Browse Results What Format Should I Choose?

Showing 1,601 through 1,625 of 1,993 results

The Salsa Guidebook

by Sher Music Rebeca Mauleon

The only complete method book on Salsa ever published. Numerous musical examples of how different Afro-Cuban styles are created, what each instrument does, text explaining the history and structure of the music, etc. "This will be the Salsa Bible for years to come." Sonny Bravo, Tito-Puente's pianist.

Samba Pocket Reference

by Robert Eckstein David Collier-Brown Peter Kelly

This book describes all the options for Samba's configuration file in quick-reference format. It also contains command-line options and related information on the use of the Samba daemons and the utilities in the Samba distribution. System administrators who are familiar with Samba and want a handy reminder of how to administer it without the bulk of a full-sized book will find this pocket reference invaluable.

Sams Teach yourself PHP in 10 minutes

by Christopher Newman

Take your website from boring to bold and fresh with the power of php. Php is a powerful programming language specifically designed to create powerful website applications and scripts. This book has a lot to offer for both the person who has never written a line of programming code and the person who is experienced in other programming languages. Each lesson is designed to teach an important concept and is accompanied by examples and exercises to help the reader put the concepts into action.

Save The Date (From the Files of Madison Finn #7)

by Laura Dower

[From the back cover:] "Rude Awakening: I've decided I wish I had a giant flyswatter for seventh grade. That way I could take care of all the pests with one big SPLAT. Madison is as busy as a bee--and she has the jam-packed school schedule to prove it. The only problem is: whatever Madison does comes back to bug her. Even an ordinary science-class trip to a nature preserve turns into a major emergency. And when Mom decides to start dating, Madison gets a case of the real creepy-crawlies." There's a list of Madison's shortened chat words at the end of the book like GGN for Gotta go now. Read it first, and add some of your own. Look for the rest of the books in the Files of Madison Finn series in the Bookshare Collection including: #1 Only the Lonely, #2 Boy, Oh Boy!, #3 Play It Again, #4 Caught in the Web, #5 Thanks for Nothing, #6 Lost and Found, and #8 Picture-Perfect.

SAX2

by David Brownell

This concise book gives you information you need to effectively use the Simple API for XML (SAX2), the dominant API for efficient XML processing with Java. With SAX2, developers have access to information in XML documents as they are read without imposing major memory constraints or a large code footprint. SAX2 gives you the detail and examples required to use SAX2 to its full potential.

Scaling Networks Companion Guide

by Cisco Networking Academy Program Staff

Scaling Networks Companion Guide is the official supplemental textbook for the Scaling Networks course in the Cisco® CCNA® Academy® This course describes the architecture, components, and operations of routers and switches in a large and complex network. You will learn how to configure routers and switches for advanced functionality. By the end of this course, you will be able to configure and troubleshoot routers and switches and resolve common issues with OSPF, EIGRP, STP, and VTP in both IPv4 and IPv6 networks. You will also develop the knowledge and skills needed to implement DHCP and DNS operations in a network. The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time. The book's features help you focus on important concepts to succeed in this course.

Scanning Negatives and Slides: Digitizing Your Photographic Archive, 2nd Edition

by Sascha Steinhoff

<p>Many photographers have either moved into digital photography exclusively or use both analog and digital media in their work. In either case, there is sure to be an archive of slides and negatives that cannot be directly integrated into the new digital workflow, nor can it be archived in a digital format. Increasingly, photographers are trying to bridge this gap with the use of high-performance film scanners. <br/><br/>\nIn this 2nd edition, you will learn how to achieve the best possible digital image from a negative or a slide, and how to build a workflow to make this process efficient, repeatable, and reliable. The author uses Nikon's film scanners, but all steps can easily be accomplished while using a different scanner. The most common software tools for scanning (SilverFast, VueScan, NikonScan) are not only covered extensively in the book, but trial versions are also provided on a DVD, which also contains other useful tools for image editing, as well as numerous sample scans.</p>

The Scarpetta Factor (Kay Scarpetta Series #17)

by Patricia Daniels Cornwell

It is the week before Christmas. A tanking economy has prompted Dr. Kay Scarpetta-- despite her busy schedule and her continuing work as the senior forensic analyst for CNN--to offer her services pro bono to New York City's Office of the Chief Medical Examiner. In no time at all, her increased visibility seems to precipitate a string of unexpected and unsettling events. She is asked live on the air about the sensational case of Hannah Starr, who has vanished and is presumed dead. Moments later during the same telecast she receives a startling call-in from a former psychiatric patient of Benton Wesley's. When she returns after the show to the apartment where she and Benton live, she finds an ominous package-- possibly a bomb-- waiting for her at the front desk. Soon the apparent threat on Scarpetta's life finds her embroiled in a surreal plot that includes a famous actor accused of an unthinkable sex crime and the disappearance of a beautiful millionairess with whom Lucy seems to have shared a secret past. Scarpetta's CNN producer wants her to launch a TV show called The Scarpetta Factor. Given the bizarre events already in play, she fears that her growing fame will generate the illusion that she has a "special factor," a mythical ability to solve all her cases. She wonders if she will end up like other TV personalities: her own stereotype. The Scarpetta Factor, the seventeenth Kay Scarpetta novel, finds the much-loved cast of characters together again in New York. Marino is working for the NYPD; Benton Wesley uses his forensic psychological expertise at Kirby and Bellevue; and Lucy continues to dazzle with her expertise in forensic computer investigations as she works another case with New York prosecutor Jaime Berger. Throughout, Cornwell delivers shocking twists and turns, and the kind of cutting-edge technology that only she can. Once again, she proves her exceptional ability to entertain and enthrall.

Scientific Computing: An Introductory Survey

by Michael T. Heath

This book presents a broad overview of numerical methods for solving all the major problems in scientific computing.

ScreenOS Cookbook

by Stefan Brunner

Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep ScreenOS systems on track. ScreenOS Cookbook gives you real-world fixes, techniques, and configurations that save time -- not hypothetical situations out of a textbook. The book comes directly from the experience of engineers who have seen and fixed every conceivable ScreenOS network topology, from small branch office firewalls to appliances for large core enterprise and government, to the heavy duty protocol driven service provider network. Its easy-to-follow format enables you to find the topic and specific recipe you need right away and match it to your network and security issue. Topics include: * Configuring and managing ScreenOS firewalls * NTP (Network Time Protocol) * Interfaces, Zones, and Virtual Routers * Mitigating Denial of Service Attacks * DDNS, DNS, and DHCP * IP Routing * Policy-Based Routing * Elements of Policies * Authentication * Application Layer Gateway (SIP, H323, RPC, RTSP, etc.,) * Content Security * Managing Firewall Policies * IPSEC VPN * RIP, OSPF, BGP, and NSRP * Multicast -- IGPM, PIM, Static Mroutes * Wireless Along with the usage and troubleshooting recipes, you will also find plenty of tricks, special considerations, ramifications, and general discussions of interesting tangents and network extrapolation. For the accurate, hard-nosed information you require to get your ScreenOS firewall network secure and operating smoothly , no book matches ScreenOS Cookbook.

Search Engine Optimization

by Harold Davis

SEO--short for Search Engine Optimization--is the art, craft, and science of driving web traffic to websites. Web traffic is food, drink, and oxygen--in short, life itself--to any web-based business. Whether your website depends on broad, general traffic, or high-quality, targeted traffic, this PDF has the tools and information you need to draw more traffic to your site. You'll learn how to effectively use PageRank (and Google itself); how to get listed, get links, and get syndicated; and much more. The field of SEO is expanding into all the possible ways of promoting web traffic. This breadth requires a range of understanding. In this PDF you'll find topics that cover that range, so you can use SEO to your benefit. Those topics include: Understanding how to best organize your web pages and websites. Understanding technologic and business tools available that you can use to achieve your SEO goals. Understanding how Google works. (Since Google is far and away the most important search engine, effectively using SEO means effectively using Google. This PDF covers how to boost placement in Google search results, how not to offend Google, how best to use paid Google programs, and more.) Understanding best SEO practices (whether your organization is small and entrepreneurial, or whether you have responsibility for a large web presence). When you approach SEO, you must take some time to understand the characteristics of the traffic that you need to drive your business. Then go out and use the techniques explained in this PDF to grab some traffic--and bring life to your business.

The Search: How Google and Its Rivals Rewrote the Rules

by John Battelle

"A must-read for anyone endeavoring to understand one of the most important trends of this generation: organizing the world's information and making it universally accessible." - Mary Meeker

The Second Coming of Steve Jobs

by Alan Deutschman

From the acclaimed Vanity Fair and GQ journalist--an unprecedented, in-depth portrait of the man whose return to Apple precipitated one of the biggest turnarounds in business history. From the emergence of Apple Computer in the late 1970s and early 1980s to its current resurgence, charismatic leader Steve Jobs has captivated the public. Both revered and reviled for his dictatorial manner and stunning successes, Jobs has transcended his legend in Silicon Valley to take on some of the heaviest hitters in Hollywood. Now, in The Second Coming of Steve Jobs, Alan Deutschman presents the most revealing portrait yet of this fascinating, complex character--an in-depth look at the many layers of Steve Jobs, a man who is at turns a brilliant cult figure and an abusive, egomaniacal kid. This story begins back in 1985 when Jobs was exiled from Apple, and then it goes on to chronicle the rise and fall of his own company, NeXT; the enormous success of Jobs's film animation studio, Pixar; and finally his triumphant return to Apple in the late 1990s, with Jobs taking the title of CEO in January 2000. Displaying an uncanny skill at the negotiation table and an intuitive sense of brilliant design that could capture the public's fascination with products like the iMac, along with a celebrity's ability to command the spotlight, Jobs has been able to catapult himself to the top of the Silicon Valley and Hollywood establishments. Based on interviews with scores of people--rivals, colleagues, friends--who have worked with Jobs over the years, The Second Coming of Steve Jobs gets under the hood of this extraordinarily complex man: how and why he almost gave up on his career; the details of his negotiations with Disney's Jeffrey Katzenberg and Michael Eisner, and of the culture clash between Silicon Valley and Hollywood; his methods of leadership, management, creativity, and innovation; his friendship and rivalry with Bill Gates--and much more. In an unsentimental and powerful voice, Deutschman reveals a man who suffered his midlife crisis at thirty, compressing it into just three months; struggled between self-imposed exile and the allure of public life; and became the baby boomer icon who was constantly blurring the lines between businessman, rock star, and beatnik. The Second Coming of Steve Jobs is a compelling look at an individual who has changed the face of technology and entertainment for the twenty-first century. This candid account of Steve Jobs's tumultuous and provocative career will answer the many questions left unanswered by this incredibly private character who has come to represent the Silicon Valley American dream.

The Second Life Herald: The Virtual Tabloid That Witnessed the Dawn of the Metaverse

by Peter Ludlow Mark Wallace

Ludlow and Wallace take us behind the scenes of the Herald as they report on the emergence of a fascinating universe of virtual spaces that will become the next generation of the World Wide Web: a 3-D environment that provides richer, more expressive interactions than the Web we know today.

Second Lives: A Journey Through Virtual Worlds

by Tim Guest

We've always dreamed of perfect places: Eden, heaven, Oz Â- places over the rainbow, beyond death and loss. Now, through computer technology, we can inhabit those worlds together. Each week, between 35 and 50 million people worldwide abandon reality for virtual worlds. In Boston, Massachusetts, a group of nine disabled men and women inhabit one virtual body, which frees them from their lifelong struggle to be seen and heard. The Pentagon has begun to develop virtual worlds to help in real-world battles. In Korea, where one particular game has 8 million residents, virtual violence has spread into the real world. Fortunes have been made, and mafia gangs have emerged to muscle in on the profits. In these new computer-generated places, which at first glance seem free from trouble and sorrow, you can create a new self. With the click of a mouse you can select eye colour, face shape, height, even wings. You can build houses, make and sell works of art, earn real money, get married and divorced. On websites like eBay, people sell virtual clothes and rent virtual property for real cash - for a total of £400 million worth each year. Tim Guest takes us on a revelatory journey through the electronic looking-glass, as he investigates one of the most bizarre phenomena of the 21st century.

The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies

by Erik Brynjolfsson Andrew Mcafee

A revolution is under way.<P> In recent years, Google's autonomous cars have logged thousands of miles on American highways and IBM's Watson trounced the best human Jeopardy! players. Digital technologies--with hardware, software, and networks at their core--will in the near future diagnose diseases more accurately than doctors can, apply enormous data sets to transform retailing, and accomplish many tasks once considered uniquely human.<P> In The Second Machine Age MIT's Erik Brynjolfsson and Andrew McAfee--two thinkers at the forefront of their field--reveal the forces driving the reinvention of our lives and our economy. As the full impact of digital technologies is felt, we will realize immense bounty in the form of dazzling personal technology, advanced infrastructure, and near-boundless access to the cultural items that enrich our lives.<P> Amid this bounty will also be wrenching change. Professions of all kinds--from lawyers to truck drivers--will be forever upended. Companies will be forced to transform or die. Recent economic indicators reflect this shift: fewer people are working, and wages are falling even as productivity and profits soar.<P> Drawing on years of research and up-to-the-minute trends, Brynjolfsson and McAfee identify the best strategies for survival and offer a new path to prosperity. These include revamping education so that it prepares people for the next economy instead of the last one, designing new collaborations that pair brute processing power with human ingenuity, and embracing policies that make sense in a radically transformed landscape.<P> A fundamentally optimistic book, The Second Machine Age will alter how we think about issues of technological, societal, and economic progress.

Secrets of Silicon Valley: What Everyone Else Can Learn From the Innovation Capital of the World

by Deborah Perry Piscione

While the global economy languishes, one place just keeps growing despite failing banks, uncertain markets, and high unemployment: Silicon Valley. In the last two years, more than 100 incubators have popped up there, and the number of angel investors has skyrocketed. Today, 40 percent of all venture capital investments in the United States come from Silicon Valley firms, compared to 10 percent from New York. In Secrets of Silicon Valley, entrepreneur and media commentator Deborah Perry Piscione takes us inside this vibrant ecosystem where meritocracy rules the day. She explores Silicon Valley's exceptionally risk-tolerant culture, and why it thrives despite the many laws that make California one of the worst states in the union for business. Drawing on interviews with investors, entrepreneurs, and community leaders, as well as a host of case studies from Google to Paypal, Piscione argues that Silicon Valley's unique culture is the best hope for the future of American prosperity and the global business community and offers lessons from the Valley to inspire reform in other communities and industries, from Washington, DC to Wall Street.

Secure Coding: Principles & Practices

by Mark G. Graff Kenneth R. Van Wyk

Despite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles & Practices looks at the problem of bad code in a new way. This concise and highly readable book is packed with advice based on the authors' decades of experience in the computer security field.

Securing Ajax Applications

by Christopher Wells

Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security with an eye for dangerous gaps and offers ways that you can plug them before they become a problem. By making security part of the process from the start, you will learn how to build secure Ajax applications and discover how to respond quickly when attacks occur. Securing Ajax Applications succinctly explains that the same back-and-forth communications that make Ajax so responsive also gives invaders new opportunities to gather data, make creative new requests of your server, and interfere with the communications between you and your customers. This book presents basic security techniques and examines vulnerabilities with JavaScript, XML, JSON, Flash, and other technologies -- vital information that will ultimately save you time and money. Topics include: An overview of the evolving web platform, including APIs, feeds, web services and asynchronous messaging Web security basics, including common vulnerabilities, common cures, state management and session management How to secure web technologies, such as Ajax, JavaScript, Java applets, Active X controls, plug-ins, Flash and Flex How to protect your server, including front-line defense, dealing with application servers, PHP and scripting Vulnerabilities among web standards such as HTTP, XML, JSON, RSS, ATOM, REST, and XDOS How to secure web services, build secure APIs, and make open mashups secure Securing Ajax Applications takes on the challenges created by this new generation of web development, and demonstrates why web security isn't just for administrators and back-end programmers any more. It's also for web developers who accept the responsibility that comes with using the new wonders of the Web.

Securing the Virtual Environment: How to Defend the Enterprise Against Attack

by Davi Ottenheimer Matthew Wallace

A step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models and the appropriate technology and procedures to defend it from attack Dissects and exposes attacks targeted at the virtual environment and the steps necessary for defense Covers information security in virtual environments: building a virtual attack lab, finding leaks, getting a side-channel, denying or compromising services, abusing the hypervisor, forcing an interception, and spreading infestations Accompanying DVD includes hands-on examples and code This how-to guide arms IT managers, vendors, and architects of virtual environments with the tools they need to protect against common threats.

Securing Windows NT/2000 Servers for the Internet

by Stefan Norberg

In recent years, Windows NT and 2000 systems have emerged as viable platforms for Internet servers, but securing Windows for Internet use is a complex task. This concise guide simplifies the task by paring down installation and configuration instructions into a series of security checklists for security administration, including hardening servers for use as "bastion hosts," performing secure remote administration with OpenSSH, TCP Wrappers, VNC, and the new Windows 2000 Terminal Services.

Securing Windows Server 2003

by Mike Danseglio

If you use Windows 2003 Server at a small to medium-sized organization, or use Microsoft's Small Business Server, this thorough yet concise tutorial offers the hands-on advice you need for securing your network. Securing Windows Server 2003 not only shows you how to put Windows security tools to work, but guides you through ways to plan and implement a secure operating environment.

Security and Usability

by Simson Garfinkel Lorrie Cranor

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users. Still, many people believe there is an inherent trade-off between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless. There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security and Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computer interaction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research. Security and Usability groups 34 essays into six parts: Realigning Usability and Security-- with careful attention to user-centered design principles, security and usability can be synergistic. Authentication Mechanisms-- techniques for identifying and authenticating computer users. Secure Systems-- how system software can deliver or destroy a secure user experience. Privacy and Anonymity Systems-- methods for allowing people to control the release of personal information. Commercializing Usability: The Vendor Perspective-- specific experiences of security and software vendors (e.g., IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability. The Classics-- groundbreaking papers that sparked the field of security and usability. This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.

The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software

by Michael Howard Steve Lipner

<div xmlns="http://www.w3.org/1999/xhtml"><p>With expert insights, this introduction to the Security Development Lifecycle (SDL) provides you with a history of the methodology and guides you through each stage of the proven process\u2014from design to release\u2014that helps minimize security defects.</p></div>

Showing 1,601 through 1,625 of 1,993 results

Help

Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.

Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.

  • Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
  • DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
  • BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
  • MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
  • DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.