- Table View
- List View
Rather than treat phonology, phonetics, morphology, syntax, semantics, and pragmatics as completely separate fields, this text shows how they interact in principled ways.
Linguistics falls in the gap between arts and science. Beginning at the "arts" end of the subject with the common origins of languages, and finishing at the "science" end with the newest discoveries regarding language in the brain, this stimulating guide covers all the major aspects of linguistics from a refreshing and insightful angle.
It is extremely important that students become familiar with the structural properties of languages other than English. In A Linguistics Workbook, therefore, we have provided exercises based on a wide variety of the world's languages.
From the Publisher In a tiny cave beneath the Central African plain, a young woman inches forward, the cone of her flashlight piercing a darkness undisturbed for countless centuries. It's airless, claustrophobic, eerie - but there's nowhere else on earth paleoanthropologist Samantha Colby would rather be. She can sense she's on the brink of scientific immortality, and when her light reveals the chalky white of a skeleton propped against the wall, her every instinct comes alive: This could be it - the Missing Link, the long-sought solution to the mystery of humankind's origin. But these ancient bones ask more questions than they answer. They hint at things no scientist would dare to think. No scientist but one: maverick Jack Austin, whose outspoken theories have earned him only scorn - and whose stubborn pride once cost him Samantha's love. This thriller plunges Jack and Samantha into a labyrinth of international intrigue and ruthless violence that could cost them their lives. For as scientists they know that knowledge is power - but they've forgotten that all power corrupts. Synopsis The final piece has been found. In a tiny cave in Central Africa, paleoanthropologist Samantha Colby has discovered the skeleton of what might be the long-sought missing link between ape and man. But the ancient bones raise more questions then they answer-and they suggest that human ancestry can be traced to something previously unimaginable. ..The most important discovery in civilization's history could mean death for Colby and renegade scientist Jack Austin. For it will lead them to even greater revelations that could rock the world-and to secrets no human should know.
This book presents in-depth surveys and systematic discussions on models, algorithms and applications for link mining. Link mining is an important field of data mining. Traditional data mining focuses on "flat" data in which each data object is represented as a fixed-length attribute vector. However, many real-world data sets are much richer in structure, involving objects of multiple types that are related to each other. Hence, recently link mining has become an emerging field of data mining, which has a high impact in various important applications such as text mining, social network analysis, collaborative filtering, and bioinformatics. At present, there are no books in the market focusing on the theory and techniques as well as the related applications for link mining. On the other hand, due to the high popularity of linkage data, extensive applications ranging from governmental organizations to commercial businesses to people's daily life call for exploring the techniques of mining linkage data; people need such a reference book to systematically apply the link mining techniques to these applications to develop the related technologies. Therefore, such a book is in high demand on the market.
When Elissa learns her telepathic twin is the subject of government experiments, the girls find themselves on the run with secrets worth killing for in this futuristic, romantic thriller. Elissa used to have it all: looks, popularity, and a bright future. Now, all she has is nightmarish visions and unexplained bruises. Finally, she's promised a cure, and a surgery is scheduled. But on the eve of the procedure, she discovers the truth behind her visions: She's seeing the world through another girl's eyes. A world filled with pain and wires and weird machines. Elissa follows her visions, only to find a battered, broken girl on the run. A girl--Lin--who looks exactly like Elissa, down to the matching bruises. A twin she never knew existed.Elissa helps Lin evade the government agents who are ruthlessly tracking her down, but they're struggling to avoid capture, and soon Elissa is forced to turn to the only person who can help: Cadan, her brother's infuriating, arrogant best friend, and new graduate of the SFI space flight academy. Cadan is their one chance at safety. But Lin is too valuable to let go, and Elissa has knowledge that is too dangerous. The government will stop at nothing to get them back.
This report assesses the evidence that exists for the ways in which local air quality could influence local economic growth through health and workforce issues, quality-of-life issues, or air-quality regulations and business operations. It then extrapolates some of the existing results to the Pittsburgh region.
India, 1839: Linny Gow, a respectable young wife and mother, settles down to write her life story. To outside appearances Linny is the perfect Raj wife: beautiful, gracious, subservient. But appearances can be very deceptive . . . Born into direst poverty in Liverpool, Linny escapes the life of prostitution her stepfather has forced her into, transforms herself into a young lady, and escapes to India, where the British Raj is in its infancy. There she will find heartache and suffering, but also true love and - perhaps most precious of all - freedom. But how did Linny achieve all this? And what has she sacrificed along the way? Most importantly, is this the end of Linny's journey, or is her story not yet over? THE LINNET BIRD is an enthralling tale of one young girl's destiny and her struggle for happiness and survival.
GNU/Linux is an immensely popular operating system that is both extremely stable and reliable. But it can also induce minor headaches at the most inopportune times, if you're not fully up to speed with its capabilities. A unique approach to running and administering Linux systems, Linux Annoyances for Geeks addresses the many poorly documented and under-appreciated topics that make the difference between a system you struggle with and a system you really enjoy. This book is for power users and system administrators who want to clear away barriers to using Linux for themselves and for less-trained users in their organizations. This book meticulously tells you how to get a stubborn wireless card to work under Linux, and reveals little-known sources for wireless driversand information. It tells you how to add extra security to your systems, such as boot passwords, and how to use tools such as rescue disks to overcome overly zealous security measures in a pinch. In every area of desktop and server use, the book is chock full of advice based on hard-earned experience. Author Michael Jang has spent many hours trying out software in a wide range of environments and carefully documenting solutions for the most popular Linux distributions. (The book focuses on Red Hat/Fedora, SUSE, and Debian.) Many of the topics presented here are previously undocumented or are discussed only in obscure email archives. One of the valuable features of this book for system administrators and Linux proponents in general is the organization of step-by-step procedures that they can customize for naive end-users at their sites. Jang has taken into account not only the needs of a sophisticated readership, but the needs of other people those readers may serve. Sometimes, a small thing for a user (such as being able to play a CD) or for an administrator (such as updating an organizations' systems from a central server) can make or break the adoption of Linux. This book helps you overcome the most common annoyances in deploying Linux, and trains you in the techniques that will help you overcome other problems you find along the way. In keeping with the spirit of the Annoyances series, the book adopts a sympathetic tone that will quickly win you over. Rather than blaming you for possessing limited Linux savvy, Linux Annoyances for Geeks takes you along for a fun-filled ride as you master the system together.
Linux powers the servers and machines that power a significant proportion of the Internet, and it forms the backbone of a variety of different modern operating systems, particularly in the embedded and smaller systems markets, such as ARM-based desktops, laptops and set top systems. In fact, Linux is now the solution behind so many different things: from game consoles, to media platforms, to massive database servers, to clusters, and to some of the most powerful computing clusters in the world. Linux manages to span the full gamut of hardware platforms from watches to supercomputers. In this bibliography we have collected a range of different titles that cover the basics of installing your Linux system, how to use it and deploy it, and how to make use of the different systems. We've also collected guides to specific environments and distributions, including Fedora, SUSE, Ubuntu and the Raspberry Pi platform. For more generic content, there are titles on kernel development, device driver building and the Linux programming interfaces. Maybe programming Linux is more appealing to you, in which case you can find books on everything from system programming to C++, Perl, Python and more with a focus on the Linux or Linux-like environment. For administration and deployment, you'll want to examine the books that cover the core of administration, shell tools, and the specific guides on security, Oracle and development stack solutions such as LAMP (Linux, Apache, MySQL, and Perl/Python/PHP). Finally, if you want to develop your professional skills and get certified, or just learn the finer details of the internals, then Safari Books Online has everything you need here and more.
With hacks that any user can follow, Linux Desktop Hacks demonstrates how easy it is to modify Linux to suit your desires. The book is packed with tips on customizing and improving the interface, boosting performance, administering your desktop, and generally making the most out of what X, KDE, Gnome, and the console have to offer.
This practical guide is for anyone who wants to support computer peripherals under the Linux operating system. It shows step-by-step how to write a driver for character devices, block devices, and network interfaces, illustrating with examples you can compile and run. The second edition covers Kernel 2.4 and adds discussions of symmetric multiprocessing (SMP), Universal Serial Bus (USB), and some new platforms.
This book is for anyone who wants to support computer peripherals under the Linux operating system or who wants to develop new hardware and run it under Linux. Linux is the fastest-growing segment of the Unix market, is winning over enthusiastic adherents in many application areas, and is being viewed more and more as a good platform for embedded systems. Linux Device Drivers, already a classic in its second edition, reveals information that heretofore has been shared by word of mouth or in cryptic source code comments, on how to write drivers for a wide range of devices. Version 2.4 of the Linux kernel includes significant changes to device drivers, simplifying many activities, but providing subtle new features that can make a driver both more efficient and more flexible. The second edition of this book thoroughly covers these changes, as well as new processors and buses. You don't have to be a kernel hacker to understand and enjoy this book; all you need is an understanding of C and some background in Unix system calls. You'll learn how to write drivers for character devices, block devices, and network interfaces, guided by full-featured examples that you can compile and run without special hardware. Major changes in the second edition include discussions of symmetric multiprocessing (SMP) and locking, new CPUs, and recently supported buses. For those who are curious about how an operating system does its job, this book provides insights into address spaces, asynchronous events, and I/O. Portability is a major concern in the text. The book is centered on version 2.4, but includes information for kernels back to 2.0 where feasible. Linux Device Driver also shows how to maximize portability among hardware platforms; examples were tested on IA32 (PC) and IA64, PowerPC, SPARC and SPARC64, Alpha, ARM, and MIPS. Contents include: Building a driver and loading modules Complete character, block, and network drivers Debugging a driver Timing Handling symmetric multiprocessing (SMP) systems Memory management and DMA Interrupts Portability issues Peripheral Component Interconnect (PCI)
Over the years, this bestselling guide has helped countless programmers learn how to support computer peripherals under the Linux operating system, and how to develop new hardware under Linux. Now, with this third edition, it's even more helpful, covering all the significant changes to Version 2.6 of the Linux kernel. Includes full-featured examples that programmers can compile and run without special hardware.
This complete reference covers all user, programming, administration, and networking commands, with options, for common Linux distributions. It also documents a wide range of GNU tools. New material in the third edition includes common configuration tasks for the GNOME and KDE desktops and the fvwm2 window manager, the dpkg Debian package manager, expanded coverage of the rpm Red Hat package manager, and many new commands.
Comprehensive but concise, Linux in a Nutshell is an essential desktop reference for the commands that users of Linux utilize every day. It covers all substantial user, programming, administration, and networking commands for the most common Linux distributions. It's several quick references rolled into one: sed, gawk, RCS, CVS, vi, Emacs, bash, tcsh, regular expressions, package management, bootloaders, and desktop environments are all covered in this clear, to-the-point volume, along with core command-lin
Written by a leading developer and maintainer of the Linux kernel, Linux Kernel in a Nutshell is a comprehensive overview of kernel configuration and building, a critical task for Linux users and administrators. No distribution can provide a Linux kernel that meets all users' needs. Computers big and small have special requirements that require reconfiguring and rebuilding the kernel. Whether you are trying to get sound, wireless support, and power management working on a laptop or incorporating enterprise features such as logical volume management on a large server, you can benefit from the insights in this book. Linux Kernel in a Nutshell covers the entire range of kernel tasks, starting with downloading the source and making sure that the kernel is in sync with the versions of the tools you need. In addition to configuration and installation steps, the book offers reference material and discussions of related topics such as control of kernel options at runtime. A key benefit of the book is a chapter on determining exactly what drivers are needed for your hardware. Also included are recipes that list what you need to do to accomplish a wide range of popular tasks.
The Linux Network Administrator's Guide , Third Edition updates a classic Linux title from O'Reilly. This refreshed resource takes an in-depth look at everything you need to know to join a network. Topics covered include all of the essential networking software that comes with the Linux operating system, plus information on a host of cutting-edge services including wireless hubs, spam filtering, and more.
Fully updated, this impressive, comprehensive introduction to networking on Linux now covers firewalls, including the use of ipchains and iptables (netfilter), masquerading, and accounting. Other new topics include Novell (NCP/IPX) support and INN (news administration). Original material on serial connections, UUCP, routing and DNS, mail and News, SLIP and PPP, NFS, and NIS has been thoroughly updated.
The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax.
<p>The <i>Linux Security Cookbook</i> includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax.</p>
A competent system administrator knows that a Linux server is a high performance system for routing large amounts of information through a network connection. Setting up and maintaining a Linux server requires understanding not only the hardware, but the ins and outs of the Linux operating system along with its supporting cast of utilities as well as layers of applications software. There's basic documentation online but there's a lot beyond the basics you have to know, and this only comes from people with hands-on, real-world experience. This kind of "know how" is what we sought to capture in Linux Server Hacks. Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system. You'll find hacks devoted to tuning the Linux kernel to make your system run more efficiently, as well as using CVS or RCS to track the revision to system files. You'll learn alternative ways to do backups, how to use system monitoring tools to track system performance and a variety of secure networking solutions. Linux Server Hacks also helps you manage large-scale Web installations running Apache, MySQL, and other open source tools that are typically part of a Linux system. O'Reilly's new Hacks Series proudly reclaims the term "hacking" for the good guys. Hackers use their ingenuity to solve interesting problems. Rob Flickenger is an experienced system administrator, having managed the systems for O'Reilly Network for several years. (He's also into community wireless networking and he's written a book on that subject for O'Reilly.) Rob has also collected the best ideas and tools from a number of other highly skilled contributors. Written for users who already understand the basics, Linux Server Hacks is built upon the expertise of people who really know what they're doing.
Today's system administrators deal with a vast number of situations, operating systems, software packages, and problems. Those who are in the know have kept their copy of Linux Server Hacks close at hand to ease their burden. And while this helps, it's not enough: any sys admin knows there are many more hacks, cool tips, and ways of solving problems than can fit in a single volume (one that mere mortals can lift, that is). Which is why we created Linux Server Hacks, Volume Two, a second collection of incredibly useful tips and tricks for finding and using dozens of open source tools you can apply to solve your sys admin problems. The power and flexibility of Linux and Open Source means that there is an astounding amount of great software out there waiting to be applied to your sys admin problems -- if only you knew about it and had enough information to get started. Hence, Linux Server Hacks, Volume Two. This handy reference offers 100 completely new server management tips and techniques designed to improve your productivity and sharpen your administrative skills. Each hack represents a clever way to accomplish a specific task, saving you countless hours of searching for the right answer. No more sifting through man pages, HOWTO websites, or source code comments -- the only resource you need is right here. And you don't have to be a system administrator with hundreds of boxen to get something useful from this book as many of the hacks apply equally well to a single system or a home network. Compiled by experts, these hacks not only give you the step-by-step instructions necessary to implement the software, but they also provide the context to truly enable you to learn the technology. Topics include: Authentication Remote GUI connectivity Storage management File sharing and synchronizing resources Security/lockdown instruction Log files and monitoring Troubleshooting System rescue, recovery, and repair Whether they help you recover lost data, collect information from distributed clients, or synchronize administrative environments, the solutions found in Linux Server Hacks, Volume Two will simplify your life as a system administrator.
Linux Server Security , 2nd Edition expertly conveys to administrators and developers the tricks of the trade that can help them avoid serious security breaches. It covers both background theory and practical step-by-step instructions for protecting a server that runs Linux. Packed with examples, this must-have book lets the good guys stay one step ahead of potential adversaries.
- Embossed Braille - Use Bookshare’s DAISY Text or BRF formats to generate embossed braille.