode with the high-quality Kendra voice by Ivona pre-installed. Navigate by page, chapter, section, and more. Must be used with a DAISY Audio compatible reading tool.
- MP3 - Listen to books in audio-only mode with the high-quality Kendra voice by Ivona pre-installed. Navigate using tracks. Can be used with any MP3 player.
- BRF (Braille Ready Format) - Read with any BRF compatible refreshable braille display; navigate using the search or find feature.
- DAISY Text - Read with any DAISY 3.0 compatible refreshable braille display, navigate by page, chapter, section, and more.
- Embossed Braille - Use Bookshare’s DAISY Text or BRF formats to generate embossed braille.