- Table View
- List View
Voice typing is transforming the way people work, write, and enter data. With Voice X Press for the Office Professional, your students can learn the most effective way to use this new software and be able to apply it to the various office applications. This book takes students step-by-step through the speech learning process, providing tips and advice along the way.
This book contains step-by-step activities that help users master the techniques and extra reinforcement activities that provide enrichment opportunities. Appendices on using the software with Word and WordPerfect are included. Natural language commands are emphasized throughout the text.
More than sixty percent of today's email traffic is spam, according to email filtering firm Brightmail. This year alone, five trillion spam messages will clog Internet users in-boxes, costing society an estimated $10-billion in lost productivity, filtering software, and other expenses. Spam Kings: The Real Story behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements is the first book to expose the shadowy world of the people responsible for the junk email problem. Author and veteran investigative journalist Brian S. McWilliams delivers a compelling account of the cat-and-mouse game played by spam entrepreneurs in search of easy fortunes and those who are trying to stop them. Spam Kings chronicles the evolution of Davis Wolfgang Hawke, a notorious neo-Nazi leader (Jewish-born) who got into junk email in 1999. Using Hawke as a case study, Spam Kings traces the twenty-year-old neophyte's rise in the spam trade to his emergence as a major player in the lucrative penis pill market--a business that would eventually make him a millionaire and the target of lawsuits from AOL and others. Spam Kings also tells the parallel story of Susan Gunn, a computer novice in California who is reluctantly drawn into the spam wars and eventually joins a group of anti-spam activists. Her volunteer sleuth work puts her on a collision course with Hawke and other spammers, who try to wreak revenge on the antis. You'll also meet other cyber-vigilantes who have taken up the fight against spammers as well as the cast of quirky characters who comprise Hawke's business associates. The book sheds light on the technical sleight-of-hand--forged headers, open relays, harvesting tools, and bulletproof hosting--and other sleazy business practices that spammers use; the work of top anti-spam attorneys; the surprising new partnership developing between spammers and computer hackers; and the rise of a new breed of computer viruses designed to turn the PCs of innocent bystanders into secret spam factories.
Sys admins can field scores of complaints and spend months testing software suites that turn out to be too aggressive, too passive, or too complicated to setup only to discover that SpamAssassin (SA), the leading open source spam-fighting tool, is free, flexible, powerful, highly-regarded, and remarkably effective. The drawback? Until now, it was SpamAssassin's lack of published documentation. This clear, concise new guide provides the expertise you need to take back your inbox. "Detailed, accurate and informative--recommended for spam-filtering beginners and experts alike." --Justin Mason, SpamAssassin development team
Featuring comprehensive, up-to-date instruction on HTML, web page creation, and new programming techniques and technologies, a book and software package covers graphics, style sheets, form layout and design, and creating Java applets.
This book collects essays on this topic by leading analysts of telecommunications and the European auction experience, all but one presented at a November 2001 CESifo conference; comments and responses are included as well, to preserve some of the controversy .
Written for developers, researchers, technical assistants, librarians, and power users, Spidering Hacks provides expert tips on spidering and scraping methodologies. You'll begin with a crash course in spidering concepts, tools (Perl, LWP, out-of-the-box utilities), and ethics (how to know when you've gone too far: what's acceptable and unacceptable). Next, you'll collect media files and data from databases. Then you'll learn how to interpret and understand the data, repurpose it for use in other applications, and even build authorized interfaces to integrate the data into your own content.
The rate at which technology is changing our world--not just on a global level like space travel and instant worldwide communications but on the level of what we choose to wear, where we live, and what we eat--is staggeringly fast and getting faster all the time. The rate of change has become so fast that a concept that started off sounding like science fiction has become a widely expected outcome in the near future--a singularity referred to as the Spike. At that point of singularity, the cumulative changes on all fronts will affect the existence of humanity as a species and cause a leap of evolution into a new state of being. On the other side of that divide, intelligence will be freed from the constraints of the flesh; machines will achieve a level of intelligence in excess of our own and boundless in its ultimate potential; engineering will take place at the level of molecular reconstruction, which will allow everything from food to building materials to be assembled as needed from microscopic components rather than grown or manufactured; we'll all become, effectively immortal by either digitizing and uploading our minds into organic machines or by transforming our bodies into illness-free, undecaying exemplars of permanent health and vitality. The results of all these changes will be unimaginable social dislocation, a complete restructuring of human society, and a great leap forward into a dazzlingly transcendent future that even SF writers have been too timid to imagine.
This practical text is a perfect fit for introductory engineering courses by successfully combining an introduction to Excel fundamentals with a clear presentation on how Excel can be used to solve common engineering problems. Updated to ensure compatibility with Excel 2007,Spreadsheet Tools for Engineers Using Excel 2007provides beginning engineering students with a strong foundation in problem solving using Excel as the modern day equivalent of the slide rule. As part of McGraw-Hill's BEST series for freshman engineering curricula, this text is particularly geared toward introductory students. The author provides plenty of background information on technical terms, and provides numerous examples illustrating both traditional and spreadsheet solutions for a variety of engineering problems. The first three chapters introduce the basics of problem solving and Excel fundamentals. Beyond that, the chapters are largely independent of one another. Topics covered include graphing data, unit conversions, data analysis, interpolation and curve fitting, solving equations, evaluating integrals, creating macros, and comparing economic alternatives.
A supplementary textbook for a graduate or undergraduate introductory course in research methods or statistics in the behavioral sciences or education. Morgan (education and human development, Colorado State U.), Orlando V. Griego (business and management, Azusa Pacific U.), and Gene W. Gloeckner (education, Colorado State U.) help students learn how to analyze and interpret research data using the Statistical Products and Service Solutions statistical software package in a Microsoft Windows environment. No background in statistics is assumed. The disk contains data files for the laboratory exercises. Annotation c. Book News, Inc., Portland, OR (booknews.com)
After twelve years of teaching SPSS, SPSSx, and SPSS/PC+, I am convinced that SPSS/PC+ is not easy for the average college student to learn. I am also convinced that it is not easy to teach from the program manuals. Students who are experienced with statistics and programming or students with a high aptitude for this type of work will learn SPSS/PC+ easily. The rest suffer. Typically, my students have scant training in statistics or programming. Often they are not comfortable with mathematics, computers, and "that sort of thing." I wrote SPSS/PC+ Made Simple to help these students and their instructors
This guide book provides a reference source to enable students not only to navigate but understand statistical analysis performed in and output produced by SPSS.
In this fully revised edition of her bestselling text, Julie Pallant guides you through the entire research process, helping you choose the right data analysis technique for your project. From the formulation of research questions, to the design of the study and analysis of data, to reporting the results, Julie discusses basic and advanced statistical techniques. She outlines each technique clearly, with step-by-step procedures for performing the analysis, a detailed guide to interpreting SPSS output and an example of how to present the results in a report. For both beginners and experienced SPSS users in psychology, sociology, health sciences, medicine, education, business and related disciplines, the SPSS Survival Manual is an essential guide. Illustrated with screen grabs, examples of output and tips, it is supported by a website with sample data and guidelines on report writing. In this third edition all chapters have been updated to accommodate changes to SPSS procedures, screens and output in version 15. A new flowchart is included for SPSS procedures, and factor analysis procedures have been streamlined. It also includes more examples and material on syntax. Additional data files are available on the book's supporting website.
Whether you're running Access, MySQL, SQL Server, Oracle, or PostgreSQL, this book will help you push the limits of traditional SQL to squeeze data effectively from your database. The book offers 100 hacks -- unique tips and tools -- that bring you the knowledge of experts who apply what they know in the real world to help you take full advantage of the expressive power of SQL. You'll find practical techniques to address complex data manipulation problems. Learn how to: Wrangle data in the most efficient way possible Aggregate and organize your data for meaningful and accurate reporting Make the most of subqueries, joins, and unions Stay on top of the performance of your queries and the server that runs them Avoid common SQL security pitfalls, including the dreaded SQL injection attackLet SQL Hacks serve as your toolbox for digging up and manipulating data. If you love to tinker and optimize, SQL is the perfect technology and SQL Hacks is the must-have book for you.
SQL in a Nutshell is a practical and useful command reference to the latest release of the Structured Query Language (SQL99). For experienced SQL programmers, analysts, and database administrators, it's a handy key to each of the SQL commands and its use in both commercial (Microsoft SQL Server 2000 and Oracle 8 i ) and open source (MySQL, PostgreSQL 7.0) implementations. SQL in a Nutshell is also a great learning resource for novice and auxiliary SQL users.
SQL in a Nutshell applies the eminently useful "Nutshell" format to Structured Query Language (SQL), the elegant--but complex--descriptive language that is used to create and manipulate large stores of data. For SQL programmers, analysts, and database administrators, the new second edition of SQL in a Nutshell is the essential date language reference for the world's top SQL database products. SQL in a Nutshell is a lean, focused, and thoroughly comprehensive reference for those who live in a deadline-driven world. This invaluable desktop quick reference drills down and documents every SQL command and how to use it in both commercial (Oracle, DB2, and Microsoft SQL Server) and open source implementations (PostgreSQL, and MySQL). It describes every command and reference and includes the command syntax (by vendor, if the syntax differs across implementations), a clear description, and practical examples that illustrate important concepts and uses. And it also explains how the leading commercial and open sources database product implement SQL. This wealth of information is packed into a succinct, comprehensive, and extraordinarily easy-to-use format that covers the SQL syntax of no less than 4 different databases. When you need fast, accurate, detailed, and up-to-date SQL information, SQL in a Nutshell, Second Edition will be the quick reference you'll reach for every time. SQL in a Nutshell is small enough to keep by your keyboard, and concise (as well as clearly organized) enough that you can look up the syntax you need quickly without having to wade through a lot of useless fluff. You won't want to work on a project involving SQL without it.
If you're a programmer or database administrator who uses SQL in your day-to-day work, this popular pocket guide is the ideal on-the-job reference. You'll find many examples that address the language's complexity, along with key aspects of SQL used in IBM DB2 Release 9.7, MySQL 5.1, Oracle Database 11g Release 2, PostgreSQL 9.0, and Microsoft SQL Server 2008 Release 2. SQL Pocket Guide describes how these database systems implement SQL syntax for querying, managing transactions, and making changes to data. It also shows how the systems use SQL functions, regular expression syntax, and type conversion functions and formats. All example SQL statements in this book execute against a set of tables, with data that you can quickly download. The third edition covers important database changes, including: Oracle's support of the recursive WITH syntax, and addition of PIVOT and UNPIVOT operators Functions new to Oracle, such as LISTAGG, NTH_VALUE, and more PostgreSQL's support of recursive WITH and some window functions DB2 syntax and datatypes, some compatible with Oracle MySQL features such as the TIMESTAMP type and the TO_SECONDS function
SQL is the language of databases. It's used to create and maintain database objects, place data into those objects, query the data, modify the data, and, finally, delete data that is no longer needed. Databases lie at the heart of many, if not most business applications. Chances are very good that if you're involved with software development, you're using SQL to some degree. And if you're using SQL, you should own a good reference or two. Now available in an updated second edition, our very popular SQL Pocket Guide is a major help to programmers, database administrators, and everyone who uses SQL in their day-to-day work. The SQL Pocket Guide is a concise reference to frequently used SQL statements and commonly used SQL functions. Not just an endless collection of syntax diagrams, this portable guide addresses the language's complexity head on and leads by example. The information in this edition has been updated to reflect the latest versions of the most commonly used SQL variants including: * Oracle Database 10g, Release 2 (including the free Oracle Database 10g Express Edition (XE)) * Microsoft SQL Server 2005 * MySQL 5 * IBM DB2 8.2 * PostreSQL 8.1 database
SSH (Secure Shell) is a popular, robust, TCP/IP-based product for network security and privacy, supporting strong encryption and authentication. This book covers Unix, Windows, and Macintosh implementations of SSH. It shows both system administrators and end users how to install, maintain, and troubleshoot SSH; configure servers and clients in simple and complex ways; apply SSH to practical problems; and protect other TCP applications through forwarding (tunneling).
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively. Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide . This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution. How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration. Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks. No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
You've heard stories about people making their fortune creating Web sites and selling merchandise on the Internet. You've been eager to jump right in and take a shot at striking it rich, but you're not quite sure how to get started-or if you're business-minded and tech-savvy enough to succeed. Starting an Online Business for Dummies will show you how easy it is to get your ideas off the ground and on the Web. You'll be able to take advantage of everything an online business has to offer, without an MBA or years of experience! This updated, hands-on guide gives you the tools you need to: Establish and promote your business, advertise your site, build a business with online auctions, keep your business legal and lawsuit free, impress customers in the virtual world, publicize your business with Google, Yahoo!, and Microsoft, conduct electronic payments, and also utilize VOIP, site feeds, blogging, and affiliate marketing. You'll soon begin to realize that online business is not confined to large corporations or even businesses with storefronts. With this handy, straightforward guide, you will have your business online and ready to go in no time. There's also a chapter on hot new ways to make money online, such as selling on Amazon or promoting on Flickr. The 5th edition of Starting an Online Business for Dummies helps you help your business can reach its full potential!
Starting Out With C++ 8th Edition is intended for use in a two-term or three-term C++ programming sequence, or an accelerated one-term course. The book is written with clear, easy-to-understand language and it covers all the necessary topics for an introductory programming course.
This edition covers the core programming concepts that are introduced in the first semester introductory programming course. The problem-solving approach inspires students while introducing the C++ programming language. The style of teaching builds programming confidence and enhances each student's development of programming skills. Clear and easy-to-read code listings, concise and practical real-world examples, and an abundance of exercises appear in every chapter.
A language independent programming guide aimed at equipping students with sound fundamental knowledge on logical thinking without the complication of language syntaxes.
Jerry Kaplan had a dream: he would redefine the known universe (and get very rich) by creating a new kind of computer. All he needed was sixty million dollars, a few hundred employees, a maniacal belief in his ability to win the Silicon Valley startup game. Kaplan, a well-known figure in the computer industry, founded GO Corporation in 1987, and for several years it was one of the hottest new ventures in the Valley. Startup tells the story of Kaplan's wild ride: how he assembled a brilliant but fractious team of engineers, software designers, and investors; pioneered the emerging market for hand-held computers operated with a pen instead of a keyboard; and careened from crisis to crisis without ever losing his passion for his revolutionary idea. Along the way, Kaplan vividly recreates his encounters with eccentric employees, risk-addicted venture capitalists, and industry giants such as Bill Gates and John Sculley. And no one -- including Kaplan himself -- is spared his sharp wit.
Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.
Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.
- Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
- DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
- BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
- MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
- DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.