Browse Results

Showing 99,276 through 99,300 of 100,000 results

Linux Security Cookbook: Security Tools & Techniques

by Daniel J. Barrett Robert G. Byrnes Richard E. Silverman

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the "recipes" you'll find in this book are:Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and moreMonitoring your network with tcpdump, dsniff, netstat, and other toolsProtecting network connections with Secure Shell (SSH) and stunnelSafeguarding email sessions with Secure Sockets Layer (SSL)Encrypting files and email messages with GnuPGProbing your own security with password crackers, nmap, and handy scriptsThis cookbook's proven techniques are derived from hard-won experience. Whether you're responsible for security on a home Linux system or for a large corporation, or somewhere in between, you'll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver.

The Art of Readable Code: Simple and Practical Techniques for Writing Better Code (O'reilly Ser.)

by Dustin Boswell Trevor Foucher

As programmers, we’ve all seen source code that’s so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they’re bad and how they could be improved. Their conclusion? You need to write code that minimizes the time it would take someone else to understand it—even if that someone else is you.This book focuses on basic principles and practical techniques you can apply every time you write code. Using easy-to-digest code examples from different languages, each chapter dives into a different aspect of coding, and demonstrates how you can make your code easy to understand.Simplify naming, commenting, and formatting with tips that apply to every line of codeRefine your program’s loops, logic, and variables to reduce complexity and confusionAttack problems at the function level, such as reorganizing blocks of code to do one task at a timeWrite effective test code that is thorough and concise—as well as readable"Being aware of how the code you create affects those who look at it later is an important part of developing software. The authors did a great job in taking you through the different aspects of this challenge, explaining the details with instructive examples."—Michael Hunger, passionate Software Developer

Graphing Data with R: An Introduction

by John Jay Hilfiger

It’s much easier to grasp complex data relationships with a graph than by scanning numbers in a spreadsheet. This introductory guide shows you how to use the R language to create a variety of useful graphs for visualizing and analyzing complex data for science, business, media, and many other fields. You’ll learn methods for highlighting important relationships and trends, reducing data to simpler forms, and emphasizing key numbers at a glance.Anyone who wants to analyze data will find something useful here—even if you don’t have a background in mathematics, statistics, or computer programming. If you want to examine data related to your work, this book is the ideal way to start.Get started with R by learning basic commandsBuild single variable graphs, such as dot and pie charts, box plots, and histogramsExplore the relationship between two quantitative variables with scatter plots, high-density plots, and other techniquesUse scatterplot matrices, 3D plots, clustering, heat maps, and other graphs to visualize relationships among three or more variables

Main Street: How a City's Heart Connects Us All

by Mindy Thompson Fullilove

Mindy Thompson Fullilove traverses the central thoroughfares of our cities to uncover the ways they bring together our communitiesAfter an 11-year study of Main Streets in 178 cities and 14 countries, Fullilove discovered the power of city centers to “help us name and solve our problems.” In an era of compounding crises including racial injustice, climate change, and COVID-19, the ability to rely on the power of community is more important than ever. However, Fullilove describes how a pattern of disinvestment in inner-city neighborhoods has left Main Streets across the U.S. in disrepair, weakening our cities and leaving us vulnerable to catastrophe.In the face of urban renewal programs built in response to a supposed lack of “personal responsibility,” Fullilove offers “a different story, that of a series of forced displacements that had devastating effects on inner-city communities. Through that lens, we can appreciate the strength of segregated communities that managed to temper the ravages of racism through the Jim Crow era, and build political power and many kinds of wealth. . . . Only a very well-integrated, powerful community—one with deep spiritual principles—could have accomplished such a feat.” This is the power she hopes we will find again.Throughout Main Street, readers glimpse strong, vibrant communities who have conquered a variety of disasters, from the near loss of a beloved local business to the devastation of a hurricane. Using case studies to illustrate her findings, Fullilove turns our eyes to the cracks in city centers, the parts of the city that tend to be avoided or ignored. Providing a framework for those who wish to see their communities revitalized, Fullilove’s Main Street encourages us all to look both inward and outward to find the assets that already exist to create meaningful change.

Drawdown: The American Way of Postwar (Warfare and Culture #8)

by Jason W. Warren

Analyzes the cultural attitudes, political decisions, and institutions surrounding the maintenance of armed forces throughout American history While traditionally, Americans view expensive military structure as a poor investment and a threat to liberty, they also require a guarantee of that very freedom, necessitating the employment of armed forces. Beginning with the seventeenth-century wars of the English colonies, Americans typically increased their military capabilities at the beginning of conflicts only to decrease them at the apparent conclusion of hostilities. In Drawdown: The American Way of Postwar, a stellar team of military historians argue that the United States sometimes managed effective drawdowns, sowing the seeds of future victory that Americans eventually reaped. Yet at other times, the drawing down of military capabilities undermined our readiness and flexibility, leading to more costly wars and perhaps defeat. The political choice to reduce military capabilities is influenced by Anglo-American pecuniary decisions and traditional fears of government oppression, and it has been haphazard at best throughout American history. These two factors form the basic American “liberty dilemma,” the vexed relationship between the nation and its military apparatuses from the founding of the first colonies through to present times. With the termination of large-scale operations in Iraq and the winnowing of forces in Afghanistan, the United States military once again faces a significant drawdown in standing force structure and capabilities. The political and military debate currently raging around how best to affect this force reduction continues to lack a proper historical perspective. This volume aspires to inform this dialogue. Not a traditional military history, Drawdown analyzes cultural attitudes, political decisions, and institutions surrounding the maintenance of armed forces.

Boundaries of Love: Interracial Marriage and the Meaning of Race

by Chinyere K. Osuji

How interracial couples in Brazil and the US navigate racial boundaries How do people understand and navigate being married to a person of a different race? Based on individual interviews with forty-seven black-white couples in two large, multicultural cities—Los Angeles and Rio de Janeiro—Boundaries of Love explores how partners in these relationships ultimately reproduce, negotiate, and challenge the “us” versus “them” mentality of ethno-racial boundaries.By centering marriage, Chinyere Osuji reveals the family as a primary site for understanding the social construction of race. She challenges the naive but widespread belief that interracial couples and their children provide an antidote to racism in the twenty-first century, instead highlighting the complexities and contradictions of these relationships. Featuring black husbands with white wives as well as black wives with white husbands, Boundaries of Love sheds light on the role of gender in navigating life married to a person of a different color.Osuji compares black-white couples in Brazil and the United States, the two most populous post–slavery societies in the Western hemisphere. These settings, she argues, reveal the impact of contemporary race mixture on racial hierarchies and racial ideologies, both old and new.

The Excellence of the Arabs (Library of Arabic Literature #39)

by Ibn Qutaybah

The Excellence of the Arabs is a spirited defense of Arab identity—its merits, values, and origins—at a time of political unrest and fragmentation, written by one of the most important scholars of the early Abbasid era.In the cosmopolitan milieu of Baghdad, the social prestige attached to claims of being Arab had begun to decline. Although his own family originally hailed from Merv in the east, Ibn Qutaybah locks horns with those members of his society who belittled Arabness and vaunted the glories of Persian heritage and culture. Instead, he upholds the status of Arabs and their heritage in the face of criticism and uncertainty.The Excellence of the Arabs is in two parts. In the first, Arab Preeminence, which takes the form of an extended argument for Arab privilege, Ibn Qutaybah accuses his opponents of blasphemous envy. In the second, The Excellence of Arab Learning, he describes the fields of knowledge in which he believed pre-Islamic Arabians excelled, including knowledge of the stars, divination, horse husbandry, and poetry. And by incorporating extensive excerpts from the poetic heritage—“the archive of the Arabs”—Ibn Qutaybah aims to demonstrate that poetry is itself sufficient corroboration of Arab superiority.Eloquent and forceful, The Excellence of the Arabs addresses a central question at a time of great social flux at the dawn of classical Muslim civilization: what did it mean to be Arab?A bilingual Arabic-English edition.

The Sex Obsession: Perversity and Possibility in American Politics (Sexual Cultures #55)

by Janet R. Jakobsen

Finalist, 2021 Lambda Literary Award in LGBTQ StudiesOffers a way to undo the inextricable American knot of sex, politics, religion, and powerAmerican politics are obsessed with sex. Before the first televised presidential debate, John F. Kennedy trailed Richard Nixon in the polls. As Americans tuned in, however, they found Kennedy a younger, more vivacious, and more attractive choice than Nixon. Sexier. The political significance of Kennedy’s telegenic sex appeal is now widely accepted – but taking sexual politics seriously is not. Janet R. Jakobsen examines how, for the last several decades, gender and sexuality have reappeared time and again at the center of political life, marked by a series of widely recognized issues and movements – women’s liberation and gay liberation in the 1960s and ’70s, the AIDS crisis and ACT UP in the ‘80s and ’90s, welfare and immigration “reform” in the ‘90s, wars claiming to “save women” in the 2000s, and battles over health care in the 2010s, to recent demands for reproductive justice, trans liberation, and the explosive exposures of #MeToo.Religion has been wound up in these political struggles, and blamed for not a little of the resistance to meaningful change in America political life. Jakobsen acknowledges that religion is a force to be reckoned with, but decisively breaks with the common sense that religion and sex are the fixed binary of American political life. She instead follows the kaleidoscopic ways in which sexual politics are embedded in social relations of all kinds – not only the intimate relations of love and family with which gender and sex are routinely associated, but also secularism, freedom, race, disability, capitalism, nation and state, housing and the environment.In the midst of these obsessions, Jakobsen’s promiscuous ethical imagination guides us forward. Drawing on examples from collaborative projects among activists, academics and artists, Jakobsen shows that sexual politics can contribute to building justice from the ground up. Gender and sexual relations are practices through which values emerge and communities are made. Sex and desire, gender and embodiment emerge as bases of ethical possibility, breaking political stalemate and opening new possibility.

In the Camp of Angels of Freedom: What Does It Mean to Be Educated?

by Arlene Goldbard

An autodidact explores issues of education itself through essays and personal portraits of the key minds who influenced herWhat does it mean to be educated? Through her evocative paintings and narrative, author Arlene Goldbard has portrayed eleven people whose work most influenced her—what she calls a camp of angels. She sees each as a brave messenger of love and freedom for a society that badly needs “uncolonized minds.” Goldbard describes how the learning from each changed the course of her life in essays that offer generative moments of a life in art and social change. She also reveals ways a dominant society tried to put a first-generation American from a socially marginal family in her place—and failed. Readers will learn about the author’s own self education, issues of formal higher education and its discontents, and the damage done by a society that prizes profits over people. Goldbard asks readers to consider the impact of credentialism on U.S. society and what we can do to set it right.

Social Media Entertainment: The New Intersection of Hollywood and Silicon Valley (Postmillennial Pop #7)

by Stuart Cunningham David Craig

Winner, 2020 Outstanding Book Award, given by the International Communication AssociationHonorable Mention, 2020 Nancy Baym Book Award, given by the Association of Internet ResearchersHow the transformation of social media platforms and user-experience have redefined the entertainment industryIn a little over a decade, competing social media platforms, including YouTube, Facebook, Twitter, Instagram, and Snapchat, have given rise to a new creative industry: social media entertainment. Operating at the intersection of the entertainment and interactivity, communication and content industries, social media entertainment creators have harnessed these platforms to generate new kinds of content separate from the century-long model of intellectual property control in the traditional entertainment industry. Social media entertainment has expanded rapidly and the traditional entertainment industry has been forced to cede significant power and influence to content creators, their fans, and subscribers. Digital platforms have created a natural market for embedded advertising, changing the worlds of marketing and communication in their wake. Combined, these factors have produced new, radically shifting demands on the entertainment industry, posing new challenges for screen regimes, media scholars, industry professionals, content creators, and audiences alike.Stuart Cunningham and David Craig chronicle the rise of social media entertainment and its impact on media consumption and production. A massive, industry-defining study with insight from over 100 industry insiders, Social Media Entertainment explores the latest transformations in the entertainment industry in this time of digital disruption.

Fashion and Beauty in the Time of Asia (NYU Series in Social and Cultural Analysis #6)

by S. Heijin Lee, Christina H. Moon, and Thuy Linh Nguyen Tu

How transnational modernity is taking shape in and in relation to AsiaFashion and Beauty in the Time of Asia considers the role of bodily aesthetics in the shaping of Asian modernities and the formation of the so-called “Asian Century.” S. Heijin Lee, Christina H. Moon, and Thuy Linh Nguyen Tu train our eyes on sites as far-flung, varied, and intimate as Guangzhou and Los Angeles, Saigon and Seoul, New York and Toronto. They map the transregional connections, ever-evolving aspirations and sensibilities, and new worlds and life paths forged through engagements with fashion and beauty.Contributors consider American influence on plastic surgery in Korea, Vietnamese debates about “the fashionable,” and the costs and commitments demanded of those who make and wear fast fashion, from Chinese garment workers to Nepalese nail technicians in New York who are mandated to dress "fashionably." In doing so, this interdisciplinary anthology moves beyond common characterizations of Asians and the Asian diaspora as simply abject laborers or frenzied consumers, analyzing who the modern Asian subject is now: what they wear and how they work, move, eat, and shop.

The Gay Marriage Generation: How the LGBTQ Movement Transformed American Culture

by Peter Hart-Brinson

The generational and social thinking changes that caused an unprecedented shift toward support for gay marriageHow did gay marriage—something unimaginable two decades ago—come to feel inevitable to even its staunchest opponents? Drawing on over 95 interviews with two generations of Americans, as well as historical analysis and public opinion data, Peter Hart-Brinson argues that a fundamental shift in our understanding of homosexuality sparked the generational change that fueled gay marriage’s unprecedented rise. Hart-Brinson shows that the LGBTQ movement’s evolution and tactical responses to oppression caused Americans to reimagine what it means to be gay and what gay marriage would mean to society at large. While older generations grew up imagining gays and lesbians in terms of their behavior, younger generations came to understand them in terms of their identity. Over time, as the older generation and their ideas slowly passed away, they were replaced by a new generational culture that brought gay marriage to all fifty states.Through revealing interviews, Hart-Brinson explores how different age groups embrace, resist, and create society’s changing ideas about gay marriage. Religion, race, contact with gay people, and the power of love are all topics that weave in and out of these fascinating accounts, sometimes influencing opinions in surprising ways. The book captures a wide range of voices from diverse social backgrounds at a critical moment in the culture wars, right before the turn of the tide. The story of gay marriage’s rapid ascent offers profound insights about how the continuous remaking of the population through birth and death, mixed with our personal, biographical experiences of our shared history and culture, produces a society that is continually in flux and constantly reinventing itself anew.An intimate portrait of social change with national implications, The Gay Marriage Generation is a significant contribution to our understanding of what causes generational change and how gay marriage became the reality in the United States.

The Backroom Boy: Andrew Malengeni's Story

by Mandla Mathebula

The Backroom Boy opens dramatically in China, 1962. Andrew Mlangeni is one of a small select group undergoing military training there. The unannounced visitor is Mao Tse-Tung or Chairman Mao as he was known, Chairman of the Communist Party of China.Mlangeni was selected as one of the first-ever six members who received military training in China before the formation of Umkhonto we Sizwe. He seems to have been chosen because he was a dedicated, intelligent and dependable operative, rather than a leader. Even after his release after 25 years on Robben Island, Mlangeni was not given a senior position in the post-apartheid democratic government. ‘I was always the backroom boy,’ says Andrew Mlangeni about himself.Andrew Mlangeni, is a struggle stalwart, Rivonia Trialist, and Robben Island prisoner 467/64 who was next door inmate to Nelson Mandela’s acclaimed 466/64 prison number. Released after 26 years of incarceration, he served as Member of Parliament, and is Chairman of the ANC’s Integrity Commission and Founder of the June and Andrew Mlangeni Foundation. With the passing of Ahmed Kathrada (March 2017), Mlangeni (91) is one of only two Rivonia Trialist still alive with Denis Goldberg.While still at school, Andrew Mlangeni joined the Communist Party of South Africa and also the ANC Youth League. These were the organisations that shaped his values. Decades of resourceful activism were to lead to his arrest and life sentence in the Rivonia trial. Mlangeni’s lifelong commitment to the struggle for liberation reverberates with other biographies and memoirs of leading figures, such as Rusty Bernstein’s Memory Against Forgetting and Albie Sachs’ We, the People: Insights of an Activist Judge. This story of an ANC elder is a well-researched historical record overlaid with intensely personal refl ections which intersect with the political narrative. Above all, it is one man’s story, set in the maelstrom of the liberation struggle.This biographical project has been developed for, and published in conjunction with, the June and Andrew Mlangeni Foundation.

Learning SQL

by Alan Beaulieu

SQL (Structured Query Language) is a standard programming language for generating, manipulating, and retrieving information from a relational database. If you're working with a relational database--whether you're writing applications, performing administrative tasks, or generating reports--you need to know how to interact with your data. Even if you are using a tool that generates SQL for you, such as a reporting tool, there may still be cases where you need to bypass the automatic generation feature and write your own SQL statements.To help you attain this fundamental SQL knowledge, look to Learning SQL, an introductory guide to SQL, designed primarily for developers just cutting their teeth on the language. Learning SQL moves you quickly through the basics and then on to some of the more commonly used advanced features. Among the topics discussed:The history of the computerized databaseSQL Data Statements--those used to create, manipulate, and retrieve data stored in your database; example statements include select, update, insert, and deleteSQL Schema Statements--those used to create database objects, such as tables, indexes, and constraintsHow data sets can interact with queriesThe importance of subqueriesData conversion and manipulation via SQL's built-in functionsHow conditional logic can be used in Data StatementsBest of all, Learning SQL talks to you in a real-world manner, discussing various platform differences that you're likely to encounter and offering a series of chapter exercises that walk you through the learning process. Whenever possible, the book sticks to the features included in the ANSI SQL standards. This means you'll be able to apply what you learn to any of several different databases; the book covers MySQL, Microsoft SQL Server, and Oracle Database, but the features and syntax should apply just as well (perhaps with some tweaking) to IBM DB2, Sybase Adaptive Server, and PostgreSQL.Put the power and flexibility of SQL to work. With Learning SQL you can master this important skill and know that the SQL statements you write are indeed correct.

Unix Power Tools

by Shelley Powers Jerry Peek Tim O'Reilly Mike Loukides

With the growing popularity of Linux and the advent of Darwin, Unix has metamorphosed into something new and exciting. No longer perceived as a difficult operating system, more and more users are discovering the advantages of Unix for the first time. But whether you are a newcomer or a Unix power user, you'll find yourself thumbing through the goldmine of information in the new edition of Unix Power Tools to add to your store of knowledge. Want to try something new? Check this book first, and you're sure to find a tip or trick that will prevent you from learning things the hard way.The latest edition of this best-selling favorite is loaded with advice about almost every aspect of Unix, covering all the new technologies that users need to know. In addition to vital information on Linux, Darwin, and BSD, Unix Power Tools 3rd Edition now offers more coverage of bash, zsh, and other new shells, along with discussions about modern utilities and applications. Several sections focus on security and Internet access. And there is a new chapter on access to Unix from Windows, addressing the heterogeneous nature of systems today. You'll also find expanded coverage of software installation and packaging, as well as basic information on Perl and Python.Unix Power Tools 3rd Edition is a browser's book...like a magazine that you don't read from start to finish, but leaf through repeatedly until you realize that you've read it all. Bursting with cross-references, interesting sidebars explore syntax or point out other directions for exploration, including relevant technical details that might not be immediately apparent. The book includes articles abstracted from other O'Reilly books, new information that highlights program tricks and gotchas, tips posted to the Net over the years, and other accumulated wisdom.Affectionately referred to by readers as "the" Unix book, UNIX Power Tools provides access to information every Unix user is going to need to know. It will help you think creatively about UNIX, and will help you get to the point where you can analyze your own problems. Your own solutions won't be far behind.

RADIUS: Securing Public Access to Private Resources

by Jonathan Hassell

The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users who want access to a system or service from a central network server. Originally developed for dial-up remote access, RADIUS is now used by virtual private network (VPN) servers, wireless access points, authenticating Ethernet switches, Digital Subscriber Line (DSL) access, and other network access types. Extensible, easy to implement, supported, and actively developed, RADIUS is currently the de facto standard for remote authentication.RADIUS provides a complete, detailed guide to the underpinnings of the RADIUS protocol, with particular emphasis on the utility of user accounting. Author Jonathan Hassell draws from his extensive experience in Internet service provider operations to bring practical suggestions and advice for implementing RADIUS. He also provides instructions for using an open-source variation called FreeRADIUS."RADIUS is an extensible protocol that enjoys the support of a wide range of vendors," says Jonathan Hassell. "Coupled with the amazing efforts of the open source development community to extend RADIUS's capabilities to other applications-Web, calling card security, physical device security, such as RSA's SecureID-RADIUS is possibly the best protocol with which to ensure only the people that need access to a resource indeed gain that access."This unique book covers RADIUS completely, from the history and theory of the architecture around which it was designed, to how the protocol and its ancillaries function on a day-to-day basis, to implementing RADIUS-based security in a variety of corporate and service provider environments. If you are an ISP owner or administrator, corporate IT professional responsible for maintaining mobile user connectivity, or a web presence provider responsible for providing multiple communications resources, you'll want this book to help you master this widely implemented but little understood protocol.

Concurrent Programming in Mac OS X and iOS: Unleash Multicore Performance with Grand Central Dispatch (Oreilly And Associate Ser.)

by Vandad Nahavandipoor

Now that multicore processors are coming to mobile devices, wouldn't it be great to take advantage of all those cores without having to manage threads? This concise book shows you how to use Apple's Grand Central Dispatch (GCD) to simplify programming on multicore iOS devices and Mac OS X.Managing your application’s resources on more than one core isn't easy, but it's vital. Apps that use only one core in a multicore environment will slow to a crawl. If you know how to program with Cocoa or Cocoa Touch, this guide will get you started with GCD right away, with many examples to help you write high-performing multithreaded apps.Package your code as block objects and invoke them with GCDUnderstand dispatch queues—the pools of threads managed by GCDUse different methods for executing UI and non-UI tasksCreate a group of tasks that GCD can run all at onceInstruct GCD to execute tasks only once or after a delayDiscover how to construct your own dispatch queues

Mobile Design Pattern Gallery: UI Patterns for Smartphone Apps

by Theresa Neil

When you’re under pressure to produce a well-designed, easy-to-navigate mobile app, there’s no time to reinvent the wheel—and no need to. This handy reference provides more than 90 mobile app design patterns, illustrated by 1,000 screenshots from current Android, iOS, and Windows Phone apps.Much has changed since this book’s first edition. Mobile OSes have become increasingly different, driving their own design conventions and patterns, and many designers have embraced mobile-centric thinking. In this edition, user experience professional Theresa Neil walks product managers, designers, and developers through design patterns in 11 categories:Navigation: get patterns for primary and secondary navigationForms: break industry-wide habits of bad form designTables: display only the most important informationSearch, sort, and filter: make these functions easy to useTools: create the illusion of direct interactionCharts: learn best practices for basic chart designTutorials & Invitations: invite users to get started and discover featuresSocial: help users connect and become part of the groupFeedback & Affordance: provide users with timely feedbackHelp: integrate help pages into a smaller form factorAnti-Patterns: what not to do when designing a mobile app

Elegant SciPy: The Art of Scientific Python

by Harriet Dashnow Juan Nunez-Iglesias Stéfan van der Walt

Welcome to Scientific Python and its community. If you’re a scientist who programs with Python, this practical guide not only teaches you the fundamental parts of SciPy and libraries related to it, but also gives you a taste for beautiful, easy-to-read code that you can use in practice. You’ll learn how to write elegant code that’s clear, concise, and efficient at executing the task at hand.Throughout the book, you’ll work with examples from the wider scientific Python ecosystem, using code that illustrates principles outlined in the book. Using actual scientific data, you’ll work on real-world problems with SciPy, NumPy, Pandas, scikit-image, and other Python libraries.Explore the NumPy array, the data structure that underlies numerical scientific computationUse quantile normalization to ensure that measurements fit a specific distributionRepresent separate regions in an image with a Region Adjacency GraphConvert temporal or spatial data into frequency domain data with the Fast Fourier TransformSolve sparse matrix problems, including image segmentations, with SciPy’s sparse modulePerform linear algebra by using SciPy packagesExplore image alignment (registration) with SciPy’s optimize moduleProcess large datasets with Python data streaming primitives and the Toolz library

Juniper Networks Warrior: A Guide to the Rise of Juniper Networks Implementations

by Peter Southwick

In this practical book, Juniper Networks consulting senior network engineer, Peter Southwick, offers unique first-person field studies on designing, configuring, and troubleshooting new systems that are changing the networking world. Each chapter-long "travelogue" follows a team of Juniper Networks warriors as they solve specific needs with emerging network platform architectures.In these case studies, Southwick and his fellow warriors analyze a client’s particular situation, arrive at an architectural solution, and work through the deployment details. For anyone who operates, installs, designs, or works in IT, this book provides an intimate and entertaining look at what’s changing and why.Among the case studies, you’ll discover how:A service provider protected customers from malicious traffic with Juniper Networks IDP systemsSRX5800s improved connectivity and security in a data centerEthernet WAN technology was chosen as a storage solution, rather than a proprietary design on dark fiberAn enterprise severed communications between different departments to comply with government personal credit card standardsCore network and edge devices helped a power company serve local customers and ISPs in the data services marketA hosting company migrated its core, datacenter, edge, and access domains to a state-of-the-art network"In this uniquely written book, you will get a detailed view of life in the data center, the edge, the core, and the office of the customer’s CIO."Steve Fazio, CEO, TorreyPoint

Hadoop Security: Protecting Your Big Data Platform

by Ben Spivey Joey Echeverria

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases.Understand the challenges of securing distributed systems, particularly HadoopUse best practices for preparing Hadoop cluster hardware as securely as possibleGet an overview of the Kerberos network authentication protocolDelve into authorization and accounting principles as they apply to HadoopLearn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at restIntegrate Hadoop data ingest into enterprise-wide security architectureEnsure that security architecture reaches all the way to end-user access

Oracle PL/SQL Programming: Covers Versions Through Oracle Database 12c

by Steven Feuerstein Bill Pribyl

Considered the best Oracle PL/SQL programming guide by the Oracle community, this definitive guide is precisely what you need to make the most of Oracle’s powerful procedural language. The sixth edition describes the features and capabilities of PL/SQL up through Oracle Database 12c Release 1.Hundreds of thousands of PL/SQL developers have benefited from this book over the last twenty years; this edition continues that tradition. With extensive code examples and a lively sense of humor, this book explains language fundamentals, explores advanced coding techniques, and offers best practices to help you solve real-world problems.Get PL/SQL programs up and running quickly, with clear instructions for executing, tracing, testing, debugging, and managing codeUnderstand new 12.1 features, including the ACCESSIBLE_BY clause, WITH FUNCTION and UDF pragma, BEQUEATH CURRENT_USER for views, and new conditional compilation directivesTake advantage of extensive code samples, from easy-to-follow examples to reusable packaged utilitiesOptimize PL/SQL performance with features like the function result cache and Oracle utilities such as PL/Scope and the PL/SQL hierarchical profilerBuild modular, easy-to-maintain PL/SQL applications using packages, procedures, functions, and triggers

Cloud Native Java: Designing Resilient Systems with Spring Boot, Spring Cloud, and Cloud Foundry

by Josh Long Kenny Bastani

What separates the traditional enterprise from the likes of Amazon, Netflix, and Etsy? Those companies have refined the art of cloud native development to maintain their competitive edge and stay well ahead of the competition. This practical guide shows Java/JVM developers how to build better software, faster, using Spring Boot, Spring Cloud, and Cloud Foundry.Many organizations have already waded into cloud computing, test-driven development, microservices, and continuous integration and delivery. Authors Josh Long and Kenny Bastani fully immerse you in the tools and methodologies that will help you transform your legacy application into one that is genuinely cloud native.In four sections, this book takes you through:The Basics: learn the motivations behind cloud native thinking; configure and test a Spring Boot application; and move your legacy application to the cloudWeb Services: build HTTP and RESTful services with Spring; route requests in your distributed system; and build edge services closer to the dataData Integration: manage your data with Spring Data, and integrate distributed services with Spring’s support for event-driven, messaging-centric architecturesProduction: make your system observable; use service brokers to connect stateful services; and understand the big ideas behind continuous delivery

When Animals Speak: Toward an Interspecies Democracy (Animals in Context #1)

by Eva Meijer

Winner, 2020 ASCA Book Award, given by the Amsterdam School of Cultural AnalysisA groundbreaking argument for the political rights of animals In When Animals Speak, Eva Meijer develops a new, ground-breaking theory of language and politics, arguing that non-human animals speak—and, most importantly, act—politically. From geese and squid to worms and dogs, she highlights the importance of listening to animal voices, introducing ways to help us bridge the divide between the human and non-human world. Drawing on insights from science, philosophy, and politics, Meijer provides fascinating, real-world examples of animal communities who use their voices to speak, and act, in political ways. When Animals Speak encourages us to rethink our relations with other animals, showing that their voices should be taken into account as the starting point for a new interspecies democracy.

The Politics of Perverts: The Political Attitudes and Actions of Non-Traditional Sexual Minorities (LGBTQ Politics)

by Charles Anthony Smith Shawn R. Schulenberg Connor B. Strobel

Reveals the underexplored politics and activism of non-traditional sexual minoritiesOver the past four decades, there has been significant research focused on the political and social lives of lesbian, gay, and transgender (LGT) individuals, exploring how these sexual communities interact with politicians and voters who identify as straight. However, due to society’s binary view of sexuality, this research has overlooked non-traditional sexual minorities.To address this omission, The Politics of Perverts delves into the political attitudes and activities of individuals who identify with non-traditional sexual orientations and practices, such as Polyamory, BDSM, the Furry Fandom, Nudism, and the large bisexual population within these communities. These groups face similar discrimination, stigma, and lack of legal protections in various aspects of life.The authors shed light on the political identities, affiliations, and attitudes of these communities in theUnited States, revealing how sexuality and politics are even more deeply intertwined at the margins of society. Despite facing challenges, these communities actively engage in political discussions and activities in hopes of fostering greater inclusivity, better representation, and more informed policies.

Refine Search

Showing 99,276 through 99,300 of 100,000 results