- Table View
- List View
The fifth edition of Running Linux is greatly expanded, reflecting the maturity of the operating system and the teeming wealth of software available for it. Hot consumer topics such as audio and video playback applications, groupware functionality, and spam filtering are covered, along with the basics in configuration and management that always made the book popular.
AppleÂ® has shown no mercy to the MacintoshÂ® power user---that dedicated individual who knows their MacÂ® inside and out: what makes it tick, and what makes it tick better. In the rapid evolution of Mac OSÂ® X, there have been three major releases, and each new release challenges the power user to once more stay ahead of the learning curve. Mac OS X Panther is no exception to that rule. With more than 100 new features, including a new Finder, Expos , FileVault, and an improved BSD Unix core, there's plenty here to master. Fortunately, power users have a secret weapon in Running Mac OS X Panther . This book takes readers deep inside Mac OS X's core, revealing the inner workings of Panther for those who want to get the most out of their system. Running Mac OS X Panther is the ultimate Swiss Army Knifeâ ¢ for power users who want to customize, tweak, and generally rev up their Mac. The easy-to-follow format is organized into three primary parts: Getting Started introduces you to Mac OS X--where it came from, how it's put together, and how it works Administration Essentials gives you the tools you need to examine how your system is running and adjust all the knobs behind its operation Networking and Network Services covers all the ways Mac OS X interfaces with the world around it, including wireless and spontaneous networking Developer Tools, including Xcode, for Mac OS X are discussed throughout the book where needed to accomplish the task at hand. The appendices that follow include handy quick reference materials for things such as Open Firmware. Written for readers who are inquisitive and confident enough to dig into their Macintosh system, Running Mac OS X Panther doesn't waste time talking about silly Finder tips or glossing over the messier details. This book dives right in and explains how your Mac works. You may not be a Mac guru when you start this book, but once you've read it, you'll be well on your way.
Running Mac OS X Tiger is the ideal resource for power users and system administrators like you who want to tweak Tiger, the new release of Mac OS X, to run faster, better, or just differently. If you areready to dig deep into your Mac, this book expertly guides you to the core of Mac OS X. It helps you understand the inner workings of the operating system so you can know how to get the most out of it. And it gives you countless ideas--and step-by-step instruction--for customizing and revving up Tiger to your specific needs and your liking. Completely revised and updated for Mac OS X Tiger, Running Mac OS X Tiger covers all the new features and functionality of Tiger. You can count on authors Jason Deraleau and James Duncan Davidson to give what you need--and not bother with what you don't. They don't spend time on Finder tips and keyboard shortcuts; they focus on showing you what makes a Mac tick and, more importantly, how you can make it tick just the way you want it to. Easy to follow and intuitively organized, Running Mac OS X Tiger is divided into three parts: "Getting Started" introduces Mac OS X and explains how it's put together and why it works; "Administration Essentials" gives you the tools you need to examine how your system is running and adjust all the knobs behind its operation; and "Networking and Network Services" covers the ways Mac OS X interfaces with the world around it, including wireless and spontaneous networking. Developer Tools for Mac OS X, including Xcode, are discussed throughout the book as appropriate. For the growing number of intermediate to advanced users who are ready and eager to customize Mac OS X, Running Mac OS X Tiger delivers everything you need to become master of your Mac.
Slash is the open-source software system that drives the hugely popular Slashdot web site and many others. Slash implements the kind of web site that has come to be called a "weblog": a moderated list, in reverse-chronological order, of timely items, with links to further discussion on-site, or to further information off-site. Anyone who wants to get a weblog site up and running will want to read Running Weblogs with Slash.
Describes safe social networking usage and ways to avoid dangerous situations, such as identity theft, cyberbullying, or predators.
Sales Guru Stephan Schiffman shows you how to give your presentation the ultimate wow factor.
The only complete method book on Salsa ever published. Numerous musical examples of how different Afro-Cuban styles are created, what each instrument does, text explaining the history and structure of the music, etc. "This will be the Salsa Bible for years to come." Sonny Bravo, Tito-Puente's pianist.
This book describes all the options for Samba's configuration file in quick-reference format. It also contains command-line options and related information on the use of the Samba daemons and the utilities in the Samba distribution. System administrators who are familiar with Samba and want a handy reminder of how to administer it without the bulk of a full-sized book will find this pocket reference invaluable.
Take your website from boring to bold and fresh with the power of php. Php is a powerful programming language specifically designed to create powerful website applications and scripts. This book has a lot to offer for both the person who has never written a line of programming code and the person who is experienced in other programming languages. Each lesson is designed to teach an important concept and is accompanied by examples and exercises to help the reader put the concepts into action.
[From the back cover:] "Rude Awakening: I've decided I wish I had a giant flyswatter for seventh grade. That way I could take care of all the pests with one big SPLAT. Madison is as busy as a bee--and she has the jam-packed school schedule to prove it. The only problem is: whatever Madison does comes back to bug her. Even an ordinary science-class trip to a nature preserve turns into a major emergency. And when Mom decides to start dating, Madison gets a case of the real creepy-crawlies." There's a list of Madison's shortened chat words at the end of the book like GGN for Gotta go now. Read it first, and add some of your own. Look for the rest of the books in the Files of Madison Finn series in the Bookshare Collection including: #1 Only the Lonely, #2 Boy, Oh Boy!, #3 Play It Again, #4 Caught in the Web, #5 Thanks for Nothing, #6 Lost and Found, and #8 Picture-Perfect.
This concise book gives you information you need to effectively use the Simple API for XML (SAX2), the dominant API for efficient XML processing with Java. With SAX2, developers have access to information in XML documents as they are read without imposing major memory constraints or a large code footprint. SAX2 gives you the detail and examples required to use SAX2 to its full potential.
Scaling Networks Companion Guide is the official supplemental textbook for the Scaling Networks course in the Cisco® CCNA® Academy® This course describes the architecture, components, and operations of routers and switches in a large and complex network. You will learn how to configure routers and switches for advanced functionality. By the end of this course, you will be able to configure and troubleshoot routers and switches and resolve common issues with OSPF, EIGRP, STP, and VTP in both IPv4 and IPv6 networks. You will also develop the knowledge and skills needed to implement DHCP and DNS operations in a network. The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time. The book's features help you focus on important concepts to succeed in this course.
<p>Many photographers have either moved into digital photography exclusively or use both analog and digital media in their work. In either case, there is sure to be an archive of slides and negatives that cannot be directly integrated into the new digital workflow, nor can it be archived in a digital format. Increasingly, photographers are trying to bridge this gap with the use of high-performance film scanners. <br/><br/>\nIn this 2nd edition, you will learn how to achieve the best possible digital image from a negative or a slide, and how to build a workflow to make this process efficient, repeatable, and reliable. The author uses Nikon's film scanners, but all steps can easily be accomplished while using a different scanner. The most common software tools for scanning (SilverFast, VueScan, NikonScan) are not only covered extensively in the book, but trial versions are also provided on a DVD, which also contains other useful tools for image editing, as well as numerous sample scans.</p>
It is the week before Christmas. A tanking economy has prompted Dr. Kay Scarpetta-- despite her busy schedule and her continuing work as the senior forensic analyst for CNN--to offer her services pro bono to New York City's Office of the Chief Medical Examiner. In no time at all, her increased visibility seems to precipitate a string of unexpected and unsettling events. She is asked live on the air about the sensational case of Hannah Starr, who has vanished and is presumed dead. Moments later during the same telecast she receives a startling call-in from a former psychiatric patient of Benton Wesley's. When she returns after the show to the apartment where she and Benton live, she finds an ominous package-- possibly a bomb-- waiting for her at the front desk. Soon the apparent threat on Scarpetta's life finds her embroiled in a surreal plot that includes a famous actor accused of an unthinkable sex crime and the disappearance of a beautiful millionairess with whom Lucy seems to have shared a secret past. Scarpetta's CNN producer wants her to launch a TV show called The Scarpetta Factor. Given the bizarre events already in play, she fears that her growing fame will generate the illusion that she has a "special factor," a mythical ability to solve all her cases. She wonders if she will end up like other TV personalities: her own stereotype. The Scarpetta Factor, the seventeenth Kay Scarpetta novel, finds the much-loved cast of characters together again in New York. Marino is working for the NYPD; Benton Wesley uses his forensic psychological expertise at Kirby and Bellevue; and Lucy continues to dazzle with her expertise in forensic computer investigations as she works another case with New York prosecutor Jaime Berger. Throughout, Cornwell delivers shocking twists and turns, and the kind of cutting-edge technology that only she can. Once again, she proves her exceptional ability to entertain and enthrall.
This book presents a broad overview of numerical methods for solving all the major problems in scientific computing.
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep ScreenOS systems on track. ScreenOS Cookbook gives you real-world fixes, techniques, and configurations that save time -- not hypothetical situations out of a textbook. The book comes directly from the experience of engineers who have seen and fixed every conceivable ScreenOS network topology, from small branch office firewalls to appliances for large core enterprise and government, to the heavy duty protocol driven service provider network. Its easy-to-follow format enables you to find the topic and specific recipe you need right away and match it to your network and security issue. Topics include: * Configuring and managing ScreenOS firewalls * NTP (Network Time Protocol) * Interfaces, Zones, and Virtual Routers * Mitigating Denial of Service Attacks * DDNS, DNS, and DHCP * IP Routing * Policy-Based Routing * Elements of Policies * Authentication * Application Layer Gateway (SIP, H323, RPC, RTSP, etc.,) * Content Security * Managing Firewall Policies * IPSEC VPN * RIP, OSPF, BGP, and NSRP * Multicast -- IGPM, PIM, Static Mroutes * Wireless Along with the usage and troubleshooting recipes, you will also find plenty of tricks, special considerations, ramifications, and general discussions of interesting tangents and network extrapolation. For the accurate, hard-nosed information you require to get your ScreenOS firewall network secure and operating smoothly , no book matches ScreenOS Cookbook.
SEO--short for Search Engine Optimization--is the art, craft, and science of driving web traffic to websites. Web traffic is food, drink, and oxygen--in short, life itself--to any web-based business. Whether your website depends on broad, general traffic, or high-quality, targeted traffic, this PDF has the tools and information you need to draw more traffic to your site. You'll learn how to effectively use PageRank (and Google itself); how to get listed, get links, and get syndicated; and much more. The field of SEO is expanding into all the possible ways of promoting web traffic. This breadth requires a range of understanding. In this PDF you'll find topics that cover that range, so you can use SEO to your benefit. Those topics include: Understanding how to best organize your web pages and websites. Understanding technologic and business tools available that you can use to achieve your SEO goals. Understanding how Google works. (Since Google is far and away the most important search engine, effectively using SEO means effectively using Google. This PDF covers how to boost placement in Google search results, how not to offend Google, how best to use paid Google programs, and more.) Understanding best SEO practices (whether your organization is small and entrepreneurial, or whether you have responsibility for a large web presence). When you approach SEO, you must take some time to understand the characteristics of the traffic that you need to drive your business. Then go out and use the techniques explained in this PDF to grab some traffic--and bring life to your business.
"A must-read for anyone endeavoring to understand one of the most important trends of this generation: organizing the world's information and making it universally accessible." - Mary Meeker
From the acclaimed Vanity Fair and GQ journalist--an unprecedented, in-depth portrait of the man whose return to Apple precipitated one of the biggest turnarounds in business history. From the emergence of Apple Computer in the late 1970s and early 1980s to its current resurgence, charismatic leader Steve Jobs has captivated the public. Both revered and reviled for his dictatorial manner and stunning successes, Jobs has transcended his legend in Silicon Valley to take on some of the heaviest hitters in Hollywood. Now, in The Second Coming of Steve Jobs, Alan Deutschman presents the most revealing portrait yet of this fascinating, complex character--an in-depth look at the many layers of Steve Jobs, a man who is at turns a brilliant cult figure and an abusive, egomaniacal kid. This story begins back in 1985 when Jobs was exiled from Apple, and then it goes on to chronicle the rise and fall of his own company, NeXT; the enormous success of Jobs's film animation studio, Pixar; and finally his triumphant return to Apple in the late 1990s, with Jobs taking the title of CEO in January 2000. Displaying an uncanny skill at the negotiation table and an intuitive sense of brilliant design that could capture the public's fascination with products like the iMac, along with a celebrity's ability to command the spotlight, Jobs has been able to catapult himself to the top of the Silicon Valley and Hollywood establishments. Based on interviews with scores of people--rivals, colleagues, friends--who have worked with Jobs over the years, The Second Coming of Steve Jobs gets under the hood of this extraordinarily complex man: how and why he almost gave up on his career; the details of his negotiations with Disney's Jeffrey Katzenberg and Michael Eisner, and of the culture clash between Silicon Valley and Hollywood; his methods of leadership, management, creativity, and innovation; his friendship and rivalry with Bill Gates--and much more. In an unsentimental and powerful voice, Deutschman reveals a man who suffered his midlife crisis at thirty, compressing it into just three months; struggled between self-imposed exile and the allure of public life; and became the baby boomer icon who was constantly blurring the lines between businessman, rock star, and beatnik. The Second Coming of Steve Jobs is a compelling look at an individual who has changed the face of technology and entertainment for the twenty-first century. This candid account of Steve Jobs's tumultuous and provocative career will answer the many questions left unanswered by this incredibly private character who has come to represent the Silicon Valley American dream.
Ludlow and Wallace take us behind the scenes of the Herald as they report on the emergence of a fascinating universe of virtual spaces that will become the next generation of the World Wide Web: a 3-D environment that provides richer, more expressive interactions than the Web we know today.
We've always dreamed of perfect places: Eden, heaven, Oz Â- places over the rainbow, beyond death and loss. Now, through computer technology, we can inhabit those worlds together. Each week, between 35 and 50 million people worldwide abandon reality for virtual worlds. In Boston, Massachusetts, a group of nine disabled men and women inhabit one virtual body, which frees them from their lifelong struggle to be seen and heard. The Pentagon has begun to develop virtual worlds to help in real-world battles. In Korea, where one particular game has 8 million residents, virtual violence has spread into the real world. Fortunes have been made, and mafia gangs have emerged to muscle in on the profits. In these new computer-generated places, which at first glance seem free from trouble and sorrow, you can create a new self. With the click of a mouse you can select eye colour, face shape, height, even wings. You can build houses, make and sell works of art, earn real money, get married and divorced. On websites like eBay, people sell virtual clothes and rent virtual property for real cash - for a total of £400 million worth each year. Tim Guest takes us on a revelatory journey through the electronic looking-glass, as he investigates one of the most bizarre phenomena of the 21st century.
A revolution is under way.<P> In recent years, Google's autonomous cars have logged thousands of miles on American highways and IBM's Watson trounced the best human Jeopardy! players. Digital technologies--with hardware, software, and networks at their core--will in the near future diagnose diseases more accurately than doctors can, apply enormous data sets to transform retailing, and accomplish many tasks once considered uniquely human.<P> In The Second Machine Age MIT's Erik Brynjolfsson and Andrew McAfee--two thinkers at the forefront of their field--reveal the forces driving the reinvention of our lives and our economy. As the full impact of digital technologies is felt, we will realize immense bounty in the form of dazzling personal technology, advanced infrastructure, and near-boundless access to the cultural items that enrich our lives.<P> Amid this bounty will also be wrenching change. Professions of all kinds--from lawyers to truck drivers--will be forever upended. Companies will be forced to transform or die. Recent economic indicators reflect this shift: fewer people are working, and wages are falling even as productivity and profits soar.<P> Drawing on years of research and up-to-the-minute trends, Brynjolfsson and McAfee identify the best strategies for survival and offer a new path to prosperity. These include revamping education so that it prepares people for the next economy instead of the last one, designing new collaborations that pair brute processing power with human ingenuity, and embracing policies that make sense in a radically transformed landscape.<P> A fundamentally optimistic book, The Second Machine Age will alter how we think about issues of technological, societal, and economic progress.
While the global economy languishes, one place just keeps growing despite failing banks, uncertain markets, and high unemployment: Silicon Valley. In the last two years, more than 100 incubators have popped up there, and the number of angel investors has skyrocketed. Today, 40 percent of all venture capital investments in the United States come from Silicon Valley firms, compared to 10 percent from New York. In Secrets of Silicon Valley, entrepreneur and media commentator Deborah Perry Piscione takes us inside this vibrant ecosystem where meritocracy rules the day. She explores Silicon Valley's exceptionally risk-tolerant culture, and why it thrives despite the many laws that make California one of the worst states in the union for business. Drawing on interviews with investors, entrepreneurs, and community leaders, as well as a host of case studies from Google to Paypal, Piscione argues that Silicon Valley's unique culture is the best hope for the future of American prosperity and the global business community and offers lessons from the Valley to inspire reform in other communities and industries, from Washington, DC to Wall Street.
Despite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles & Practices looks at the problem of bad code in a new way. This concise and highly readable book is packed with advice based on the authors' decades of experience in the computer security field.
Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.
Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.
- Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
- DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
- BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
- MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
- DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.